- Feb 2023
-
-
TITLE: Upcoming South Korea’s ‘strategic command’ to oversee cyber units
CONTENT: Speaking at a security forum, Ryoo Moo-bong, deputy defense minister for defense reform, detailed key features of the command that Seoul has been seeking to launch next year to counter evolving North Korean nuclear and missile threats.
South Korea's military plans to task its envisioned "strategic command" with overseeing space and cybersecurity units, and those running F-35 stealth jets and submarines, a defense ministry official said. The command is designed to take charge of the Cyber Operations Command, units for missile, space and electromagnetic spectrum operations as well as those operating F-35 jets and submarines. Ryoo also highlighted the need to improve cyberspace and electromagnetic capabilities, which can be used to neutralize threats from hostile missiles even before their launch.
EXCERPT: South Korea's military plans to task its envisioned "strategic command" with overseeing space and cybersecurity units, and those running F-35 stealth jets and submarines, a defense ministry official said
TOPIC: Cyberconflict and warfare
TREND: N/A
PROCESS: N/A
DATE: February 9, 2023
COUNTRY: South Korea
-
-
dig.watch dig.watch
-
TITLE: The US and UK issue joint cyber sanctions against a cybercrime gang Trickbot
CONTENT: In a joint press release, the United States and United Kingdom announce “historic joint cyber sanctions against the seven individuals who are part of Russia-based cybercrime gang Trickbot”. This action represents the very first sanctions of their kind for the U.K., and result from a collaborative partnership between the U.S. Department of the Treasury’s Office of Foreign Assets Control and the U.K.’s Foreign, Commonwealth, and Development Office; National Crime Agency; and His Majesty’s Treasury to disrupt Russian cybercrime and ransomware.
EXCERPT: The US and UK coordinate actions in issuing sanctions against a cybercrime gang Trickbot that are described as the first major move of a “new campaign of concerted action”
TOPIC: Cyberconflict and warfare
TREND: N/A
PROCESS: N/A
DATE: February 9, 2023
COUNTRY: Global
Tags
Annotators
URL
-
-
h.diplomacy.edu h.diplomacy.edu
-
TITLE: Ransomware hacking campaign targeting Europe and North America
CONTENT: Italy’s National Cybersecurity Agency (ACN) warned of a large-scale campaign to spread ransomware on thousands of computer servers across Europe and North America. France, Finland and Italy are the most affected countries in Europe at the moment, while the U.S. and Canada also have a high number of targets, the ACN warned, according to Italian news agency ANSA.
France was the first country to detect the attack, according ANSA. The French cybersecurity agency ANSSI on Friday released an alert to warn organizations to patch the vulnerability.
It is estimated that thousands of computer servers have been compromised around the world, and according to analysts the number is likely to increase. Experts are warning organizations to take action to avoid being locked out of their systems.
EXCERPT: Italy’s National Cybersecurity Agency warns of ransomware hacking campaign targeting Europe and North America
TOPIC: Cyberconflict and warfare
TREND: N/A
PROCESS: N/A
DATE: February 5, 2023
COUNTRY: Europe, North America
-
TITLE: Russian telecommunications regulator Roskomnadzor blocks access toCIA, FBI websites for 'spreading false information'
CONTENT: Russian telecommunications regulator Roskomnadzor blocked access to the U.S. State Department’s Rewards for Justice website on Friday, alongside the sites for the Central Intelligence Agency and the Federal Bureau of Investigation.
"Roscomnadzor has restricted access to some resources that are owned by government organizations of hostile countries for dissemination of materials that are aimed at the destabilization of the social and political situation in Russia," the agency told TASS in a statement.
The agency acted based on Federal Law #149 On Information, Information Technologies and Protection of Information, it said.
The websites were found to contain materials that "contain inaccuracies in socially important information and discredit the Russian Federation’s armed forces," Roscomnadzor said.
EXCERPT:
Russian agency says it blocked access to CIA, FBI websites which were found to include materials that "contain inaccuracies in socially important information and discredit the Russian Federation’s armed forces"
TOPIC: Cyberconflict and warfare
TREND: N/A
PROCESS: N/A
DATE: January 27, 2023
COUNTRY: Russian Federation
-
TITLE: The US-EU cooperation in fields of Cyber Resilience
CONTENT: US Secretary of Homeland Security Alejandro N. Mayorkas and European Commissioner for Internal Market Thierry Breton, released the joint statement on the cooperation between the US and the EU in the fields of Cyber Resilience.
In the context of the EU-US Cyber Dialogue, the US Department of Homeland Security (DHS) and the European Commission's Directorate-General for Communications Networks, Content and Technology (DG CNCT) intend to launch dedicated workstreams in the fields of:
- Information Sharing, Situational Awareness, and Cyber Crisis Response;
- Cybersecurity of Critical Infrastructure and Incident Reporting Requirements; and
- Cybersecurity of Hardware and Software.
The workstreams are expected to invite and involve as appropriate other relevant institutions and agencies working on cyber issues, including the European External Action Service, the Directorate-General for Defence, Industry, and Space, and the U.S. Department of State. In addition, a cyber fellowship led by DHS and DG CNCT is expected to be launched with a pilot that will involve an exchange of cyber experts in 2023.
The statement further quotes, “Today, we discussed the initial deliverables, which include:
- Deepening structured information exchanges on threats, threat actors, vulnerabilities, and incidents to support a collective response to defend against global threats to include crisis management and support of diplomatic responses.
- Finalizing a working arrangement between ENISA and CISA to foster cooperation and sharing of best practices.
- Collaborating on the topic of cyber incident reporting requirements for critical infrastructure, including guidelines and templates.
- Collaborating on the cybersecurity of software and hardware.
- Exploring how we can work together to better protect civilian space systems.”
The first deliverables from these workstreams are expected to be reported on at the 9th EU-US Cyber Dialogue, foreseen in the second half of 2023.
EXCERPT:
The US and EU will launch workstreams in the fields of Cyber Resilience to establish deeper cooperation and more structured cybersecurity information exchanges on threats between the US DHS and EU DG CNCT as well as other relevant agencies.
TOPIC: Cyberconflict and warfare, Network security
TREND: N/A
PROCESS: N/A
DATE: January 26, 2023
COUNTRY: US, EU
-
- Jan 2023
-
www.reuters.com www.reuters.com
-
Brazil Justice Moraes fines Telegram for not complying with court order
TITLE: Brazil Justice Moraes fines Telegram for not complying with court order.
CONTENT: Brazil's Supreme Court Justice Alexandre de Moraes fined messaging app Telegram for failing to comply with a court order that instructed the suspension of accounts of supporters of former President Jair Bolsonaro who were spreading disinformation and hate speech. Telegram will be fined 1.2 million reais ($236,527). Telegram did not immediately respond to Reuters on their request to comment.
EXCERPT: Brazil's Supreme Court Justice Alexandre de Moraes fined messaging app Telegram for failing to comply with a court order that instructed the suspension of accounts spreading disinformation and hate speech.
TREND: Fake news
DATE: 31/01/2023
COUNTRY: Brazil
-
-
h.diplomacy.edu h.diplomacy.edu
-
TITLE: Extremists use social media to lure to women and girls into (online) extremism
CONTENT: The European Commission’s Radicalisation Awareness Network Practitioners (RAN Practitioners) network published a paper which explores narratives and strategies used by right-wing and Islamist extremist actors to persuade and recruit young women and girls into violent extremism. Especially due to the COVID-19 pandemic, Preventing and Countering Violent Extremism (P/CVE) programs struggled to maintain access to their target groups, especially in offline spaces. The document notes that digital platforms have not been used enough to reach out to girls and women in a strategic manner. On the contrary, the perpetrators took better advantage of social media in approaching and recruiting young women and girls. The paper looks into their tactics and young women and girls’s vulnerabilities. Vulnerabilities the perpetrators take advantage of include, but are not limited to, discrimination young women and girls experience online and offline, desire to belong to a sisterhood-like group, and other issues related to understanding sexuality and other insecurities. While misogynist narratives are on the rise over the past several years and women are being targeted with defamatory hate speech and anti-feminist discussion online, in parallel right-wing extremism (RWE) groups, such as neo-Nazi organisations and identitarian organizations, strategically engage in producing content and using specific hashtags with the aim of persuading girls and women into online extremism. It particularly looks into online platforms such as YouTube, Facebook and Telegram. The paper offers recommendations for preventing and countering extremists’ online targeting of girls and women.
EXCERPT: The European Commission’s Radicalisation Awareness Network Practitioners (RAN Practitioners) network paper explores narratives and strategies used by extremist actors to persuade and recruit young women and girls into violent extremism. Perpetrators take advantage of their insecurities and vulnerabilities to lure them into online extremism.
TOPIC: Violent extremism, Gender rights online
TREND: n/a
DATE: February 25, 2022
COUNTRY: Global
-
-
www.whitehouse.gov www.whitehouse.gov
-
TITLE: US government launches Digital Transformation with Africa
TEXT: The US government has launched a Digital Transformation with Africa (DTA) initiative dedicated to 'expand[ing] digital access and literacy and strengthen[ing] digital enabling environments across the continent'. The USA plans to dedicate over US$350 million to this initiative, which is expected to support the implementation of both the African Union's Digital Transformation Strategy and the US Strategy Towards Sub-Saharan Africa. DTA's objectives revolve around three pillars:
- Digital economy and infrastructure: (a) expanding access to an open, interoperable, reliable, and secure internet; (b) expanding access to key enabling digital technologies, platforms, and services and scale the African technology and innovation ecosystem; (c) facilitating investment, trade, and partnerships in Africa’s digital economy.
- Human capital development: (a) facilitating inclusive access to digital skills and literacy, particularly for youth and women; (b) fostering inclusive participation in the digital economy; (c) strengthening the capacity of public sector employees to deliver digital services.
- Digital enabling environment: (a) strengthening the capacities of authorities and regulators to develop, implement, and enforce sound policies and regulations; (b) supporting policies and regulations that promote competition, innovation, and investment; (c) promoting governance that strengthens and sustains an open, interoperable, reliable, and secure digital ecosystem.
Date: 14 December 2022
-
-
-
False outrage
TITLE: Pro-Kremlin media spreads false claims about President Putin's international support.
CONTENT: Pro-Kremlin comments have been frequently appearing on articles in leading European media. According to permeate public discourse, according to the Security, Crime and Intelligence Innovation Institute at Cardiff University in Wales, these comments are intended to permeate public discourse in Western media. A 2021 study by the institute analysed comments on 32 European media outlets, such as Die Welt and Der Spiegel in Germany. The study concluded accounts are using the space on reader comments in Russia-related news articles to post provocative pro-Russian/anti-Western statements. Comments often They often contradict what the public opinion on a given country really think about Russia, Ukraine, and sanctions against Moscow.
EXCERPT: Pro-Kremlin comments have been frequently appearing on articles in leading European media in order to permeate public discourse in Western media.
LINK: https://www.dw.com/en/how-russian-fake-news-paints-the-germans/a-64394917
TREND: Fake news
DATE: 24/01/2023
COUNTRY: Germany
-
-
www.theverge.com www.theverge.com
-
Climate change denial is making a ‘stark comeback’ on social media, study finds
TITLE: Report finds Big Tech companies recommend climate change denial content
CONTENT: A new report from the Climate Action Against Disinformation (CAAD) coalition revealed that fossil fuel sector-linked entities spent approximately 4 million USD on Meta for paid advertisements to spread false and misleading claims on climate crisis, net-zero targets and necessity of fossil fuels prior to and during COP27. This would imply that not only are social media platforms not managing to crack down on content that rejects widely accepted science risks, but they are even making it worse by promoting climate change denialism. Some of these Big Tech companies were requested to comment, but journalists reporting on the topic have not received an answer yet.
EXCERPT: A new report from the Climate Action Against Disinformation (CAAD) coalition revealed that Big Tech companies are promoting climate change denialism on their platforms.
TREND: Fake news
DATE: 20/01/2023
-
-
www.theverge.com www.theverge.com
-
The company made no outreach to Getty Images to utilize our or our contributors’ material so we’re taking an action to protect our and our contributors’ intellectual property rights
In the High Court of Justice in London, Getty Images has filed a lawsuit against Stability AI, for allegedly infringing the intellectual property rights of millions of images to train its AI image generator, Stable Diffusion. Reports The Verge. According to the lawsuit, Stability AI violated several of Getty Image’s Terms of Service, such as image scraping to train its AI image generator.
Getty Image is alleging that Stability AI has unlawfully copied and processed millions of images from its website without obtaining a license for their commercial exploitation, including copyright in content that belongs to or is represented by Getty Images.
-
-
counterhate.com counterhate.com
-
TITLE: New report examines TikTok’s algorithm in recommending harmful content to vulnerable teen users
CONTENT: Researchers from the Center for Countering Digital Hate look into how TikTok's For You feed's algorithmic recommendations react to teen users who express interest in eating disorders, body image, and mental health.
By creating two brand-new accounts for users in the USA, UK, Australia, and Canada, all of whom were 13 years old, researchers looked at the algorithm behind TikTok. One of these accounts has a username that suggests a preoccupation with one's appearance. They watched and liked any videos about body image, mental health, or eating disorders for each account, and then they recorded the first 30 minutes of algorithmically suggested content on each account's "For You" feed. The resulting recordings were examined to see how frequently eating disorder, self-harm, and body image recommendations were made.
The study found that TikTok gave suicide-related information recommendations in under 2.6 minutes. Within 8 minutes, TikTok offered material on eating disorders. Every 39 seconds, teens on TikTok received recommendations for videos on body image and mental health. According to the study, self-harm videos were recommended to vulnerable accounts with the vulnerable phrase in their usernames 12 times more frequently than they were to regular accounts. The overwhelming deluge of increasingly more suggested films that appear on the feeds of young people who interact with this content is something they must endure.
EXCERPT: Researchers from the Center for Countering Digital Hate look into how TikTok's For You feed's algorithmic recommendations react to teen users who express interest in eating disorders, body image, and mental health. By creating two brand-new accounts for teen users, the report found that TikTok recommended information related to suicide within 2.6 minutes. Teens on TikTok were given recommendations for videos regarding body image and mental health every 39 seconds. The "vulnerable" accounts were recommended self-harm and suicide videos 12 times more frequently than the typical accounts.
LINK: https://counterhate.com/research/deadly-by-design/
TOPIC: Child safety online
TREND: Tik Tok, harmful content, algorithmic recommendations
DATE: December 15, 2022
COUNTRY: Global
-
-
-
TITLE: Meta restricts advertisers to see teen user’s gender information
CONTENT: The way that Meta's apps manage advertising and young users is changing. The new regulations limit how much individualised data advertisers on Facebook and Instagram may use to target ads at teenagers. Additionally, users under the age of 18 will now have more control over the ads they view and the reasons behind them.
Beginning the following month, Meta will discontinue the option for gender-based ad targeting of users who are teenagers. Additionally, the business will stop allowing marketers to target under-18 users with tailored advertising based on their in-app behaviour, such as which Facebook pages they like and who they follow on Instagram. After the adjustments, the only factors used to determine the relevance of tailored advertising on those applications will be a user's age and location.
EXCERPT: Starting next month, Meta will remove the option for targeting advertising to teen users based on gender. The company will also end advertisers’ ability to target personalized ads to under-18 users based on their in-app activity, including who they follow on Instagram and what Facebook pages they like.
LINK: https://about.fb.com/news/2023/01/age-appropriate-ads-for-teens/
TOPIC: Child safety online
TREND: gender, online advertising
DATE: January 10, 2023
COUNTRY: Global
-
-
www.commonsensemedia.org www.commonsensemedia.org
-
TITLE: New report reveals how the U.S. adolescents engaged with or experienced pornography online
CONTENT: According to a research by Common Sense Media, 75% of teens have seen online porn by the time they are 17, with the average age of first exposure being 12 years old. The report's goals are to provide a baseline for understanding U.S. teens' pornography use and to comprehend the role that internet pornography plays in adolescent life in the United States.
The study by Common Sense was based on a poll of 1,358 Americans between the ages of 13 and 17. More than half of those surveyed admitted to seeing pornographic footage of violent crimes like rape, suffocation, or people in pain. The majority of respondents claimed that Asian, Black, and Latino stereotypes were depicted in pornography. After seeing porn, more than half of respondents claimed they felt bad or ashamed. Meanwhile, 45% of respondents felt that pornography gave them useful information about sex. Teenagers who identify as L.G.B.T.Q. in particular claimed it helped them learn more about their sexuality.
EXCERPT: According to a research by Common Sense Media, 75% of teens have seen online porn by the time they are 17, with the average age of first exposure being 12 years old. The report's goals are to provide a baseline for understanding U.S. teens' pornography use and to comprehend the role that internet pornography plays in adolescent life in the United States.
LINK: https://www.commonsensemedia.org/research/teens-and-pornography
TOPIC: Child safety online or Children’s rights
TREND: Child safety online; adolescents;
DATE: January 10, 2023
COUNTRY: United States
-
-
www.helsinkitimes.fi www.helsinkitimes.fi
-
Finland’s THL leaves Twitter, citing volume of disinformation
TITLE: Finish Institute for Health and Welfare withdraws from Twitter due to disinformation.
CONTENT: The Finish Institute for Health and Welfare (THL) announced that they have withdrawn from Twitter due to the high amount of disinformation and inappropriate remarks contained in replies to their posts. Marjo Loisa, the director of communications at THL, explained that although the platform has always been prone to spreading disinformation, the situation worsened during the coronavirus pandemic. Especially given that the THL tweeted about the virus and vaccines. Consequently, the institute took the decision of leaving Twitter because they consider it presently offers little benefits as a channel of official information.
EXCERPT: The Finish Institute for Health and Welfare (THL) announced that they have withdrawn from Twitter due to the high amount of disinformation and inappropriate remarks contained in replies to their posts.
TREND: Fake news
DATE: 17/01/2023
COUNTRY: Finland
-
-
www.antena3.com www.antena3.com
-
Crean un juego de aventuras para enseñar a detectar y combatir los bulos
TITLE: Researchers launch first video game to teach fake news detection
CONTENT: Researchers from the University of Extremadura in Spain have developed and launched a video game aimed at teaching how to detect fake news and combat online disinformation. The game is called "Forge of Destiny (FoD)” and it is the first multi platform initiative designed for this ends. The game is already available online for free use.
EXCERPT: Researchers from the University of Extremadura in Spain have developed and launched a video game aimed at teaching how to detect fake news and combat online disinformation.
TREND: Fake news
DATE: 11/01/2023
COUNTRY: Spain
-
-
www.washingtonpost.com www.washingtonpost.com
-
Covid misinformation spikes in wake of Damar Hamlin’s on-field collapse
TITLE: Covid misinformation spikes on Twitter after NFL player's on-field collapse
CONTENT: NFL player Damar Hamlin collapsed on the field after suffering a cardiac arrest during a game on Monday night. After the incident, anti-vaxxers tweets sought to link the Hamlin's condition and the coronavirus vaccine, without any evidence. These claims were posted by many relevant influencers on the platform and getting as much as 10 million views per tweet, like in the case of a tweet by Charlie Kirk. The massive spread of these claims was also explained by changes in the direction of the Twitter’s policy against covid misinformation in November when new owner Elon Musk took charge. The company has also restored the accounts of many previously suspended individuals, including multiple high-profile anti-vaxxers.
EXCERPT: Excerpt (a brief, tweet-like summary of your update); excerpts should be no longer than 300 characters
LINK: https://www.washingtonpost.com/technology/2023/01/03/covid-misinfo-damar-hamlin-collapse/
TOPIC: freedom of speech
TREND: fake news
DATE: 04/01/2023
COUNTRY: United States
-
- Dec 2022
-
www.reuters.com www.reuters.com
-
TITLE: Turkish court releases first journalist jailed under new 'disinformation' law
CONTENT: A Turkish court ordered the release of a journalist that was detained under the country's new disinformation law. Sinan Aygul became the first journalist to be jailed pending trial under the new law, approved by the Turkish parliament two months ago. Aygul, a journalist in the Kurdish-majority Bitlis province, had written on Twitter last week that a 14-year-old girl had allegedly been sexually abused by the police and soldiers but then apologised because the story was not confirmed with the authorities. Nevertheless, he was prosecuted and put under arrest. The government expressed ghat the disinformation law is aimed at protecting the public, but critics say it can be abused to stifle dissent.
EXCERPT: A Turkish court ordered the release of a journalist that was detained under the country's new disinformation law.
TOPIC: Freedom of the press
TREND: Fake news
DATE: 29/12/2022
COUNTRY: Turkey
-
-
www.cnbc.com www.cnbc.com
-
TechChina is about to get tougher on deepfakes in an unprecedented way.
TITLE: China to introduce pioneering regulation on “deepfakes”
CONTENT: In January, China will introduce pioneering regulation on “deepfakes”, reinforcing their policies of control over internet content. Deepfakes are synthetically generated or altered images or videos built using artificial intelligence. This technology can be used to alter an existing video, for example, by creating realistic fake speech. China announced its new rules for governing “deep synthesis technologies” earlier this year, and finalized them in December. These new legislation will come into effect on Jan. 10.
EXCERPT: In January, China will introduce pioneering regulation on “deepfakes”, reinforcing their policies of control over internet content.
LINK: https://www.cnbc.com/2022/12/23/china-is-bringing-in-first-of-its-kind-regulation-on-deepfakes.html
TOPIC: Freedom of expression
TREND: Fake News
DATE: 23/12/2022
COUNTRY: China
-
-
www.edweek.org www.edweek.org
-
TITLE: More time spent online might increase the risk of OCD for children
CONTENT: Preteens are more likely to develop the obsessive-compulsive disorder if they spend more time playing internet games or watching videos. The most extensive long-term investigation of brain development in American children, the Adolescent Brain Cognitive Development research, has reached this conclusion. The preteens had a 13% higher chance of developing obsessive-compulsive disorder within two years for every additional hour they spent playing video games. Additionally, for every additional hour they spent watching internet videos, their chance of OCD increased by 11%. According to the report, schools can be vital in ensuring that adolescents form positive digital habits at a crucial juncture in their growth.
EXCERPT: Preteens are more likely to develop the obsessive-compulsive disorder if they spend more time playing on internet games or watching videos. The most extensive long-term investigation of brain development in American children, the Adolescent Brain Cognitive Development research, has reached this conclusion.
TOPIC: Children’s rights
TREND: online gaming, screen time, mental health
DATE: December 20, 2022
COUNTRY: the U.S.
-
-
-
Title: Nigeria and Rwanda sign Artemis Accords
Content: Nigeria and Rwanda signed the Artemis Accords, becoming the first two African countries to adhere to the a set of nonbinding commitments to facilitate the peaceful and safe exploration of outer space.
The Artemis Accords, signed by 23 countries up to December 2022, outlines a series of principles, guidelines, and best practices to o enhance the governance of the civil exploration and use of outer space. Intended to apply to civil space activities conducted by the civil space agencies of each signatory countries, the principles cover issues such as peaceful purposes, transparency, interoperability, emergency assistance, registration of space objects, release of scientific data, deconfliction of activities, protection of space heritage, and mitigation of orbital debris, including spacecraft disposal.
-
-
asia.nikkei.com asia.nikkei.com
-
The so-called request for consultations is the first step in a long procedure at the global trade body. The United States has blocked appointments to the WTO's top ruling body on trade disputes, meaning some rows never get settled.
TITLE: China-USA trade dispute at WTO on the U.S. chip export control measures.
CONTENT: China initiated a trade dispute procedure against the U.S. chip export control measures arguing that these measures 'threatened the stability of the global industry supply chains."
The WTO process will start with request for consultations. But, any resolution is not likely as WTO's arbitration body has been disfunctional due to the U.S. blockage of appointing new judges. The WTO's arbitration mechanisms are not likely to be de-blocked.
Thus, China's move has more symbolic relevance in ongling 'chip war' between two countries.
TOPIC: e-commerce
PROCESS: The WTO Joint Statement Initiative (JSI) on e-commerce
||VladaR|| ||AndrijanaG|| Do we have any page on microchips?
-
-
www.aspistrategist.org.au www.aspistrategist.org.au
-
TITLE: Gender equality in space diplomacy
CONTENT: Space negotiation should become more gender-inclusive. This article calls Australia to have leading role in space diplomacy and gender in the wider context of UN women, peace and security (WPS) agenda with the following specific proposals:
- to use of gender-neutral language such as ‘piloted’ or ‘automated’ rather than ‘manned’ or ‘unmanned’ when referring to spacecraft;
- to ensure greater participation by women diplomats and decision-makers in space security negotiations; and
- to take into account the disproportionate impact on girls and women when space-based technologies are interrupted, interfered with or attacked in grey-zone and conflict situations.
EXCERPT: Space diplomacy should become more gender inclusive from changes in language used in space negotiations to more involvement in women in space diplomacy.
TOPIC: Space diplomacy
||sorina|| Let us also publish this on Space Diplomacy at Diplo website
-
-
therecord.media therecord.media
-
Australia signed a bilateral security agreement with Vanuatu on Tuesday which will include cooperation over cybersecurity matters, the Department of Foreign Affairs and Trade (DFAT) announced. The agreement was signed as Australian Foreign Minister Penny Wong visited the island nation in the wake of a severe ransomware attack in November. The attack left the Pacific island’s government in disarray; internal systems were completely unavailable impacting a host of emergency services, alongside schools and hospitals. The Sydney Morning Herald reported that officials from the Australian Cybersecurity Centre assisted Vanuatu’s government in rebuilding the systems following the attack. The two countries have historically had strong diplomatic ties. The pact involves cooperation in a range of areas, including humanitarian assistance and disaster relief, as well environmental and resource security, maritime and aviation safety and security, as well as defense and policing, according to DFAT. It “reflects Australia and Vanuatu’s ongoing commitment to working together as members of the Pacific family to address shared security challenges,” said Australia’s deputy prime minister Richard Marles. Australia, which is rewriting its own national security strategy following the ransomware attack on health insurance business Medibank, has ramped up its diplomatic work in the region as it competes with China. Beijing attempted — although ultimately failed in May — to sign regional trade and security agreements with the 10 Pacific Island states it has diplomatic relations with. An unexpected security deal between China and the Solomon Islands in April provoked enormous concern — particularly plans that would permit China to create a military base just 2,000 km from Australia itself. Following the announcement of the agreement, the Solomon Islands’ prime minister Manasseh Sogavare stressed that he would not allow a Chinese military base in the country. He said the agreement covered the contingency of “a gap” in the kinds of security that Australia can provide: “When it comes to security issues in the region, we will call on them [the Australians] first.” The details of China’s agreement with the Solomon Islands have not been published, although a leaked draft was posted online revealing broad access to the Solomon Islands was being offered to China’s military and police. Australia’s agreement with Vanuatu “will be publicly available,” said Wong on Tuesday, because both nations are “committed to democracy, accountability and transparency.”
