- Aug 2022
-
www.reuters.com www.reuters.com
-
Man with rifle arrested near Iranian-American journalist’s home
An Iranian-American journalist and women's rights activist, Masih Alinejad, was a potential target to a man who was found near her home in New York with a loaded rifle. Fortunately, he was arrested and Alinejad expressed her shock to learn what happened.
She is known for promoting videos of women violating Iran’s head covering law to her millions of social media followers. It was said that the same journalist was a target of a Tehran-backed kidnapping plot last year. What she had to say about this to Reuters was: ‘What the Iranian regime did, first trying to kidnap me and now sending someone here trying to kill me, it's a pattern. It's a continuation of their way of oppressing dissidents inside and outside Iran...I'm not scared of them and I'm going to continue my fight against gender apartheid. Because I didn't do anything wrong, I'm not a criminal, my crime is just giving voice to voiceless people.’
Tehran has dismissed all allegations of involvement in the kidnapping.
-
-
www.unicef.org www.unicef.org
-
UNICEF’s new analysis: ‘Protecting Children in Cyberconflicts’
In this rapid analysis, UNICEF made 5 important questions: How are AI technologies and the use of cyber operations changing the nature of conflict? Who are the actors in cyberconflict? What types of risks do offensive cyber operations pose to children? What legal and other provisions exist to protect children from harm caused by cyberconflict and where are the gaps? What should organizations working for and with children do to strengthen protections in cyberconflict? The ones we will focus on in this update are the last three questions. Firstly, it is important to focus on question number 3 - What types of risks do offensive cyber operations pose to children? As UNICEF experts highlighted the most important ones are:
Behavioral surveillance, profiling, and targeting of children during conflict operations. Behavioral engineering as a potential pathway to child recruitment into and use by armed forces and non-state armed groups. Information operations and their impact on children. Health and biotech sectors. Education sector (‘Large-scale, multi-vector attacks could increasingly infect myriad layers of schools’ digital systems…’). Critical industrial control systems in urban environments. Cyber threats to humanitarian datasets and services critical to child well-being and protection.
Question number 4 focuses on - What legal and other provisions exist to protect children from harm caused by cyberconflict and where are the gaps? UNICEF notes that attributing responsibility for child rights violations while protecting sensitive information from digital manipulation and theft is crucial. ‘Many analysts would argue that the combination of IHL, international criminal law, human rights law, and child rights law are adequate to address the emerging issues posed by cyberconflict and the technology it involves. Nevertheless, several key challenges persist.’
Question number 5 - What should organizations working for and with children do to strengthen protection in cyberconflict? It is necessary to engage with normative policy development processes. UNICEF sees OEWG (Open-Ended Working Group) as an important platform for dialogue for States to develop norms to strengthen children's rights protection from cyber attacks. It is important to further strengthen understanding of the potential risks to children of cyberconflict as well. What also is an obligation of States is the reinforcement of normative and legal frameworks to strengthen child protection during cyberconflict and translating them into action. The last two that were mentioned were the strengthening of monitoring and investigation mechanisms and defining corporate responsibility in cyberconflict.
-
-
-
Australian reporter left Afghanistan after Taliban forced her to withdraw reports on forced marriages
Lynne O’Donnell, an Australian journalist for Foreign Policy Magazine, said this week that the Taliban threatened to put her in jail if she did not withdraw stories criticizing the organization.
She spent several years in Afghanistan as a resident correspondent before the U.S. retreated her from the country last year. She then returned within the last week to report on the Taliban practices of forced marriages with teenage girls.
After writing some tweets and articles about the topic, Taliban officials started to pressure O’Donnell, influencing what she wrote. She stated that the tweets written on Tuesday were made by the Taliban: ‘l apologize for 3 or 4 reports written by me accusing the present authorities of forcefully marrying teenage girls and using teenage girls as sexual slaves by Taliban commanders. This was a premeditated attempt at character assassination and an affront to Afghan culture.’
The concerned journalist left Afghanistan after these happenings, claiming it was inevitable: “If I did not, they said, they’d send me to jail. At one point, they surrounded me and demanded I accompany them to prison. Throughout, a man with a gun was never far away.”
-
-
www.datacenterdynamics.com www.datacenterdynamics.com
-
Title: Data centres need more space in Frankfurt
Frankfurt is the major European data hub, with more than 60 data centres covering 64 hectares.
One of the main reasons for this high concentration of data centres is the proximity of the main Internet exchange hub in Frankfurt, which processes most of the European internet traffic.
Fast expansion of data hubs triggered reaction of local authorities. In the new urbanist plan, they would like to restrict space for data centres. As you can see from the enclosed article, this proposal triggered a reaction from the German Datacenter Association arguing, among others, that the restriction for the growth of data centres could endanger digitalisation processes in Germany.
-
- Jul 2022
-
curator.diplomacy.edu curator.diplomacy.edu
-
Internet business model based on advertising is under the strain after 'golden' time during the shift to online at pandemics time. In 2021, online advertising growth was 38% compared to average growth of 21%.
There are the following reasons why online advertising growth won't continue:
- online advertising is becoming mature industry with saturated offer.
- growing pressure on privacy and data protection reduces use of tools for targeted advergising.
- Apple's change to the privacy setting on Iphones that prevents tracing of effect of advertising compaign affected many companies. For example it reduced Meta/Facebook annual revenue for $20 billion (8%).
Meta/Facebook and smaller companies are most affected by slow down in online advartising. Google is doing well as it builds advertising around search engine, more traditional approach to online advertising.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
The enormous economic power of tech companies that threatens market competition triggered the US Congress initaitive on the American Innovation and Choice Online Act. This act is proposed in bi-partisan mode, but it does not enjoy, yet, overwhelming support.
The Act is championed by Senator Amy Kobuchar from the Democratic Party.
The main provision of the proposed act is that online platforms with more than 50 million monthly active users or 100,000 U.S.-based monthly active users would be blocked from putting their products and services ahead of a different business if it materially harms competition.
In this respect, the Act aims to 'mimic' approach from the EU's Digital Market Act.
The voting on this Act will be also test of the power of tech companies to block the US Congres legislation that may harm their interests.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Title: DeepMind uses AI to predict the structure of almost all proteins. Text: DeepMind, in partnership with the European Molecular Biology Laboratory's European Bioinformatics Institute, has released predicted structures for nearly all catalogued proteins known to science. The announcement comes a year after the two partners released and open-sourced AlphaFold – an artificial intelligence (AI) system used to predict the 3D structure of a protein – and created the AlphaFold Protein Structure Database to share this scientific knowledge with the researchers. The database now contains over 200 million predicted protein structures, covering plants, bacteria, animals, and other organisms. It is expected to help researchers advance work on issues such as neglected diseases, food insecurity, and sustainability.
Tags
Annotators
URL
-
-
rsf.org rsf.org
-
Saudi prince’s meeting with Macron despite Khashoggi murder and imprisonment of 27 journalists
The meeting between the French president Emmanuel Macron and Saudi Crown Prince Mohammed bin Salman is supposed to be held tomorrow in Paris on 28 July. What seems to be the concern of RSF (Reporters Without Borders) is that 4 years passed since journalist Jamal Khashoggi was murdered. 27 journalists and bloggers are currently detained in Saudi Arabia, thus RSF asks Macron to negotiate with Mohammed bin Salman to release them.
It is worrying that the prince of Saudi Arabia is engaging in international relations promoting truth and justice. The involvement of Mohammed bin Salman in Khashoggi’s murder has been confirmed by the UN special rapporteur Agnès Callamard and a CIA report in 2021.
RSF put the Saudi Arabian prince on their list of predators of press freedom, due to waves of arrests of journalists starting from his appointment in 2017 and his brutal response to the freedom of speech.
-
-
-
Frequent violence against media in Greece
In the past three years, there were 11 attacks against Greek journalists and media accused of spreading government propaganda. The latest attack was on a building in Athens that houses Real FM news radio and the weekly RealNews on 13 July. An anarchist group calling themselves ‘Thousands of Night Suns’ confirmed the involvement on 20 July, dedicating this attack to two anarchist activists, and blaming Real for supporting political propaganda.
It is crucial that the Greek government speeds up the implementation of the interministerial memo on journalists’ safety and the European Commission’s September 2021 recommendations. Despite what Greek Prime Minister Kyriakos Mitsotakis says about the need for conviction of perpetrators, most attacks on press freedom remain unpunished.
