- Dec 2022
-
www.wsj.com www.wsj.com
-
superposition,
-
But qubits—which are encoded into subatomic and atomic particles including electrons, photons and ions—can exist as a zero and a one at the same time.
-
from their use of so-called quantum bits, or qubits, instead of the digital zeros and ones used to represent data in conventional computers.
-
“heaven is the origin of everything” in Mandarin Chinese.
-
-
www.internetsociety.org www.internetsociety.org
-
this is a new ISOC strategy. It has some elements which we may develop cooperation:
- fellowships
- delivery of courses
||Pavlina||||VladaR||||sorina||||Andrej||
-
Collaborate with at least 5 partners to deliver training
-
an Internet fragmentation threat matrix
||GingerP|| Is this something that you suggest we should develop as taxonomy?
-
We encourage our community, partners, and decisionmakers to use the resources available in our Internet Impact Assessment Toolkit (IIAT) when analyzing forthcoming policies and the potential consequences to the Internet.
What is this?
-
to engage in advocacy activities that increase awareness and promote and defend encryption.
-
to introduce a “government use of encryption” course in 2023 to improve policymaker awareness about the importance of encryption
||VladaR|| ||sorina|| Maybe something to co-develop with ISOC?
-
the Global Encryption Coalition (GEC)
-
Internet shutdowns stifle human expression, threaten the Internet’s resilience, and weaken our ability to weather global challenges.
-
It’s called the splinternet, and this reality is closer than you think.
-
-
www.newyorker.com www.newyorker.com
-
A good and realistic analysis of ChatAI whicis new hype by OpenAI
||sorina||||JovanNj||||anjadjATdiplomacy.edu||
-
“The weird monoculture we’re in just loves to produce these, like, generic middlebrow things. I’m not sure if those things would be worse if GPT did it. I think it would be the same?” ♦
-
“These systems are a reflection of a collective Internet,”
-
rated as an “establishment liberal”—more or less the position that I am writing from right now.
-
with a passive-aggressive co-worker who just tells you what you want to hear, but mostly just wants you to leave them alone.
-
It seems, at least for now, that GPT-3 can generate its own stories, but can’t quite get beyond broad platitudes delivered in that same, officious voice.
-
To put it a bit more pointedly, why does it matter whether a human or a bot typed out the wall of text?
-
“The Internet itself is just patterns—so much of what we do online is just knee-jerk, meme reactions to everything, which means that most of the responses to things on the Internet are fairly predictable. So this is just showing that.”
-
-
-
Recent local, federal and international regulations and regulatory proposals have sought to address the potential of AI systems to discriminate, manipulate or otherwise cause harm in ways that assume a system is highly competent. They have largely left out the possibility of harm from such AI systems’ simply not working, which is more
||JovanNj|| ||sorina|| This is an interesting comment that politicians are trying to deal with AI hype - not reality.
-
the perception gap has crept into policy documents
-
-
-
guardrails
-
Along with their popularity come concerns over privacy, misinformation and problematic lack of context.
What are limitations of AI?
-
“One hour of googling was solved with just five minutes of ChatGPT.”
-
This isn’t like searching Google. If you don’t like the results, you can ask again, and you’re likely to get a different response.
Q: What is the difference between Google search and ChatGPT?
||JovanNj||||anjadjATdiplomacy.edu||
-
-
-
||JovanNj|| An interesting parallel between nature and AI. ||anjadjATdiplomacy.edu||
-
many computational biologists expect protein-language models to yield benefits beyond faster drug development.
-
Recent advances in natural language processing and a dramatic drop in the cost of protein sequencing, which has yielded vast databases of amino-acid sequences, have largely overcome both problems, proponents say.
-
“We’re learning the blueprint from nature.”
-
the grammar of proteins
-
Natural language algorithms, which quickly analyze language and predict the next step in a conversation, can also be applied to this biological data to create protein-language models.
-
-
www.project-syndicate.org www.project-syndicate.org
-
Southeast Asia’s population of 685 million has 240 million Muslims, 140 million Christians, 200 million Buddhists, and so on. Yet, owing to the intangible contributions of the Javanese ethos within the Association of Southeast Asian Nations (ASEAN), the region has remained peaceful.
-
Yet that is precisely the kind of flexibility we need if we are going to maintain relative peace and stability in the twenty-first century.
-
Culture matters for diplomacy, and Indonesian President Joko Widodo embodies the “soft” and sophisticated elements of Indonesia’s dominant Javanese culture, which prizes musyawarah and mufakat (consultation and consensus).
-
Indonesia’s dominant Javanese values, which emphasize consultation and consensus
-
-
-
Meta, the parent company of Facebook today said that it is partnering with the Independent National Elections Commission (INEC), civil society groups and local radio stations to stop spread of fake news and protect the integrity of the Nigerian 2023 general elections.