TITLE: Australia and Vanuatu conclude pact on defense, including cybersecurity
CONTENT: The agreement includes cybersecurity cooperation. Australia already helped Vanuatu after November randsomwere attack that impacted emergency services, schools and hospitals.
This agreement is part of Australia's renewed push to strengthen its relationships with other countries in the Pacific in the context of increasing presence of China.
EXCERPT: Australia strengthens cybersecurity cooperation in the Pacific region by singing safety pact with Vanuatu.
TOPIC: cybersecurity
TREND: n/a
PROCESS: n/a
DATE: 12 December 2022
COUNTRY: Australia, Vanuatu
-
-
www.washingtonpost.com www.washingtonpost.com
-
Twitter dissolves Trust and Safety Council
TITLE: Twitter abruptly dissolves its Trust and Safety Council.
CONTENT: Twitter abruptly dissolved its Trust and Safety Council on Monday night. This happened just moments before a scheduled meeting with company representatives. The Trust and Safety Council was created to make the platform safer and more civil, after years of work towards that goal. Members of Twitter’s Trust and Safety Council received an email informing them the council was no longer “the best structure” to bring “external insights into our product and policy development work.”
EXCERPT: Twitter abruptly dissolved its Trust and Safety Council on Monday night.
LINK: https://www.washingtonpost.com/technology/2022/12/12/musk-twitter-harass-yoel-roth/
TREND: Fake News
PROCESS: Freedom of expression
DATE: 12/12/2022
COUNTRY: United States
-
-
www.theguardian.com www.theguardian.com
-
Concern as US media hit with wave of layoffs amid rise of disinformation
TITLE: Wave of layoffs in US media raises concerns about the spread of disinformation
CONTENT: A wave of layoffs in US media raises concerns about the spread of disinformation. Several major companies, including CNN, BuzzFeed and Gannett, have laid off hundreds of workers in recent weeks citing economic volatility and uncertainty. The recent staff cuts have triggered new worries over the health of the US media at a time of democratic crisis.
EXCERPT: A wave of layoffs in US media raises concerns about the spread of disinformation.
LINK: https://www.theguardian.com/media/2022/dec/10/media-layoffs-cnn-buzzfeed-gannett-recount-protocol
TREND: Fake news
DATE: 12/12/2022
COUNTRY: United States
-
-
-
Meta, the parent company of Facebook today said that it is partnering with the Independent National Elections Commission (INEC), civil society groups and local radio stations to stop spread of fake news and protect the integrity of the Nigerian 2023 general elections.
TITLE: Meta partners with Nigerian organisations to combat disinformation ahead of 2023 elections
CONTENT: Meta announced they will partner with the Independent National Elections Commission (INEC), civil society groups and local radio stations to combat the spread of disinformation and protect the integrity of the Nigerian 2023 general elections. The approach has also been informed by conversations with human rights groups, NGOs, local civil society organisations, regional experts and local election authorities and consists of a series of measures to promote good practices and make it easier for audiences to distinguish trusted content from dubious claims. For instance, the official Facebook page on the 2023 elections on its platform will have a blue tick which confirms the authentic of the results posted on the INEC official website. Additionally, Meta has quadrupled the size of its global teams working on safety and security to about 40,000 people, including over 15,000 content reviewers in every major timezone. Collectively, these reviewers are able to review content in more than 70 languages- including Yoruba, Igbo and Hausa.
EXCERPT: Meta announced they will partner with the Independent National Elections Commission (INEC), civil society groups and local radio stations to combat the spread of disinformation and protect the integrity of the Nigerian 2023 general elections.
LINK: https://leadership.ng/meta-partners-inec-ngos-to-combat-2023-elections-fake-news/
TREND: Fake news
DATE: 08/12/2022
COUNTRY: Nigeria
-
- Nov 2022
-
www.unicef-irc.org www.unicef-irc.org
-
TITLE: New evidence revealed the disparity in the internet access for children in five African countries
CONTENT: A recent UNICEF research brief estimated the level of internet access for children in Ethiopia, Kenya, Namibia, Uganda, and the United Republic of Tanzania, as well as the most common barriers to connecting children to the digital world and their consequences. The report classified these common barriers into three categories: infrastructure-related, resource-constrained, and adult permission-related. According to the findings, 90% of children in the five countries surveyed reported having at least one barrier to regular internet access. The most frequently mentioned barrier was the high cost of data.
The report identified three priorities for addressing the digital divide and enabling equal access to digital connectivity: investing in electricity and connectivity with a focus on marginalised communities and users; lowering the cost of connectivity and devices; and addressing cultural and social norms as barriers to address for children and adolescents.
EXCERPT: A recent UNICEF research brief revealed that 90% of children in Ethiopia, Kenya, Namibia, Uganda, and Tanzania experienced at least one of three common barriers to regular internet access - infrastructure-related, resource-constrained, and adult permission-related barriers. The most frequently mentioned barrier was the high cost of data.
TOPIC: Children’s rights
TREND: internet access; internet connectivity; digital divide; digital inclusion.
DATE: November 2022
COUNTRY: Ethiopia, Kenya, Namibia, Uganda and Tanzania
-
-
-
TITLE: WHO report evaluates online safety and violence against children educational programmes for youth.
CONTENT: Based on a review of evaluations of online safety programmes and online VAC programmes for children and adolescents, the report, What Works to Prevent Online Violence Against Children, discovered strong evidence that prevention education for children can work, and that this is a key strategy for addressing online VAC. Educational programmes have been widely demonstrated to improve overall safety and health. These educational programmes are particularly effective in preventing one type of online VAC, cyberbullying (both victimisation and perpetration).
This report also captured a number of structural and skill components that contribute to the effectiveness of educational programmes and should be widely adopted.
- Structural components include multiple and varied learning strategies and tools; more lessons, more message exposures, more reminders, and follow-ups; using peer engagement, role-plays, and interactions; getting a supportive whole-school environment; and parental involvement.
- Skill components include problem-solving, assertiveness, empathy, self-regulation, help-seeking, bystander or defender mobilization, social norm instruction, sex education, and substance abuse education.
The report also revealed that there is a lack of evidence about the success of prevention programmes for online child sexual exploitation and abuse.
The report suggests implementing school-based educational programmes with multiple sessions that encourage youth interaction and involve parents. It emphasises the need for more violence prevention programmes that integrate content about online dangers with offline violence prevention. It suggested less emphasis on stranger danger and more emphasis on acquaintance and peer perpetrators, who are responsible for the majority of online violence against children.
EXCERPT: The WHO report on what works to prevent online violence against children, based on a review of evaluations of online safety programmes for youth, found strong evidence that prevention education for children can work and can increase safety and health in general.
LINK: https://www.who.int/publications/i/item/978924006206
TOPIC: Child safety online
TREND: Violence against children; online violence against children; educational program; cyberbullying; online child sexual exploitation and abuse; evidence review.
DATE: 24 November 2022
COUNTRY: Global
-
-
www.unicef.org www.unicef.org
-
TITLE: UNICEF released a future-ready, child-centered digital framework to address inequalities in children's lives.
CONTENT: Given that digital exclusion mirrors and magnifies existing social, cultural, and economic inequities and pushes vulnerable children closer to the edges of marginalisation, the digitization of society has an uneven consequence on all children. In order to address the effects of the shifting digital and governance landscape, as well as emerging and embedded technologies, on children's experience with digital technologies, a future-oritened framework for an equitable digital future was proposed in this new UNICEF report. This framework drew the needs of transformation from "digital inclusion" to "digital equality". For this framework to effectively respond to new trends and technologies, a wider range of stakeholders must be engaged.
The framework can be used as a foundation for developing and evaluating digital inclusion policies, as a roadmap for structuring the involvement of pertinent stakeholders in achieving digital equality for children, and as a tool to assist in the design of policies and interventions by state authorities, civic groups, and the private sector.
EXCERPT: A new child-centered digital framework proposed by UNICEF painted an equitable digital future, highlighting the need for a shift from "digital inclusion" to "digital equality," as well as increased participation from relevant stakeholders.
LINK: https://www.unicef.org/globalinsight/reports/towards-child-centred-digital-equality-framework
TOPIC: Children’s rights
TREND: digital equity; child-centred; inequality
DATE: October 2022
COUNTRY: Global
-
-
www.who.int www.who.int
-
TITLE: WHO report recommends to strengthen the evidence base to monitor the digital health transformation
CONTENT: Digital health refers to the use of information and communication technologies for delivering health care and service, managing health systems and facilities. Despite the positive role that digital health has played to improve health care access, safety, and quality, this WHO report pointed out that digital health programmes and interventions are often not monitored or evaluated. It found that existing metrics for measurement and evaluation tend to be left behind by the rapid evolution of digital health. This report made the case for the necessity of incorporating health data measurement and governance into health care systems. Making available information more accessible at the national and international levels, addressing the variability in digital health monitoring, paying closer attention to monitoring digital health inequalities, and addressing the potential risk of exacerbating inequalities among the most vulnerable, including young children, are all necessary steps to improve monitoring activities.
EXCERPT: A WHO report noted that monitoring of digital health programmes is frequently lacking. It advised focusing attention on enhancing current measurement measures, reducing the variability in digital health monitoring, and addressing the disparities in digital health among the most vulnerable, especially young children.
LINK: https://www.who.int/europe/publications/i/item/WHO-EURO-2022-5985-45750-65816
TOPIC: Children’s rights
TREND: digital health; monitoring and evaluation.
DATE: 22 November 2022
COUNTRY: Global
-
-
-
Taiwan says it sees less Chinese interference ahead of elections
TITLE: Taiwanese Foreign Minister attests decreased Chinese interference in upcoming elections
CONTENT: Taiwan has repeatedly accused China of attempts to meddle in their elections with online disinformation campaigns. China, which claims the democratically governed island as its own territory, has always played a role in Taiwanese politics. However, Taiwanese Foreign Minister Joseph Wu said to the press ahead of the elections that this time around it seemed like there has been less interference from the Chinese government. Still, more recent news reports do find evidence of Chinese disinformation operations in Taiwan. China's Taiwan Affairs Office did not respond to requests for comment by Reuters.
EXCERPT: Taiwanese Foreign Minister Joseph Wu said to the press ahead of the elections that this time around it seemed like there has been less interference from the Chinese government.
TREND: Fake news
DATE: 27/11/2022
COUNTRY: Taiwan
-
-
www.theguardian.com www.theguardian.com
-
Emmanuel Macron has accused Russia of feeding disinformation to further its “predatory project” in Africa, where France has had military setbacks.
TITLE: Macron accuses Russia of financing disinformation projects in Africa
CONTENT: In an interview with TV5 Monde, Emmanuel Macron has accused Russia of spreading disinformation to further its “predatory project” in Africa. He explained that there are several different actors with the intention to spread disinformation in the continent in order to hurt France after its military setback in the Region. In particular, there is concern regarding the Kremlin-linked Wagner Group that built connections with Mali’s military after France pulled its troops out of the country. Russia has rejected the accusations and Yevgeny Prigozhin, the businessman believed by the EU to be behind the Wagner Group called the reports “fakes, outright lies and … falsification”.
EXCERPT: In an interview with TV5 Monde, Emmanuel Macron has accused Russia of spreading disinformation to further its “predatory project” in Africa.
TREND: Fake news
DATE: 21/11/2022
COUNTRY: Russia, France, Mali
-
-
www.euronews.com www.euronews.com
-
How climate disinformation is spreading after Elon Musk’s Twitter takeover
TITLE: Activists express concerns about climate disinformation on Twitter after Musk's takeover
CONTENT: Activists have been expressing their concerns about climate disinformation on Twitter after Musk's takeover. Although there has not been an explicit policy change in Twitter’s approach to tackling climate disinformation on the platform, Musk fired Twitter’s sustainability team within a wider cull of staff two days before the start of COP27. Jennie King, head of civic action and education at the Institute for Strategic Dialogue (ISD) explained that Twitter was supposed to be the voice of COP27, according to a campaign planned in advance alongside climate advocates. However, she expressed that all the intermediaries on the company were laid off and since then there has been a spike in outright climate denial on the platform,
EXCERPT: Activists have been expressing their concerns about climate disinformation on Twitter after Musk's takeover. Although there has not been an explicit policy change in Twitter’s approach to tackling climate disinformation on the platform, Musk fired Twitter’s sustainability team within a wider cull of staff two days before the start of COP27.
TREND: Fake news
DATE: 18/11/2022
-
-
www.reuters.com www.reuters.com
-
Russian Foreign Minister Sergei Lavrov was taken to hospital after arriving in Indonesia's Bali for the G20 summit, the Associated Press reported on Monday, a report that Moscow dismissed as "fake news".
TITLE: Moscow claims that reports of their hospitalised foreign minister at G20 are 'fake news'
CONTENT: Russian Foreign Minister Sergei Lavrov arrived in Bali to represent Russian President Vladimir Putin at the G20 Summit. Lavrov was taken to the hospital shortly after arriving in Bali and the Associated Press reported on Monday that Lavrov was being treated for a heart condition, citing several sources. Nevertheless, Russia's foreign ministry spokesperson claimed that the report was baseless and dismissed the situation by calling it "fake news".
EXCERPT: Russia's foreign ministry spokesperson claims that reports of their hospitalised foreign minister at G20 are 'fake news'
TREND: fake news
DATE: 14/11/2022
COUNTRY: Russia
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
A California federal judge dismissed blockchain platform Dfinity's trademark suit over the infinity-symbol logo against Meta Platforms Inc. The judge ruled that the two logos were not similar enough to sustain the lawsuit.
In a trademark infringement lawsuit, Swiss blockchain group Dfinity Foundation alleged that Mets copied its infinity-symbol logo, which was similar to the one used by the Swiss company.
The court found that Meta's logo was not likely to cause consumer confusion with Dfinity's logo as Dfinity's rainbow infinity logo is not similar in shape or colour to Meta's log. Given the targeted audience, it is unlikely to create any confusion, the court concluded.
-
-
ec.europa.eu ec.europa.eu
-
Is globalisation going back to localisation and centralisation?
The US government announced the Chips and Science Act of 2022 to strengthen the chips supply chain and provide more STEM job opportunities to Americans.
The UK Digital Strategy sets semiconductors and advanced computing as critical supply chains and builds partnerships with the US government.
The European Commission proposed the Chips Act in Feb. 2022 to enhance productivity and technology leadership. Then, the Commission approved the Italian measure to improve the semiconductor supply chain. To achieve the goals of digital and green transition.
Some advanced economies try to deindustrialization, keep the research and development in these developed countries and set manufacturing processes in less economically developed countries before 2022. The economic activity is called the "global division of labour."
But these national and regional strategies or bills seem to make the whole manufacturing process in the local country or the region and try to decouple with some controversial countries.
-
-
www.nytimes.com www.nytimes.com
-
But more than any single post, the danger of manipulated media lies in the way it risks further damaging the ability of many social media users to depend on concepts like truth and proof. The existence of deepfakes, which are usually created by grafting a digital face onto someone else’s body, is being used as an accusation and an excuse by those hoping to discredit reality and dodge accountability — a phenomenon known as the liar’s dividend
Title: Misinformation experts express concern about manipulated content on TikTok
Content: Experts who study misinformation are expressing concerns about manipulated video and photo content on TikTok. Manipulated media is a key feature on the platform and is mostly used as an entertainment or humorous resource. However, fake news stories and deepfake images of politicians are starting to become a pervasive reality on the popular video platform. These techniques are being applied to posts that sow political division, advance conspiracy theories and threaten the core tenets of democracy ahead of the midterm elections. Henry Ajder, an expert on manipulated and synthetic media stated: “When this volume of content can be created so quickly and at such scale, it completely changes the landscape.” Experts also said it is especially difficult to detect and moderate this kind of content on TikTok, where an estimated 1.6 billion active users put their own stamp on someone else’s content, and where objective facts, satire and outright deceit sometimes blend together in the fast-moving feed. Regardless of single posts, the largest concern is about how these apps where manipulated media is a feature blurs the users ability to tell the difference between truth and fake.
Excerpt: Experts who study misinformation are expressing concerns about manipulated video and photo content on TikTok. The largest concern is about how these apps where manipulated media is a key feature blurrs the users ability to tell the difference between truth and fake.
Link: (https://www.nytimes.com/2022/11/04/technology/tiktok-deepfakes-disinformation.html)
Trend: Fake news
Date: November 4th
-
-
h.diplomacy.edu h.diplomacy.edu
-
TITLE: INTERPOL launches first INTERPOL Global Crime Trend Report 2022 (IGCTR)
CONTENT: With a view to improving law enforcement's access to timely and accurate criminal intelligence analysis, INTERPOL has produced the first INTERPOL Global Crime Trend Report 2022 (IGCTR), which also includes a summary of key findings on global crime trends. The IGCTR is INTERPOL's first assessment to greatly rely upon the Organisation's data holdings and contributions from its global network of 195 member countries as well as private sector partners
Among the top five global trends ranks cybercrimes, for which ransomware, phishing, online scams and computer intrusion are perceived as 'high' or 'very high' threats by INTERPOL member countries. Also among the top ten crime trends was Online Child Sexual Exploitation and Abuse (OCSEA), for which 62% of member countries expected these crimes to "increase" or "significantly increase" in the future.
TOPIC: cybercrime
-
-
www.fmprc.gov.cn www.fmprc.gov.cn
-
Title: The German Chancellor will visit Beijing to push human rights and an open market
The German Chancellor, Olaf Scholz, will visit Beijing on Nov 4. The trip aims to discuss human rights and push an open market. The Chancellor will probably focus on establishing a mutually beneficial business relationship between Germany and China, especially for all European and enterprises. (link)
The German government allowed the Chinese shipping company to set up a terminal in Hamburg. The government is still assessing a Sweden company's acquisition of a small-scale, German-based semiconductor company with €85 million. The Sweden company is owned by one of the Chinese microchip manufacturers. (link)
The U.S. Government published the rule to restrict chips in advanced technology export to Chinese entities in Oct. To prevent the Chinese government uses advanced chips in military applications. Chinese enterprises begin to search for any opportunity to own the chip technology to prosper their technical development, i.e., supercomputer, artificial intelligence, autonomy technology and aerospace technology. Many related companies have stopped providing services or materials to Chinese companies.
-
-
h.diplomacy.edu h.diplomacy.edu
-
TITLE: The White House to host the second Counter Ransomware Initiative Summit
CONTENT: This week, the White House will host the Counter Ransowmare Initiative Summit with representatives from 13 international firms and representatives from 36 countries and the European Union to discuss the growing threat posed by ransomware and other cybercrime on critical infrastructure and individuals. The goal of the Summit is to “institute a set of cyber norms and rules of the road that are recognized across the globe to counter criminal ransomware threats and hold malicious actors accountable”. A joint statement by participants is expected at the end of the Summit.
EXCERPT: The White House will host the second Counter Ransowmare Initiative Summit with representatives from 36 countries and the EU as well as private sector actors to discuss the threats posed by ransomware and other cybercrime on critical infrastructure.
TOPIC: Critical Infrastructure, Cybersecurity
TREND: Protection of Critical Infrastructure
PROCESS: -
DATE: 31October 2022
COUNTRY: United States
-
TITLE: Australia releases a practical framework for cyber governance principles
CONTENT: The Australian Institute of Company Directors (AICD) and the Cyber Security Cooperative Research Centre (CSCRC) have published the Cybersecurity Governance Principles, a set of governance principles and a “practical framework” for organizations to strengthen their cyber resilience. The principles cover five main areas: roles and responsibilities, cyber strategy, cyber risk management, cyber resilient culture, and cyber incident planning.
These guidelines build on the recently published Cybersecurity Performance Goals for Critical Infrastructure by the US Department of Homeland Security as an example of best practice and are being considered by the Australian government as it reviews its cyber laws following a spate of recent high-profile hacks.
EXCERPT: The Australian Institute of Company Directors (AICD) and the Cyber Security Cooperative Research Centre (CSCRC) have published the Cybersecurity Governance Principles, a set of governance principles and a “practical framework” for organizations to strengthen their cyber resilience.
TOPIC: Critical Infrastructure, Cybersecurity
TREND: Protection of Critical Infrastructure
PROCESS: -
DATE: 27 October 2022
COUNTRY: Australia
-
TITLE: The US Department of Homeland Security releases New Cybersecurity Performance Goals for Critical Infrastructure (CPGs)
CONTENT: On 27 October 2022, the United States Department of Homeland Security (DHS) released new Cybersecurity Performance Goals (CPGs). CPGs are voluntary and non-comprehensive “prioritized subset of IT and operational technology (OT) cybersecurity practices)” that identify the highest priorities and measures owners of critical infrastructures and supply chains should follow to protect against cyber attacks.
As part of the White House efforts and new investments in cybersecurity, the CPGs were developed by the Cybersecurity and Infrastructure Security Agency (CISA) in collaboration with governmental and private sector actors. These procedures are meant to be implemented in the National Institute of Standards and Technology's (NIST) Cybersecurity Framework (CSF), covering the following issues: account security, device security, data security, governance and training, vulnerability management, supply chain and third parties security, and finally recovery and response.
EXCERPT: The United States Department of Homeland Security released new New Cybersecurity Performance Goals for Critical Infrastructure (CPGs) to identify priorities and measures owners of critical infrastructures and supply chains should follow to protect against cyber attacks.
TOPIC: Critical Infrastructure, Cybersecurity
TREND: Protection of Critical Infrastructure
PROCESS: -
DATE: 27 October 2022
COUNTRY: United States
-
- Oct 2022
-
www.finnegan.com www.finnegan.com
-
-
Dutch corporations have unknowingly supplied Russia with high tech.
Dutch high-tech companies have unknowingly sold technology to firms founded by the Russian military intelligence service, the head of the Dutch military (MIVD) secret service revealed in an interview with Financieele Dagblad.
As explained by MIVD head, Jan Swillens, the Russian secret service created dozens of businesses functioning in the Netherlands as 'front companies' to purchase technology in the Netherlands and smuggle it to Russia, thus evading sanctions. The products range from microchips to rubber for the tires of military vehicles.
Such practices have existed since the Russian annexation of Crimea in 2014, 'but with the war in Ukraine, it is increasing significantly', Swillens said.
Duch official has called on high-tech companies to conduct more thorough research into their customers and inquire about their products' actual end users and has informed defense minister Kajsa Ollongren about the smuggling routes.
-
-
www.reuters.com www.reuters.com
-
A Russian diplomat warned that commercial satellites used by the US and its allies to help Ukraine in the war could become legitimate targets for attacks.
Speaking at the first special session of the UN General Assembly on Disarmament, Konstantin Vorontsov, deputy director of the Russian foreign ministry's department for non-proliferation and arms control, said that:
'Quasi-civilian infrastructure may be a legitimate target for a retaliatory strike,' and noted that helping through civilian satellites constitutes indirect participation in military conflicts, calling it 'an extremely dangerous trend'.
A senior official from the American administration quickly responded in reaction to threats made by a Russian diplomat.
John Kirby, National Security Council Coordinator for Strategic Communications, said at a news conference that 'any attack on US infrastructure will be met with a response and that will be met with a response appropriate to the threat that's posed to our infrastructure.'
Likewise, Kirby promised that the US would continue supporting Ukrainian war efforts.
-
-
www.federalregister.gov www.federalregister.gov
-
Title: The U.S. BIS announced new Export Administration Regulations for national security and foreign policy concerned https://www.federalregister.gov/documents/2022/10/13/2022-21658/implementation-of-additional-export-controls-certain-advanced-computing-and-semiconductor
The US Commerce Department's Bureau of Industry and Security (BIS) is concerned about its national security and foreign policy. The BIS made critical changes to the Export Administration Regulations (EAR).
Based on the published document, advanced integrated circuits (ICs) used in supercomputing, semiconductor manufacturing in ICs, software, and technology in new advanced computing and military defense usage are in the EAR. They need to apply for export permission. The document also listed twenty-eight entities in China which were identified for the national security and foreign policy concerned.
The US BIS knows the new rule will impact to the supply chain, they also set two changes to minimize the short term impact on the supply chains. The new rule gives some companies a one-year waiver to produce their products in China .
-
-
www.reuters.com www.reuters.com
-
Interpol says metaverse opens up new world of cybercrime
Madan Oberoi, Interpol's executive director for technology and innovation warned about the potential of cybercrime in the metaverse and said the agency is preparing for dangers posed by the virtual world(s).
Metaverse could potentially amplify the cybercrime challenges already present online while also introducing a host of new ones. Cybercrime might operate differently when augmented reality and virtual reality are involved. Oberoi cautioned
"Some of the crimes may be new to this medium, some of the existing crimes will be enabled by the medium and taken to a new level," Oberoi said.
He underlined other serious concerns, such as child safety and the possibility that virtual reality can make crime in the real world easier.
‘If terror group wants to attack a physical space they may use this space to plan and simulate and launch their exercises before attacking,’ he said.
Law agencies are increasingly interested in the metaverse, with Interpol developing its own virtual environment that will allow police forces around the world to communicate with one another and even participate in immersive training courses. At the same time, Europol recently published its second report about the metaverse named ‘Policing in the metaverse: what law enforcement needs to know’.
-
-
www.reuters.com www.reuters.com
-
Apple Inc lost an appeal in a London court over key technology patents that are used in Apple's devices. The Court of Appeal confirmed the lower court’s previous decision that Optis Cellular Technology LLC can restrict Apple from using the crucial patents for 3G and 4G telecommunications unless Apple commits to fair and reasonable terms of use.
Judge Richard Arnold stated that Apple merely needed to agree to accept a global license over the standard essential patents on terms that a court considered to be fair and reasonable to avoid an injunction on using the patents in England and Wales.
The ruling is the latest in a dispute that has been ongoing since 2019 when Optis accused Apple of infringing eight of its patents on key telecommunications technology through the sale of products, including iPhone and iPad. In contrast, Apple claimed that Optis has been abusing its dominant position.
The legal battle between Apple viruses Optis has already prompted six separate trials and three appellate hearings in Uk alone, with two further Court of Appeal hearings due next year.
Also, the mentioned companies led a legal dispute before a court in the US, where a judge fined Apple $300 million for infringing on Optis' patent rights related to wireless standards. Apple attempted to appeal the decision, but an East Texas court denied its bid for a third trial in May.
-
-
www.cnbc.com www.cnbc.com
-
The bill is especially concerned with the protection of children, having been developed in response to the death of Molly Russell, a U.K. teen who took her own life after being exposed to suicide-related posts on Instagram
UK's telecom regulator chief (Ofcom)said Meta and Microsoft will not be allowed to self-regulate their metaverses in the UK and will be subject to the country's proposed Online Safety Bill. Breach of the online safety legislation, which is yet to be approved, may result in heavy fines of up to 10% of annual global revenues. Furthermore, senior executives of those companies could even face criminal charges in case of extreme violations.