Journalists in Greece are not exposed only to violent attacks of this kind, being a target of organised crime. That is why Greece is placed the lowest in RSF’s 2022 World Press Freedom Index out of all EU countries, being 108th out of 180.
-
-
www.washingtonpost.com www.washingtonpost.com
-
Intensification of cyberwar between Iran and Israel
Three of Iran's state-owned biggest steel companies stopped working after facing cyberattacks in late June. These biggest steel companies were attacked by a hacking group who admitted it on social media as a response to ‘the aggression of the Islamic Republic.’
After that, Israel’s defense secretary ordered an investigation into the leaked video which showed the damage to the steel plants. This incident was soon followed by the Israeli Security Agency’s statement (Shin Bet) that a May cyber operation by Iran was set to be out of the cyber domain . With these two incidents, it is clear that the cyber conflict between these two countries has become more public in the previous 2 years.
Israel and Iran shifted to a public forum and their objective has changed from defense targets to violating critical infrastructure and civilian lives. With larger public exposure, the greater the risks of extending beyond cyberspace with the influence of other areas of this conflict as well.
-
-
www.politico.com www.politico.com
-
Yurii Shchyhol warns of a new ongoing World Cyber War
Yurii Shchyhol, the head of the Ukrainian State Service of Special Communications and Information Protection, warns there might be an ongoing World Cyber War since the start of Russia’s invasion. Russian cyberespionage and cyberattacks since 24 February weren’t targeted only at Ukraine. Their intervention has been recorded in 42 countries across six continents, mostly from NATO and countries which supported Ukraine during this period.
Shchyhol has stated for Politico that the world has been awakened and that countries are more willing to intensely cooperate with each other on these issues. He also advised: ‘But what we need are not further sanctions and further efforts to curb cyberattacks, we also need for global security companies to leave the market of the Russian Federation. Only then can we ensure the victory will be ours, especially in cyberspace.’
In this interview, it was said that there is strong assistance from the U.S. Cyber Command and the National Security Agency as all of Russia's attacks are ‘an ongoing, continuous war, including the war in cyberspace.’ What Shchyhol also warns us is that despite the two-month stagnation of Russian cyber attacks, what they’re doing is just a part of their tactic in order to collect resources for another attack - which will likely be on a global level.
-
-
-
Russian journalists’ union close to being disbanded
The Russian prosecutor’s office brought on a 350-page complaint against the independent Journalists’ and Media Workers’ Union (JMWU), to disband it. The union learned about the complaint on 13 July. The complaint proposes that some of the employees are foreign agents while some were accused of systematically harming the state and society with their actions.
The reasons behind the complaint are mainly due to the fact that the JMWU publicly opposed the war in Ukraine, defended Russian journalists who were prosecuted, and criticized media censorship in their country. They also signed the ‘Perugia Declaration for Ukraine’, which confirmed their support for Ukrainian journalists.
-
-
www.reuters.com www.reuters.com
-
India's Supreme court ordered releasing of a journalist over a controversial tweet
An Indian journalist, Mohammed Zubair, has been given the release on bail over the accusations of a “highly provocative” tweet in 2018, by India's Supreme Court. The tweet was supposedly aimed at straining ties between Hindus and Muslims. Regardless of the accusations, the tweet itself had no evidence of causing harm to the religious sentiment of Hindus.
When he was granted bail, the court said that keeping Zubair in custody had no legal power. As a vocal critic of Indian Prime Minister Narendra Modi, Zubair and his colleagues accused the federal government of giving the police orders in silencing journalists and critics undermining the freedom of the press and speech.
In this atmosphere, it is important to note that India is ranked 150th on the 180-country World Press Freedom Index.
-
-
www.cnn.com www.cnn.com
-
important test text
-
-
ec.europa.eu ec.europa.eu
-
Title: The Global Gateway Strategy by EU
Description:
Actor: EEAs
-
-
-
Myanmar freelancer sentenced to three-years of jail by the state military court
Nyein Nyein Aye, a Myanmar freelancer and journalist, was sentenced to a three-year prison sentence for the spread of ‘false news.’ She was also accused of causing fear and agitating crimes against a government employee. While Nyein worked for various media outlets, one of them: Mizzima News, was banned by the junta.
Daniel Bastard, the head of RSF’s Asia-Pacific desk implied that this arrest is followed by the big wave of arrests of journalists after the February 2021 coup. He also noted that these sentences behind closed doors by military courts are similar to a factory production line. RSF’s press freedom barometer shows that she is the 24th journalist to receive a prison sentence out of the 67 media workers currently held in Myanmar’s prisons.
-
-
-
Biden’s message at the Arab summit on freedom of the press and democratic rights
U.S. president Joe Biden said in his speech at the Arab summit in Saudi Arabia that the United States will keep its close partnership with the Middle East while urging leaders who attended the summit to advance human rights as a powerful source of economic and social changes. With that being said, freedom of the press and democratic rights are highlighted. He urged the necessity of releasing journalists.
Biden sent a message to the leaders saying: ‘Accountable, accountable institutions that are free from corruption and act transparently and respect the rule of law are the best way to deliver growth, respond to people's needs, and I believe ensure justice.’
-
-
-
Pakistani reporters are being harassed by the government army
Since Shehbaz Sharif took over as a Pakistani prime minister in April, there have been a dozen reports of army-related agencies harassing the media, as RSF cautioned. Critical journalists have been a target of a major army campaign to intimidate their work, parallelly destabilizing Pakistan’s democracy.
This serious decline in press freedom was bolstered with the latest case on 9 July when BOL news anchor, Sami Ibrahim, got attacked by three people. The next day, he posted a YouTube video, saying that the attack was planned to prevent him from filming the scene, and the attackers later left in a vehicle with clear signs of being state-owned.
-
-
www.enisa.europa.eu www.enisa.europa.eu
-
Cyberwar games: Cyber Europe 2022
One of the largest cyber crisis simulations organised by The European Union Agency for Cybersecurity (ENISA) has just been completed. With over 800 cybersecurity experts from 29 European countries and the European Free Trade Area (EFTA), it involved specialists from EU agencies and institutions as well.
This year, the exercises involved a scenario of a simulated attack on European healthcare infrastructure and they tested how participants’ respond to incidents in coordination with EU institutions. They involve the ability of close work with CERT-EU and ENISA in order to reinforce the resilience of the healthcare sector against cyber attacks in the EU with complex business continuity and crisis management situations.
These lessons will be published in ENISA’s ‘after-action report.’
-
-
techcrunch.com techcrunch.com
-
Costa Rica's public health system hit by Hive ransomware
The Costa Rican Social Security Fund (CCSS), i.e. Costa Rica’s public health service was hit by Hive ransomware and forced to shut its systems down. The ransomware was deployed on at least 30 out of 1,500 government servers, CCSS told local media.
Cybersecurity experts suggested that Hive might be working with Conti to help Conti rebrand.
-
-
cybernews.com cybernews.com
-
Italian police thwart Eurovision cyberattack by pro-Russian hacker groups
Italian police thwarted hacker attacks by pro-Russian hacker groups Killnet and Legion during the 10 May semi-final and 14 May final of the Eurovision Song Contest (ESC) in Turin, Italy. Russia was excluded from the competition due to what it calls its special military operation in Ukraine, while Ukraine went on to win the contest.
Killnet denied the attack on ESC, but then declared cyberwar on 10 countries in the same Telegram post. In a separate video, the group stated that these 10 countries are ‘the US, the UK, Germany, Italy, Latvia, Romania, Lithuania, Estonia, Poland, and Ukraine.’
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
HEADLINE How future of TikTok can determine the future of the integrated Internet?
EXCERPTS TIKTok saga will shape the future of the Internet. If TikTok is banned in the USA as a security risk, it could lead towards further disintegration of the Internet. In the same time, Chinese side has to be ready to accept higher scrutiny of TikTok algorithms and business models. By monitoring this policy issue we will monitor the future of integrated Internet.
SUMMARY
TikTok controversy, as the Economist put it, s a test of whether global business and the global internet can remain intact as us-China relations deteriorate.
Context for pressure on TikTok is geopolitics and forthcoming elections in the USA. There is a concern that TikTok could be used to influence eletions.
Is privacy protection real risk since most of TikTok data can be scraped as public data.
The real risk that concers US is a possibility of manipuating domestic audience by company which is in Chinese ownership. For examplea quarter of American users consider TikTok to be a news source.
TikTok algorithms that could be used for manipulation are developed mainly in Beijing.