TITLE: Meta partners with Nigerian organisations to combat disinformation ahead of 2023 elections
CONTENT: Meta announced they will partner with the Independent National Elections Commission (INEC), civil society groups and local radio stations to combat the spread of disinformation and protect the integrity of the Nigerian 2023 general elections. The approach has also been informed by conversations with human rights groups, NGOs, local civil society organisations, regional experts and local election authorities and consists of a series of measures to promote good practices and make it easier for audiences to distinguish trusted content from dubious claims. For instance, the official Facebook page on the 2023 elections on its platform will have a blue tick which confirms the authentic of the results posted on the INEC official website. Additionally, Meta has quadrupled the size of its global teams working on safety and security to about 40,000 people, including over 15,000 content reviewers in every major timezone. Collectively, these reviewers are able to review content in more than 70 languages- including Yoruba, Igbo and Hausa.
EXCERPT: Meta announced they will partner with the Independent National Elections Commission (INEC), civil society groups and local radio stations to combat the spread of disinformation and protect the integrity of the Nigerian 2023 general elections.
LINK: https://leadership.ng/meta-partners-inec-ngos-to-combat-2023-elections-fake-news/
TREND: Fake news
DATE: 08/12/2022
COUNTRY: Nigeria
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
crash course in
-
- Nov 2022
-
www.nasa.gov www.nasa.gov
-
Signatories are
Initial: Australia, Canada, Italy, Japan, Luxembourg, the United Arab Emirates, the United Kingdom and the United States
Additional signatories: Ukraine, South Korea, New Zealand, Brazil, Poland, Mexico, Israel, Romania, Bahrain, Singapore, Colombia, France and Saudi Arabia.
||sorina||
-
THE ARTEMIS ACCORDS
||sorina|| we should include this into our 'space diplomacy' set of documents
-
-
www.unicef-irc.org www.unicef-irc.org
-
TITLE: New evidence revealed the disparity in the internet access for children in five African countries
CONTENT: A recent UNICEF research brief estimated the level of internet access for children in Ethiopia, Kenya, Namibia, Uganda, and the United Republic of Tanzania, as well as the most common barriers to connecting children to the digital world and their consequences. The report classified these common barriers into three categories: infrastructure-related, resource-constrained, and adult permission-related. According to the findings, 90% of children in the five countries surveyed reported having at least one barrier to regular internet access. The most frequently mentioned barrier was the high cost of data.
The report identified three priorities for addressing the digital divide and enabling equal access to digital connectivity: investing in electricity and connectivity with a focus on marginalised communities and users; lowering the cost of connectivity and devices; and addressing cultural and social norms as barriers to address for children and adolescents.
EXCERPT: A recent UNICEF research brief revealed that 90% of children in Ethiopia, Kenya, Namibia, Uganda, and Tanzania experienced at least one of three common barriers to regular internet access - infrastructure-related, resource-constrained, and adult permission-related barriers. The most frequently mentioned barrier was the high cost of data.
TOPIC: Children’s rights
TREND: internet access; internet connectivity; digital divide; digital inclusion.
DATE: November 2022
COUNTRY: Ethiopia, Kenya, Namibia, Uganda and Tanzania
-
-
www.unhcr.org www.unhcr.org
-
text on Rousseau and Geneva for Geneva Digital Atlas.
||Jovan||
-
-
-
TITLE: WHO report evaluates online safety and violence against children educational programmes for youth.
CONTENT: Based on a review of evaluations of online safety programmes and online VAC programmes for children and adolescents, the report, What Works to Prevent Online Violence Against Children, discovered strong evidence that prevention education for children can work, and that this is a key strategy for addressing online VAC. Educational programmes have been widely demonstrated to improve overall safety and health. These educational programmes are particularly effective in preventing one type of online VAC, cyberbullying (both victimisation and perpetration).
This report also captured a number of structural and skill components that contribute to the effectiveness of educational programmes and should be widely adopted.
- Structural components include multiple and varied learning strategies and tools; more lessons, more message exposures, more reminders, and follow-ups; using peer engagement, role-plays, and interactions; getting a supportive whole-school environment; and parental involvement.
- Skill components include problem-solving, assertiveness, empathy, self-regulation, help-seeking, bystander or defender mobilization, social norm instruction, sex education, and substance abuse education.
The report also revealed that there is a lack of evidence about the success of prevention programmes for online child sexual exploitation and abuse.
The report suggests implementing school-based educational programmes with multiple sessions that encourage youth interaction and involve parents. It emphasises the need for more violence prevention programmes that integrate content about online dangers with offline violence prevention. It suggested less emphasis on stranger danger and more emphasis on acquaintance and peer perpetrators, who are responsible for the majority of online violence against children.
EXCERPT: The WHO report on what works to prevent online violence against children, based on a review of evaluations of online safety programmes for youth, found strong evidence that prevention education for children can work and can increase safety and health in general.
LINK: https://www.who.int/publications/i/item/978924006206
TOPIC: Child safety online
TREND: Violence against children; online violence against children; educational program; cyberbullying; online child sexual exploitation and abuse; evidence review.