Melanie Dawes, CEO of Ofcom, stated that businesses in the metaverse wouldn't be allowed to self-regulate their virtual worlds and would instead need to comply with the Online Safety Bill in the UK.
The Online Safety Bill is a proposed legislation drafted to prevent the online sharing of harmful content. The law, which is yet to be approved, would require companies to create a set of strict measures to address harmful content. The legislation focuses particularly on protecting children.
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
Tata Power
The Hive ransomware group has claimed responsibility for a cyberattack against India's largest power company Tata Power. As reported by bleepingcomputer, the threat actor began leaking data allegedly stolen from Tata Power on their leak site after failed ransom negotiations.
According to details shared by security researcher Rakesh Krishnan, the leak contains personally identifiable information (PII), including Aadhaar identity numbers, permanent account numbers (PAN), drivers' license, salary specifics, and engineering drawings.
The incident is said to have occurred on 3 October 2022 and was confirmed by Tata Power; however, the company refused to provide any additional details (about the incident).
-
-
www.reuters.com www.reuters.com
-
Apple filed a lawsuit against medical tech company Masimo Corp in federal court in Delaware, accusing the company of 'copying' its Apple Watch. According to the case, Masimo Corp, W1 smartwatches infringed several Apple Watch patents.
An Apple spokesperson said in a statement that it hoped the suit would 'protect the innovations we advance on behalf of our customers.'
On the other hand, Masimo spokesperson said Apple's suit was an effort to 'divert attention from the litigations brought by Masimo,' and accused Apple of intellectual property theft "instead of competing fairly."
Previously, Masimo, which specializes in health-monitoring devices for medical patients, sued Apple in California federal court in 2020. The company claimed that Apple had stolen its trade secrets and infringed its patents, including measuring heart rate and blood-oxygen levels. Last year, it also asked the US government to halt imports of Apple Watches that violate its patents.
-
-
cert.gov.ua cert.gov.uaCERT-UA1
-
Tropical Scorpius
The Computer Emergency Response Team of Ukraine (CERT-UA) reported the spread of phishing emails that target critical infrastructure with Cuba Ransomware.
As explained by CERT-UA Team, phishing emails impersonated the Press Service of the General Staff of the Armed Forces of Ukraine, enticing recipients to click a link. The victims are lured to a third-party website to update the PDF Reader software to read the embedded document. Upon clicking the 'DOWNLOAD' button, victims are infected with malware known as 'ROMCOM RAT.' The operations are linked to the threat actor 'Tropical Scorpius'.
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
www.reuters.com www.reuters.com
-
Iran's atomic energy organization says e-mail was hacked
TITLE: Iran’s nuclear energy agency’s email got hacked from a foreign country
CONTENT: Iran's atomic energy organization announced on Sunday that an e-mail server belonging to one of its subsidiaries had been hacked from a foreign country and material had been published online.
Black Reward, an Iranian hacker collective, claimed in a statement posted on Twitter that it has made leaked information about Iranian nuclear programs, calling the move a gesture of support for Iranian protesters.
According to Black Reward, the documents released included atomic development contracts and agreements with domestic and foreign partners, management and operational schedules of different parts of the Bushehr power plant, and passports and visas of Iranian and Russian specialists working there.
In a statement made on October 21, Black Reward threatened to reveal hacked data within 24 hours if the government did not free political prisoners and those detained during the uprising.
EXCERPT: An e-mail server belonging to Iran's atomic energy organization was hacked from a foreign country. Black Reward, an Iranian hacker collective, claims it has made leaked information about Iran's nuclear programs public. Documents include atomic development contracts, management and operational schedules of different parts of Bushehr power plant.
TOPIC: Cybercrime, Cyberconflict and warfare
DATE: 23.10.
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
New Phishing Campaign Targets Saudi Government Service Portal
TITLE: Saudi government’s service site becomes a target of a new phishing campaign
CONTENT: Multiple phishing domains imitating Absher, the Saudi government service site, have been set up to supply citizens with fake services and steal their passwords.
CloudSEK cybersecurity researchers made the finding and published an advisory about the threat on Thursday.
Government services in the Saudi region have reportedly recently been a top target for cybercriminals looking to steal user credentials and exploit them in other cyberattacks, according to CloudSEK.
In order to lessen the effects of these assaults, CloudSEK urged government agencies to keep an eye on phishing attempts that target citizens and warn and educate them about the risks, such as by advising them not to click on questionable links.
EXCERPT: Saudi citizens are being targeted by phishing websites that mimic Absher, the Saudi government service site. Cybercriminals are looking to steal user credentials and exploit them in other cyberattacks, researchers say. Government services in the Saudi region have reportedly been a top target for cybercriminals.
LINK: https://www.infosecurity-magazine.com/news/phishing-campaign-saudi-government/
DATE: 21.10.
TOPIC: Cybercrime, Cybersecurity, Cyberconflict and warfare
-
-
www.europol.europa.eu www.europol.europa.eu
-
The Europol Innovation Lab has published its second report under its Observatory function, ‘Policing in the metaverse: what law enforcement needs to know’. The reports are intended to aid in the understanding, adaptation, and planning of law enforcement agencies for policing in the metaverse.
Based on in-depth consultations with law enforcement experts, industry and academia, the report provides a detailed overview of the potential for criminal activities within the metaverse, recommendations for tackling crime (within the metaverse) alongside the opportunities and best practices for building a police presence online.
-
-
trust.zscaler.com trust.zscaler.com
-
Zscaler
Internet connectivity was on 19 October impacted after a major cable cut in the south of France, affecting subsea cable connectivity to Europe, Asia, the United States and potentially other parts of the world. As a result, customers may see packet loss or latency for websites and applications which cross these impacted routes. Cloud security company Zscaler reports that they made routing adjustments to reduce the impact.
According to Zscaler, three French links - from Marseille-Lyon, Marseille-Milano, and Marseille-Barcelona- were cut.
While the repair crews reached the spots quickly, they had to wait for the police to collect evidence. As of now, the issue has been resolved, and all internet connectivity should resume usually.
Coincidently, the undersea cable that connects the Shetland Islands to the Scottish mainland has reportedly also suffered damage, according to the BBC. Since cables between the Faroe Islands and Shetland were also recently damaged, this is the second incidence involving marine cables in that area in a short period.
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
Ransomware is Being Used As a Precursor to Physical War: Ivanti
TITLE: Ivanti’s Ransomware Index Report Q2–Q3 2022: Ransomware leads to physical war
CONTENT: Since 2019, ransomware has expanded by 466%, and it is increasingly being utilized as a precursor to actual combat.
The findings came from Ivanti's Ransomware Index Report Q2-Q3 2022, which the company released earlier today to Infosecurity.
The data also suggests that ransomware groups are becoming more sophisticated and widespread, with 35 vulnerabilities becoming related with ransomware in the first three quarters of 2022 and 159 trending active exploits. Based on the report, 47.4% of ransomware vulnerabilities threaten healthcare systems, 31.6% damage energy systems, and 21.1% affect key manufacturing.
The Ivanti research claims that hostile nations are increasingly using state-sponsored threat groups to infiltrate, destabilize, and disrupt operations in their target countries. As shown in the recent Russia-Ukraine war, ransomware is being utilized as a precursor to physical warfare in many of these operations.
Ivanti executive also noted that IT and security teams need to work on employing automation technology that can not only correlate data from disparate sources, but also quantify risk, provide early warning of weaponization, predict assaults, and prioritize remedial actions.
TOPIC: Cyberconflict and warfare, Cybercrime, Critical infrastructure
DATE: 20.10.
LINK: https://www.infosecurity-magazine.com/news/ransomware-precursor-to-physical/
EXCERPT: Ivanti's Ransomware Index Report Q2-Q3 2022 states that ransomware is being utilized as a precursor to physical warfare. The report shows percentage of ransomware expansion since 2019, as well as ransomware vulnerabilities that threaten some of the most critical infrastructure. It is suggested that IT and security teams work on quantifying risk, providing early warning of weaponization, predicting assaults, and prioritizing remedial actions.
-
-
www.interpol.int www.interpol.int
-
Interpol unveiled the first-ever 'metaverse' designed for law enforcement worldwide at its ongoing 90th General Assembly in Delhi. The metaverse platform is envisioned to aid police forces worldwide to interact with other officers and even take 'immersive training courses in forensic investigation and other policing capabilities'. Likewise, the platform allows users to visit virtual Interpol headquarters in Lyon, France.
'The metaverse has the potential to transform every aspect of our daily lives with enormous implications for law enforcement,' Madan Oberoi, Interpol's Executive Director of Technology and Innovation, said in a statement.
'But in order for police to understand the metaverse, we need to experience it'., added Oberoi
In addition, Interpol announced the formation of a metaverse expert group to voice law enforcement's concerns worldwide and guaranteed that the new virtual world was safe by design.
-
-
-
Ajman Police General Command said its metaverse project is the first such police service in the UAE and the development makes it the first government body in the emirate of Ajman to take the digital leap.
The Ajman Police in Dubai has become the first law enforcement organization in the world to provide metaverse services. The Ajman Police stated that its metaverse initiative is the first of its kind for the United Arab Emirates and marks the Ajman government's entry into the metaverse.
According to the Police force, citizens will be able to interact with police officials in the metaverse by wearing Virtual Reality (VR) headsets, smartphones, tablets, laptops or desktop computers.
Lieutenant Colonel Mohammed bin Abdullah Abu Shehab, head of the Services Development Team, stated, 'the project came within Ajman Police's efforts to strengthen cooperation with its customers and involve them in the design and development of services. Metaverse comes within the framework of facilitating the meeting between customers through VR, which brings them together with police officers without the need for a personal presence at the police station.'
-
-
interfax.com interfax.com
-
Russia's ministry of industry and trade recommended that industrial enterprises stop using Zoom, Skype, and WhatsApp for official purposes and choose Russian systems as an alternative.
As Kommersant reports, the ministry explained its decision 'as the requirement to comply with the government's requirements and strengthen information security measures.'
Another high-ranking Russian official had made a similar request. A 'full ban on WhatsApp use for official purposes by the Russian state and municipal employees' employees' was demanded by Anton Gorelkin, deputy chairman of the information policy committee of the Russian parliament.
-
-
-
“There could be — in time, if it grows — financial stability problems. There also are investor issues around a lack of certainty.”
The head of the EU's financial services has called US lawmakers to create new regulations to control the cryptocurrency market, stressing that if digital assets remain unregulated, it might threaten financial stability.
Mairead McGuinness, the European Commission's financial services commissioner, told the Financial Times in a recent interview that they need to look at global regulation of cryptocurrencies.
'We do need to see other players also legislating … perhaps differently, but with the same objective. … We need to look at the global regulation of crypto. There would be a lot of concern at a European level as to [what would happen] if crypto were not to be regulated.' warning digital assets could pose a threat to financial stability if left to grow unregulated. Stated McGuinness
-
-
www.cnbc.com www.cnbc.com
-
The United Kingdom's Competition and Markets Authority (CMA) rejected Meta's (formerly known as Facebook) appeal and ordered the company to sell the animated-images platform Giphy. CMA's decision cited that taking over Giphy was harmful to the competition.
The decision came after CMA found that Meta's purchase of Giphy could allow Meta to limit other social media platforms' access to GIFs, making those sites less attractive to users and less competitive. CMA also ruled that such a deal removed Giphy' as a potential challenger in the UK display advertising market, preventing UK businesses from benefiting from innovation in this market.'
Previously, in November, the CMA ordered Meta to sell Giphy after finding it would raise competition concerns. Meta tried to appeal the decision. However, in June, a court ruled against the company's appeal, promoting the final decision to the CMA.
The final decision by CMA ruled the deal would enable Meta to further increase its market power.
-
-
www.eenewseurope.com www.eenewseurope.com
-
The US International Trade Commission (USITC) revealed it would open investigations into divisions of Taiwan Semiconductor Manufacturing Company (TSMC), Samsung Electronics and Qualcomm on allegations of patent infringement. USITC stated that it would look into allegations made by the complainant that parts and mobile devices imported into the US violated its semiconductors and integrated circuits patents.
According to the USITC's investigation, the patent infringement claims cover chips manufactured by Samsung using its 14nm and smaller process nodes and by TSMC using its 16nm and smaller process nodes. The investigation will also include the aforementioned processors as well as mobile devices like smartphones, tablets, and smartwatches. In contrast, Qualcomm has been named in a separate patent infringement filed by the same company.
-
-
-
However, the organization came under fire after Russia launched its war in Ukraine over the connection of one of its members to the Kremlin.
German cybersecurity chief Arne Schönbohm was fired over alleged ties with Russian security services. According to media reports, German Interior Minister Nancy Faeser sacked the head of the Federal Office for Information Security (BSI) due to recent media reports of his ties with Russia and due to the damaged public trust in Schönbohm's leadership.
According to reports in German media, Schönbohm was tied to Russia through his role in the Cyber Security Council of Germany. In 2012, Schönbohm co-founded the organization, which advises the private and public sectors on cybersecurity issues. However, the organization came under fire over the connection of one of its members to the Kremlin.
The layoff was initially reported by the German news publication Spiegel, and was later confirmed by a representative for the Interior Ministry.
'The background to this is not least the allegations, which are well known and widely discussed in the media, and which have permanently damaged the necessary public confidence in the neutrality and impartiality of the conduct of his office as president of Germany's most important cybersecurity authority,' the spokesperson said.
The departure of Schoenbohm will be followed by an investigation from Germany's Interior Ministry over the allegations in question.
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
Hackers compromised Hong Kong govt org's network for a year
TITLE: Hong Kong’s government org’s network compromised by hackers for a year
CONTENT: Cyberattacks on government institutions in Hong Kong by the China-linked espionage actor APT41 (also known as Winnti), which compromised them, went unnoticed for up to a year in certain cases, have been discovered by Symantec researchers.
The threat actor has been employing a piece of customized malware known as Spyder Loader that has previously been linked to the organization.
The newly detected Hong Kong activity appears to be a component of the same operation, according to Symantec's research, and the targets of Winnti are local governments in the special administrative area.
Although Symantec was unable to recover the full malware, it appears that the objective of APT41's most recent effort was to gather intelligence from significant Hong Kong institutions.
EXCERPT: Symantec has discovered a year long China-linked cyberattacks, coming from espionage actor known as Winnti. They have been compromising government institutions in Hong Kong. The full malware was not yet found, but their most recent object is local governments special administrative area.
DATE: 18.10.
TOPIC: Cybercrime, Cyberconflict and warfare
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
Pro-Russia Hackers DDoS Bulgarian Government
TITLE: Bulgarian government attacked with DDoS by pro-Russian hackers
CONTENT: Over the weekend, the Bulgarian government was subject to a wave of DDoS attacks, with Russia being the main suspect, according to sources.
According to various local reports, traffic flooded the websites of the Bulgarian President, the National Revenue Agency, and the departments of internal affairs, defense, and justice.
The campaign on October 15 also targeted telecom businesses, airports, banks, and a few media outlets, Sofia Globe reported.
The suspects were recognized as being from the Russian city of Magnitogorsk by the authorities, according to Borislav Sarafov, the director of Bulgaria's National Investigation Service.
However, according to some reports, the notorious Russian cybercrime group Killnet had already taken responsibility for the said DDoS attack.
LINK: https://www.infosecurity-magazine.com/news/prorussia-hackers-ddos-bulgarian/
DATE: 18.10.
TOPIC: Cyberconflict and warfare, cybercrime
EXCERPT: The Bulgarian government was subject to a wave of DDoS attacks, with Russia being the main suspect. Traffic flooded the websites of the Bulgarian President, National Revenue Agency, and departments of internal affairs, defense, and justice. Some reports claim Russian cybercrime group Killnet had already taken responsibility for the attack.
-
-
www.usnews.com www.usnews.com
-
1 million roubles ($16,150)
A Moscow court on Tuesday fined US giant Amazon.com Inc a total of 41 million roubles ($16,150), Interfax reported.
Interfax said the court ruled that Amazon had failed to delete material that 'propagandises suicide', which is illegal under Russian law.
It is the first such fine imposed on Amazon, although other US-based giants have come under pressure in Russia in recent months, with Meta being labelled as an 'extremist' organization and Google and Apple receiving fines.
-
-
www.cnbc.com www.cnbc.com
-
Horizon Worlds, Meta’s flagship metaverse for consumers, is failing to meet internal performance expectations, according to The Wall Street Journal, which reviewed internal company documents.
Horizon Worlds, Meta’s flagship metaverse platform, is failing to meet internal performance expectations, The Wall Street Journal reported, which reviewed internal company documents. The Journal said the records showed the user base had been progressively falling since the spring, and many Horizon users have left after the first month on the platform.
Meta had set a target of 500,000 monthly active users but recently reduced it to 280,000; at this time, there are fewer than 200,000.
Horizon’s services include several interactive virtual spaces or worlds letting users socialize, play and have fun. Internal statistics have shown that only 9% of developed worlds have more than 50 visitors, while many are never visited.
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
Australian police secret agents exposed in Colombian data leak
TITLE: Colombian data leak exposes personal information of Australian Federal Police
CONTENT: Following the release of data taken from the Colombian government by hackers, the identities of covert agents for the Australian Federal Police (AFP) have been made public.
More than five terabytes of sensitive information, including emails, documents, and strategies AFP agents were employing to prevent drug cartels from conducting business in Australia, were leaked by the hacktivist collective Guacamaya.
Details exposed this way come from 35 AFP operations, some of them still active, and also contain surveillance reports from agents, phone tap recordings, and salary data for Colombian personnel.
DATE: 14.10.
TOPIC: Cyberconflict and warfare, Cybercrime
EXCERPT: The identities of covert agents for the Australian Federal Police (AFP) have been made public. This follows the release of data taken from the Colombian government by hackers. More than five terabytes of sensitive information were leaked by the hacktivist collective Guacamaya.
-
-
www.microsoft.com www.microsoft.com
-
The Microsoft Threat Intelligence Center (MSTIC) reports that it has tracked new ransomware dubbed Prestige that is being used to target transportation and logistics organizations in Ukraine and Poland. The latest ransomware campaign has not been attributed to any known threat actor.
However, MSTIC added that 'the activity shares victimology with recent Russian state-aligned activity, specifically on affected geographies and countries, and overlaps with previous victims of the FoxBlade malware (also known as HermeticWiper)'.
According to MSTIC, deployment of Prestige ransomware has not been previously recorded, and its activity was not connected to any of the 94 currently active ransomware activity groups that Microsoft tracks.
The method of initial access remains unknown, with Microsoft noting that the threat actor had already obtained privileged access to the compromised environment to deploy the ransomware using three different methods.
Microsoft reported observing three different methods for deploying the ransomware. Two involved attackers uploaded the payload to an admin-shared folder and then activated it on network systems using remote code tools to trigger them on victim systems. A third involved the payload being added to the Active Directory Domain Controller and deployed across networks.
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
Education Sector Experienced 44% Increase in Cyber-Attacks Over Last Year
TITLE: Education sector recorded a 44% increase in cyberattacks since last year
CONTENT: According to Check Point's 2022 Mid-Year Report, the education sector saw a 44% increase in cyberattacks from 2021 to 2022, with an average of 2297 attacks against organizations every week.
The research illustrates that a factor in the attraction is the enormous amount of personal information that threat actors can amass by picking on businesses in this industry.
According to the monthly threat index produced by the research team, the education sector will be most negatively affected in 2022. It is obvious that cybercriminals are finding success with these operations, and schools and colleges should be planning for a rise in the frequency of these attacks.
In contrast to most businesses, which only have employees, academic institutions also have students. This makes the sector's networks much larger, more accessible, and harder to secure.
TOPIC: Cyberconflict and warfare, Cybercrime, Cybersecurity
LINK: https://www.infosecurity-magazine.com/news/education-experienced-44-increase/
DATE: 14.10.
EXCERPT: The education sector saw a 44% increase in cyberattacks from 2021 to 2022, with an average of 2297 attacks against organizations every week. Cybercriminals are finding success with these operations, and schools and colleges should be planning for a rise in the frequency of these attacks.
-
-
www.reuters.com www.reuters.com
-
Microsoft says Ukraine, Poland targetted with novel ransomware attack
TITLE: Microsoft discovers new novel ransomware attack on Ukraine and Poland
CONTENT: According to a blog post by Microsoft on Friday, a recently identified hacker group has used a novel kind of ransomware to assault logistics and transportation firms in Poland and Ukraine.
In less than an hour on Tuesday, the attackers targeted a variety of computers, according to Microsoft, which added that it had not yet been able to connect the attacks to any known group.
Researchers discovered that the cyberattacks, however, closely resembled past assaults by a cyber team connected to the Russian government that had affected Ukrainian government services.
TOPIC: Cyberconflict and warfare, Cybercrime
EXCERPT: A hacker group has used a novel kind of ransomware to attack logistics and transportation firms in Poland and Ukraine. In less than an hour on Tuesday, the attackers targeted a variety of computers. Microsoft has not yet been able to connect the attacks to any known group.
DATE: 15.10.
-
-
www.nato.int www.nato.int
-
TITLE: NATO establishes review board to govern responsible use of AI
CONTENT: NATO has established a Review Board to govern the responsible development and use of artificial intelligence (AI) and data across the organisation. The decision was taken at the meeting of NATO Ministers of Defence which took place in Brussels on 12–13 October 2022. The Data and Artificial Intelligence Review Board (DARB) will work on developing a user-friendly responsible AI certification standard to help align new AI and data projects with NATO's Principles of Responsible Use. The board is also expected to act as a platform allowing the exchange of views and best practices to help create quality controls, mitigate risks, and adopt trustworthy and interoperable AI systems. NATO member states will designate one national nominee to serve on the DARB. Nominees could come from governmental entities, academia, the private sector, or civil society.
TECHNOLOGY: AI
DATE: 13 October 2022
-
-
www.theguardian.com www.theguardian.com
-
Turkey: new ‘disinformation’ law could jail journalists for three years
TITLE: Turkey’s new disinformation law imposes threats to domestic journalism and social media
CONTENT: A comprehensive new rule that could result in up to three years in prison for people suspected of disinformation spreading has been approved by the Turkish parliament.
Wide-ranging clauses of the contentious bill, put out by the government's Justice and Development party (AKP), are designed to control domestic journalism as well as social media.
The bill provides a framework for extensive censorship of online information and the criminalization of journalism, which will enable the government to further subdue and control public debate in the run-up to Turkey's general elections in 2023, according to a coalition of 22 press freedom organizations.
Additionally, the new law mandates that messaging services like WhatsApp, which is also owned by Meta, submit user information to the government upon request from the nation's Information and Communication Technologies Authority.
EXCERPT: Turkey's parliament has approved a bill that could result in up to three years in prison for people suspected of spreading disinformation online. The bill, put out by the government's Justice and Development party (AKP), is designed to control domestic journalism as well as social media.
DATE: 13.10.
TOPIC: Freedom of the press, Freedom of expression, Content policy
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
Report Shows How China Has Been Using Cyberattacks Over the Past Decade
TITLE: Report documents China's use of cyberattacks over the past ten years
CONTENT: According to a report released on October 12, by consultancy firm Booz Allen Hamilton, Chinese state-sponsored cyberattacks pose a growing threat to US national security.
‘Same Cloak, More Dagger: Decoding How the People's Republic of China (PRC) Uses Cyber Attacks’ is a report aimed at CISOs of American companies and their allies, as well as threat analysts. It provides a thorough examination of more than 13 case studies of Chinese-sponsored cyberattacks over the last decade.
According to their results, China is creating and using cyberattack capabilities to further its 'core interests' at home. These cyberattacks are a supplement to China's more well-known and varied efforts to use legal, financial, cultural, political, and technical tools to further its objectives online.
Booz Allen did clarify that the report's main source of research was open-source. It is likely impossible to properly determine the exact extent of China's cyberattack capabilities from open sources. It's probable that China decided not to use all of its resources or that it did so secretly, based on the study.
LINK: https://www.infosecurity-magazine.com/news/report-china-cyberattacks-past/
DATE: 14.10.
TOPIC: Cyberconflict and warfare
EXCERPT: 'Same Cloak, More Dagger: Decoding How the People's Republic of China Uses Cyber Attacks' is a report aimed at CISOs of American companies and their allies. It provides a thorough examination of more than 13 case studies of Chinese-sponsored cyberattacks over the last decade. It is shown that Chinese state-sponsored cyberattacks pose a growing threat to US national security.
-
-
cpj.org cpj.org
-
Kazakh outlet Orda, staff subjected to months of threats, online harassment, cyberattacks
TITLE: Kazakh media outlet Orda’s staff suffer from months of cyberattacks and online harassment
CONTENT: The Committee to Protect Journalists said on Wednesday that Kazakhstani authorities should fully examine recent threats against independent news website Orda and its head editor Gulnara Bazhkenova and safeguard the safety of the publication and its personnel.
Following the publishing by the outlet of an investigation into suspected lobbying methods by a corporation apparently related to Kazakhstan's former president, Nursultan Nazarbayev, there have been several internet harassments and cyberattacks against Bazhkenova, her family, and Orda.
While Orda has improved its cybersecurity, Bazhkenova claims that DDoS and other types of cyberattacks have been ongoing since July, with perpetrators constantly looking for ‘weak spots’ that cause the site to go offline for brief periods.
In addition to the website cyberattacks, she claims that unidentified users have flooded Orda's Telegram chat with derogatory images and insults aimed at Bazhkenova and Orda staff. However, most recently, the online insults have been replaced by threats against her and her 7-year-old son. LINK: https://cpj.org/2022/10/kazakh-outlet-orda-staff-subjected-to-months-of-threats-online-harassme nt-cyberattacks/
EXCERPT: Cyberattacks against independent news outlet Orda have been ongoing since July, with perpetrators constantly looking for 'weak spots' that cause the site to go offline for brief periods. The Committee to Protect Journalists said on Wednesday that Kazakhstani authorities should fully examine recent online threats.
DATE: 12.10.2022.
TOPIC: Freedom of the press, Cybercrime
-
-
-
Greece: At a meeting with RSF, the government commits to ban the use of spyware
TITLE: Greek government promises ban on spyware of journalists at the meeting with RSF
CONTENT: At their meeting on October 10th, the representative of RSF requested that the Deputy Minister to the Prime Minister and Government Spokesperson, Ioannis Oikonomou, initiate discussions for a complete reform of the legal safeguards against the arbitrary surveillance of journalists.