TikTok can address the risk of shutting down by having data held by Oracle, as already happened during Trump administration, letting third parties inspect its algorithms, including showing the source code and allowing ongoing inspection.
According to the Economist: 'TikTok should be ultimately responsible to an independent board of its own, with members from outside China.'
China is likely to oppose this request for supervision of TikTok's algorithms. However, by doing so, China may make this companies shut down by Western authorities. It will be one of the key decisions and trade-offs with far-reaching consequences for global Internet that China will have to make.
-
-
documents.unoda.org documents.unoda.org
-
OEWG agrees on modalities of stakeholder participation
The OEWG reached agreement to apply modalities for the participation of stakeholders as proposed by the Chair on 20 April, through a silent procedure. NGOs both with and without ECOSOC status should inform the OEWG Secretariat of their interest to participate. If no state raises an objection to the Chair, NGOs will be invited to participate as observers in the formal sessions, make oral statements during a dedicated stakeholder session, and submit written inputs to be posted on the OEWG’s website. The modalities will be read out at the OEWG’s third substantive session for the formal record.
-
-
us-cert.cisa.gov us-cert.cisa.gov
-
Five Eyes authorities issue warning against Russia-backed cyberattacks on critical infrastructure
We’ve reported before that US authorities have been warning against imminent cyberattacks from Russia. This time, it’s the cybersecurity authorities from the Five Eyes – Australia, Canada, New Zealand, the UK, plus the USA – who are warning of the risk that cyberattacks are being planned against critical infrastructures in Ukraine and beyond.
The warning comes in a joint cybersecurity advisory, which refers to US intelligence that the Russian government may be exploring options for potential cyberattacks.
The advisory also notes that cybercrime groups that have recently publicly pledged support for the Russian government ‘have threatened to conduct cyber operations in retaliation for perceived cyber offensives against the Russian government or the Russian people.’ The same threat exists for countries and organisations helping Ukraine.
-
-
www.engadget.com www.engadget.com
-
DDoS attack takes Israeli government websites down
Several government websites in Israel – including the websites of the ministries of interior, defence, and justice – were unavailable for over an hour on 14 March. The incident was caused by a distributed denial of service (DDoS) attack against a communications provider, according to the country’s National Cyber Directorate. Access to the affected websites was restored later in the day.
No statements were made regarding attribution of the attack, although some media sources pointed to a possible Iranian involvement.
-
-
rsf.org rsf.org
-
Digital Security Lab launching
Reporters Without Borders (RWB) is an international non-profit public interest organization in France which has defended the promotion of freedom of information since 1985.
On 18 July, RWB will present its newly founded Digital Security Lab: a digital forensic laboratory that will help combat the threats of online surveillance. Based in Berlin, the Digital Security Lab is designed to analyze the devices of journalists who suspect they are under any digital surveillance. Journalists are a target of many threats that can affect their devices or personal social accounts for malicious reasons. This requires a rigorous and united response, and that is why any journalist will be able to contact the Digital Security Lab if they suspect they are the target of digital espionage because of their work.
Journalists often receive sophisticated phishing messages, and Digital Security Lab experts will search for clues with the analysis of suspicious messages to find out if they are for sent spying purposes. The team will also examine installed programmes and will check for other data traces that might offer traces about previous activities and spying technologies.
-
-
www.euronews.com www.euronews.com
-
Turkish court jails 16 Kurdish journalists over alleged terrorist links
A Turkish court has jailed 16 Kurdish journalists for "belonging to a terrorist organisation" and their close cooperation with the pro-Kurdish Peoples’ Democratic Party (HDP) in Diyarbarkir. They were also accused of spreading terrorist propaganda and since 2016 several hundred HDP members have already been detained. Nazim Bilgin, the president of the Journalists' Association of Turkey warns that: "We are living in the darkest days of our country as far as press freedom is concerned." It is also alarming that Turkey has jailed more reporters than most other countries in the previous decade, according to the Committee to Protect Journalists.
-
-
-
Relatives of Al Jazeera reporter Shireen Abu Akleh accused the U.S. of trying to erase Israel’s responsibility for her death
Relatives of Al Jazeera reporter Shireen Abu Akleh, who was killed while covering an Israeli raid in the occupied West Bank in May, showed their deep disappointment in President Joe Biden in a letter released over his administration’s response to her death.
They accused the U.S. of trying to deny Israel’s responsibility for her death, saying in an official statement that Israeli fire most likely killed her but that the May 11 shooting in the West Bank was an accident. The family sent a request to Biden for meeting with them when he visits the region, which The White House declined to comment on, alongside with the matters of the letter.
Palestinian eyewitnesses who claimed they saw she was shot by Israeli forces gained support from a reconstruction made by The Associated Press, investigations by CNN, New York Times, and The Washington Post as well as monitoring by the U.N. human rights office.
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
Ukraine state agency publishes cyberattacks statistics
The State Service of Special Communications and Information Protection (SSSCIP) of Ukraine published statistics about the number, targets, and type of cyberattacks since the beginning of the Russian invasion.
The government and local authorities, defence, finance, commercial organisations, and the energy sector, in that order, were the main targets of the 796 recorded cyberattacks. Information gathering, malicious code, infiltration attempts, and availability were important cyberattack strategies.
-
-
cybersecuritynews.com cybersecuritynews.com
-
Ukraine warns of massive cyberattack targeting telecommunications operators
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned about widespread cyberattacks targeting telecommunications providers. The CERT-UA claims it had learned about the mass distribution of emails with the subject 'LIST of links to interactive maps' among Ukrainian media entities. The emails contain malicious attachments and may begin downloading CrescentImp malware if opened
-
-
fortune.com fortune.com
-
European mayors fooled into calls with fake Kyiv mayor
The mayors of several European cities held meetings via video link with a person they thought was the mayor of Kyiv, Vitali Klitschko, only to find out they were deceived by a deepfake of Klitschko.
The office of Berlin Mayor Franziska Giffey tweeted Friday night that his conversation with the alleged mayor of Kyiv was ended after his comments raised suspicion.
A screenshot of the tweet by the office of Berlin Mayor. Source: PNP.de Jose Luis Martinez-Almeida, the mayor of Madrid, likewise cancelled a video call when he suspected he was not speaking with his Kyiv colleague. Meanwhile, Budapest mayor Gergely Karácsony said in a Facebook post that he had also recently been targeted and had ended the call following 'several strange, suspiciously provocative questions’. Meanwhile, Michael Ludwig, the mayor of Vienna, was convinced he had talked with Klitschko and even tweeted that they had a video chat. The tweet was deleted after the official account of the Austrian capital published a statement that Ludwig appeared to be the victim of a ‘serious case of cybercrime’.
Questions arose whether the fake Klitschko was a deepfake. German investigative journalist Daniel Laufer found an earlier interview with Klitschko on YouTube that served as the digital source material for the scam. Had a deepfake been used, Laufer argues, the video frames would have been altered in ways that no longer matched the YouTube recording. Apparently this might have been an edited version, not a more-sophisticated deepfake.
-
-
www.cnn.com www.cnn.com
-
Russian hackers accused of launching attacks against targets in Lithuania and Norway
Several public and private sector websites in Lithuania were temporarily down on Monday following a cyberattack reportedly carried out by a Russian-backed hacking group. The Lithuania National Cyber Security Centre (NKSC) warned of an 'intense ongoing' Distributed Denial of Service (DDoS) attack against the Secure National Data Transfer Network, as well as governmental institutions and private companies. Killnet, a pro-Russian group, claimed responsibility for at least some of the attacks, claiming it was in reprisal for Lithuania blocking the delivery of certain products to the Russian outpost of Kaliningrad.
Meanwhile, in Norway, a DDOS attack targeted a secure national data network, affecting several private and public institutions. According to Norwegian officials, Russian hackers were likely behind the cyberattack, although there was minimal damage, with 'no sensitive information taken’.
-
-
rcrcconference.org rcrcconference.org
-
Title: Resolution on Safeguarding Humanitarian Data
Resolution on Safeguarding Humanitarian Data addresses the centrality of data for humanitarian actions. It reiterates previous initiatives and resolutions of the International Red Cross and Red Crescent Movement.
Here are a few key points from the resolution:
- unauthorised access to data could undermine the principle of impartiality of humanitarian organisations;
- states and other actors should respect humanitarian purpose of data;
- work on a digital emblem as a sign to identify data of humanitarian organisations;
- apply humanitarian principles online as it is done offline.