The recent revelations of the intelligence agency's surveillance of reporters using spyware have increased the gap of mistrust between Greek journalists and the authorities, according to Pavol Szalai, head of RSF's European Union and Balkans desk. He further stated that the new legal framework the government promised must be both ambitious and properly consult with the main stakeholders: journalists.
The government ‘will soon submit a bill to make the use of spyware illegal,’ according to Ioannis Oikonomou, who also reiterated that the Greek authorities did not acquire or use Predator, in response to Pavol Szalai's call for legislation on spywares.
LINK: https://rsf.org/en/greece-meeting-rsf-government-commits-ban-use-spyware
EXCERPT: Reporters Without Borders (RSF) has called for a complete reform of the legal safeguards against the arbitrary surveillance of journalists in Greece. The government 'will soon submit a bill to make the use of spyware illegal,' according to Ioannis Oikonomou, who also reiterated that the Greek authorities did not acquire or use Predator.
TOPIC: Freedom of the press
DATE: 12.10.
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
Ukraine Enhances Cooperation With EU Cybersecurity Agencies
TITLE: Ukraine tightens collaboration with EU cybersecurity agencies
CONTENT: Recently, representatives from the European Union Agency for Cybersecurity (ENISA) and the State Service of Special Communications and Information Protection of Ukraine (SSSCIP) met to explore enhancing networking and collaboration.
The working meeting took place as part of the Cybersecurity East Project trip to the ENISA headquarters in Athens.
After the conference, Viktor Zhora, the deputy head of the SSSCIP, stated: ‘Cooperation with the European partners includes two key vectors for our country. On the one hand, Ukrainian experience in cyber-war, confronting cyber-threats from Russia would definitely be beneficial for other democracies.’
The SSSCIP claimed that the meeting was essential for European integration as well, with ENISA special partner status being a key step in that direction since the Ukrainian conflict has pushed the country even further toward its Western peers.
According to SSSCIP, achieving this accreditation is a crucial step in the process of aligning national cybersecurity laws with EU law.
DATE: 10.10.
TOPIC: Cybersecurity, Cyberconflict and warfare
EXCERPT: Ukraine and the European Union have met to discuss enhancing networking and collaboration. The meeting took place as part of the Cybersecurity East Project trip to the ENISA headquarters in Athens. SSSCIP claimed that the meeting was essential for European integration as well, with ENISA special partner status being a key step in that direction. This will also push the country's aligning of national cybersecurity laws with EU law.
LINK: https://www.infosecurity-magazine.com/news/ukraine-cooperation-with-eu/
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
US airports' sites taken down in DDoS attacks by pro-Russian hackers
TITLE: US airports’ hit with DDoS by pro-Russian hackers
CONTENT: The websites of numerous major airports in the United States have allegedly been subjected to widespread distributed denial-of-service (DDoS) attacks, according to the pro-Russian hacktivist organization 'KillNet.'
Travelers are unable to login and receive information about their booked flights or make reservations for airport services because the servers hosting these sites are being overloaded by trash requests as a result of the DDoS attacks.
The Hartsfield-Jackson Atlanta International Airport (ATL), one of the nation's major air traffic hubs, and the Los Angeles International Airport (LAX), which is occasionally offline or very slow to reply, are notable examples of airport websites that are now inaccessible.
DATE: 10.10.
TOPIC: Cyberconflict and warfare, Cybercrime
EXCERPT: The websites of numerous major airports in the U.S. have allegedly been subjected to widespread distributed denial-of-service attacks caused by pro-Russian hackers. The Hartsfield-Jackson Atlanta International Airport (ATL), and the Los Angeles International Airport are notable examples of airport websites that are now inaccessible.
-
-
www.outlookindia.com www.outlookindia.com
-
How Cyberfeminism Is Helping Women Forge Solidarities In Conservative Societies
TITLE: Expansion of cyberfeminism in the Middle East and South Asia
CONTENT: Feminist activists in Iraq started a social media campaign in September last week to call for the Ministry of Education to issue a formal resolution that will forbid ‘the imposition of the veil as a condition for academic enrollment.’
The online campaign, which emphasized the value of women's personal freedom, provided another illustration of how cyberfeminism is taking a dynamic shape in the Middle East and South Asian countries through the hashtag #No_for_forced_veiling on Iraqi social media networks.
DATE: 09.10.
TOPIC: Gender rights online
EXCERPT: Feminist activists in Iraq started a social media campaign to call for the Ministry of Education to issue a formal resolution that will forbid 'the imposition of the veil as a condition for academic enrollment'. The online campaign, which emphasized the value of women's personal freedom, generated #No_for_forced_veiling on Iraqi social media networks.
-
-
www.reuters.com www.reuters.com
-
Germany's cybersecurity chief faces dismissal, reports say
TITLE: Germany's cybersecurity chief may be dismissed
CONTENT: Due to potential interactions with individuals associated with Russian security services, German Interior Minister Nancy Faeser wants to fire the nation's cybersecurity director, according to late-Sunday reports in German media that cited official sources.
According to numerous sites, Arne Schoenbohm, the head of the federal information security organization BSI, may have had these contacts through the German Cyber Security Council.
Schoenbohm founded the organization, which includes a German firm that is a subsidiary of a Russian cybersecurity firm founded by a former KGB employee.
EXCERPT: Germany's interior minister reportedly wants to fire the nation's cybersecurity director. Arne Schoenbohm may have had contacts with individuals associated with Russian security services. His organization, BSI, is a subsidiary of a Russian cybersecurity firm founded by a former KGB employee.
TOPIC: Cybersecurity
DATE: 10.10.
-
-
eurohpc-ju.europa.eu eurohpc-ju.europa.eu
-
TITLE: Six countries selected to host future European quantum computers
CONTENT: The European High Performance Computing Joint Undertaking (EuroHPC JC) had announced the the selection of six sites across the EU to host and operate the first EuroHPC quantum computers: Czechia, France, Germany, Italy, Poland, and Spain. The quantum computing systems to be developed within these sites are to be made available to European users (scientific communities, industry, the public sector, etc.) mainly for research and development purposes.
For background, the EuroHPC JU is a legal and funding entity launched in 2018 to enable the EU and countries participating in the EuroHPC to coordinate efforts and resources towards developing supercomputing facilities in the EU.
TECHNOLOGY: Emerging technologies
TREND: Quantum computing
Date: 4 October 2022
-
-
www.whitehouse.gov www.whitehouse.gov
-
TITLE: US White House publishes Blueprint for an AI Bill or Rights
CONTENT: The US White House, through the Office of Science and Technology Policy, has issued a Blueprint for an AI Bill of Rights to guide the development, deployment, and use of automated systems. The blueprint outlines five key principles and is accompanied by a framework to help incorporate the protections into policy and practice.
The five principles are:
- Safe and effective systems: Users should be protected from unsafe and ineffective systems.
- Algorithmic discrimination protection: Users should not face discrimination by algorithms and systems should be used and designed in an equitable way.
- Data privacy. Users should be protected from abusive data practices via built-in protections and should have agency over how data about them is used.
- Notice and explanation: Users should know that an automated system is being used and understand how and why it contributes to outcomes that impact them.
- Human alternatives, consideration, and fallback: Users should be able to opt out, where appropriate, and have access to a person who can quickly consider and remedy problems they encounter.
Within the scope of the blueprint are automated systems that have the potential to meaningfully impact the public's rights, opportunities, or access to critical resources or services.
It is important to note that the blueprint does not have a regulatory character, and is meant to serve as a guide.
TOPICS: AI
TRENDS: AI governmental initiatives
DATE: 4 October
COUNTRY: USA
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
The Kyiv Post reports that "tough" Russian threat actors target within their own country as reprisal for the Ukrainian war and the overall situation in Russia. The organization, known as the National Republican Army (NRA), apparently launched several attacks, including one on Unisoftware, a Russian software company that purportedly collaborates closely with government clients.
NRA claimed to have stolen all data held by the firm, such as banking and personal account credentials, employee information, phone numbers, addresses, contracts, and proprietary code for Unisoftware clients and software.
The group has also been linked to the attack on Russian IT retail chain DNS, which confirmed earlier this week that it had been breached without providing additional information
-
-
www.coindesk.com www.coindesk.com
-
Fumio Kishida, Prime Minister of Japan, has stated in a policy speech that the country's plans for investing in digital transformation include the Metaverse and non-fungible tokens (NFTs) services. In his address to Japan's parliament, Kishida stated Japan will continue to focus on 'supporting the social implementation of digital technology' and will 'promote efforts to expand the use of Web3 services that utilize the metaverse and NFTs.' Previously, Japan had recently established a Web3 policy office under the Ministry of Economy, Trade and Industry (METI), which is focused on improving the business environment related to Web 3.0. Furthermore, METI is reportedly looking into a proposal to offer tax exemptions to Japanese crypto companies to entice them to keep their business in the country and further fuel the nation's evolving Web3 sector.
-
-
cpj.org cpj.org
-
Taliban shuts down two news websites in Afghanistan
TITLE: Taliban deactivate two news websites due to ‘false propaganda’ in Afghanistan
CONTENT: According to a tweet from the ministry's spokesperson Anayatullah Alokozay and a report by the London-based independent Afghanistan International TV station, the Taliban's Ministry of Telecommunications and Information Technology shut down the websites of Hasht-e Subh Daily and Zawia News on Monday, October 3, due to 'false propaganda' against the Taliban.
In separate statements on Monday, the Hasht-e Subh daily and Zawia News sites, which are run by Afghan journalists who have been reporting from exile since the August 2021 Taliban takeover, said the Taliban had deactivated their website domain names.
Since then, Hasht-e Subh Daily has resumed its online presence under a new domain. According to Zawia News, it will keep publishing news on the website of Zawia Media, its parent firm.
LINK: https://cpj.org/2022/10/taliban-shuts-down-two-news-websites-in-afghanistan/
EXCERPT: Afghanistan's Ministry of Telecommunications and Information Technology shut down the websites of Hasht-e Subh Daily and Zawia News on Monday, October 3. The sites are run by Afghan journalists who have been reporting from exile since the August 2021 Taliban takeover.
DATE: 04.10.
TOPIC: Freedom of the press
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
FBI and CISA Publish Advisory on Malicious Cyber Activity Against Election Infrastructure
TITLE: FBI and CISA joined in a public announcement on malicious cyber activities against election infrastructure
CONTENT: An official public service announcement about hostile cyber activity intended to compromise election infrastructure has been released by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA).
The agencies stated in the letter made public on Tuesday that it is unlikely that attempts to breach election infrastructure will result in widespread disruptions or stop voting.
The notice also made clear that authorities employ a range of safeguards to lessen the possibility of hostile cyber activity compromising the security, reliability, or accessibility of election infrastructure systems.
The Election Security Group (ESG), a body created at the end of August by the US Cyber Command (USCYBERCOM) and the National Security Agency (NSA), was created to safeguard electoral processes from hacking and disinformation before and during the November elections.
EXCERPT: An official public service announcement about hostile cyber activity intended to compromise election infrastructure has been released by the FBI and CISA. The agencies stated that it is unlikely that attempts to breach election infrastructure will result in widespread disruptions or stop voting. Election Security Group (ESG) was created to safeguard electoral processes from hacking and disinformation.
LINK: https://www.infosecurity-magazine.com/news/fbi-cisa-advisory-cyber-activity/
DATE: 06.10.
TOPIC: Cyberconflict and warfare, Cybersecurity, Cybercrime
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
US govt shares top flaws exploited by Chinese hackers since 2020
TITLE: US government agencies reveal top weak points exploited by Chinese hackers since 2020
CONTENT: In order to attack government and critical infrastructure networks, hackers supported by the People's Republic of China (PRC) most frequently use certain security flaws, according to information released today by the NSA, CISA, and the FBI.
In a combined alert, the three government agencies claimed that Chinese-sponsored hackers are targeting tech businesses and networks in the United States and its allies in order to enter private networks and steal intellectual property.
The report also includes suggestions for addressing each of the security holes that Chinese threat actors use the most, as well as detecting techniques and weak technologies to aid defenses in identifying and thwarting incoming attacks.
TOPIC: Cyberconflict and warfare, Cybercrime
DATE: 06.10.
EXCERPT: NSA, CISA, and FBI warn that Chinese-sponsored hackers are targeting tech businesses and networks in the U.S. and its allies to steal intellectual property. Report also includes suggestions for addressing each of the security holes that Chinese threat actors use the most.
-
-
-
Mexico continued to use spyware against activists
TITLE: Spyware still used by Mexico against activists
CONTENT: Despite a commitment by President Andrés Manuel López Obrador to halt such activities, it is reported that the Mexican government or army has continued to utilize spyware meant to hack into the cellphones of activists.
Press freedom advocacy organizations reported on Monday that they had discovered proof of recent attempts to target activists looking into Mexican army human rights violations using the Israeli spyware tool Pegasus. The University of Toronto group Citizen Lab conducted a forensic study to confirm the Pegasus virus.
The targets included rights campaigner Raymundo Ramos, according to a report by the press freedom organization Article 19, The Network for the Defense of Digital Rights, and Mexican media outlets.
TOPIC: Cybercrime, Freedom of expression
LINK: https://apnews.com/article/technology-mexico-caribbean-hacking-cd4e4a0bcf13705072af19b2d97bbf63
EXCERPT: Despite a commitment by President Andrés Manuel López Obrador to halt such activities, it is reported that the Mexican government or army has continued to utilize spyware. Targets included rights campaigner Raymundo Ramos, according to a report by the press freedom organization Article 19.
DATE: 03.10.
-
-
-
A Bolsonaro reelection poses biggest threat to Brazilian press freedom, says RSF
TITLE: Election campaign and online attacks pose threat to Brazilian press freedom
CONTENT: The image of the media by President Bolsonaro as an enemy of the state that must be stopped has always resonated strongly with his support base, which is well-organized on social media, but especially during this election campaign.
Since the campaign's launch on August 16th, RSF has carefully tracked (put this link on ‘carefully tracked’: https://rsf.org/en/press-under-pressure-brazil-rsf-analyzes-online-attacks-against-journalists-during-presidential ) these online attacks and has recorded no less than 2.8 million posts that target and degrade journalists.
In terms of direct assaults, 86% of victims were female journalists. The president's family and government officials, who have millions of followers on social media, have shared the vast majority of this offensive material.
LINK: https://rsf.org/en/bolsonaro-reelection-poses-biggest-threat-brazilian-press-freedom-says-rsf
EXCERPT: RSF has recorded more than 2.8 million posts that target and degrade journalists in Brazil since the beginning of election campaign.
TOPIC: Freedom of the press
DATE: 30.09.
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
Lazarus-Associated Hackers Weaponize Open-Source Tools Against Several Countries
TITLE: Lazarus hacker group weaponize open-source software against several countries
CONTENT: Legitimate open-source software has been weaponized by threat actors connected to North Korea and is now being used to target personnel in businesses from a variety of industries.
The information was obtained by the Microsoft Threat Intelligence Center (MSTIC), which on Thursday released a warning about the threat.
The Lazarus Group, also known as the actor Microsoft tracks as Zinc, is said to have carried out the attacks, the technical write-up stated.
According to the advisory, Zinc has successfully compromised numerous organizations in the media, defense and aerospace, and information technology sectors in the United States, United Kingdom, India, and Russia.
EXCERPT: Open-source software has been weaponized by threat actors connected to North Korea. The Lazarus Group, also known as the actor Microsoft tracks as Zinc, is said to have carried out the attacks. Targets include media, defense and aerospace, and information technology sectors in the United States, UK, India, and Russia.
LINK: https://www.infosecurity-magazine.com/news/lazarus-group-weaponize-open/
TOPIC: Cyberconflict and warfare, Cybercrime
DATE: 30.09.
-
- Sep 2022
-
www.eeas.europa.eu www.eeas.europa.eu
-
TITLE: 54 countries outline support for human-centric approach at the core of standardisation and connectivity
CONTENT: In a joint statement delivered during the International Telecommunication Union (ITU) Plenipotentiary Conference, 54 countries endeavoured to promote 'a human rights-based approach to the whole life cycle of telecommunication/ICT technologies – including design, development, deployment, use and disposal - as part of a human-centric vision of the digital transformation, including in international standard-setting processes'. The countries encouraged the ITU to work with other standard development organisations to develop international technical standards are consistent with exiting international frameworks on human rights and fundamental freedoms. It also called on the organisation to intensify efforts to make its procedures more transparent and accessible, including to organisations active on human rights aspects of telecommunications/ICTs. Among the signatory countries were the 27 EU member states, Australia, Canada, Ghana, Chile, Japan, Rwanda, Switzerland, the UK, and others.
TOPICS: digital standards, human rights principles
DATE: 26 September 2022
-
-
-
TITLE: GSMA, IBM, and Vodafone launch Post-Quantum Telco Network Taskforce
CONTENT: GSMA, IBM, and Vodafone have launched a Post-Quantum Telco Network Taskforce to contribute to the definition of policies, regulations, and business processes for the protection of telecommunication in the context of advanced quantum computing. According to GSMA, the taskforce will help define requirements, identify dependencies, and create the roadmap to implement quantum-safe networking, mitigating the risks associated with future, more-powerful quantum computers. Activities to be undertaken by the taskforce will focus on three areas: (a) strategy: integrating quantum-safe capabilities into telecom network operators’ technology, business processes; and security; (b) standardisation: identifying the needs and common alignments for the integration of quantum-safe capabilities into existing telecom networks; and (c) policy: advising on public policy, regulation, and compliance matters.
TOPICS: Telecom infra, emerging tech
TRENDS: Quantum
DATE: 28 September 2022
-
-
www.reuters.com www.reuters.com
-
Vietnam preparing rules to limit news posts on social media accounts - sources
TITLE: Vietnam is working on a new set of rules to restrict news posts on social media accounts
CONTENT: According to Reuters, Vietnam is preparing new rules that will restrict which social media accounts can post news-related content, as authorities tighten their grip on the country's news and information sources.
The regulations would create a legal foundation for regulating news distribution on platforms such as Facebook and YouTube.
The sources confirmed that government officials have been holding confidential meetings with popular social media and internet firms to brief them on which types of accounts will be allowed to post news content under the new rules. According to them, authorities will be able to order social media companies to ban accounts that violate the rules.
The rules are anticipated to be announced before the end of the year, with specifics still being worked out.
TOPIC: Freedom of expression
DATE: 29.09.
EXCERPT: Vietnam is preparing new rules that will restrict which social media accounts can post news-related content, as authorities tighten their grip on the country's news and information sources. If the rules are announced, authorities will be able to order social media companies to ban accounts that violate the rules.
-
-
www.ohchr.org www.ohchr.org
-
Human Rights Council Holds Annual Discussion on the Integration of the Gender Perspective, Focusing on Overcoming Gender-Based Barriers to Freedom of Opinion and Expression
TITLE: HR Council’s annual debate on gender-based barriers to freedom of opinion and expression: online aspects
CONTENT: The Human Rights Council held its annual debate on the incorporation of a gender perspective, with the focus on overcoming gender-based barriers to freedom of opinion and expression.
Gender-based online violence against journalists, according to Julie Posetti of the International Centre for Journalists, is one of the most serious contemporary threats to press freedom and the safety of women journalists worldwide. Individual political actors and parties have been identified as perpetrators, instigators, and amplifiers of online violence against female journalists in many countries.
Irene Khan, Special Rapporteur on freedom of opinion and expression said that states must not use efforts to eradicate online violence, gendered hate speech, and disinformation as an excuse to limit free expression.
During the discussion that followed, speakers stated that online discrimination plays a role in censoring and silencing the voices of women and girls.
TOPIC: Gender rights online, Freedom of expression, Freedom of the press
EXCERPT: Human Rights Council held its annual debate on the incorporation of a gender perspective. The focus was on overcoming gender-based barriers to freedom of opinion and expression. Gender-based online violence against journalists is one of the most serious contemporary threats to press freedom, and states must not use efforts to eradicate online violence, gendered hate speech, and disinformation as an excuse to limit free expression.
DATE: 28.09.
-
-
www.fbcnews.com.fj www.fbcnews.com.fj
-
Women more vulnerable on cyber space: FWRM
TITLE: Fiji Women’s Rights Movement claims that women are more vulnerable to online violence
CONTENT: Nalini Singh, Executive Director of the Fiji Women's Rights Movement, made remarks on gender rights in cyberspace, while praising the government's intention to join the Convention on Cyber Crime.
According to Singh, cybercrime should not be approached from a gender-neutral standpoint.
She claims that women who have regular access to online spaces are more vulnerable to online violence. Singh also states that dissecting how cybercrime occurs can help the state respond more effectively.
LINK: https://www.fbcnews.com.fj/news/women-more-vulnerable-on-cyber-space-fwrm/
DATE: 28.09.
EXCERPT: Nalini Singh, Executive Director of the Fiji Women's Rights Movement made remarks on gender rights in cyberspace. She claims that women who have regular access to online spaces are more vulnerable to online violence.
TOPIC: Gender rights online
-
-
asianews.network asianews.network
-
Indonesian activists deplore latest cyberattack as ‘assault on press freedom’
TITLE: Indonesian advocates condemn latest cyberattack on press freedom
CONTENT: Indonesian advocates have condemned a series of widespread and coordinated cyberattacks on journalists and employees of the state’s media company Narasi and urged police to act immediately. This media company is known for its criticism of the government.
The attacks aimed to take control of its employees' Telegram, Instagram, Facebook, and Twitter accounts, states the head of newsroom, Laban Laisila.
Advocates condemned the attack on press freedom and urged law enforcement not to take sides when dealing with cyberattacks.
Discrepancy between the way law treated cyberattacks involving state or government institutions and those involving the press is noticeable.
EXCERPT: Indonesian advocates have condemned a series of widespread and coordinated cyberattacks on journalists and employees of the state's media company Narasi. This media company is known for its criticism of the government. Press freedom is at stake as the country deals with cyberattacks differently depending on whether they occurred against the government than against the press.
DATE: 28.09.
TOPIC: Freedom of the press, Cybercrime
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
Meta dismantles massive Russian network spoofing Western news sites
TITLE: Meta takes down Russian network spoofing Western news sites
CONTENT: According to Meta, it took down a vast network of Facebook and Instagram profiles spreading misinformation that had been spoofed on more than 60 websites across Europe.
The primarily targeted countries were Germany, France, Italy, Ukraine, and the U.K. Original articles were attacking Ukraine and Ukrainian refugees and suggesting that Western sanctions on Russia will backfire.
Meta said it succeeded to take down around thousands of Facebook and Instagram accounts, while stating that this is ‘the largest and most complex Russian-origin operation that we've disrupted since the beginning of the war in Ukraine.’
EXCERPT: Social media company Meta says it has disrupted 'the largest and most complex Russian-origin operation that we've disrupted since the beginning of the war in Ukraine'. The primarily targeted countries were Germany, France, Italy, Ukraine, and the U.K. Original articles were attacking Ukrainian refugees and suggesting that Western sanctions on Russia will backfire.
DATE: 27.09.
TOPIC: Cybersecurity, Cybercrime
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
Ukraine warns allies of Russian plans to escalate cyberattacks
TITLE: Ukrainian military intelligence warns allies of major upcoming Russian cyber-attacks
CONTENT: The key infrastructure of Ukraine and its allies will be the target of ‘major cyber-attacks,’ according to a warning issued today by the Ukrainian military intelligence service.
According to the Main Directorate of Intelligence of the Ukrainian Ministry of Defence (HUR MO), this upcoming ‘massive’ wave of strikes will likely target disrupting and destroying institutions and facilities related to the energy sector.
The Russian cyberattacks' most likely objective would also be to disrupt the Ukrainian Army's on-going advance and heighten the destruction caused by missile strikes against the country's eastern and southern energy supply facilities.
EXCERPT: 'Major cyber-attacks' will target key infrastructure of Ukraine and its allies, warns Ukrainian military intelligence service. Main objective would be to disrupt the Ukrainian Army's advance and heighten destruction caused by missile strikes against the country's eastern and southern energy supply facilities.
DATE: 26.09.2022.
TREND: Ukraine
TOPIC: Cyberconflict and warfare
-
-
-
RSF calls on Azerbaijan to end online harassment of Swedish journalist
TITLE: RSF urges Azerbaijan to stop harassing Swedish journalist online
CONTENT: Reporters Without Borders (RSF) demands that supporters of Azerbaijani President Ilham Aliyev stop smearing Swedish freelance journalist Rasmus Canbäck, particularly on Twitter.
Canbäck has been called a ‘Islamophobe,’ a ‘terrorist,’ a ‘spy,’ and ‘funded by the Armenian lobby’ on Twitter as a result of his articles about Azerbaijan, particularly for the online magazine Blankspot. He has been writing about Nagorno-Karabakh, a region with an Armenian majority where a long-running conflict has recently resurfaced, as well as Azerbaijan's alleged use of bribes in its ‘caviar diplomacy’ and lobbying.
According to RSF, Canbäck's account was mentioned in nearly 900 tweets between September 1 and September 21. Therefore, RSF also requests that Swedish Foreign Minister Ann Linde remind Azerbaijan's Ambassador Ahmadov to maintain press freedom and journalistic independence. Nevertheless, Ambassador himself participated in the online harassment.
TOPIC: Freedom of the press
LINK: https://rsf.org/en/rsf-calls-azerbaijan-end-online-harassment-swedish-journalist
DATE: 23.09.2022.
EXCERPT: Reporters Without Borders (RSF) demands that supporters of Azerbaijani President Ilham Aliyev stop smearing Swedish freelance journalist Rasmus Canbäck, highlighting the one on Twitter. His account was mentioned in nearly 900 tweets between September 1 and September 21, and he suffers from online harassment in all of them. RSF also urges Swedish Foreign Minister Ann Linde to remind Azerbaijan's Ambassador Ahmadov to maintain press freedom and journalistic independence.
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
Ukraine dismantles hacker gang that stole 30 million accounts
TITLE: The Security Service of Ukraine dismantles hacker group which stole around 30 mil. accounts
CONTENT: The Security Service of Ukraine (SSU) has dismantled a group of hackers who stole the accounts of nearly 30 million people and sold them on the dark web.
On victim systems in the European Union and Ukraine, the hackers deployed malware to steal login information and other sensitive data. Several hard drives containing stolen personal data, as well as computers, SIM cards, mobile phones, and flash drives, were discovered and confiscated during raids on the perpetrators' homes in Lviv, Ukraine.
Although the number of people detained is still unknown, they are all being prosecuted on criminal accusations related to the illegal sale or dissemination of information with restricted access kept in computers and networks. Sentences for these offenses carry long prison terms.
Since the first days of the Russian invasion, spreading false information about the conflict has become common throughout Ukraine. Misinformation and deception are still flooding the internet.
EXCERPT: The Security Service of Ukraine (SSU) has dismantled a group of hackers. They stole the accounts of nearly 30 million people and sold them on the dark web. Hard drives containing stolen personal data, as well as computers, SIM cards, mobile phones, and flash drives were all discovered and confiscated during raids in Lviv. The number of detained people remains unknown, but sentences for the offenses in question will be quite long.
DATE: 23.09.2022.
TOPIC: Cybercrime, Cyberconflict and warfare
-
-
rsf.org rsf.org
-
Iran reins in access to Instagram and WhatsApp, last platforms available to Iranians
TITLE: Iranians lose access to Instagram and WhatsApp: RSF sees it as an attack on the right to news and information
CONTENT: According to Reporters Without Borders, the Iranian government's decision to restrict access to Instagram and WhatsApp, which had been circulating information about a wave of protests triggered by the death of Mahsa Amini in police custody following her arrest by the morality police on September 16, is an unprecedented attack on the right to news and information in Iran.
Since the beginning of the protests, the Islamic Republic has imposed numerous Internet shutdowns, and the shutdown is now complete in western Iran's Kurdistan province, where Amini was born and where the first protests began. Other major cities, including Tehran, have reported partial Internet restrictions.
The government has made contradictory statements about Internet censorship. ICT Minister Issa Zarepour insisted he had been misquoted after initially saying on September 21 that Internet restrictions could be imposed for security reasons.
However, since 2011, the government has invested in a ‘national Iranian Internet’ project that attempts to force Iranians to connect through a network controlled by the authorities before accessing content located elsewhere.
LINK: https://rsf.org/en/iran-reins-access-instagram-and-whatsapp-last-platforms-available-iranians
EXCERPT: According to Reporters Without Borders, the Iranian government's decision to restrict access to Instagram and WhatsApp is an unprecedented attack on the right to news and information in Iran. Internet shutdowns are complete in some regions - such as Western Iran’s Kurdistan province. These shutdowns follow the beginning of a wave of protests triggered by the death of Mahsa Amini. The Iranian government has started a ‘national Iranian Internet’ project that attempts to force Iranians to connect through a network controlled by the authorities before accessing content located elsewhere. This may seriously affect some basic human rights of the Iranian people.
TOPIC: Freedom of expression
DATE: 22.09.2022.
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
Optus Hit By Cyber-Attack, Breach Affects Nearly 10 Million Customers
TITLE: Optus hit by cyberattack which affected around 10 million customers
CONTENT: Optus, the Australian subsidiary of Singapore Telecommunications, announced earlier today that it was investigating unauthorized access to customer data following a cyber-attack.
The company confirmed that the attack was instantly stopped, preventing customers' payment information and account passwords from being compromised. However, Optus confirmed that the attacker may have obtained some home addresses, driver's license numbers, and passport numbers.
Optus, which has 9.7 million subscribers according to publicly available data, said it also notified key financial institutions about the attack and subsequent breach.
Optus customers are now more vulnerable to phishing, with their credentials potentially already on the dark web, according to the executive.
EXCERPT: Optus, the Australian subsidiary of Singapore Telecommunications, was hit by a cyber-attack. Customers' payment information and account passwords were not compromised, but personal details may have been accessed. Optus customers are now more vulnerable to phishing, with their credentials potentially already on the dark web.
LINK: https://www.infosecurity-magazine.com/news/optus-hit-by-cyberattack/
DATE: 22.09.2022.
TOPIC: Cyberconflict and warfare, Cybercrime
-
-
www.unwomen.org www.unwomen.org
-
Expanding broadband safely and inclusively to reach digital gender equality
TITLE: Insight by UN Women Executive Director on reaching digital gender equality
CONTENT: Ms. Sima Bahous, Broadband Commissioner, UN Under-Secretary-General and UN Women Executive Director has shared her ‘Insight’ regarding digital gender equality.
Sexual harassment, stalking, and zoom bombing are all examples of online and ICT-facilitated violence against women and girls that are expanding. Misogyny and sexual violence are finding new digital homes in virtual reality and the metaverse. Women journalists, politicians, and activists who rely on an online presence for their work are therefore especially impacted. A concerning fact is that more than half of girls and young women surveyed globally have already experienced some form of online violence.
She firstly recommends that governments should establish strong and clear codes of conduct for law enforcement officials dealing with online violence against women and girls, as well as to invest in specialized justice officers to deal with such violence in a human rights and gender-sensitive manner. Secondly, she suggested that internet intermediaries make high-level, clear commitments to ensure the safety of women and girls in online spaces.
You can read more about her recommendations on the topic here (please insert link on ‘here’).
DATE: 18.09.2022.
TOPIC: Gender rights online
EXCERPT: Sima Bahous, Broadband Commissioner, UN Under-Secretary-General and UN Women Executive Director has shared her 'Insight' regarding digital gender equality. One of her recommendations for achieving online gender equality is that governments establish strong and clear codes of conduct for law enforcement officials dealing with online violence against women and girls.
-
-
www.aljazeera.com www.aljazeera.com
-
‘Anonymous’ hacks Iran state websites after Mahsa Amini’s death
TITLE: Iranian websites hacked after Mahsa Amini’s death
CONTENT: After a Twitter account connected to the ‘Anonymous’ hacking collective claimed to have conducted cyberattacks on them in support of protests following the tragic death of 22-year-old Mahsa Amini, multiple government and state-affiliated media websites in Iran were taken down.
The attacks appear to have targeted the Iranian government's two main websites. One is the government's ‘smart services’ website, which provides a variety of online services, and another is dedicated to publishing government news and interviews with officials.
‘All databases have been deleted,’ a social media linked to Anonymous claimed. claimed a social media account linked to Anonymous. The Iranian government has yet to issue an official response to the attacks.
EXCERPT: ‘Anonymous’ hackers have taken down government and state-affiliated media websites in Iran. ‘All databases have been deleted,’ a social media account linked to ‘Anonymous’ claimed. The Iranian government has yet to issue an official response to the attacks.
DATE: 21.09.2022.
TOPIC: Cyberconflict and warfare
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
Microsoft 365 phishing attacks impersonate U.S. govt agencies
TITLE: Microsoft 365 phishing attacks pose as US government agencies
CONTENT: There is an ongoing phishing campaign aimed at the US government contractors that has grown to include higher-quality lures and better-crafted documents. Phishing emails show a request for bids on lucrative government projects, which leads them to phishing pages that look exactly like legitimate federal agency portals.
This appears to be the same operation that INKY reported on in January this year, with the threat actors attaching PDFs with instructions on how to bid on US Department of Labor projects.
This campaign's operatives don't appear to be stopping anytime soon, since they are now expanding their targeting scope while refining their lures.
Given that the emails, PDFs, and websites used in the phishing operation are primarily copies of the actual state’s content, detecting signs of fraud may be difficult.
TOPIC: Cyberconflict and warfare, Cybercrime
DATE: 19.09.2022.
EXCERPT: US government contractors are being targeted by an ongoing phishing campaign that has grown to include higher-quality lures and better-crafted documents. Given that the emails, PDFs, and websites used in the phishing operation are primarily copies of the actual state's content, detecting signs of fraud may be difficult.
-
-
cpj.org cpj.org
-
Russian authorities revoke Novaya Gazeta’s online media license
TITLE: Novaya Gazeta’s online media license revoked
CONTENT: Only 10 days after a Moscow Court revoked Novaya Gazeta’s print license, the Russian Supreme Court has revoked its online media license. This media outlet has been working independently for nearly 30 years, and now it lost its right to exist.
‘You are depriving hundreds of people of jobs. You are depriving readers–there were 27 million in March–of the right to information,’ Novaya Gazeta chief editor Dmitry Muratov stated in court on September 15. He referred to the verdict as ‘media genocide’ outside of court, claiming that it would prevent Novaya Gazeta reporters from contacting authorities, remove their accreditation status, and impose several restrictions on their operations.
LINK: https://cpj.org/2022/09/russian-authorities-revoke-novaya-gazetas-online-media-license/
TOPIC: Freedom of the press
EXCERPT: Only 10 days after a Moscow Court revoked Novaya Gazeta's print license, the Russian Supreme Court has revoked its online media license. This media outlet has been working independently for 30 years. Novaya Gazeta’s chief editor Dmitry Muratov referred to this action as ‘media genocide.’
DATE: 15.09.2022.
-
-
rsf.org rsf.org
-
The second Summit for Information and Democracy to be held in New York on 22 September 2022
TITLE: The second Summit for Information and Democracy will be held on the sidelines of the UNGA
CONTENT: The Second Summit of the Partnership for Information and Democracy will be held on September 22, 2022 on the sidelines of the UN General Assembly. The Partnership is currently supported by 45 countries, and serves as a framework for multilateral reflection on the implementation of democratic guarantees in the global communication and information space.
The Summit's second edition will bring together Foreign Ministers from the Partnership's member countries as well as representatives from civil society. Among other initiatives, the recommendations of the Forum's working group on accountability regimes (please insert this link for ‘accountability regimes’: https://informationdemocracy.org/working-groups/accountability-regimes/) for social networks and their users will be published.
In its 4 years of work, launched by Reporters Without Borders in 2018, one of the International Initiative on Information and Democracy key results is an international coalition of 43 civil society and research organizations formed to promote democratic principles in the digital space. Therefore, the Summit will allow for better coordination of efforts to create a democratic digital space.
EXCERPT: The Second Summit of the Partnership for Information and Democracy will be held on September 22, 2022 on the sidelines of the UN General Assembly. It is currently supported by 45 countries, and serves as a framework for multilateral reflection on the implementation of democratic guarantees in the global communication and information space. The Summit aims for better coordination in creating a safe democratic digital space.
TOPIC: Freedom of expression, Freedom of the press
LINK: https://rsf.org/en/second-summit-information-and-democracy-be-held-new-york-22-september-2022 & https://informationdemocracy.org/working-groups/accountability-regimes/
DATE: 19.09.2022.
-
-
www.fenews.co.uk www.fenews.co.uk
-
Bridging the Digital Literacy Gender Gap in Developing Countries
TITLE: New Policy Brief: Bridging the Digital Literacy Gender Gap in Developing Countries
CONTENT: An international team worked on a Policy Brief, Bridging the Digital Literacy Gender Gap in Developing Countries to urge the G20 and other countries to address the digital literacy challenges women face.
According to the data, when it comes to women being included in the digital sector, it is clear they are left behind. The gender gap in digital literacy in some economies, cultures, and locations inhibits women from taking advantage of improved educational possibilities and career prospects.
This policy brief assesses the correlation between sociocultural and digital literacy gaps. The article goes on to explain why gaps in digital literacy start developing in young age and how most programs for developing digital skills miss the challenges that women confront in integrating into the digital world. In its conclusion, it identifies solutions to these problems and implores the G20 and other nations to deal with the particular difficulties associated with women's digital literacy.
The main issue with women's access to digital resources is not the technology itself, but rather where women are situated in society. The gender digital gap is widened by elements including lack of autonomy, unequal access to education, and the perception of women as dangerous and unsafe in digital areas. You can read the full policy brief here (please insert this link on ‘here’: https://www.fenews.co.uk/wp-content/uploads/2022/09/Bridging-the-digital-literacy-gender-gap-in-developing-countries-2.pdf).
EXCERPT: An international team worked on a Policy Brief, Bridging the Digital Literacy Gender Gap in Developing Countries. It urges the G20 and other countries to address the digital literacy challenges women face. The main issue with women's access to digital resources is not the technology itself, but rather where women are situated in society.
DATE: 15.09.2022.
LINK: https://www.fenews.co.uk/exclusive/bridging-the-digital-literacy-gender-gap-in-developing-countries/ & https://www.fenews.co.uk/wp-content/uploads/2022/09/Bridging-the-digital-literacy-gender-gap-in-developing-countries-2.pdf
TOPIC: Gender rights online
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
FBI: Hackers steal millions from healthcare payment processors
...
-
-
-
Meta-owned apps most vulnerable to cyberattacks, research suggests
TITLE: Research shows that Meta-owned apps are the most vulnerable to cyberattacks
CONTENT: TechShielder conducted a review of ten popular apps in the social, entertainment, and communication categories to determine which are the most likely to be hacked and what types of user data they store are at risk of being compromised.
According to the study, the average number of Google searches each app receives about being hacked indicates its vulnerability to cybercrime. Facebook ranks first with an average of 550,000 monthly searches for ‘Facebook hacked.’ Following that, there are 246,000 searches for ‘Instagram hacked’ and 135,000 for ‘WhatsApp hacked.’
With 49,500 and 27,100 searches, respectively, Snapchat and Twitch round out the top five. Netflix, YouTube, Telegram, Twitter, and Facebook's Messenger app were also included in the study. All of the apps reviewed by TechShielder store user email addresses and phone numbers, according to the company. Most collect names, credit card information, and cookies, which can provide a "in-depth" look into users' online lives.
The survey also showed that Meta-owned products have the most information on their users when compared to other popular apps, and Telegram has the least.
EXCERPT: TechShielder conducted a review of ten popular apps in the social, entertainment, and communication categories to determine which are most likely to be hacked. The average number of Google searches each app receives about being hacked indicates its vulnerability to cybercrime. Facebook ranks first with an average of 550,000 monthly searches for 'Facebook hacked'.
LINK: https://cybernews.com/security/meta-owned-apps-vulnerable-cyberattacks/
DATE: 14.09.2022.
TOPIC: Cybersecurity, Cybercrime, Network security
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
DDoS Attacks on UK Firms Surge During Ukraine War
TITLE: Increased DDoS attacks on UK companies during Ukraine war
CONTENT: According to new Freedom of Information (FoI) data obtained from the industry regulator, the volume of DDoS attacks against UK financial institutions increased during the first few months of the Ukraine war.
The Financial Conduct Authority (FCA) has given information that 14 DDoS attacks have occurred in 2022, compared to only five in all of 2021.
Picus Security co-founder, Suleyman Ozarslan has explained: ‘UK financial institutions are in the crossfire of the ongoing war between Russia and Ukraine and have become a direct target for nation-state attackers and hacktivists seeking to disrupt Ukraine’s allies.’ With the importance of the finance sector as critical national infrastructure, Picus Security understands these attacks were carried out by state-sponsored and hacktivist operations.
LINK: https://www.infosecurity-magazine.com/news/ddos-attacks-uk-firms-surge-during/
EXCERPT: DDoS attacks against UK financial institutions increased during the Ukraine war. 14 DDoS attacks have occurred in 2022, compared to only five in all of 2021. Picus Security believes these attacks were carried out by state-sponsored and hacktivist operations
DATE: 14.09.2022.
TOPIC: Cyberconflict and warfare, Cybercrime
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
Iranian Hackers Launch Renewed Attack on Albania
TITLE: Albania is yet again the target of new Iranian hacker attacks
CONTENT: The office of Albanian Prime Minister Edi Rama tweeted over the weekend that the attacks targeted the Total Information Management System (TIMS), which assists in tracking individuals entering and exiting the country. Following a July 15 ransomware attack that knocked out multiple government services, Tirana decided last week to cut all diplomatic ties with Iran.
The NATO member nation has long been Iran's adversary, providing refuge to tens of thousands of members of the Iranian opposition movement Mujahedeen-e-Khalq (MEK). The attack in July occurred just before the Free Iran World Summit that was scheduled to take place in Albania.
Albania had joined forces with Microsoft and the FBI on attribution in order to ensure that the act was the result of state aggression.
EXCERPT: The office of Albanian Prime Minister Edi Rama tweeted over the weekend that the attacks targeted the Total Information Management System (TIMS), which assists in tracking individuals entering and exiting the country. The FBI and Microsoft worked with the Albanian government to ensure that the act was the result of state aggression.
LINK: https://www.infosecurity-magazine.com/news/iranian-hackers-launch-renewed/
DATE: 13.09.2022.
TOPIC: Cyberconflict and warfare, Cybercrime
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
Cyberspies drop new infostealer malware on govt networks in Asia
TITLE: New infostealer malware dropped on Asian government networks by cyberspies
CONTENT: Security researchers have discovered new cyber-espionage action targeting Asian governments, along with state-owned aerospace and defense companies, telecom companies, and IT organizations.
This activity is being carried out by a distinct threat group previously associated with the "ShadowPad" RAT (remote access trojan). Recently, the threat actor used a much broader set of tools.The most current campaign appears to be almost entirely focused on Asian governments or public entities, such as some of the following: head of government/Prime Minister's office, government-owned aerospace and defense companies, state-owned media companies etc.
Chinese hackers are most likely behind these espionage campaigns, but the evidence isn't credible enough to make a certain conclusion.
EXCERPT: This cyber-espionage activity is being carried out by a distinct threat group previously associated with the "ShadowPad" RAT. The most current campaign appears to be almost entirely focused on Asian governments. Chinese hackers are most likely behind these espionage campaigns, but the evidence isn't credible enough to make a certain conclusion.
DATE: 13.09.2022.
TOPIC: Cyberconflict and warfare, Cybercrime, Cybersecurity
-
-
-
Vietnamese journalist gets five years in prison for “abusing democratic freedoms”
TITLE: Vietnamese journalist gets five years of prison for his online criticism
CONTENT: Le Anh Hung, a 49 year old journalist, was given a five-year prison sentence by a Hanoi court on August 30 for "abusing democratic freedoms" and "infringing upon the interests of the state." Hung frequently contributed to the Voice of America website and wrote on politics. He also frequently attacked Hoang Trung Hai, a former deputy prime minister and industry minister, whom he accused of corruption, abuse of authority, and espionage for China in his posts that criticized the ruling party's corruption and dominance.
He published an open letter on his Facebook page that went viral three days prior to his arrest. The letter criticized government actions and demanded that a draft law designating "special economic zones" in three different regions of Vietnam be changed. The planned law had received harsh public criticism and had ignited demonstrations that were ruthlessly put down. Despite Hung's repeated claims that his mental health was excellent, he was detained in a mental institution in Hanoi for the first three years and ten months following his detention.
This five-year prison sentence that Vietnam's authorities secretly handed down to independent journalist Le Anh Hung after imprisoning him for four years in appalling conditions apalls Reporters Without Borders (RSF). According to RSF, the authorities continue to abuse the legal system to impose draconian punishments in an effort to silence any criticism of media.
EXCERPT: Journalist Le Anh Hung was sentenced to five years in a Hanoi court for "abusing democratic freedoms" and "infringing upon the interests of the state". Reporters Without Borders (RSF) says the authorities continue to abuse the legal system to impose draconian punishments in an effort to silence any criticism of media. Despite claims that his mental health was excellent, he was detained in a mental institution for the first three years and ten months following his detention.
LINK: https://rsf.org/en/vietnamese-journalist-gets-five-years-prison-abusing-democratic-freedoms
DATE: 12.09.2022.
TOPIC: Freedom of the press, Freedom of expression
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
US Treasury Sanctions Iranian Minister Over Hacking of Govt and Allies
TITLE: Iranian Minister Sanctioned by US Treasury for Hacking Government and Allies
CONTENT: The Office of Foreign Assets Control (OFAC) of the US Department of the Treasury has sanctioned Iran's Ministry of Intelligence and Security (MOIS) and its Minister of Intelligence for allegations in engaging in cyber-enabled activities against the United States and its allies.
"We will not tolerate Iran's increasingly aggressive cyber activities targeting the United States or our allies and partners," stated Brian E. Nelson, Treasury Undersecretary for Terrorism and Financial Intelligence.
The MOIS would have guided several network connections of cyber threat actors engaged in cyber-espionage and ransomware attacks in assistance of Iran's political goals under Esmail Khatib's leadership.
The MuddyWater ransomware operations against Turkish government entities in November 2021, the APT39 wide - spread theft of personally identifiable information (PII) in 2020, and, most recently, the cyber activity that directly impacted Albanian government websites are examples of these. These sanctions come just weeks after Microsoft revealed details of alleged hacking campaigns linked to MuddyWater that targeted Israeli organizations by exploiting Log4j 2 vulnerabilities in SysAid applications.
EXCERPT: United States Office of Foreign Assets Control has sanctioned Iran's Ministry of Intelligence and Security (MOIS) and its Minister of Intelligence for cyber-enabled activities against the U.S. and its allies. "We will not tolerate Iran's increasingly aggressive cyber activities targeting the United States, …" said Brian E. Nelson, Treasury Undersecretary for Terrorism and Financial Intelligence.
LINK: https://www.infosecurity-magazine.com/news/us-sanctions-iranian-ministry/
DATE: 12.09.2022.
TOPIC: Cyberconflict and warfare
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
North Korean Lazarus Group Hacked Energy Providers Worldwide
TITLE: Energy providers hacked globally by North Korean Lazarus Group
CONTENT: Between February and July 2022, the North Korean threat actor Lazarus Group ran a malicious campaign against energy providers all over the world. The campaign was previously revealed in part by Symantec and AhnLab in April and May, and Cisco Talos is now providing additional details.
The security researchers stated in an advisory on Thursday that the Lazarus campaign involved the exploitation of vulnerabilities in VMWare Horizon to gain initial access to targeted organizations. Cisco Talos states that the recent Lazarus attacks targeted energy providers from various countries, including the United States, Canada, and Japan.
The new Cisco Talos advisory is just the latest in a long line of documents detailing the Lazarus Group's hacking operations this summer. Elliptic, a blockchain analytics company, suggested in June that the threat actor was responsible for the $100 million theft from cryptocurrency firm Harmony. The Block recently linked the group to Axie Infinity's $600 million hack.
LINK: https://www.infosecurity-magazine.com/news/lazarus-group-hacked-energy/
DATE: 12.09.2022.
TOPIC: Cyberconflict and warfare, Cybercrime
EXCERPT: Between February and July 2022, the Lazarus Group ran a malicious campaign against energy providers all over the world. The campaign was previously revealed in part by Symantec and AhnLab in April and May. Cisco Talos is now providing additional details on the North Korean threat actor's operations.
-
-
freedomhouse.org freedomhouse.org
-
TITLE: Freedom House report on Beijing’s Global Media Influence: cyber aspects
CONTENT: (For the next two paragraphs please use this link: https://www.voanews.com/a/china-s-global-media-influence-campaign-growing-says-freedom-house-/6736696.html) Freedom House report: Beijing's Global Media Influence: Authoritarian Expansion and the Power of Democratic Resilience, showed Beijing’s efforts to influence media in democracies, and their response. According to Freedom House, the Chinese Communist Party (CCP) employs a variety of tactics, including mass distribution of state-produced content, harassment and intimidation of local media outlets, targeted disinformation, and the use of cyberbullying and fake social media accounts.
Sarah Cook, Freedom House's research director for China, Hong Kong, and Taiwan, and one of the report's authors said: ‘The Chinese government is using more sophisticated, more covert and more coercive tactics, like cyberbullying, or cyberattacks, or just phone calls to journalists, to try to pressure and influence coverage in countries around the world.’
(From here on, please use this link: https://freedomhouse.org/report/beijing-global-media-influence/2022/authoritarian-expansion-power-democratic-resilience) Since 2019, more aggressive activities such as targeted harassment of individual reporters, cyberbullying, and cyberattacks against stigmatized media organizations have spread to 24 of the 30 countries under investigation in some form. Also, from 2019, news outlets or journalists from 7 countries have been targeted by cyberattacks that could be traced back to China. These cyberattacks increase the financial burden on media outlets to improve their defenses, and data theft hacking could endanger journalists and their sources.
Nigeria has been identified as the country most vulnerable to Beijing's media influence campaigns.
LINK: https://freedomhouse.org/report/beijing-global-media-influence/2022/authoritarian-expansion-power-democratic-resilience & https://www.voanews.com/a/china-s-global-media-influence-campaign-growing-says-freedom-house-/6736696.html
TOPIC: Freedom of the press, Cybercrime
DATE: 08.09.2022.
EXCERPT: Freedom House report: Beijing's Global Media Influence: Authoritarian Expansion and the Power of Democratic Resilience, showed Beijing's efforts to influence media in democracies. Since 2019, news outlets or journalists from 7 countries have been targeted by cyberattacks that could be traced back to China. More aggressive activities such as targeted harassment of individual reporters, cyberbullying, and cyberattacks against stigmatized media organizations have spread to 24 of the 30 countries under investigation in some form. According to Freedom House, the Chinese Communist Party (CCP) employs a variety of tactics, including mass distribution of state-produced content, harassment and intimidation of local media outlets, targeted disinformation, and the use of cyberbullying and fake social media accounts.
-
Beijing's Global Media Influence 2022
TITLE: Freedom House report on Beijing’s Global Media Influence: cyber aspects
CONTENT: (For the next two paragraphs please use this link: https://www.voanews.com/a/china-s-global-media-influence-campaign-growing-says-freedom-house-/6736696.html) Freedom House report: Beijing's Global Media Influence: Authoritarian Expansion and the Power of Democratic Resilience, showed Beijing’s efforts to influence media in democracies, and their response. According to Freedom House, the Chinese Communist Party (CCP) employs a variety of tactics, including mass distribution of state-produced content, harassment and intimidation of local media outlets, targeted disinformation, and the use of cyberbullying and fake social media accounts.
(From here on, please use this link: https://www.voanews.com/a/china-s-global-media-influence-campaign-growing-says-freedom-house-/6736696.html) Sarah Cook, Freedom House's research director for China, Hong Kong, and Taiwan, and one of the report's authors said: ‘The Chinese government is using more sophisticated, more covert and more coercive tactics, like cyberbullying, or cyberattacks, or just phone calls to journalists, to try to pressure and influence coverage in countries around the world.’
Since 2019, more aggressive activities such as targeted harassment of individual reporters, cyberbullying, and cyberattacks against stigmatized media organizations have spread to 24 of the 30 countries under investigation in some form. Since 2019, news outlets or journalists from 7 countries have been targeted by cyberattacks that could be traced back to China. These cyberattacks increase the financial burden on media outlets to improve their defenses, and data theft hacking could endanger journalists and their sources.
Nigeria has been identified as the country most vulnerable to Beijing's media influence campaigns.
LINK: https://freedomhouse.org/report/beijing-global-media-influence/2022/authoritarian-expansion-power-democratic-resilience & https://www.voanews.com/a/china-s-global-media-influence-campaign-growing-says-freedom-house-/6736696.html
TOPIC: Freedom of the press, Cybercrime
DATE: 08.09.2022.
EXCERPT: Freedom House report: Beijing's Global Media Influence: Authoritarian Expansion and the Power of Democratic Resilience, showed Beijing's efforts to influence media in democracies. Since 2019, news outlets or journalists from 7 countries have been targeted by cyberattacks that could be traced back to China. More aggressive activities such as targeted harassment of individual reporters, cyberbullying, and cyberattacks against stigmatized media organizations have spread to 24 of the 30 countries under investigation in some form. According to Freedom House, the Chinese Communist Party (CCP) employs a variety of tactics, including mass distribution of state-produced content, harassment and intimidation of local media outlets, targeted disinformation, and the use of cyberbullying and fake social media accounts.