Data breaches put humanitThe data breach against the Movement discovered this year has highlighted a growing trend in cyber-operations targeted at humanitarian organisations. Data breaches risk causing severe consequences for the people those organisations serve – those that are already among the most vulnerable. The Movement will reaffirm its commitment and responsibility to implement data protection rules and cyber security measures. It will also emphasize the urgency of protecting humanitarian data and send a call from the Movement to States and other actors to protect humanitarian organisations online as they do offline.
-
-
www.politico.eu www.politico.eu
-
This analysis does not follow logically with many non-sequiturs. It is difficult to understand the main arguments, including the following points:
First, the most confusing argument was the one that the EU should not "subscribe to the Internet its values", even if these values are democratic and progressive. What should the EU do then?
Since time immemorial, the core values of countries (and other social organisations) have been applied via regulations. For example, the societal value of protecting human lives is applied by regulation against killing human beings. The article does not mention the US-led Declaration on the Future of the Internet which calls for digital governance and regulation inspired by values.
Second, the article promotes 'the Internet’s own values' to be the opposite of EU's. How different are these values from the core EU’s values of openness, inclusion, etc. ?
Third, the author also opposes the EU's request to use technology to filter out online child sexual exploitation. Why not? It is actually happening by tech platforms already. What's wrong with the EU codifying legally this practice of tech companies.
Fourth, the article complains that EU's processes are not inclusive and driven by business interests. Yes, tech companies and other business actors lobby heavily in Brussels as they do in other regulatory capitals. They are just one of the actors, which cannot capture regulation. The EU is often criticised for slowness and inefficiency caused exactly by inclusive processes involving member states, parliaments and other actors. Even at a basic level of logic, this argument doesn't follow. Why would the EU adopt regulations that could hurt big tech interests (data/AI, competition policy, etc.) if the big tech was able to capture EU's regulations?
Fifth, China appears in this title with very little substantiation on the "China trap" in the text. It is not clear how, for example, GDPR can bring EU into 'China trap'. The Internet is regulated in many countries, including the USA. There are many EU's concerns in digital geopolitics with China, but it is not the EU's regulation.
-
- Jun 2022
-
curator.diplomacy.edu curator.diplomacy.edu
-
Title: How to link digitalisation and UN Security Council?
Excerpt: US ambassador identifies 3 areas of digitalisation of UN Security Council: getting more data and information; apps for humanitarian aid; helping peacekeeping missions
Cybersecurity is often in news. But, there are many more impacts of digitalisation on security of modern society from food and climate, to supply chains and peacekeeping.
This holistic impact of digitalisation on modern society is behind the US push for higher relevance of digitalisation on the agenda of the UN Security Council.
In the Economist article, the US ambassador to the UN Linda Thomas-Greenfield identifies three steps for strenghtening links between digitalisation and security at the UN UN Security Council:
Firstly, DATA gathered form satelites to smart tractors can help more informed and proactive actions ahead of climate, food and political crisis.
Secondly, DIGITAL TOOLS can help in hnadling crisis from distribution of humanitarian assistance to helping those in the need of assistance.
Thirdly, DIGITAL PEACE can be strenghtend via use of social media, GPS monitoring and other tools in the UN peacekeeping missions.
As cross cutting activities, the article calls for wider access to the Internet, digital literacy and development of new apps and tools for crisis management and humanitarian assistance.
-
-
news.sky.com news.sky.com
-
US Cyber Command chief confirms USA conducted offensive cyber operations in support of Ukraine
Commander of the US Cyber Command General Paul Nakasone confirmed that the USA conducted offensive cyber operations in support of Ukraine. ‘We’ve conducted a series of operations across the full spectrum: offensive, defensive, [and] information operations,’ the general stated, but did not elaborate further.
-
-
www.reuters.com www.reuters.com
-
Will the EU ban providing cloud services to Russia?
The EU is considering a ban on providing cloud computing services to Russia as part of a new round of sanctions, an EU official told Reuters.
Although the EU announced in a public press release that the sixth sanctions package would include a restriction on the provision of cloud services, cloud technologies were not included in the final decision. As later explained by the press officer for the EU Council, the reference to the ban on cloud services in the first statement was 'a fabric error'.
The cloud service restriction was not recommended by the European Commission, according to an EU official familiar with sanctions decisions. Nonetheless, such a prospect was not ruled out.
-
-
tass.com tass.com
-
Russia unveils internet traffic backup plan
Russia is prepared to face eventual internet disconnection by Europe, stated Maksut Shadayev, Minister of Digital Development, Communications and Mass Media. The plan is for Russian internet providers to redirect traffic through international exchange points in Asia, and Rostelecom has the necessary capabilities, Shadayev explained. Traffic exchange points in Europe are still open for Russian internet providers.
-
-
-
Russia’s Ministry of Foreign Affairs: West risks 'direct military clash' over cyberattacks
Russia warned that the West's cyberattacks against Russian infrastructure could lead to direct military confrontation.
In a statement, the Russian Ministry of Foreign Affairs said that 'The militarization of the information space by the West, and attempts to turn it into an arena of interstate confrontation, have greatly increased the threat of a direct military clash with unpredictable consequences.'
The statement added that Washington was ‘deliberately lowering the threshold for the combat use’ of cyberweapons.
The statement also attributes cyberattacks on Russian infrastructure and governmental institutions to the USA and Ukraine and warns: ‘Rest assured, Russia will not leave aggressive actions unanswered.’
The warning came after Russia’s housing ministry website was hacked over the weekend and its traffic redirected to a ‘Glory to Ukraine’ sign.
-
-
www.euractiv.com www.euractiv.com
-
Wikipedia appeals Russian order to remove Ukraine war information
Wikipedia’s owner, the Wikimedia Foundation, has filed an appeal against a Moscow court decision which demanded that Wikipedia remove content related to the Ukraine war. Previously, Wikimedia was fined 5 million rubles (US$88,000) in a court decision for failing to remove the content in question. Wikimedia argues that people have a right to know the facts of the war and that removing information is a violation of human rights to knowledge access and free expression.
Wikimedia stated that, while its website is accessible within Russia, the country has no authority over Wikipedia, which it describes as a global resource available in 300 languages. The Moscow court argued that the disinformation posted on Wikipedia represented a threat to Russian public order and that the foundation in fact operates in Russia.
So far, the foundation has refused to comply with Russia's demands to delete the articles in question.
-
-
www.justice.gov www.justice.gov
-
USA, UK, EU dismantle Russian hacking botnet
A joint law enforcement operation involving the USA, the EU countries, and the UK has dismantled the infrastructure of a Russia-linked botnet known as RSOCKS stated the US Department of Justice (DoJ).
The RSOCKS botnet has compromised millions of computers and devices worldwide, including IoT equipment like routers and smart garage openers.
According to the DoJ, RSOCKS customers paid between US$30 and US$200 per day to channel malicious internet activity through hacked computers to mask or hide the source of the traffic.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Two African leaders warn about the future of multilateralism. They think that it is not fair that Africa pays for the geopolitical games of big powers.
They argue that UN has to be reformed in order to protect small and developing countries from power games.
Concretely speaking, they propose the reform of the UN Security Council.
Excerpt/twitter: African leaders call for renewed UN to protect small and developin gcountries from geopolitical power games.
Title: How to protect Africa from geopolitical power games
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Title: Amr, UK microchips design company, becomes a key actor in digital geopolitics.
Arm, UK\s microchips design factory, symbolises a shift in the semiconductor industry. Arm focuses on design chips which are becoming increasingly complicated. Amr's design is trend into chips by manufacturers worldwide, ending in mobile phones, drons and other devices. For example, Amr's design is behind 99% of smartphone chips.
ARM tries to keep its unique position by remaining neutral actor in semi-conductor industry. By refusing recent buy-out offer by Nvida, Amr keeps its neutral positioin by remaining, asA Amr's boss Simon Segars put it 'Switzerland of the tech industry'.
Another challenge for Amr will be risc-v chip architecture that lacks royalities and licence fees, the core of companies business model.
Amr''s role wll play an important role in emerging geopolitics of microchps. Companies importance is so high that some UK politicans propsoed government to take controlling 'goden share' of Amr.
Source: The Economist
Twitter: AMR, a UK high-tech company is a key player in chips geopolitics. It focuses on the design and maintains its neutrality among large semiconductor manufacturers.