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
Increased Mortality Rates Linked to Cyber-Attacks Against Healthcare Organizations
TITLE: Increased Mortality Rates as a Result of Cyber-Attacks on Healthcare Organizations
CONTENT: According to new research from Proofpoint's Ponemon Institute, cyber-attacks on healthcare organizations increase mortality rates by more than 20%. The report surveyed 641 healthcare IT and security practitioners, and found out that 89% of them experienced an average of 43 attacks in the previous 12 months, with more than 20% experiencing one of these types of attacks: cloud compromise, ransomware, supply chain, and phishing.
The most common consequences of these attacks, according to Proofpoint, were delayed procedures, which resulted in poor patient outcomes for 57% of healthcare providers and increased complications from medical interventions for approximately half of them.
Ransomware was the most likely type of attack to have a negative impact on patient care, causing procedure or test postponements in 64% of cases and longer patient stays (59%).
LINK: https://www.infosecurity-magazine.com/news/mortality-rates-linked-cyber/
DATE: 11.09.2022.
TOPIC: Cyberconflict and warfare, Cybercrime, Cybersecurity
EXCERPT: Cyber-attacks on healthcare organizations increase mortality rates by more than 20%. 89% of healthcare IT and security practitioners experienced an average of 43 attacks in the previous 12 months. Cloud compromise, ransomware, supply chain, and phishing were the most common types of attacks.
-
-
www.reuters.com www.reuters.com
-
Draft EU rules target smart devices with cybersecurity risks
TITLE: Draft EU regulations direct smart devices that pose cybersecurity risks
CONTENT: According to a European Commission document obtained by Reuters on Thursday, smart devices connected to the internet, such as refrigerators and televisions, will have to comply with strict European Union cybersecurity rules or risk being fined or banned from the bloc.
On September 13, the EU executive will unveil its Cyber Resilience Act proposal. Following input from EU countries, it is likely to become law. Companies will be required to notify the EU cybersecurity agency ENISA of incidents within 24 hours of becoming aware of them, and to take corrective action.
The paper states that if companies fail to comply, national surveillance authorities have the authority to ‘prohibit or restrict that product being made available on its national market, to withdraw it from that market or recall it.’
EXCERPT: On September 13, the EU executive will unveil its Cyber Resilience Act proposal. Following input from EU countries, it is likely to become law. Smart devices connected to the internet, such as refrigerators and televisions, will have to comply with strict European Union cybersecurity rules.
DATE: 08.09.2022.
TOPIC: Cybersecurity, Cybercrime
-
-
www.nytimes.com www.nytimes.com
-
Battling Violence and Censors, Women in China Become ‘Invisible and Absent’
TITLE: Women in China are being silenced online as a result of violence and censorship
CONTENT: When an influential woman in China's #MeToo movement, Ms. Zhou Xiaoxuan, went to court against a famous TV anchor, Mr. Zhu Jun, the justice was not on her side. What happened was not the accuser, but the accused - was portrayed as the victim. Other cases of gender violence and gender related incidents also rapidly went viral. In each case, however, the conversation was quickly censored in order to reduce the ways in which the women had been assaulted. China’s Communist Party has used social media censorship to silence critics while amplifying comments that support the government's chosen narrative of social harmony. After carefully analysing the content, censors then remove popular comments or accounts which express views that deviate too far from the party line. Government censors used Weibo, a popular Chinese social media platform to boost the comments supporting the court’s decision against one of the victims of sexual assault mentioned above, while reducing and deleting messages in her support.
TOPIC: Freedom of expression, Gender rights online
LINK: https://www.nytimes.com/2022/09/06/business/china-women-metoo.html
DATE: 06.09.2022.
EXCERPT: Chinese women are not allowed to post freely about their experiences of gender-related violence. #MeToo movement in China was restricted and censored by the ruling China’s Communist Party. Social media censorship is one of the main tools the government use in order to prevent women to express themselves and point out the unjust situation in the country regarding their mistreatment.
-
-
-
UK condemns Iran for reckless cyber attack against Albania
TITLE: Iran is condemned by the United Kingdom for its cyber attack on Albania
CONTENT: On September 7, the United Kingdom officially condemned the Iranian state for a cyber attack against Albania's government which destroyed data and interrupted crucial government services such as paying utilities, booking medical appointments, and enrolling schoolchildren. According to the National Cyber Security Centre (NCSC), Iranian state-linked cyber actors are almost definitely accountable for a number of cyber attacks against Albanian government infrastructure beginning on July 15, 2022.
UK Foreign Secretary James Cleverly declared that ‘The UK is supporting our valuable partner and NATO ally. We join Albania and other allies in exposing Iran’s unacceptable actions.’ The UK has already identified and provided advice on several cyberattacks by Iranian actors, starting with 2018.
TOPIC: Cyberconflict and warfare
LINK: https://www.gov.uk/government/news/uk-condemns-iran-for-reckless-cyber-attack-against-albania
DATE: 07.09.2022.
EXCERPT: This Wednesday, the United Kingdom condemned the Iranian state for a cyber attack against Albania's government which destroyed data and interrupted crucial government services such as paying utilities. The UK has already identified and provided advice on several cyberattacks by Iranian actors, starting with 2018.
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
Ransomware gang's Cobalt Strike servers DDoSed with anti-Russia messages
TITLE: Ransomware gang’s Cobalt Strike servers receive anti-Russia messages in a series of DDoS
CONTENT: There has been a flood of anti-Russian messages to Cobalt Strike servers run by former Conti ransomware gang members in order to disrupt their operations. Although the operators of Conti ransomware turned off their infrastructure this year in May, its members are now a part of other ransomware groups, including Quantum, Hive, and BlackCat. At the time, TeamServers (C2) used by ransomware actors to control the Cobalt Strike (CS) Beacon payloads on compromised hosts are being tracked by someone, allowing for lateral network movement. When they go inside the CS servers, the usernames they use are ‘Stop Putin!’, or they change their computer name to messages like ‘Be a Russian patriot!’, and ‘Stop the war!’ It is unknown who is sending these messages, as it could be anyone from a security researcher to law enforcement or even a cybercriminal with a grudge for siding with Russia, BleepingComputer reports. In the end, the disruption was only temporary, and the ransomware actor returned to the scene with a more robust infrastructure, allowing them to keep the stolen data accessible even in the face of distributed denial-of-service (DDoS) attacks. LINK: https://www.bleepingcomputer.com/news/security/ransomware-gangs-cobalt-strike-servers-ddosed-with-anti-russia-messages/ EXCERPT: There has been a flood of anti-Russian messages to Cobalt Strike servers run by former Conti ransomware gang members in order to disrupt their operations. At the time, TeamServers (C2) used by ransomware actors to control the Cobalt Strike (CS) Beacon payloads on compromised hosts are being tracked by someone, allowing for lateral network movement. TOPIC: Cybercrime, Cyberconflict and warfare DATE: 07.09.2022.
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
TITLE: Albania blames Iran for the July cyberattack and suspends diplomatic relations
CONTENT: Albanian Prime Minister, Edi Rama, declared on Wednesday that the entire staff of the Islamic Republic of Iran Embassy in Albania had been asked to leave within 24 hours.
This decision follows the termination of diplomatic relations with Iran following the identification of an Albanian government infrastructure cyberattack to Iranian threat actors in July. Rama said that: ‘The in-depth investigation provided us with indisputable evidence that the cyberattack against our country was orchestrated and sponsored by the Islamic Republic of Iran through the engagement of four groups that enacted the aggression.’
The U.S. government also officially blamed Iran for the July attack on Albania. The U.S. official said that they condemn this attack and that the Islamic Republic of Iran would be held responsible for endangering the security of a NATO ally. Further actions will be taken to held Iran accountable if another attack towards any of their NATO ally happens in the future. EXCERPT: Albanian Prime Minister, Edi Rama, declared on Wednesday that the entire staff of the Islamic Republic of Iran Embassy in Albania had been asked to leave within 24 hours. The U.S. government also officially blamed Iran for the July attack on Albania. The U.S. official said that they condemn this attack and that the Islamic Republic of Iran would be held responsible for endangering the security of a NATO ally. LINK: https://www.bleepingcomputer.com/news/security/albania-blames-iran-for-july-cyberattack-severs-diplomatic-ties/ TOPIC: Cyberconflict and warfare DATE: 07.09.2022.
-
-
www.reuters.com www.reuters.com
-
TITLE: Japan investigates the potential involvement of a pro-Russian group in cyberattacks
CONTENT: Japan announced on Wednesday that it is looking into the possible role in cyberattacks of a pro-Russian group after numerous government websites were disrupted the day before. The ransomware group in question is ‘Killnet’, which is considered to be responsible for attacks on the government websites, as media quotes.
According to Chief Cabinet Secretary Hirokazu Matsuno, the Japanese government is investigating whether problems accessing more than 20 websites across four government ministries were caused by a denial-of-service (DDoS) attack. Matsuno also explained that the government websites could not be reached on Tuesday evening.
However, services were recovered the same day. He is aware this pro-Russian group is suggesting that they were behind the attack, but the case is still being investigated at the moment.
EXCERPT: Japan announced on Wednesday that it is looking into the possible role in cyberattacks of a pro-Russian group named Killnet after numerous government websites were disrupted the day before. According to Chief Cabinet Secretary Hirokazu Matsuno, the Japanese government is investigating whether problems accessing more than 20 websites across four government ministries were caused by a denial-of-service (DDoS) attack.
DATE: 07.09.2022.
TOPIC: Cyberconflict and warfare, Cybercrime
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
The new Worok cyber-espionage group is targeting governments and high-profile corporations
Worok, a newly discovered cyber-espionage group, has been using a combination of custom and existing malicious tools to hack governments and high-profile companies in Asia since 2020. ESET security researchers were the first to spot it, and they found out that the group also attacked targets from Middle East and Africa.
Worok has so far been linked to attacks on telecommunications, banking, maritime, and energy companies, along with military, government, and public sector organizations. Although there have been no sightings since February 2022, ESET has linked the group to new attacks against a Central Asian energy company and a public sector institution in Southeast Asia.
TOPIC: Cyberconflict and warfare, Cybercrime
DATE: 06.09.2022.
EXCERPT: Worok, a newly discovered cyber-espionage group, has been using a combination of custom and existing malicious tools to hack governments and high-profile companies in Asia since 2020. Although there have been no sightings since February 2022, ESET has linked the group to new attacks against a Central Asian energy company and a public sector institution in Southeast Asia.
-
-
-
TITLE: The JX Fund and Voronezh Mass Media Defence Center launched the information platform Shpargalka | Exile
CONTENT: The JX Fund - European Fund for Journalism in Exile, in collaboration with the Voronezh Mass Media Defense Center, has launched the information platform Shpargalka | Exile (‘cheat sheet’ in Russian) to assist threatened media professionals in Russia in selecting a country of exile that is appropriate for them and their needs. Since the increase in anti-press legislation in Russia starting from 4 March, even the use of the word "war" can result in a 15-year prison sentence, so this type of platform is useful for media workers.
Shpargalka | Exile has now compiled answers to 21 of the most pressing questions, like ‘How do I get a work permit?’, or ‘What do I need to do to register a media company in exile?’ All questions are being answered by lawyers from 12 countries, which currently include: Armenia, Azerbaijan, Bulgaria, Germany, Georgia, Israel, Kazakhstan, Latvia, Montenegro, Poland, Serbia, and Turkey.
The information is regularly updated, as many countries' entry requirements and legal systems constantly change in light of the tense geopolitical situation. In recent months, the JX Fund has helped 14 media outlets rebuild, as well as five start-ups and the creation of a media hub in Tbilisi, Georgia. Since the increase in anti-press legislation in Russia starting from 4 March, even the use of the word "war" can result in a 15-year prison sentence.
EXCERPT: The JX Fund - European Fund for Journalism in Exile, in collaboration with the Voronezh Mass Media Defense Center, has launched the information platform Shpargalka | Exile (‘cheat sheet’ in Russian) to assist threatened media professionals in Russia in selecting a country of exile that is appropriate for them and their needs. The platform gives answers to 21 of the most pressing questions, which are given by lawyers from 12 countries.
LINK: https://rsf.org/en/cheat-sheet-media-workers-under-threat Sharpgalka | Exile: https://shpargalka-exile.web.app/
TOPIC: Freedom of the press
DATE: 05.09.2022.
-
-
abcnews.go.com abcnews.go.com
-
China accuses Washington of cyberspying on university
TITLE: China accused Washington of breaking into computers and spying on university
CONTENT: China accused Washington on Monday of breaking into computers at Northwestern Polytechnical University that US officials say conducts military research. Both governments complained about worrying online spying against one another.
The National Computer Virus Emergency Response Center reported computer break-ins at Northwestern Polytechnical University in June. It stated that the center, in collaboration with a commercial security provider, Qihoo 360 Technology Co., identified the attacks back to the National Security Agency, but did not specify how.
China accuses the US of spying on universities, energy companies, and internet service providers, among other targets. Washington accuses Beijing of stealing commercial secrets and has charged Chinese military officers with crimes.
According to Foreign Ministry spokeswoman Mao Ning, the US actions "seriously endanger China's national security." She also accused Washington of using spyware to eavesdrop on Chinese phone calls and stealing text messages.
As per the security experts, the ruling Communist Party's military wing, the People's Liberation Army, and the Ministry of State Security also fund outside hackers. Alongside with Russia, China and the United States are widely acknowledged as global leaders in cyberwarfare research.
TOPIC: Cyberconflict and warfare, Cybercrime
EXCERPT: Chinese government accused Washington of cyberspying on Monday. Northwestern Polytechnical University in June has suffered computer break-ins, according to The National Computer Virus Emergency Response Center. China also accuses the US of spying on universities, energy companies, and internet service providers, among other targets. It stated that the center, in collaboration with a commercial security provider, Qihoo 360 Technology Co., identified the attacks back to the National Security Agency, but did not specify how.
DATE: 05.09.2022.
-
-
cpj.org cpj.org
-
U.S. reporters wary of online, legal threats in the wake of the overturn of Roe v. Wade
TITLE: In the aftermath of the Roe v. Wade decision, US journalists are wary of online legal threats
CONTENT: The editors of the pro-abortion rights news website Rewire unusually removed reporter biographies from the site in May.
The move was made as a precaution after a draft of a majority Supreme Court opinion in Dobbs v. Jackson Women's Health Organization, which sought to overturn the constitutional right to abortion, was leaked. Rewire reporters were concerned about an increase in online harassment.
Editor-in-chief Galina Espinoza said that: ‘The newsroom has for years kept a repository of harassing messages to track patterns, just in case.’ The current abortion situation in America has some abortion reporters on edge.
In addition to their fears about online harassment, reporters notified Committee to Protect Journalists (CPJ) that they are concerned about real-world violence and how changing laws may expose them and their sources to legal threats in the aftermath of the Supreme Court's decision to overturn Roe v. Wade in June.
EXCERPT: U.S. reporters shared their concerns with Committe to Protect Journalists (CPJ) about online harassment they face. However, it does not ned there. They are now even concerned about real-world violence in the aftermath of the Supreme Court’s decision to overturn Roe v. Wade in June. The current abortion situation in America has some abortion reporters on edge. The Rewire newsroom is keeping a repository of harassing messaged to track patterns.
DATE: 01.09.2022.
TOPIC: Freedom of the Press, Freedom of expression
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
New ransomware hits Windows, Linux servers of Chile govt agency
TITLE: Ransomware attack hits Windows, Linux servers of Chilean government agency
CONTENT: Chile's national computer security and incident response team (CSIRT) has confirmed that a ransomware attack has affected the country's government agency's operations and online services.
The attack began on Thursday, August 25, and targeted the agency's Microsoft and VMware ESXi servers. The hackers offered Chile’s CSIRT a communication channel through which they could negotiate the payment of a ransom that would prevent the files from being leaked. The malware used in this attack, according to CSIRT, also had functions for stealing credentials from web browsers, listing removable devices for encryption, and evading antivirus detection via execution timeouts.
In their announcement, Chile's CSIRT does not title the ransomware group responsible for the attack, nor does it offer enough information to identify the malware. Because it has been used by multiple threat actors, the extension appended to the encrypted files provides no clue. Very limited information provided by Chile's CSIRT on the malware's behavior points to the 'RedAlert' ransomware (aka "N13V"). Nevertheless, indicators of compromise (IoCs) in the announcement could be associated with Conti.
According to what Chilean threat analyst Germán Fernández told BleepingComputer, the strain appears to be entirely new, and the researchers he spoke with were unable to associate the malware with known families. Based on what BleepingComputer has learned so far about this ransomware, it is a new operation that began in early August.
EXCERPT: BleepingComputer learned about a brand new ransomware operation that started in August, targeting Chile's national computer security and incident response team (CSIRT). The hackers have affected the agency's Microsoft and VMware ESXi servers with their operations. According to CSIRT, the malware used in this operations had functions for stealing credentials from web browsers, listing removable devices for encryption, and evading antivirus detection via execution timeouts.
DATE: 01.09.2022.
TOPIC: Cyberconflict and warfare
COUNTRY: Chile
-
-
-
China-Taiwan military tension fuels an active cyberwar
TITLE: Military tensions between China and Taiwan fuel an active cyberwar
CONTENT: The world was relieved when tensions between China and Taiwan did not escalate into a larger military engagement in August. Nevertheless, both countries are influenced by an active cyberwarfare.
According to researchers at threat intelligence firm Cyberint, cyber activity between China and Taiwan is defined by multi-vector attacks, similar to what experts have observed happening between Russia and Ukraine. Based on a recent report, cyber tensions are high, and the number of national-level cyberattacks targeting China and Taiwan has recently significantly increased. Cyberint Research Team states that the growing number of cyberattacks will encourage more competing hackers organizations, raising the risk of an escalating cyber conflict.
One obvious sign of increased activity, according to the researchers, is the increasing number of comments on Chinese and Taiwanese breaches in cybercriminal leak forums, with the number of comments on Chinese data leaks increasing four times in July compared to June. When it comes to Taiwan, the number of comments under data leaks from its companies also increased during July.
The new tactic may eventually lead to a gradual increase from minor cyberattacks on government websites to more serious crimes involving hacking of critical infrastructure. If the cyber conflict between Taiwan and China resembles what happened in Ukraine, China should prepare its infrastructure to withstand a series of new of distributed denial-of-service (DDoS) attacks.
EXCERPT: Even though military tensions between China and Taiwan have not escalated, there is an ongoing cyber war between them. The engagement in these attacks is similar to the ones in Ukraine and Russia, and there are clear signs that there is an increasing number of comments on Chinese and Taiwanese breaches in cybercriminal leak forums. The new tactic may include a gradual increase from minor cyberattacks on government websites to more serious crimes involving the hacking of critical infrastructure.
DATE: 01.09.2022.
LINK: https://cybernews.com/news/china-taiwan-military-tension-fuels-an-active-cyberwar/
TOPIC: Cyberconflict and warfare
COUNTRY: China, Taiwan
-
-
-
TITLE: Military tensions between China and Taiwan fuel an active cyberwar
CONTENT: The world was relieved when tensions between China and Taiwan did not escalate into a larger military engagement in August. Nevertheless, both countries are influenced by an active cyberwarfare.
According to researchers at threat intelligence firm Cyberint, cyber activity between China and Taiwan is defined by multi-vector attacks, similar to what experts have observed happening between Russia and Ukraine. Based on a recent report, cyber tensions are high, and the number of national-level cyberattacks targeting China and Taiwan has recently significantly increased. Cyberint Research Team states that the growing number of cyberattacks will encourage more competing hackers organizations, raising the risk of an escalating cyber conflict.
One obvious sign of increased activity, according to the researchers, is the increasing number of comments on Chinese and Taiwanese breaches in cybercriminal leak forums, with the number of comments on Chinese data leaks increasing four times in July compared to June. When it comes to Taiwan, the number of comments under data leaks from its companies also increased during July.
The new tactic may eventually lead to a gradual increase from minor cyberattacks on government websites to more serious crimes involving hacking of critical infrastructure. If the cyber conflict between Taiwan and China resembles what happened in Ukraine, China should prepare its infrastructure to withstand a series of new of distributed denial-of-service (DDoS) attacks.
EXCERPT: Even though military tensions between China and Taiwan have not escalated, there is an ongoing cyber war between them. The engagement in these attacks is similar to the ones in Ukraine and Russia, and there are clear signs that there is an increasing number of comments on Chinese and Taiwanese breaches in cybercriminal leak forums. The new tactic may include a gradual increase from minor cyberattacks on government websites to more serious crimes involving the hacking of critical infrastructure.
DATE: 01.09.2022.
LINK: https://cybernews.com/news/china-taiwan-military-tension-fuels-an-active-cyberwar/
TOPIC: Cyberconflict and warfare
COUNTRY: China, Taiwan
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
Ragnar Locker ransomware claims attack on Portugal's flag airline
TITLE: TAP Air Portugal hit by ransomware: Ragnar Locker claims responsibility
CONTENT: The Ragnar Locker ransomware gang has claimed responsibility for an attack on Portugal's flag carrier, TAP Air Portugal, which was revealed by the airline after its systems were compromised on Thursday night.
The company stated that the attack was stopped and that no evidence suggested that the attackers gained access to the customer data stored on the affected servers. The airline also issued an alert on Monday, stating that its website and app are unavailable due to the Thursday ransomware attack.
TAP has yet to confirm whether this was a ransomware attack. However, the Ragnar Locker ransomware gang posted a new entry on their data leak website today, claiming responsibility for last week's cyberattack on TAP's network.
The ransomware group believes to have "reasons" to assume that hundreds of Gigabytes of data were compromised in the incident and has threatened to provide "irrefutable evidence" to negate TAP's claim that its customers' data was not accessed. Ragnar Locker also shared a screenshot of a spreadsheet that appears to contain customer data stolen from TAP's servers, such as names, dates of birth, emails, and addresses.
DATE: 31.08.2022.
EXCERPT: The Ragnar Locker ransomware gang claims responsibility for the ransomware attack on Portugal’s flag carrier, TAP Air Portugal. The company itself says that the attack was prevented, and customers’ information has been untouched. On the other hand, the ransomware gang states that they can easily provide evidence that the data has been compromised.
TOPIC: Cyberconflict and warfare, Cybercrime
-
- Aug 2022
-
www.reuters.com www.reuters.com
-
TITLE: Saudi woman sentenced to 45 years in prison for social media posts
CONTENT: A Saudi Arabian court convicted Nourah bint Saeed al-Qahtani to 45 years of prison time for posts on social media, according to a rights group. According to a Washington-based DAWN organization, she was convicted by the Saudi Specialized Criminal Court on charges of ‘using the internet to tear the (Saudi) social fabric’ and for ‘violating public order by using social media.’
DAWN stated that almost nothing is known about Qahtani or even what her social media posts stated and that the investigation into her case was ongoing. Salma al-Shehab, a mother of two and doctoral candidate at the University of Leeds in the United Kingdom, was sentenced to 35 years in prison for following and retweeting dissidents and activists on Twitter just a few weeks before Qahtani's conviction.
According to Abdullah al-Aoudh, Director of Research for the Gulf Region at DAWN, Saudi authorities used "abusive" laws in both the Shebab and Qahtani cases to target and sanction Saudi citizens for opposing the government on Twitter.
According to what Saudi officials told Reuters last month, the kingdom has no political prisoners, and the thought of it is ridiculous. On the other hand, a request for comment was not responded to by the Saudi government's media office.
DATE: 30.08.2022.
EXCERPT: Saudi Arabian woman, Nourah bint Saeed al-Qahtani, has been sentenced to 45 years in prison for her posts on social media platforms. A few weeks before that, another woman, Salma al-Shehab was sentenced to 35 years in prison for following and retweeting dissidents and activists on Twitter. A Washington-based DAWN organization is still investigating into al-Quahtani’s case, as it is not clearly known what her posts contained. Presumably, she criticized the government. Saudi authorities are using abusive laws to punish citizens who dare to oppose the rulers.
TOPIC: Freedom of expression
COUNTRY: Saudi Arabia
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
UK Spies Fund New Course for Female Coders
TITLE: UK Spies are funding a new course for female coders
CONTENT: With a new bootcamp course, the UK's main intelligence agency for dealing with cyber-threats hopes to attract more female coders to its workforce. GCHQ is sponsoring one of Code First Girls' 14-week 'nanodegree' courses, which are designed to appeal to women considering a career switch.
According to Jo Cavan, the security agency's director of strategy, policy, and engagement, teams such as counter-terrorism have performed better since becoming more diversified. Cavan claims that one key area where GCHQ needs more diversity is in countering threats from the east. She also added: ‘We have been working hard to increase that number so we have more diverse teams and better get across the threats we need to today.’
According to the certification organization ISC2, women still make up only 25% of cybersecurity roles global level. When it comes to its 2021 industry report, fewer women (38%) than men (50%) came from an IT background, while women have higher rates of entry through self-learning than men (20% vs. 14%). These figures suggest that there may be a sizable group of female job seekers looking to change careers to one that involves cyber.
LINK: https://www.infosecurity-magazine.com/news/uk-spies-fund-new-course-for/
DATE: 30.08.2022.
TOPIC: Gender rights online
EXCERPT: The UK’s main intelligence agency for dealing with cyber-threats is aiming to attract more female workers, in order to increase diversity. Studies have shown that teams such as counter-terrorism have performed better since becoming more diversified. In this article, you can also see the percentage of women in cybersecurity roles and the level of their entry through self-learning compared to men. The information is provided by the certification organization, ISC2.
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
TITLE: Chinese hackers use ScanBox malware to target the Australian government
CONTENT: Threat actors based in China have been targeting Australian government agencies and wind turbine fleets in the South China Sea by directing select individuals to a fake news media outlet impersonating an Australian news outlet. The sender pretended to be an employee of the hoax media outlet "Australian Morning News," with a link leading to the malicious website. The site included plagiarized content from legitimate news websites.
Victims started arriving at the fraudulent site after receiving phishing emails with appealing lures, and the ScanBox reconnaissance framework delivered a malware payload. From April to June of this year, the campaign targeted individuals at local and federal Australian Government agencies, Australian news media organizations, and global heavy industry manufacturers which provide maintenance to wind turbines in the South Chinese Sea.
Proofpoint and PwC (PricewaterhouseCoopers) security researchers who observed the campaign concluded that the goal was cyberespionage. They attribute the activity with moderate confidence to a Chinese-based threat group known as APT40 (a.k.a. TA423, Leviathan, Red Ladon).
EXCERPT: China-based actors have been targeting Australian government agencies and wind turbine fleets by directing individuals to a fake media outlet, pretending to be an Australian media outlet. The site they were led on, contained plagiarized information from legitimate news websites. From April to June 2022, the campaign targeted individuals at local and federal Australian Government agencies, Australian news media organizations, and global heavy industry manufacturers working to maintain wind turbines in the South Chinese Sea.
TOPIC: Cyberconflict and warfare, Cybercrime
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
TITLE: Acronis’ Mid-year Cyberthreat Report warns that global ransomware damage will exceed $30bn by 2023
CONTENT: Switzerland-based cybersecurity company Acronis reported in its Mid-Year Cyberthreat Report, published on August 24, that almost half of breaches during the first six months of 2022 involved stolen credentials. The primary goal of cybercriminals using these credentials is to launch ransomware attacks, which remain the number one threat to large and medium-sized businesses, including government organizations, the report says.
Acronis found that out of 600 malicious email campaigns in the first half of 2022, 58% were phishing attempts, and 28% featured malware. Unpatched or software vulnerabilities are now also being targeted by cybercriminals in order to extract data, with a recent increase in Linux operating systems and managed service providers (MSPs) and their network of SMB customers.
The Swiss firm is highlighting: ‘Ransomware is worsening, even more so than we predicted.’ They also mentioned Conti and Lapsus gangs as the prime targets for international security services. It is expected that global ransomware damage will exceed up to $30bn by next year.
EXCERPT: Swiss-based cybersecurity company Acronis reports in their Mid-Year Cyberthreat that the first six months of this year involved stolen credentials. With hacking methods in development, like targeting unpatched or software vulnerabilities, and malicious email campaigns, ransomware is worsening. It is excepted that global ransomware will exceed up to $30bn by 2023.
LINK: https://www.infosecurity-magazine.com/news/ransomware-exceed-30bn-dollars-2023/
TOPIC: Cybercrime, Cyberconflict and warfare
DATE: 29.08.2022.
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
Montenegro says Russian cyberattacks threaten key state functions
TITLE: Montenegro suspects the cyberattacks are coming from Russia
CONTENT: Cyberattacks are persistent in Montenegro and targets are the main infrastructure objects, such as electricity and water supply systems, transportation services, and online portals citizens use. At the time of writing, Bleeping Computer states that the official website of the government of Montenegro is unreachable.
The country's Defense Minister has blamed Russian actors for the attacks, telling local media on Saturday that there is enough evidence to suspect the attack was "directed by several Russian services."
The country's currently battling polarization which has been impacted by the current government's decision to support sanctions against Russia. This has sparked outrage from certain demographic groups and, in some cases like now, even external attacks.
Montenegro is currently receiving assistance from NATO allies to block the attacks. Most notable efforts come from France. The country has deployed an ANSSI (French Agency for Information Systems Security) team to assist in the defense of critical systems and the restoration of compromised networks.
DATE: 29.08.2022.
TOPIC: Cyberconflict and warfare
EXCERPT: Montenegro suffers a series of cyberattacks directed toward their vital infrastructure. The country’s Defense Minister is attributing these attacks to Russia, as Montenegro decided to support sanctions against them. Currently, Montenegro receives help from NATO allies, but mainly from France.
-
-
www.un.org www.un.org
-
This could include a commitment to negotiate an international instrument on the prevention of an arms race in outer space; common principles for the governance of outer space activities; and measures to accelerate agreement on the removal of space debris, and to coordinate space traffic.
In the Pact for the Future which should be adopted during the UN Summit for the Future to be held in September 2023, one of seven pillars is outer space.
The UN SG aims to achieve a high-level political agreement on the peaceful, secure and sustainable use of outer space with commitment 'to negotiate an international instrument on the prevention of an arms race in outer space; common principles for the governance of outer space activities; and measures to accelerate agreement on the removal of space debris, and to coordinate space traffic.'
You can more information in the UN SG remarks to the UN GA Consultation on 'Our Common Agenda'.
-
-
-
TITLE: Montenegro’s digital infrastructure hit by a unprecedented cyberattack
CONTENT: Montenegro's government digital infrastructure has been hit by a ‘unprecedented’ cyber attack, and swift measures have been taken to minimize the impact, officials said on Friday. ‘A persistent and ongoing cyber-attack is in process in Montenegro,’ The U.S. Embassy in Podgorica posted a warning on its website.
‘Certain services were switched off temporarily for security reasons but the security of accounts belonging to citizens and companies and their data have not been jeopardised,’ said Public Administration Minister Maras Dukaj on Twitter.
According to Reuters, in 2016, cyber criminals also targeted Montenegro's state digital infrastructure on election day, and again several months later in 2017, as this small Balkan state prepared to join NATO.
The Western military alliance is aware of reports of cyber attacks in Montenegro and is prepared to assist its authorities if needed, according to an unidentified NATO official quoted by Voice of America.
EXCERPT: Montenegro’s government digital infrastructure has been hit with an unprecedented cyber attack. The hacker’s origin is still not officially known, but it woke concerns among NATO members. This is not the first time the cyber attack of this range happened in Montenegro, but it is considered to be a persistent and ongoing according to the U.S. Embassy in Podgorica.
DATE: 26.08.2022.
TOPIC: Cyberconflict and warfare, Cybercrime
-
-
cpj.org cpj.org
-
TITLE: CPJ joins letters urging the U.S. government to hold the NSO Group accountable for spyware that surveilled journalists
CONTENT: In August, the Committee to Protect Journalists joined human rights and press freedom organizations in separate actions demanding the US government to hold NSO Group accountable for providing Pegasus spyware to governments that have secretly surveilled journalists around the world. The Israeli-owned NSO Group claims that it only licenses its Pegasus spyware to government agencies investigating crime and terrorism and that it should be immune from prosecution in US courts because it acted as an agent of foreign governments under the doctrine of sovereign immunity.
Nevertheless, according to the CPJ’s letter it is clear their actions are malicious: ‘The evidence of the use of Pegasus spyware against human rights defenders, journalists, opposition parties, and state officials by repressive regimes continues to mount, contrary to NSO Group’s claim that their spyware is used as a tool for investigating criminal activity and terrorism.’
EXCERPT: Committee to Protect journalists (CPJ) joins the letters of human rights and press freedom organizations in their separate actions urging the U.S. government to hold the Israeli-owned NSO Group accountable for providing Pegasus spyware to governments that have secretly surveilled journalists.
DATE: 25.08.2022.
TOPIC: Freedom of expression, Freedom of the press, Cybercrime
-
-
www.diplomacy.edu www.diplomacy.edu
-
Ambassador Theodor H. Winkler asks, "Has The West been Sleeping?" in his article for Stratos Digital journal. His answer is positive. The West is falling behind China and Russia in many military and strategic areas.
One reason was the West's acceptance of the "end of history" view after the Cold War. The Ukraine war serves as a wake up call.
Ambassador Winkler shared his thoughts on both the changes in thinking about war, security, politics, and practical steps to be taken to avoid strategic sleepwalking in Western societies.
-
-
www.fiod.nl www.fiod.nl
-
Arrest of suspected developer of Tornado Cash
TITTLE: The Netherland's financial crime agency arrested the Tornado Cash developer.
On August 10, the Dutch Fiscal Information and Investigation Service (FIOD) arrested Alexey Pertsev (29) as a suspect to be a developer behind the Tornado Cash online service.
A couple of days earlier, on August 8, the US Treasury sanctioned the Tornado Cash online service and froze all of their property in hand of the US regulators. The Treasury also issued a list of cryptocurrency wallet addresses that are affected by this sanctions.
The FIOD mentioned in the statement that 'advanced technologies, such as decentralised organisations (DAO) that may facilitate money laundering are receiving extra attention' from the financial watchdog.
'Investigations showed that at least one billion dollars' worth of cryptocurrencies of criminal origin passed through the mixer. It is suspected that persons behind this organisation have made large-scale profits from these transactions'
This is a rare case in which the open source developer is charged for the illicit activities that are performed on the platform he created.
The investigation is led by the Public Prosecutor’s Office for serious fraud, environmental crime and asset confiscation.
LINK: https://www.fiod.nl/arrest-of-suspected-developer-of-tornado-cash/
TOPIC: Cryptocurrency, Blockchain, Legal, cybercrime,
-
-
home.treasury.gov home.treasury.gov
-
U.S. Treasury Sanctions Notorious Virtual Currency Mixer Tornado Cash
The US Treasury sanctions the cryptocurrency mixer Tornado Cash
TITLE: The US Treasury sanctions the cryptocurrency mixer Tornado Cash
CONTENT: On August 8th 2022, The US Treasury's Office of Foreign Assets Control (OFAC) sanctioned the online service Tornado Cash that served as a mixer for the Ether cryptocurrency since 2019. The cryptocurrency mixers are online places where users could obfuscate the origin of cryptocurrency. Mixers use utility of decentralised exchanges and peer-to-peer trading, to create massive amount of transactions in short period of time - mixing tinted coins with the rest of the online supply. Mixers don't collect any user data related to people behind the cryptocurrency funds, therefore they are in a violation of the US federal regulations, and the global AML/CFT regulation. The Treasury stated an issues of national security to be one of the reasons for such action. The FBI and the OFAC are arguing that Tornado Cash facilitated a money laundry operation for the ransomware group Lazarus attributed to the DPRK. The OFAC is calming that cryptocurrency mixer was mostly used for illicit founds. and issued a list of Ether wallet addresses that are sanctioned in this case. It is not an usual practice for OFAC to sanction online service as they main targets are individuals. The OFAC called for the cryptocurrency industry to address challenges that anonymising features can present to AML/CFT obligations.
The Tornado Cash was decentralized entity that run on an open source code.
EXCERPT: The US Treasury, Office of Foreign Assets Control (OFAC) sanctioned the cryptocurrency mixer Tornado Cash and
LINK: https://home.treasury.gov/news/press-releases/jy0916
https://home.treasury.gov/policy-issues/financial-sanctions/recent-actions/20220808 - LIST OF CRYPTOCURRENCY WALLETS
TOPIC: Cryptocurrency, Blockchain, Legal,
TREND:
PROCESS:
-
-
-
TITLE: RSF’s new investigation on online media attacks throughout the Brazilian election campaign
CONTENT: Throughout Brazil's election campaign, Reporters Without Borders (RSF) will track and analyze internet threats, violence, and attacks against the media as a part of their ongoing project. The election campaign was launched on 16 August and it will end with the election of a new president, members of both houses of the national congress, governors and members of the legislative assemblies in Brazil’s states on 2 or 30 October.
During the campaign, RSF's Latin America bureau will monitor, analyze, and denounce online attacks on journalists in collaboration with the Laboratory for Image and Cyberculture Studies (LABIC), a leading research center specializing in social media analysis and digital trends affiliated with the Federal State University of Espirito Santo.
The results of this research will be collected and posted on the RSF website on a regular basis. Following the elections, a detailed report analyzing the main trends and attacks observed during the project will be published. The project's goal is to better understand the origin, structure, and spread of these online attacks, to expose the main perpetrators, and to find effective and long-term solutions to combat this phenomenon.
RSF published the findings of a survey of Twitter users' behavior in 2021, the platform used for the majority of attacks against the media and journalists in Brazil. Bolsonaro supporters were the primary perpetrators of these attacks, with the main targets being female journalists and media outlets critical of the government.
EXCERPT: RSF is planning to investigate the online attacks on Brazilian media during the ongoing election in their new project. The results will be posted on a regular basis, and after the elections end, a detailed report on main trends and attacks during the project will also be published. The main goals of this analysis are to better understand what caused the spread of these online attacks, as well to expose the main perpetrators whilst finding a solution to combat this phenomenon.
DATE: 23.08.2022.
LINK: https://rsf.org/en/rsf-will-analyse-online-attacks-against-media-during-brazilian-election-campaign
TOPIC: Freedom of the press, Freedom of expression
COUNTRY: Brazil
-
-
www.blockdata.tech www.blockdata.tech
-
blockchain investments these top corporations made from September 2021 to mid-June 2022.
TITLE: Research on the corporate investments in the blockchain technology for the 2021-2022 period.
CONTENT: According to the latest research from the Blockdata company, 40 corporations invested in companies in the blockchain/crypto space during the September 2021 till June 2022.
Korean tech giant Samsung is the most active, having an invested share in 13 companies.
Research look at the total funding amounts of the rounds companies participated in.
Based on this, the investors active in the biggest funding rounds are Alphabet ($1,506M in 4 rounds), Blackrock ($1,171M in 3 rounds), Morgan Stanley ($1,10M in 2 rounds), Samsung ($979M in 13 rounds), Goldman Sachs ( $698M in 5 rounds, BNY Mellon ($690M in 3 rounds), and PayPal ($650M in 4 rounds).
EXCERPT: Approximately $6 billions invested in the blockchain based startups in 2021. Samsung and Alphabet are leading the pack followed by the financial industry corporations
TOPIC: Blockchain, Cryptocurrency,
TREND: -
PROCESS: -
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
TITLE: Dominican Republic government agency was disrupted by a quantum ransomware attack
CONTENT: The Quantum ransomware assault that affected the Instituto Agrario Dominicano in the Dominican Republic and encrypted numerous services and workstations, occurred on August 18, local media reports. ‘They ask for more than 600 thousand dollars. We were affected by four physical servers and eight virtual servers; virtually all servers,’ Walixson Amaury Núñez, the IAD's director of technology, told the local press.
As IAD does not have enough money to pay the ransom and with only basic security software systems - the company’s data was completely compromised.
According to the National Cybersecurity Center (CNCS), who has been helping the agency recover from the attack, the attackers' IP addresses came from the United States and Russia.
BleepingComputer investigated the case and found out that the Quantum ransomware operation was the attacker. If IAD did not pay the ransom publicly, the threat actor, who claimed having stolen over 1TB of data, threatened to release it. This ransomware actor is supposedly an offshoot of the Conti ransomware operation which adopted the earlier name of the MountLocker ransomware operation.
EXCERPT: Instituto Agrario Dominicano, Dominican Republic’s government agency, suffered a ransomware attack by the Quantum ransomware operation. They are threatening them with a ransom of around 650.000 dollars. As the agency is not able to afford the ransom, and with only basic software security, their data is at stake. As the National Cybersecurity Center reports, the IP addresses of the attackers come from the U.S. and Russia.
TOPIC: Cyberconflict and warfare, Cybercrime
COUNTRY: Dominican Republic
DATE: 24.08.2022.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Patrick Hillmann, chief communications officer at the world’s largest crypto exchange, Binance, claims scammers made a deepfake of him to trick contacts into taking meetings.
The CCO of the world biggest cryptocurrency exchange, wrote about this case in his blog published on a company website. In his words: 'this deep fake was refined enough to fool several highly intelligent crypto community members”
-
-
www.theguardian.com www.theguardian.com
-
Russia’s Yandex to sell off news service as state tightens grip on online media
TITLE: Russia's Yandex sells news and blogging services as state tightens control over online media
CONTENT: In a transaction that would expand direct state control over the news that many Russians view online, the largest internet firm in Russia will sell off its news and blogging services to the state-controlled social media site VK.
Yandex.ru's main page, which was sold together with the news aggregator and blogging platform Zen, is expected to turn into a social media-style news feed managed by Gazprom-owned VK as a result of the transaction, with its chief executive being the son of a Kremlin official tasked with integrating the occupied territories of Ukraine.
News articles on Yandex were already perceived as having been deliberately selected to abstain from controversial subjects in Russia, particularly criticism of the war in Ukraine. By reducing Yandex's exposure to politics, the sale of the company's media holdings is reportedly an effort to protect it from the threat of western sanctions.
DATE: 23.08.2022.
TOPIC: Freedom of the press
COUNTRY: Russia
EXCERPT: Russia’s Yandex sells its news and blogging services to the state-controlled social media site VK. Yandex.ru’s main page is expected to turn into a social media-style news feed managed by Gazprom-owned VK, as a result of this transaction. The goal was reportedly an effort to loosen up the threats from western sanctions.
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
TITLE: Greece’s largest natural gas distributor DESFA suffered ransomware-related data breach
CONTENT: Greece’s largest natural gas distributor (DESFA) suffered a limited scope data breach and IT system outage which were followed by a cyberattack, this Saturday.
DESFA shared in a public statement that hackers tried to infiltrate its network, but were faced with a quick response from their IT team. Nevertheless, the attack possibly caused the leakage of some files and data and a network intrusion was definitely made, although limited. DESFA is working on returning to normal operations and is ensuring the customers this incident would not impact the gas supplies.
The attack was confirmed on Friday by Ragnar Locker ransomware operation, a threat actor. It is said in a recent FBI report that Ragnar Locker made 52 intrusions in critical U.S. infrastructure entities since January this year.
This ransomware actor is threatening to publish all files that would victimize DESFA, if they do not answer their demands. The timeline of this attack is tough for European gas suppliers after being cut from Russia’s natural gas.
The upcoming period is believed to be full of shortages, power cuts, and growing energy prices, leaving everyone involved even more vulnerable to ransomware attacks against gas distributors.
EXCERPT: DESFA, Greece’s largest gas distributor was targeted with an ransomware attack. This attack was confirmed to be made by Ragnar Locker - a ransomware operation, familiar to FBI for their previous intrusions. This attack comes at a vulnerable time for European gas suppliers after being cut from Russian gas, and it is believed that the situation will get worse if similar attack should happen in this region again.
COUNTRY: Greece
TOPIC: Cyberconflict and warfare, Cybercrime
DATE: 22.08.2022.
-
-
cpj.org cpj.org
-
TITLE: Jordanian journalist arrested for allegedly violating Jordan’s cybercrime law by writing posts on Facebook
CONTENT: On August 15, Adnan Al-Rousan, a Jordanian journalist, has been arrested by seven unidentified men, with two of them being in military uniform. The reasons behind this arrest are Al-Rousan’s posts on his Facebook profile, which were considered to be ‘insulting to Jordan.’ His most recent one, on August 14, was directed towards the ruler of Jordan, King Abdullah II bin Al-Hussein, saying ‘Jordan isn’t your property, it’s for us Jordanians.’
He is believed to be violating Jordan’s cybercrime law with these posts on social media, while regularly publishing political commentary of similar content as above mentioned. Committee to Protect Journalist asks for an immediate release of the reporter, while trying to get any contact information for the Jordanian public prosecutor.
EXCERPT: Adnan Al-Rousan, a Jordanian journalist has been arrested for allegedly violating the country’s cybercrime law. He regularly posts on his Facebook profile, criticizing the regime. Recently he wrote a post directed towards the King Abdullah II bin Al-Hussein, which caused his arrest. Committee to Protect Journalists condemns this arrest and asks for his immediate release.
TOPIC: Freedom of the press
DATE: 18 August 2022
COUNTRY: Jordan
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
Estonia's Battle Against a Deluge of DDoS Attacks
TITLE: Estonia battles a series of DDoS attacks during August
CONTENT: According to Infosecurity magazine, Estonian public authorities and businesses have been the subject of increased large-scale distributed denial-of-service (DDoS) attacks in August. The Head of the incident response (CERT-EE) department, Tõnu Tammer, said that these attacks are a daily occurrence in Estonian cyberspace. Nevertheless, the Estonian Information System Authority (RIA) is highlighting that data confidentiality is not at risk, as attackers are not able to access or change the data. On August 18, Estonia faced the most extensive cyber-attack since 2007.
Since the start of the invasion of Ukraine, Russian stated-backed cybercriminals are believed to be the main suspect for numerous cyberattacks on neighboring countries. This is why it is advised to Governments in Eastern Europe to heighten their alerts and ensure their cyber-defenses are as robust as they can be.
EXCERPT: Estonian public authorities and businesses are facing a large number of DDoS attacks during the month of August 2022. Infosecurity magazine has talked about this issue with Tõnu Tammer, the Head of the CERT-EE department. Estonia is not the only Eastern European country at risk of potential cyber attacks since the start of the Russian invasion on Ukraine in February this year. Strengthening cyber-defenses of these actors is highly recommended.
LINK: https://www.infosecurity-magazine.com/news-features/estonias-battle-against-a-deluge/
TOPIC: Cyberconflict and warfare, Cybercrime
TREND:
PROCESS:
-
-
csrc.nist.gov csrc.nist.gov
-
On 5 July, the USA National Institute for Standardisation and Technology (NIST) selected candidate to become standard for Post-Quantum Cryptography (PQC)
The new PQC standards should prevent risk that powerful quantum computing will pose to existing cryptography and encryption of digital traffic.
It is anticipatory standard that should prevent risk that will come with deployment of quantum computing for cracking encrypted communication.
See more here: https://csrc.nist.gov/projects/post-quantum-cryptography
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
We will now allow singular use of data alongside the plural. Specifically, when considered as a concept—as in data is the new oil—the singular will be acceptable, as well as when the data in question is considered as a mass (the data on this mobile-phone plan is insufficient). However, when data points are considered as a group of pieces of information, the plural should still be used: data from the National Oceanic and Atmospheric Administration indicate the hottest summer of all time.
The Economist allows use of data as both singular and plural. For example, data is the new oil. But, as it was indicated 'data from the National Oceanic and Atmospheric Administration indicate the hottest summer of all time.'
The Economist explains plural and singular use of 'data' here.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Tencent is Chinese company behind WeChat, one of the most used Internet applications. Tencent is also major gaming company globally. It has investment in hundreds of tech start-ups.
While Tencent is strong in China, its global activiteis could be endangered by Splinternet building around Sino-American digital tensions.
More at the Economist article.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
This is rare, optimistic, article on EU and Brussels. Author returns after 10 years to Brussels. EU survived 'decennium horribilis'.
EU has not moved into direction of more democarcy. National governments make deals in the late night negotiations. But, while they criticise Brussels, they often pass difficult political issues to the EU.
New mantra is 'a Europe that protects'. But the real question is if EU will manage to protect from problems that are beyond EU's power to shape.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Something for Sorina and her work on standardisation. It is a very interesting story on the way how the U.S. National Institute of Standards and Technology (NIST) works. NIST's work is explained on examples of peanut butter and marijuna/hemp.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
China is more complex politically and socially than it is portrayed in most of the Western media. The Economist brings an interesting article on neo-Maoist group 'Red song society'.
The ruling elite walks delicate line of tolerating neo-Maoist to the point that may (in)directly criticise, especially, social policy of the Communist party.
In this case, government-controlled media is trying to stop Red song society through economic fines for misuse of copyright-materials. This court case cannot happen without approval of the Communist Party.
it is interesting that 'economist censorship' is becoming favourite approach in countries worldwide. Instead of closing media outliet, they are forced to close via high fines for breach of copyright law or libel.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
The future of the United States will determine future of the world. In the center of America's future is future of Donalnd Trump.
This article shows how the raid on Mar-a-Lago compound may shake the very foundation of the United States (and the world).
Mishandling of classified document could be legally sufficient but, politically, most likely not sufficient to stop Trump's return to political leadership.
Fasten seat belts!
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Trust your instinct. Do not overthink. Avoid 'paralysis by analysis'.
These are some advises from the Economist. Big organisations are designed to stamp our instinct, which helped us to survive for centuries as much as our rationality. Should we rethink organisations of modern era? Could a bit of survival instinct help us to save us from crazy decision that may end humanity?
This text opens many questions. Answers could be discovered by intuition. The first step is to decide faster, move on, reflect, adjust, and move on.
We advanced a lot in this direction over the last few years especially on adjusting Diplo's tech and creative activities. Now, we should move to content and courses.
Trust your guts more! There is a lot of intelligence in guts!
-
-
www.foreign.senate.gov www.foreign.senate.gov
-
Nathaniel Fick was appointed U.S. Ambassador at-large to Cyberspace Policy and Digital Policy. His new title tries to balance tensions between cyber and digital. Will he become a digital or cyber ambassador?
It's also interesting to see that he frames digital foreign policy's approach around the traditional multilateral "trinity" architecture of security, economy and human rights.
SECURITY: he reiterates traditional U.S. approach to cybersecurity. A new element is that it brings cybercrime in proximity to cybersecurity which the U.S. has keeping separate in international relations.
ECONOMY: the focus is on the free flow of data, open/transparent standards, multistakeholder Internet governance, and Open RAN.
HUMAN RIGHTS: he calls for digital freedom and inclusion.
He also plans to develop institutional capacity in the U.S. diplomacy to follow digital/cyber topics.
-
-
www.euronews.com www.euronews.com
-
Russian journalist gets a new fine for ‘discrediting’ the state’s military
Maria Ovsyannikova, a Russian journalist, has been convicted by a Moscow court for ‘discrediting’ the Russian military. This is not her first fine, as she is well known for her famous protest against the invasion of Ukraine on live television, according to Euronews. In her Facebook posts, she often calls out the Russian authorities, saying ‘I go to the courts like I go to work.’ Ovsyannikova is just one among Russian citizens who pay fines or even serve prison time of up to 15 years if it is found out they spread the news about the Russian army or entities across borders that are considered to be ‘false.’
You can watch the video of Ovsyannikova’s interruption of state TV news broadcast here.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
In official papers filed with Sri Lankan authorities, the investors say that in early 2020 Shamal Bandara, a Sri Lankan, and Zhang Kai, introduced to the investors as Chinese, had set up “Sports Chain”, which they said was a cryptocurrency investment platform. They are alleged to have run their operations as a Ponzi scheme, a fraudulent venture in which existing investors were paid with funds collected from new investors.
-
-
www.lawfareblog.com www.lawfareblog.com
-
TITLE: Role of Telegram and other emerging platforms in the Ukraine war
CONTENT: There is growing concern in the Western countries that Russian propaganda in the Ukraine war is using intensively Telegram and other new social media platforms. While mainstream platforms including Twitter and Facebook/Meta exercised intensive content moderation around the Ukraine war, new platforms have more relaxed approach.
You can consult this article for more details about the challenge of what they call 'unmoderated platform' (not currect description because all platforms are moderated to some extend).
Topic: Content policy, Tag: Ukraine crisis Source: Lawfare
-
-
rsf.org rsf.org
-
RSF is concerned by the appointment of Eddie Cheung as the head of Radio Television Hong Kong
RSF dissaproves the decision Eddie Cheung’s appointment as the head of Radio Televison Hong Kong (RTHK). He was a former territory’s representative to the European Union, known for his involvement in a smear campaign against international media. He is filling the role of another political commissar, Patrick Li, who was also a bureaucrat without previous media experience, with a strong pro-Beijing commitment.
While serving as the Special Representative for Hong Kong Economic and Trade Affairs to the EU, he signed about 58 public letters in which he accused some of major European media of ‘unfounded allegations’ on Hong Kong’s policies.
RSF revealed the systematic censorship and information control by the Chinese regime in Mainland China and Hong Kong in their report titled The Great Leap Backwards of Journalism in China. The analysis showed that these actions pose a great threat to press freedom and democracy on a global level.