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
Ukrainians targeted with Cobalt Strike, CredoMap malware,
‘The APT28’ (aka Fancy Bear) hacking group supported by Russia is believed to be responsible for a recent spike in phishing campaigns that are spread by email, warns The Ukrainian Computer Emergency Response Team (CERT-UA Team)
CERT-UA Team explained that emails warning of 'unpaid taxes' or 'nuclear terrorism' are intended to lure victims into opening the file contained in the email. They cautioned that opening the files might cause users to download the malicious software Cobalt Strike or CredoMap.
-
-
www.reuters.com www.reuters.com
-
Meta loses appeal in Russian court over 'extremist activity' label
Meta Platforms, Inc. lost an appeal in a Moscow court after being found guilty of 'extremist activity' in Russia in March.
According to a Kommersant reporter in the courtroom, Meta's lawyer argued that refusing to block access to content and labelling state-controlled media were not activities that meet the definition of extremism.
The court decision requires that whenever organisations or people publicly mention Meta, they need to disclose that Meta's operations are illegal in Russia.
-
-
www.reuters.com www.reuters.com
-
Russian e-commerce firm Ozon starts selling goods via parallel imports mechanism
The Russian-based e-commerce firm Ozon has started selling goods through a parallel imports mechanism on its platform, the company confirmed to Reuters.
Ozon claims to offer a range of items to Russian customers, including smartphones and their components. It also aims to prevent the appearance of counterfeit products on its platform by requesting suppliers confirm the products' originality.
-
-
www.reuters.com www.reuters.com
-
Microsoft: Russian state-backed hackers targeted Ukrainian allies
Since the start of the Ukraine war, Russian state-backed hackers have engaged in network infiltration and espionage operations against 128 businesses in 42 countries that are allied with Ukraine, Microsoft claimed in a new report.
While Russian hackers prioritised NATO governments, they have also launched attacks against think tanks, humanitarian organisations, IT companies, and critical infrastructure. Microsoft estimates that 29% of identified attacks were successful, with a quarter of those leading to data theft. Microsoft also asserts that Russia is conducting an information war to influence public opinion in favour of the conflict domestically and overseas.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Click here to view original web page at timesofindia.indiatimes.com
Meta intensifies communication on the advantages of Metaverse by three video examples:
- university lecture
- virtual surgery
- historical lesson
Later this year, Meta will introduce its Cambria headset as the key tool for joining metaverse.
You can learn more here: https://timesofindia.indiatimes.com/gadgets-news/facebook-owner-meta-shows-future-applications-of-metaverse/articleshow/92280553.cms
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
||sorina|| We should include this in the next version of the Africa paper. It talks about new Chinese development initaitive.
Tags
Annotators
URL
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Most Latin American countries do not want to have to choose between the United States and China, as Donald Trump once suggested.
Similar to Africa ||sorina||
Tags
Annotators
URL
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
The agency said it had discovered that Russian intelligence was using smartphone games to induce unwitting youngsters to snap and upload geotagged photos of critical infrastructure, military and civilian. In exchange, players receive virtual prizes of no value outside the video-game world. And Russia gets to wreck their country.
Use of Onlne Games in wars
-
Olga Khmil, one of Molfar’s intelligence analysts, says Russia is now using group channels in messaging apps like Telegram to aim its artillery better. Russians pretending to be Ukrainians on these channels feign fear of shelling in order to elicit information about infrastructure that has and has not been hit. On May 24th the sbu revealed an even more devious approach to such espionage.
Use of Telegram in Ukraine
Tags
Annotators
URL
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
America’s share of the “hash rate”—the computing power on the network—rose from 11% to 38% in the year to January.
||ArvinKamberi|| what is hash-rate and how they calculate it. Is there any survey
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
The country has few productive industries; it is instead dependent on remittances, which amount to more than 20% of gdp.
to have some statistics on dependent on remittances worldwid
(to send to economic/financial pesons)
Tags
Annotators
URL
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
by the China Institutes of Contemporary International Relations, a state think-tank, spoke of the need for laws and regulations surrounding “virtual labour”
Could you analyse this text on 'virtual labour' from China.
(to be send to curator for labour)
-
Title: Metavere is coming with virtual celebrities in China
Virtual celebrities are becoming popular in China instead of real-life ones. Virtual celebrities are avatars generated by computers and operated by anonymous humans.
They sing, dance, and talk like real-life celebrities. Some of them like Carol from ByteDance have millions of followers.
Companies are happy to use virtual celebrities as they cost much less than real ones and they can be controlled easily.
The estimated value of the virtual-celebrity market in China is $16bn in 2021.
But new problems emerge. According to the Economist coverage, the real person behind Carol's avatar complained about being 'bullied, overworked and underpaid' by ByteDance.
Is this a glimpse of an emerging metaverse economy with more centralised control and fewer rights for human beings?
As billions are invested into metaverse economy worldwide, companies, countries, and citizens should start discussing impact of metaverse on society from human well being to labour rights.
-
- May 2022
-
-
Statistical analysis of the Ukraine war: potentials and pitfalls
Two Spanish scientists question the thesis of "two Ukraine": pro-West or pro-Russian. Their analysis is based upon a set of data on violent events in Ukraine since January 2021.
Their analysis shows that conflicts can arise from many factors beyond simple East-West binary optics. Accordingly, the solution is not to split Ukraine in two.
According to the authors, data lack is the greatest problem in this scientific method.As opposed to other fields, like engineering, obtaining reliable and high-quality data about social and political events is a major challenge.
The greatest challenge to using statistical models and scientific methods in diplomacy will be finding timely, reliable and usable data.
Source: Phys.Org
-
-
-
Undersea cables carry Internet traffic across continents. They are part of the critical information infrastructure of the modern world.
Scientists started using these cables as a global network of sensors that monitor seismic and other changes at the seabed previously beyond the reach of the scientific community.
As Wired indicated in the recent coverage Where there's cable, there's potential data.
Geoscientist Philippe Jousset said 'You can interrogate any fibre under the sea, covering all of the Earth'.
Undersea cables could be also used as early-earning tools for tsunami as they can detect any tectonic shifts on the seabed.
-
-
venturebeat.com venturebeat.com
-
Tech giants begin to support data sovereignty, and data localisation. Google has opened cloud servers in Spain for data localisation. This service will be offered in collaboration with Telefonica, the Spanish telecom giant.
A new 'data sovereignty' business model was highlighted in Google's announcement: “Accelerating digital transformation also requires cloud services that meet regulatory compliance and digital governance requirements. In particular, highly regulated sectors like government, healthcare and financial services need additional controls to store data and run workloads locally.”
You can find more information here.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Scientific sanctions on Russia may affect significantly research on climate change.
As it is analysed by the Economist, the main setback on climate research will be on Artic and Siberia's permafrost:
Permafrost research, crucial for understanding where climate projections will end up, is likely to suffer in particular. Two-thirds of Russia is covered by permafrost, and this frozen ground locks up huge amounts of organic material. As it melts and that organic material decays, greenhouse gases in the form of methane and carbon dioxide are released into the atmosphere. Without good data on these emissions, understanding about their contribution to climate change will decline.
So far, as the Ukraine war escalates, there are no moves towards re-establishing scientifc cooperation between Russia and the West. The continuation of this situation will significantly affect Artic and climate science in both parts of the world.
More information is available here: https://www.economist.com/science-and-technology/russian-and-western-scientists-no-longer-collaborate-in-the-arctic/21809236
-
-
-
Titlte: Need for more innovation in South African diplomacy
South African diplomacy need to be more innovative in order to adjust to the post-pademic era. It was the underlying message of President Cyril Ramaphosa, President of South Africa during the Annual conference of heads of missions of the Department of International Relations and Cooperations.
As a practical step towards more innovative diplomacy, President Ramaphosa said 'We need to adapt to digital diplomacy and host targeted seminars to sell South Africa.'.
The Annual Conference of South African diplomacy stressed three priority areas for innovation in diplomacy:
to attract tourism, trade, and investment by using innovative tools and approaches.
to strengthen people-to-people relations towards cultivating tolerance, and cultural understanding. The main focus should be on youth development programmes.
to strengthen public diplomacy via the use of social media and other advanced tools and approaches.
Source: City Press
-
-
www.commerce.gov www.commerce.gov
-
Global Cross-Border Privacy Rules Declaration aims to extend the current APEC Cross-Border Privacy Rules (CBPR) system worldwide.
It is also an attempt to address the need for a regulatory framework for the cross-border flow of data. The current CBPR system used by APEC countries has been developed over the last 10 years with an international certification system, standard development, etc.
The declaration is signed by Canada, Japan, the Republic of Korea, the Philippines, Singapore, Chinese Taipei, and the United States of America.
-
Global Cross-Border Privacy Rules Declaration aims to extend the current APEC Cross-Border Privacy Rules (CBPR) system worldwide.
It is also an attempt to address the need for a regulatory framework for the cross-border flow of data. The current CBPR system used by APEC countries has been developed over the last 10 years with an international certification system, standard development, etc.
The declaration is signed by Canada, Japan, the Republic of Korea, the Philippines, Singapore, Chinese Taipei, and the United States of America.
-
- Apr 2022
-
www.protocol.com www.protocol.com
-
Elon Mask owned 19-years-old devleoper Jack Sweeney 5.000 USD to stop tracking Mask's private flighs Sweeney asked for new Tesla car. Elon has not replied so far. Instead, according to some jokes on Twitter, he bought the platform for 44 billion USD.
Sweeney's Twitter app smartly combines flight data from various sources to identify itinerey of flights of celebrities, including Elon Trump.
For more info, you can visit https://www.protocol.com/elon-musk-flight-tracker
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
TITLE: How can we reduce the amount of debris and clashes that occur in outer space?
Kamala Harris, US vice-president, announced a unilateral ban of anti-satellite weapons in California on 18 April.
America, along with India, China, and Russia, has successfully 'killed' satellites. One satellite can be destroyed, causing 100.000 pieces of debris to fall on other satellites.
It's becoming a serious problem, as outer space becomes increasingly crowded with private and military satellites orbiting the earth. SpaceX has been granted permission to launch over 12.000 satellites in the next years.
With more and larger satellites and debris, it's becoming more likely, according to Kesseler syndrome that more debris will trigger more satellite collisions and, in turn, create more debris.
The US government is moving to develop 'norms and responsible behaviour' in outer space that will be gradually adopted worldwide.
||Jovan||||nikolabATdiplomacy.edu||||sorina||
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
In the Lovy Insittute's article on changes of Australian diplomacy reform of internal 'cable system' is higlighted in as priority. This old technology cannot serve new digital era with fast access to timely information.
Other proposals for the reform of Australian diplomacy include:
- making Department of Foreign Affairs and Trade (DFAT) a central agency to coordinate national security strategy.
- commitment for more flexible staffing in the fight for talents.
See: Time to think bog on the future of Australian diplomacy
-
-
-
The European Space Agency (ESA) cancels cooperation with Russia, including three planned moon missions and ExoMars. ESA's decision is the implementation of the sanctions against Russia.
The ESA Director-General Josef Aschbacher stressed that ' this new geopolitical context can help 'to create a more resilient and robust space infrastructure for Europe.'
You can consult ESA's decisions here.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
The Nimble initiative won IEEE Future Networks challnges for network solution for local communities.
The founding director of the Nimble solution as 'quickly build a low-cost, low-power, and yet still portable network that meets their own connectivity and education needs.'
It is open source system which does not depend on the Internet. It can operate off-the-Internet by connecting people in local community. The key is to support of development and content in local languages.
Nible can address challenge of logistics and supply chanins which takes up to 80% of humanitarian funding.
Nible is scalable. It can cover a village, a city, or entire region.
It is energy efficient system supporting thousands of users with less than 100 watts of power.
The first deployement of Nimble are made in South Africa and Canada.
For more information visit Spectum by IEEE
-
-
www.technologyreview.com www.technologyreview.com
-
Digitalisation brings benefits and problems. With new connections and possibilities come new risks and dangerous. It is happening in Kenya as country advances in digitalisation. Online sport betting is taking off fast. Some are becoming reach while many others are going banckrupt with amilies disintegrateing and even some people commting suicide.
According to the US research firm GeoPoll survey 84% of Kenya yout tried sport betteing. One third bet on daily basis. Kenyans sepnd $1.3 billion a year on bttering which is equal the budget of the country's Ministry of Health. 7 out of 10 youth have 'gambling disorder'.
How to address this problem? There are wide range of ideas floating around from banning online betting to new tighter legislaiton. Banning is not feasable as online betting is becoming highly integrated into local economy. Governmetns collect a lot of taxes. Online gaming industry is one of important source of employement as well. A few realistic actions includ stopping advertising online betting on radio and TV, introducing apps that can 'reduce temptations', banning access to online betting sites via university networks which are used by many youth,
There are a lot of studies on positive social and economic impact of Mpesa. Now, it is time also to address negative impact of mobile money such as sport betting.
Sport betting is not entirely new. Digitalisation and mobile money amplified spread of it.
The infrastructure for online betteing was set by fast connection via new undersea cables, influex of cheep Cinese-branded smartphones and MPesa mobile money system.
As one young Kenyan indicated in this study: 'Nowdays in Kenya, we term betting as a job. Peple believe that when you do genuine bets, when you take time to do good analyzation, you can win'.
Kenyans were spending $1.3 billion a year to place bets on the platform—more than the annual budget of the country’s Ministry of Health.
Sport betting is becoming continental phenomenon. In addition to 3/4 Kenyans there are more than half of youth from Uganda, Tanzania, Ghana, Nigeria, and South Africa involved in online betting.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Title: Exodus of Russian Tech workers
It is estimated that 70.000 Russian tech workers fled Russia after the Ukraine conflict. Another 70.000-100.000 workers will likely leave Russia over the next few months.
Sanctions against Russia have affected software outsourcing to Russian programmers. Many of them reacted quickly by moving to other countries, including Turkey, Armenia, and other places that do not require visas.
The Russian economy could be adversely affected by this exodus. Tech is an important area for diversifying Russia's energy-dominated economy.
Topic: labour, future of work
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Click here to view original web page at www.tehrantimes.com
Iran calls for more 'sand diplomacy'
Iran calls for more diplomacy and international cooperation in dealing with sand and dust storms.
Iran is particularly exposed to sand and dust from Turkmenistan, Uzbekistan, Afghanistan, and Pakistan in the northeast; Iraq, Syria, Saudi Arabia, and Jordan in the south, southwest, and west.
Sand and dust storms create major economic and environmental damage.
The cross-border nature of this phenomenon requires international cooperation as it was proposed in the article pubished by Teheran Times.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
"Destination Earth", a European Union initiative, aims to create a virtual model of Earth to be used in simulating climates and weather phenomena.
For example, "Destination Earth" should simulate the extremes of climate and server storms.
This initiative is being led by a consortium of EU-related organisation, including the European Space Agency, the European Centre for Medium-Range Weather Forecasts and the European Organisation for the Exploitation of Meteorological Satellites.
It is likely that in 10 years' time, a virtual Earth will be possible.
It is not known if or how 'Destination Earth' will mimic economic, social and political dynamics that directly affect natural phenomena.
Here you can find more information on 'Destination Earth' initiative.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Title: Is the IPCC a scientific or diplomatic exercise?
The IPCC is often seen as the scientific voice in global climate change negotiations. It is also viewed as a matter of scientific facts.
The reality is however, quite the opposite. Diplomats negotiate the "Summary for Policymakers" section of the IPCC report. Guardian noted that they completely omitted any mention of the fossil fuel sector as a major contributor to climate change in the last report. This was apparently because countries like Saudi Arabia or the lobby of the oil industry managed to get rid of this reference.
Accordingly, IPCC reports don't have the same scientific quality as we think.
Another problem is that the social sciences are often ignored in climate change research. They only receive 1% of the funding. However, the most important factors that influence negotiations and actions in climate change are the political and socio-economic aspects.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Title: Battle for cybersecurity narrative
CONTENT: China started issuing detailed reports on cyber attacks from the USA in attempt to change predominant cybersecurity narratives in global media. Accoridng to these narratives, China is one of main hubs of cyberattacks.
Recently, China published three reports documenting cyber attacks originating in the United States: Report by Qihoo 360, treport from the National Computer Network Emergency Response Technical Team (CNCERT), and the report from Qi An Pangu Lab.
The Diplomat considers it as 'Beijing's new strategy for responding to Washington'. It is aimed not only towards US but also global audience. Reports document that other countries, including US allies, are victims of these attacks.
As geopolitics shifts into tesne phase, we can expect more battles for cybersecurity and digital diplomacy narratives. frame current cybersecurity narratives.
Source: The Diplomat
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
1 April China accused of hacking Ukraine days before Russian invasion According to intelligence memos obtained by the British daily newspaper The Times, Chinese hackers reportedly carried out cyberattacks on Ukrainian institutions and nuclear facilities in the run-up to Russia's invasion. Thousands of hacking attempts were made against more than 600 Ukrainian Ministry of Defence and other agencies' websites.