While once being an example of well implemented press freedom, Hong Kong had a downfall from 80th in 2021 to 148th this year according to the RSF World Press Freedom Index.
-
-
cybernews.com cybernews.com
-
Finland parliament’s website hit by DDoS launched by Russian hackers
Yesterday, the external websites of the Finnish parliament were inaccessible for a couple of hours due to a distributed denial-of-service (DDoS) attack launched by pro-Russian hackers. They explained the reason for this attack as a response to Finland’s aspiration towards joining NATO. This hacker group called NoName057(16) took the responsibility for the attack on their Telegram channel.
In the post, the hackers said that ‘We decided to pay a ‘friendly’ visit to neighboring Finland, whose authorities are so eager to join NATO.’ The DDoS attack happened on the same day US president Joe Biden signed ratification documents regarding Washington’s support for Finland and Sweden joining NATO.
The Finnish parliament replied to this event with this statement: ‘A denial-of-service attack is directed against the Parliament’s external websites. […] The Parliament takes steps to limit the attack together with service providers and the Cybersecurity Center.’
-
-
-
Since the fall of Kabul Afghanistan suffers from a serious lack of press freedom and women journalists are impacted the most
Since the fall of Kabul and the creation of the Islamic Emirate of Afghanistan, the impact on media is unquestionable. During the past year, journalism in Afghanistan has been decimated. RSF secretary-general Christophe Deloire emphasizes: ‘Media and journalists are being subjected to iniquitous regulations that restrict media freedom and open the way to repression and persecution. The authorities must undertake to end the violence and harassment inflicted on media workers, and must allow them to do their job unmolested.’
When it comes to the slaughtering of press freedom in Afghanistan, women journalists are subjected to it the most. According to RSF’s survey, in the past year, they disappeared in 11 of Afghanistan’s 34 provinces. Out of 2,756 women journalists and media workers who were employed in 2021, only 656 are working today. This downfall resulted in the percentage of 76.19% of women journalists who are no longer working in their homeland. Statistically, 84.6% of female media workers are working in the Kabul region, while recently women TV presenters were being made to cover their faces while presenting on camera. The excuses for harassing female workers are primarily accusations of ‘immorality or conduct contrary to society’s values.’
The overall statistical report on press freedom in Afghanistan shows that both men and women have lost their jobs since the regime change. 7098 journalists are no longer employed which includes 54.52% of men. The number of media outlets also dropped, with 39.59% of them lost.
This media situation is a reflection of Taliban governance, with the impact of the draconian regulations and the inability to respect Afghanistan’s press freedom law.
-
-
-
RSF warns of violence against Iraqi reporters during protests
Reporters Without Borders (RSF) is warning of and condemning the harassing of opposition media in Iraqi Kurdistan. RSF’s Middle East desk said that the brutality against journalists shows a complete refusal for toleration of political pluralism and a desire to suppress this popular protest.
The violence is used as a tool for dispersing not only protesters, but also the journalists who cover it. RSF has gained the information from Metro Center, an NGO that defends journalists’ rights in Iraqi Kurdistan, that there are a total of 78 violations against 60 journalists, including searching, detaintment, prevention from covering protests, and equipment confiscation.
These protests are called by the New Generation leader, Shaswar Abdalwahid in order to demand elections and to denounce “corruption, poverty and unemployment.” Consequently, out of the 26 journalists who were detained shortly, at least ten work for NRT, a TV channel owned by Abdalwahid.
-
-
diplomaticacademy.us diplomaticacademy.us
-
Diplomats are also managers but they are rarely trained in management skills.
Junior diplomats have often to manage local staff. Heads of missions have to manage complete mission from human resources to financial issues.
This article reflects on unique role of Deputy Chief of Mission (DCM) which has to manage diplomatic mission. This role becomes particularly complex and, often, difficult is the head of mission is political appointee as it is often the case in the US diplomacy.
-
-
www.whitehouse.gov www.whitehouse.gov
-
A new U.S. Strategy Towards Sub-Saharan Africa outlines the US priorities in the growing competition for Africa with, in particular, China.
Digitalisation plays an important role as an 'accelerator' of sustainable development.
The U.S. strategy focuses on a few issues on digital ecosystem aimed at building open, reliable, Interoperable, and secure Internet.
- digitalisation of financial services and records;
- building infrastructure: undersea cables, expanding of a number of data centres.
- investing in digital business in Africa
- cole for Open RAN technology for telecom infrastructure relates to Huawei monopoly and proprietary technology
- digital democracy and fight against digital authoritarianism
- fight against disinformation and gender-based online harassment
- establish standards for responsible conduct in cyberspace.
- building skills and knowledge through training and courses in science, technology, engineering, and math.
-
-
rsf.org rsf.org
-
Belarusian journalists face threats in a repressive regime
Since Alexander Lukashenko’s controversial reelection in August 2020, Belarusian journalists have faced various threats, which forced them to adapt in order not to be silenced.
RSF’s partner, the Belarusian Association of Journalists (BAJ), noted that around 400 journalists have fled to neighboring countries, such as Poland, Ukraine, and Lithuania. The ones who stayed in their homeland, face difficulties on a regular basis, using the encrypting messaging app Telegram as a main tool.
Starting from 2020 the Belarusian authorities have changed certain laws to the extent of legally infringing freedom of the press. Living in this atmosphere, Belarusian journalists have been the subjects of around 500 arrests, fines, censorship, threats, searches, prison sentences, mistreatment, torture, and reprisals against loved ones, as RSF states. Even exiled journalists live in fear of being kidnapped, thus deciding to work anonymously.
RSF is giving Belarus 153rd place out of 180 countries in their 2022 World Press Freedom Index.
-
-
-
RSF welcomes a series of presidential pardons in Egypt with the warning about more than 20 journalists are still detained
RSF is praising the release of seven prisoners in Egypt at the end of last month. Nevertheless, these releases come as a government’s part of a five-year ‘National Strategy for Human Rights’ started in September 2021. Its aim is to promote reforms that should result in an increase of freedoms for Egyptians, including press freedom. The United States is donating Egypt $1.3 billion in military aid each year and another $130 million is conditioned on respect and implementation of human rights, thus encouraging the Egyptian government to give presidential pardons.
RSF notes that despite these releases, around 20 journalists are still in jail. Some of them are the bloggers “Mohamed Oxygen” and Alaa Abdel Fattah, a freelance photographer Alia Awad, and four Al Jazeera journalists – Rabie El-Sheikh, Ahmed El-Nagdy, Bahaa Ed-Din Ibrahim, and Hesham Abdel Aziz. Fattah and several of his fellow detainees were even considering ‘group suicide’ as they were not on the list of pardoned prisoners.
Al-Manassa, an independent Egyptian news website, has been inaccessible in Egypt since last month, while more than 500 other websites have been blocked from online access since 2017, which includes the RSF.
-
-
-
Five years since the launching of the U.S. Press Freedom Tracker
Five years ago, on this day, the United States have launched the U.S. Press Freedom Tracker, a joint project of the Press Foundation and the Committee to Protect Journalists.
In six years of documentation, this database for press freedom violations in the United States has documented nearly 1000 assaults of journalists and 300 arrests od detainments, above 50 border stops and 250 reports of damaged equipment. More than 100 analyses regarding press freedom issues were published.
This year, the site went through a major redesign. It has new data visualization capabilities and increased speeds for downloading data. The Traker gives both live view of aggression against the media while capturing trends over time. That is how the Tracker can give information that by the time the former president Trump was banned from Twitter, he posted 2520 tweets degrading journalists and the media.
With Tracker as a press freedom watchdog, state of press freedom in the U.S. will be monitored and served more easily in the future.
-
-
cpj.org cpj.org
-
Iraqi journalists were attacked by security while covering Baghdad protests
On July 30, three journalists who work for the privately owned Al-Mayadeen news broadcaster were attacked and injured during protests in Baghdad’sn Green Zone by supporters of Iraqi Shiite cleric Muqtada al-Sadr, according to Committee to Protect Journalists (CPJ) information.
Flash-bang grenades were thrown by the security forces and they hit Al-Mayadeen’s videographer Zaid Khaled Jomaa and Baghdad bureau chief and reporter Abdulah Badran. The third victim of the attacks was videographer Abdullah Saad who was shoved to the ground by riot police officers, being left with injured leg and ankle.
CPJ’s Middle East and North Africa senior researcher, Justin Shilad, alarms that Iraqi authorities must protect journalists that are covering protest and allow them to report about political situation in Iraq freely and safely. He also noted that Iraqi journalists are doing essential work in life threatening circumstances in order to inform the public, thus authorities need to provide them work without fear.
CPJ has received information that the three journalists often face risks when they report and Iraqi security forces regularly fail to differentiate protesters from journalists. The Iraqi Ministry of Interior had no comment on CPJ’s email.
-
-
-
Several Taiwanese government websites hit with cyberattack on the eve of Pelosi’s visit
A couple of hours before U.S. House Speaker, Nancy Pelosi was expected to visit Taiwan, several Taiwanese government websites were down.
This cyberattack was reported shortly before Pelosi’s plan to visit Taiwan, with its controversial relations with China, claiming it as its own. Therefore, the Chinese government threatened to act if the visit happens.
On Tuesday evening, the official websites of Taiwan’s government and its presidential office were blocked from use. It was confirmed by the office spokesperson that the president’s site was hit by an overseas malware attack. It was restored after 20 minutes.
-
-
www.reuters.com www.reuters.com
-
Man with rifle arrested near Iranian-American journalist’s home
An Iranian-American journalist and women's rights activist, Masih Alinejad, was a potential target to a man who was found near her home in New York with a loaded rifle. Fortunately, he was arrested and Alinejad expressed her shock to learn what happened.
She is known for promoting videos of women violating Iran’s head covering law to her millions of social media followers. It was said that the same journalist was a target of a Tehran-backed kidnapping plot last year. What she had to say about this to Reuters was: ‘What the Iranian regime did, first trying to kidnap me and now sending someone here trying to kill me, it's a pattern. It's a continuation of their way of oppressing dissidents inside and outside Iran...I'm not scared of them and I'm going to continue my fight against gender apartheid. Because I didn't do anything wrong, I'm not a criminal, my crime is just giving voice to voiceless people.’
Tehran has dismissed all allegations of involvement in the kidnapping.
-
-
www.unicef.org www.unicef.org
-
UNICEF’s new analysis: ‘Protecting Children in Cyberconflicts’
In this rapid analysis, UNICEF made 5 important questions: How are AI technologies and the use of cyber operations changing the nature of conflict? Who are the actors in cyberconflict? What types of risks do offensive cyber operations pose to children? What legal and other provisions exist to protect children from harm caused by cyberconflict and where are the gaps? What should organizations working for and with children do to strengthen protections in cyberconflict? The ones we will focus on in this update are the last three questions. Firstly, it is important to focus on question number 3 - What types of risks do offensive cyber operations pose to children? As UNICEF experts highlighted the most important ones are:
Behavioral surveillance, profiling, and targeting of children during conflict operations. Behavioral engineering as a potential pathway to child recruitment into and use by armed forces and non-state armed groups. Information operations and their impact on children. Health and biotech sectors. Education sector (‘Large-scale, multi-vector attacks could increasingly infect myriad layers of schools’ digital systems…’). Critical industrial control systems in urban environments. Cyber threats to humanitarian datasets and services critical to child well-being and protection.
Question number 4 focuses on - What legal and other provisions exist to protect children from harm caused by cyberconflict and where are the gaps? UNICEF notes that attributing responsibility for child rights violations while protecting sensitive information from digital manipulation and theft is crucial. ‘Many analysts would argue that the combination of IHL, international criminal law, human rights law, and child rights law are adequate to address the emerging issues posed by cyberconflict and the technology it involves. Nevertheless, several key challenges persist.’
Question number 5 - What should organizations working for and with children do to strengthen protection in cyberconflict? It is necessary to engage with normative policy development processes. UNICEF sees OEWG (Open-Ended Working Group) as an important platform for dialogue for States to develop norms to strengthen children's rights protection from cyber attacks. It is important to further strengthen understanding of the potential risks to children of cyberconflict as well. What also is an obligation of States is the reinforcement of normative and legal frameworks to strengthen child protection during cyberconflict and translating them into action. The last two that were mentioned were the strengthening of monitoring and investigation mechanisms and defining corporate responsibility in cyberconflict.
-
-
-
Australian reporter left Afghanistan after Taliban forced her to withdraw reports on forced marriages
Lynne O’Donnell, an Australian journalist for Foreign Policy Magazine, said this week that the Taliban threatened to put her in jail if she did not withdraw stories criticizing the organization.
She spent several years in Afghanistan as a resident correspondent before the U.S. retreated her from the country last year. She then returned within the last week to report on the Taliban practices of forced marriages with teenage girls.
After writing some tweets and articles about the topic, Taliban officials started to pressure O’Donnell, influencing what she wrote. She stated that the tweets written on Tuesday were made by the Taliban: ‘l apologize for 3 or 4 reports written by me accusing the present authorities of forcefully marrying teenage girls and using teenage girls as sexual slaves by Taliban commanders. This was a premeditated attempt at character assassination and an affront to Afghan culture.’
The concerned journalist left Afghanistan after these happenings, claiming it was inevitable: “If I did not, they said, they’d send me to jail. At one point, they surrounded me and demanded I accompany them to prison. Throughout, a man with a gun was never far away.”
-
-
www.datacenterdynamics.com www.datacenterdynamics.com
-
Title: Data centres need more space in Frankfurt
Frankfurt is the major European data hub, with more than 60 data centres covering 64 hectares.
One of the main reasons for this high concentration of data centres is the proximity of the main Internet exchange hub in Frankfurt, which processes most of the European internet traffic.
Fast expansion of data hubs triggered reaction of local authorities. In the new urbanist plan, they would like to restrict space for data centres. As you can see from the enclosed article, this proposal triggered a reaction from the German Datacenter Association arguing, among others, that the restriction for the growth of data centres could endanger digitalisation processes in Germany.
-
- Jul 2022
-
curator.diplomacy.edu curator.diplomacy.edu
-
Internet business model based on advertising is under the strain after 'golden' time during the shift to online at pandemics time. In 2021, online advertising growth was 38% compared to average growth of 21%.
There are the following reasons why online advertising growth won't continue:
- online advertising is becoming mature industry with saturated offer.
- growing pressure on privacy and data protection reduces use of tools for targeted advergising.
- Apple's change to the privacy setting on Iphones that prevents tracing of effect of advertising compaign affected many companies. For example it reduced Meta/Facebook annual revenue for $20 billion (8%).
Meta/Facebook and smaller companies are most affected by slow down in online advartising. Google is doing well as it builds advertising around search engine, more traditional approach to online advertising.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
The enormous economic power of tech companies that threatens market competition triggered the US Congress initaitive on the American Innovation and Choice Online Act. This act is proposed in bi-partisan mode, but it does not enjoy, yet, overwhelming support.
The Act is championed by Senator Amy Kobuchar from the Democratic Party.
The main provision of the proposed act is that online platforms with more than 50 million monthly active users or 100,000 U.S.-based monthly active users would be blocked from putting their products and services ahead of a different business if it materially harms competition.
In this respect, the Act aims to 'mimic' approach from the EU's Digital Market Act.
The voting on this Act will be also test of the power of tech companies to block the US Congres legislation that may harm their interests.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Title: DeepMind uses AI to predict the structure of almost all proteins. Text: DeepMind, in partnership with the European Molecular Biology Laboratory's European Bioinformatics Institute, has released predicted structures for nearly all catalogued proteins known to science. The announcement comes a year after the two partners released and open-sourced AlphaFold – an artificial intelligence (AI) system used to predict the 3D structure of a protein – and created the AlphaFold Protein Structure Database to share this scientific knowledge with the researchers. The database now contains over 200 million predicted protein structures, covering plants, bacteria, animals, and other organisms. It is expected to help researchers advance work on issues such as neglected diseases, food insecurity, and sustainability.
Tags
Annotators
URL
-
-
rsf.org rsf.org
-
Saudi prince’s meeting with Macron despite Khashoggi murder and imprisonment of 27 journalists
The meeting between the French president Emmanuel Macron and Saudi Crown Prince Mohammed bin Salman is supposed to be held tomorrow in Paris on 28 July. What seems to be the concern of RSF (Reporters Without Borders) is that 4 years passed since journalist Jamal Khashoggi was murdered. 27 journalists and bloggers are currently detained in Saudi Arabia, thus RSF asks Macron to negotiate with Mohammed bin Salman to release them.
It is worrying that the prince of Saudi Arabia is engaging in international relations promoting truth and justice. The involvement of Mohammed bin Salman in Khashoggi’s murder has been confirmed by the UN special rapporteur Agnès Callamard and a CIA report in 2021.
RSF put the Saudi Arabian prince on their list of predators of press freedom, due to waves of arrests of journalists starting from his appointment in 2017 and his brutal response to the freedom of speech.
-
-
-
Frequent violence against media in Greece
In the past three years, there were 11 attacks against Greek journalists and media accused of spreading government propaganda. The latest attack was on a building in Athens that houses Real FM news radio and the weekly RealNews on 13 July. An anarchist group calling themselves ‘Thousands of Night Suns’ confirmed the involvement on 20 July, dedicating this attack to two anarchist activists, and blaming Real for supporting political propaganda.
It is crucial that the Greek government speeds up the implementation of the interministerial memo on journalists’ safety and the European Commission’s September 2021 recommendations. Despite what Greek Prime Minister Kyriakos Mitsotakis says about the need for conviction of perpetrators, most attacks on press freedom remain unpunished.
Journalists in Greece are not exposed only to violent attacks of this kind, being a target of organised crime. That is why Greece is placed the lowest in RSF’s 2022 World Press Freedom Index out of all EU countries, being 108th out of 180.
-
-
www.washingtonpost.com www.washingtonpost.com
-
Intensification of cyberwar between Iran and Israel
Three of Iran's state-owned biggest steel companies stopped working after facing cyberattacks in late June. These biggest steel companies were attacked by a hacking group who admitted it on social media as a response to ‘the aggression of the Islamic Republic.’
After that, Israel’s defense secretary ordered an investigation into the leaked video which showed the damage to the steel plants. This incident was soon followed by the Israeli Security Agency’s statement (Shin Bet) that a May cyber operation by Iran was set to be out of the cyber domain . With these two incidents, it is clear that the cyber conflict between these two countries has become more public in the previous 2 years.
Israel and Iran shifted to a public forum and their objective has changed from defense targets to violating critical infrastructure and civilian lives. With larger public exposure, the greater the risks of extending beyond cyberspace with the influence of other areas of this conflict as well.
-
-
www.politico.com www.politico.com
-
Yurii Shchyhol warns of a new ongoing World Cyber War
Yurii Shchyhol, the head of the Ukrainian State Service of Special Communications and Information Protection, warns there might be an ongoing World Cyber War since the start of Russia’s invasion. Russian cyberespionage and cyberattacks since 24 February weren’t targeted only at Ukraine. Their intervention has been recorded in 42 countries across six continents, mostly from NATO and countries which supported Ukraine during this period.
Shchyhol has stated for Politico that the world has been awakened and that countries are more willing to intensely cooperate with each other on these issues. He also advised: ‘But what we need are not further sanctions and further efforts to curb cyberattacks, we also need for global security companies to leave the market of the Russian Federation. Only then can we ensure the victory will be ours, especially in cyberspace.’
In this interview, it was said that there is strong assistance from the U.S. Cyber Command and the National Security Agency as all of Russia's attacks are ‘an ongoing, continuous war, including the war in cyberspace.’ What Shchyhol also warns us is that despite the two-month stagnation of Russian cyber attacks, what they’re doing is just a part of their tactic in order to collect resources for another attack - which will likely be on a global level.
-
-
-
Russian journalists’ union close to being disbanded
The Russian prosecutor’s office brought on a 350-page complaint against the independent Journalists’ and Media Workers’ Union (JMWU), to disband it. The union learned about the complaint on 13 July. The complaint proposes that some of the employees are foreign agents while some were accused of systematically harming the state and society with their actions.
The reasons behind the complaint are mainly due to the fact that the JMWU publicly opposed the war in Ukraine, defended Russian journalists who were prosecuted, and criticized media censorship in their country. They also signed the ‘Perugia Declaration for Ukraine’, which confirmed their support for Ukrainian journalists.
-
-
www.reuters.com www.reuters.com
-
India's Supreme court ordered releasing of a journalist over a controversial tweet
An Indian journalist, Mohammed Zubair, has been given the release on bail over the accusations of a “highly provocative” tweet in 2018, by India's Supreme Court. The tweet was supposedly aimed at straining ties between Hindus and Muslims. Regardless of the accusations, the tweet itself had no evidence of causing harm to the religious sentiment of Hindus.
When he was granted bail, the court said that keeping Zubair in custody had no legal power. As a vocal critic of Indian Prime Minister Narendra Modi, Zubair and his colleagues accused the federal government of giving the police orders in silencing journalists and critics undermining the freedom of the press and speech.
In this atmosphere, it is important to note that India is ranked 150th on the 180-country World Press Freedom Index.
-
-
www.cnn.com www.cnn.com
-
important test text
-
-
-
Myanmar freelancer sentenced to three-years of jail by the state military court
Nyein Nyein Aye, a Myanmar freelancer and journalist, was sentenced to a three-year prison sentence for the spread of ‘false news.’ She was also accused of causing fear and agitating crimes against a government employee. While Nyein worked for various media outlets, one of them: Mizzima News, was banned by the junta.
Daniel Bastard, the head of RSF’s Asia-Pacific desk implied that this arrest is followed by the big wave of arrests of journalists after the February 2021 coup. He also noted that these sentences behind closed doors by military courts are similar to a factory production line. RSF’s press freedom barometer shows that she is the 24th journalist to receive a prison sentence out of the 67 media workers currently held in Myanmar’s prisons.
-
-
-
Biden’s message at the Arab summit on freedom of the press and democratic rights
U.S. president Joe Biden said in his speech at the Arab summit in Saudi Arabia that the United States will keep its close partnership with the Middle East while urging leaders who attended the summit to advance human rights as a powerful source of economic and social changes. With that being said, freedom of the press and democratic rights are highlighted. He urged the necessity of releasing journalists.
Biden sent a message to the leaders saying: ‘Accountable, accountable institutions that are free from corruption and act transparently and respect the rule of law are the best way to deliver growth, respond to people's needs, and I believe ensure justice.’
-
-
-
Pakistani reporters are being harassed by the government army
Since Shehbaz Sharif took over as a Pakistani prime minister in April, there have been a dozen reports of army-related agencies harassing the media, as RSF cautioned. Critical journalists have been a target of a major army campaign to intimidate their work, parallelly destabilizing Pakistan’s democracy.
This serious decline in press freedom was bolstered with the latest case on 9 July when BOL news anchor, Sami Ibrahim, got attacked by three people. The next day, he posted a YouTube video, saying that the attack was planned to prevent him from filming the scene, and the attackers later left in a vehicle with clear signs of being state-owned.
-
-
www.enisa.europa.eu www.enisa.europa.eu
-
Cyberwar games: Cyber Europe 2022
One of the largest cyber crisis simulations organised by The European Union Agency for Cybersecurity (ENISA) has just been completed. With over 800 cybersecurity experts from 29 European countries and the European Free Trade Area (EFTA), it involved specialists from EU agencies and institutions as well.
This year, the exercises involved a scenario of a simulated attack on European healthcare infrastructure and they tested how participants’ respond to incidents in coordination with EU institutions. They involve the ability of close work with CERT-EU and ENISA in order to reinforce the resilience of the healthcare sector against cyber attacks in the EU with complex business continuity and crisis management situations.
These lessons will be published in ENISA’s ‘after-action report.’
-
-
techcrunch.com techcrunch.com
-
Costa Rica's public health system hit by Hive ransomware
The Costa Rican Social Security Fund (CCSS), i.e. Costa Rica’s public health service was hit by Hive ransomware and forced to shut its systems down. The ransomware was deployed on at least 30 out of 1,500 government servers, CCSS told local media.
Cybersecurity experts suggested that Hive might be working with Conti to help Conti rebrand.
-
-
cybernews.com cybernews.com
-
Italian police thwart Eurovision cyberattack by pro-Russian hacker groups
Italian police thwarted hacker attacks by pro-Russian hacker groups Killnet and Legion during the 10 May semi-final and 14 May final of the Eurovision Song Contest (ESC) in Turin, Italy. Russia was excluded from the competition due to what it calls its special military operation in Ukraine, while Ukraine went on to win the contest.
Killnet denied the attack on ESC, but then declared cyberwar on 10 countries in the same Telegram post. In a separate video, the group stated that these 10 countries are ‘the US, the UK, Germany, Italy, Latvia, Romania, Lithuania, Estonia, Poland, and Ukraine.’
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
HEADLINE How future of TikTok can determine the future of the integrated Internet?
EXCERPTS TIKTok saga will shape the future of the Internet. If TikTok is banned in the USA as a security risk, it could lead towards further disintegration of the Internet. In the same time, Chinese side has to be ready to accept higher scrutiny of TikTok algorithms and business models. By monitoring this policy issue we will monitor the future of integrated Internet.
SUMMARY
TikTok controversy, as the Economist put it, s a test of whether global business and the global internet can remain intact as us-China relations deteriorate.
Context for pressure on TikTok is geopolitics and forthcoming elections in the USA. There is a concern that TikTok could be used to influence eletions.
Is privacy protection real risk since most of TikTok data can be scraped as public data.
The real risk that concers US is a possibility of manipuating domestic audience by company which is in Chinese ownership. For examplea quarter of American users consider TikTok to be a news source.
TikTok algorithms that could be used for manipulation are developed mainly in Beijing.
TikTok can address the risk of shutting down by having data held by Oracle, as already happened during Trump administration, letting third parties inspect its algorithms, including showing the source code and allowing ongoing inspection.
According to the Economist: 'TikTok should be ultimately responsible to an independent board of its own, with members from outside China.'
China is likely to oppose this request for supervision of TikTok's algorithms. However, by doing so, China may make this companies shut down by Western authorities. It will be one of the key decisions and trade-offs with far-reaching consequences for global Internet that China will have to make.
-
-
documents.unoda.org documents.unoda.org
-
OEWG agrees on modalities of stakeholder participation
The OEWG reached agreement to apply modalities for the participation of stakeholders as proposed by the Chair on 20 April, through a silent procedure. NGOs both with and without ECOSOC status should inform the OEWG Secretariat of their interest to participate. If no state raises an objection to the Chair, NGOs will be invited to participate as observers in the formal sessions, make oral statements during a dedicated stakeholder session, and submit written inputs to be posted on the OEWG’s website. The modalities will be read out at the OEWG’s third substantive session for the formal record.
-