According to a source from Ukraine's security service (SBU), cyberattacks began before the Winter Olympics ended and peaked on February 23, the day before the Russian invasion, with the Chinese government coordinating the attacks.
The SBU, on the other hand, denied providing the Times with any information about the alleged attacks. 'The SBU has nothing to do with the Times' findings. The Ukrainian Security Service does not currently have such information, and no investigation is underway,' according to the Guardian. Trend: Ukraine Tag: Ukraine Topic: Cyberwarfare
-
-
www.vatican.va www.vatican.va
-
TITLE: Encyclical LAUDATO SI - On Care for our common home - by Pope Francis
TEXT: Laudato si' (Praise Be to You) is Pope Francis's encycical with subtitle "on care for our common home".
In encyclical, the pope critiques consumerism and irresponsible development, laments environmental degradation and global warming. He also sets the basis for his approach towards new technologies.
24 May 2015
-
-
-
United Nations Charter
The Charter of the United Nations is the founding document of the United Nations. It was signed on 26 June 1945, in San Francisco, at the conclusion of the United Nations Conference on International Organization, and came into force on 24 October 1945.
The United Nations can take action on a wide variety of issues due to its unique international character and the powers vested in its Charter, which is considered an international treaty. As such, the UN Charter is an instrument of international law, and UN Member States are bound by it. The UN Charter codifies the major principles of international relations, from sovereign equality of States to the prohibition of the use of force in international relations.
Since the UN's founding in 1945, the mission and work of the Organization have been guided by the purposes and principles contained in its founding Charter, which has been amended three times in 1963, 1965, and 1973.
24 October 1945
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Silicon Valley in search for replacement of smartphone era
As the smartphone era is fading, Silicon Valley searchers for new winning technology.
Currently, the most likely candidate to replace smartphones is virtual reality (VR) or Metavers as it is frequently described. Pandemic lockdowns further pushed an idea for virtual reality as our lives moved to Zoom and online platforms. From Zoom, next step is Metavrse.
The key hardware for Metaverse era will be virtual reality headsets. Most major companies are devleoping VR headset and glasses. The Economist describes this shift from smartphone to virtual reality in the following way:
.... as computing shifts away from the pocket and towards wrists and ears, a growing share of consumers’ attention and spending is seeping away from the phone, too. As VR and AR glasses become lighter and cheaper, they could form the most powerful part of the wearable cluster.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Body language and gestures are deeply embedded in us acquired from our birth. They also reflect our identity, including culture, sex, and age.
How will body language be transferred to virtual reality and the Metaverse? Will we develop new types of gestures? Some traditional habits by not using hands too much to support your verbal arguments may be changed as CNET article argues:
... my hands stayed too still. Moving my hands more, and animating, made my avatar more expressive. I had to learn to perform, in a sense, to better express myself as a human.
So far, in Metaverse frantic coverage, there is very little on the impact on human communication, including changes in body language. It is not surprising. As CNET argued
The most difficult things to do, programmatically, are the things that make us most human.
It remains to be seen if existing body language will adjust to Metaverse, or we will have an entirely new way of non-verbal communication that will emerge for virtual reality.
-
-
www.justice.gov www.justice.gov
-
6 April USA disrupts Russia-backed Cyclops Blink botnet The US Department of Justice (DoJ) announced that it had taken down Cyclops Blink, a botnet controlled by a threat actor known as Sandworm (APT28), which has been linked to Russia’s military intelligence agency GRU.
‘Thanks to our close work with international partners, we were able to detect the infection of thousands of network hardware devices. We were then able to disable the GRU's control over those devices before the botnet could be weaponized.’ the announcement stated.
In a press conference, US Attorney General Merrick Garland has accused Russia of using similar infrastructure to conduct cyberattacks on Ukraine. However, he noted that 'fortunately, we could disrupt this botnet before it could be used'. Trend: Cyber detente, Ukraine Tag: Ukraine Topic: Cyberwarfare
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Epic and Lego: protecting children in Metaverse
Epic Games (operated by Fortnite) and Lego started partnership to create a virtual space aimed at kids. Two companies will combine their respective expertise in online gaming.
A new element is that at the outset of their partnership, they set three policy and governance principles for virtual space for children:
- protect children’s right to play by making safety and well-being a priority;
- safeguard children’s privacy by putting their best interests first;
- empower children and adults with tools that give them control over their digital experience.
Safety and rights of children are likely to be the first area where governance and policy rules for Metaverse will be developed.
||StephanieBP||
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Architecture and diplomacy have had a long historical interplay, from design of negotiating spaces to the architecture of embassies. Embassies are often the first visual image that locals get about foreign countries.
Expo is another example of architectural diplomacy when countries try to convey an engaging and impactful message to foreigners.
Expo 2020 is finishing this month after many delays caused by the pandemic crisis.
Countries pavillions in Dubai are very diverse, but most have an important tech feature. Mina Chow provides a survey of diplomacy and architecture at Expo 2020 in Dubai.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
AI projects are hitting the limits of available data. Thus, there is a push for synthetic data.
Synthetic data are generated by machines. They are cheaper and less prone to legal requirements including privacy protection.
But synthetic data open a new set of issues: how to ensure that they relate to 'normality'; how to avoid biases that synthetic like real data generates.
Source: Spectrum https://via.diplomacy.edu/https://spectrum.ieee.org/synthetic-data-computer-vision
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Title: Elon Masks joins Twitter: the new battle for free speech
Mask's appointment to the Board of Twitter, as the biggest shareholder, is a more content policy than business news.
Musk has been a staunch supporter of free speech. He said 'Given that Twitter serves as the de facto public town square, failing to adhere to free speech principles fundamentally undermines democracy.' He also opposed cancelling of president Trump's Twitter account.
Musk's arrival to Twitter already triggered pushback from Twitter staff who is more interested in 'protecting people from hate speech and trolls' than 'freedom of expression'.
Given Twitter influence, this battle between two camps - content control vs freedom of expression - will have major impact on the future of the Internet.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
German authorities seized servers of Hydra, one of the biggest cybercrime forums. Hydra was parked of DarkNet operated by ToR software.
One of the strengths of Hydra was the Bitcoin Bank Mixer, a service to prevent access by law-enforcement agencies.
Hydra was used for transferring funds from the Colonial Pipeline ransomware.
The end of the Hydra platform will in particular affect the Russian cybercrime community.
-
-
jmt.scholasticahq.com jmt.scholasticahq.com
-
Journal of Moral Theology dedicated special issue on 'artificial intelligence'.
An Introduction to the Ethics of Artificial Intelligence Matthew J. Gaudet
Artificial Intelligence and Moral Theology: A Conversation Brian Patrick Green, Matthew Gaudet, Levi Checketts, Brian Cutter, Noreen Herzfeld, Cory Labrecque, Anselm Ramelow, OP, Paul Scherz, Marga Vega, Andrea Vicini, SJ, Jordan Joseph Wales
Artificial Intelligence and Social Control: Ethical Issues and Theological Resources Andrea Vicini, SJ
Can Lethal Autonomous Weapons Be Just? Noreen Herzfeld
We Must Find a Stronger Theological Voice: A Copeland Dialectic to Address Racism, Bias, and Inequity in Technology John P. Slattery
Can a Robot Be a Person? De-Facing Personhood and Finding It Again with Levinas Roberto
Metaphysics, Meaning, and Morality: A Theological Reflection on A.I. Jordan Joseph Wales
The Vatican and Artificial Intelligence: An Interview with Bishop Paul Tighe by Brian Patrick Green
Epilogue on AI and Moral Theology: Weaving Threads and Entangling Them Further Brian Patrick Green
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
TITLE: ECASH - solution for cash and anonymity in the digital era
CONTENT: Many governments are experimenting with digital currency issued by the central monetary authority. Digital currency won't have anonymity one of the important aspects of traditional cash.
The lack of anonymity of emerging digital currency is problem that inspired US Congress Representative Stephen Lynch to propose the establishment of ECASH (Electronic Currency and Secure Hardware).
ECASH will be based on the peace of hardware or card issued by the U.S. Treasury that could be used strictly peer to peer, like cash. Funds could also be uploaded onto phones or other hardware. It does not require the internet and it does not use blockchain.
TOPIC: crtypto currency URL: https://www.nytimes.com/2022/03/30/opinion/digital-money-privacy.html
-
-
www.unodc.org www.unodc.org
-
TITLE: UN Cybercrime Convention (draft by Russian Federation)
CONTENT: Russian Federation submitted a proposed text for the UN Cybercrime Convention. It is used as one of inputs for negotiations.
DATE: 29 June 2021
TOPIC: cybercrime
PROCESS: Negotiations of the UN Cybercrime Convetnion
COUNTRY: Russia
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
this text presents argument that DMA can reduce security level by interrupting crypto-protected communication.
Link https://via.diplomacy.edu/https://curator.diplomacy.edu/ailink/17404/
-
-
oeil.secure.europarl.europa.eu oeil.secure.europarl.europa.eu
-
TITLE: EU's Digital Market Act (DMA)
CONTENT: Digital Market Act (DMA) aims to ensure proper functioning of the EU internal market by 'promoting effective competition in digital markets and in particular a fair and contestable online platform environment.
-
-
www.eca.europa.eu www.eca.europa.eu
-
TITLE: Cybersecurity of EU institutions, bodies and agencies - Special Report by European Court of Auditors
CONTENT: The audited report of the cybersecurity of EU institutions, bodies and agencies (EUIBAs) concluded that EUIBAs' cyber preparedness is not adequate to cyber threats. It based this conclusion on the following elements:
- increase level of cyber attacks of EUIBAs in times of pandemic and security crisis. The risk exposure is not likely to stop given global dynamcis.
- cyber risks are based on technical interconnectenes of EUIBAs (networks, servers). Technical interdependence is not followed by organisational and human one. There is lack of synergies on projects, tools and platforms such as email or videoconferencing.
- cybersecurity governance is lacking: strategies, policies, risk assessment, etc.
- cybersecurity training is not always systematic.
- two main cybersecurity institutions The Computer Emergency Response Team of the EUIBAs (CERT-EU) and the European Union Agency for Cybersecurity (ENISA) are not adequately supported for cybersecurity challenges they face.
Report proposes a few immediate steps:
- legal framework for cybersecurity binding rules for all EUIBAs
- increased resources for CERT-EU
- promotion of synergies via the Institutional Committee for the Digital Transoformation
- focus work on CERT-EU and ENISa on the less cybersecurity mature EUIBAs.
-
TITLE: Cybersecurity of EU institutions, bodies and agencies - Special Report by European Court of Auditors
CONTENT: The audited report of the cybersecurity of EU institutions, bodies and agencies (EUIBAs) concluded that EUIBAs' cyber preparedness is not adequate to cyber threats. It based this conclusion on the following elements:
- increase level of cyber attacks of EUIBAs in times of pandemic and security crisis. The risk exposure is not likely to stop given global dynamcis.
- cyber risks are based on technical interconnectenes of EUIBAs (networks, servers). Technical interdependence is not followed by organisational and human one. There is lack of synergies on projects, tools and platforms such as email or videoconferencing.
- cybersecurity governance is lacking: strategies, policies, risk assessment, etc.
- cybersecurity training is not always systematic.
- two main cybersecurity institutions The Computer Emergency Response Team of the EUIBAs (CERT-EU) and the European Union Agency for Cybersecurity (ENISA) are not adequately supported for cybersecurity challenges they face.
Report proposes a few immediate steps:
- legal framework for cybersecurity binding rules for all EUIBAs
- increased resources for CERT-EU
- promotion of synergies via the Institutional Committee for the Digital Transoformation
- focus work on CERT-EU and ENISa on the less cybersecurity mature EUIBAs.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Apple and Meta exposed client information to hackers disguised as law enforcement agencies. All of these incidents occurred in response to emergency requests, which can be used to circumvent conventional procedure with a court order.
Requests were often sent from law enforcement agencies' hacked e-mail accounts.
These data breaches point to severe flaws in the system's handling of data requests. The situation is becoming more serious as the number of requests increases. From January to June 2021, Meta received 21.700 data requests from law enforcement agencies worldwide.
Typically, these demands are delivered via email. This improvised approach introduces several dangers of misunderstanding, inaccuracy, and intentional hacking.
As a solution, a "single point of contact" is required where all law enforcement agencies can issue demands and businesses can collect them. With adequate safeguards, such a collaboration platform might be an effective solution to preventing hacking, data breaches, and the growing cyber vulnerabilities around the world.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
The thinking space for current developments is shaped by political ideals and philosophy. We cannot understand our period or work on prospective answers for crises, such as the war in Ukraine, unless we comprehend deeper thought origins of our era. This text discusses the Ukraine war by revisiting ideas that influenced Putin and the Russian elite.
On the operational front, some analysts, such as John Mearsheimer, have cautioned that NATO's expansion into Russia's borders could provoke confrontation.
However, beyond the tactical, there are ideas and concepts that have shaped Putin and the Russian elite's thinking.
Several intellectuals, including
Vladislav Surkov is a Kremlin-connected adviser. He proposed the ideology of Russian "sovereign democracy," which is the authoritarian style of mild liberalism that Russia has been practicing since 2006.
IIvan Ilyn is Russian philosopher who died in exile in Switzerland in 1954. As a vehement opponent of the Bolsheviks, he advocated not only against Communism, but also against Western liberalism. In his view that classic autocracy is the right approach for Russia, he echoed Dostoevsky's thinking. Ilyin argued in his main work, 'Our Side,' that Russia had a duty to preserve its traditional autocracy and reject Western liberalism.
The Russian political elite began to be inspired also by 'the Justification of the Good' (Vladimir Solovyov) and 'Philosophy of Inequality' (Vladimir Solovyov) (Nicholas Berdyaev). These three authors, Ilyn, Solovyov, and Berdyaev, are sometimes cited as the fathers of the "Russian idea," which is based on the historical uniqueness, distinctive vocation, and worldwide purpose of the Russian people and, by extension, the Russian state.
Most of these ideas were brought closer to our time by Alexander Dugin, who developed 'Fourth Political Theory' as a synthesis of Neo-paganism, Slavic Nativism, and Eastern Orthodox traditions.
In his book 'Foundations of Geopolitics,' Dugin describes liberal postmodernity as humanity's fundamental threat, based on these three pillars of "Atlanticism": liberalism, free markets, and democracy. As counter-forces, he recommends hierarchy, tradition, and a strict legal structure.
As a practical response to 'atlanticism,' Dugin recommended destabilizing three actions: destabilising internal political processes in the United States, Britain's withdrawal from the European Union, and Russia's annexation.
All of these books are essential background reading for understanding Putin's and Russia's elite's thinking as they shift from Western modernity to Russian social conservatism. Russian history has happened in this swinging between modernity and conservativism. It remains to be seen how this transformation will unfold with huge impact not only
-
-
www.whitehouse.gov www.whitehouse.gov
-
The United States has announced the Indo-Pacific Strategy (February 2022) calling for a free and open, connected, prosperous, secure, and resilient Indo-Pacific region. This strategy aims to limit China's growing influence in the region.
The Strategy includes prominent digital and cyber elements, as shown below.
Cross-border data is one pillar of this strategy's commerce aspect. The two other pillars are high labor standards and high environmental standards.
The call for Open RAN Standards and Technologies aims at limiting the dominance by Huawei proprietary standards for 5G networks.
Regional digital connectivity in Indo-Pacific with a link to EuroAtlantic regional networks are key infrastructural elements of the Strategy. US digital foreign policy is focusing its attention on two key strategic regions: Indo-Pacific, and Euro-Atlantic.
In cybersecurity, the strategy calls for "new regional initiatives to improve collective cybersecurity and rapidly respond to cyber incidents." The strategy also calls for the mitigation of online radicalization.
The Quad is called to support building cyber capacities in South and Southeast Asia and the Pacific Islands.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
TITLE: Will Chinese companies fill the gap at Russian tech market?
CONTENT: After the introduction of sanctions and the withdrawal of Western tech operators, Chinese companies filled the gap.
For example, Huawei's phone sales in Russia trippled in the first two weeks of March. After the withdrawal of Nokia and Ericsson, Huawei and ZET will increase their share of the market for wireless network equipment. Currently, the Russian market is divided almost half-and-half between these two Chinese and American companies.
However, business with Russia exposes Chinese companies to the risk of US sanctions, especially on the sales of equipment containing semi-conductors produced in the United States.
Chinese tech giants will have to walk a fine line between capturing the huge Russian tech market while avoiding harsh sanctions from the United States.
-
- Mar 2022
-
curator.diplomacy.edu curator.diplomacy.edu
-
test - to be deleted
-
test - to be deleted
-
Test - to be deleted
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
This text covers military aspect of the Ukraine war. ....
-