DATE: 24 November 2022
COUNTRY: Global
-
-
www.unicef.org www.unicef.org
-
TITLE: UNICEF released a future-ready, child-centered digital framework to address inequalities in children's lives.
CONTENT: Given that digital exclusion mirrors and magnifies existing social, cultural, and economic inequities and pushes vulnerable children closer to the edges of marginalisation, the digitization of society has an uneven consequence on all children. In order to address the effects of the shifting digital and governance landscape, as well as emerging and embedded technologies, on children's experience with digital technologies, a future-oritened framework for an equitable digital future was proposed in this new UNICEF report. This framework drew the needs of transformation from "digital inclusion" to "digital equality". For this framework to effectively respond to new trends and technologies, a wider range of stakeholders must be engaged.
The framework can be used as a foundation for developing and evaluating digital inclusion policies, as a roadmap for structuring the involvement of pertinent stakeholders in achieving digital equality for children, and as a tool to assist in the design of policies and interventions by state authorities, civic groups, and the private sector.
EXCERPT: A new child-centered digital framework proposed by UNICEF painted an equitable digital future, highlighting the need for a shift from "digital inclusion" to "digital equality," as well as increased participation from relevant stakeholders.
LINK: https://www.unicef.org/globalinsight/reports/towards-child-centred-digital-equality-framework
TOPIC: Children’s rights
TREND: digital equity; child-centred; inequality
DATE: October 2022
COUNTRY: Global
-
-
www.who.int www.who.int
-
TITLE: WHO report recommends to strengthen the evidence base to monitor the digital health transformation
CONTENT: Digital health refers to the use of information and communication technologies for delivering health care and service, managing health systems and facilities. Despite the positive role that digital health has played to improve health care access, safety, and quality, this WHO report pointed out that digital health programmes and interventions are often not monitored or evaluated. It found that existing metrics for measurement and evaluation tend to be left behind by the rapid evolution of digital health. This report made the case for the necessity of incorporating health data measurement and governance into health care systems. Making available information more accessible at the national and international levels, addressing the variability in digital health monitoring, paying closer attention to monitoring digital health inequalities, and addressing the potential risk of exacerbating inequalities among the most vulnerable, including young children, are all necessary steps to improve monitoring activities.
EXCERPT: A WHO report noted that monitoring of digital health programmes is frequently lacking. It advised focusing attention on enhancing current measurement measures, reducing the variability in digital health monitoring, and addressing the disparities in digital health among the most vulnerable, especially young children.
LINK: https://www.who.int/europe/publications/i/item/WHO-EURO-2022-5985-45750-65816
TOPIC: Children’s rights
TREND: digital health; monitoring and evaluation.
DATE: 22 November 2022
COUNTRY: Global
-
-
www.end-violence.org www.end-violence.org
-
TITLE: Disrupting Harm Research Project generates and archives new evidence on how digital technology facilitates the sexual exploitation and abuse of children.
CONTENT: This resource page consists of evidence on online child sexual exploitation and abuse at national and regional levels, which helps us to better understand the disrupting situations of abuse and exploitation in developing countries, and better navigate how to prevent them. Evidence has been generated and collected through desk-based research and nationally representative survey with internet-using children aged 12-17 and their caregivers in 13 countries across Eastern and Southern Africa and Southeast Asia. National reports and a series of data insight reports can be found on this page, presenting an overal understanding of the threats that online child sexual exploitation and abuse causes and national responses to the threat.
EXCERPT: Disrupting harm project, hosted by the End Violence Partnership, in collaboration with ECPAT International, INTERPOL and the UNICEF Innocenti, to conduct research and assessment in 13 countries across Eastern and Southern Africa and Southeast Asia and generate and collect new evidence on how digital technology facilitates the sexual exploitation and abuse of children.
LINK: https://www.end-violence.org/disrupting-harm#context
TOPIC: child safety online
TREND: online child sexual exploitation and abuse; disrupting harm
DATE: November 2022
COUNTRY: Global
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
how to limit the potential destructive capabilities of artificial intelligence,
-
-
-
Taiwan says it sees less Chinese interference ahead of elections
TITLE: Taiwanese Foreign Minister attests decreased Chinese interference in upcoming elections
CONTENT: Taiwan has repeatedly accused China of attempts to meddle in their elections with online disinformation campaigns. China, which claims the democratically governed island as its own territory, has always played a role in Taiwanese politics. However, Taiwanese Foreign Minister Joseph Wu said to the press ahead of the elections that this time around it seemed like there has been less interference from the Chinese government. Still, more recent news reports do find evidence of Chinese disinformation operations in Taiwan. China's Taiwan Affairs Office did not respond to requests for comment by Reuters.
EXCERPT: Taiwanese Foreign Minister Joseph Wu said to the press ahead of the elections that this time around it seemed like there has been less interference from the Chinese government.
TREND: Fake news
DATE: 27/11/2022
COUNTRY: Taiwan
-
-
-
Studies
Broken link.
-
France in 2013.
Link does not lead where it was supposed to
-
-
speechgen.humainism.ai speechgen.humainism.ai
-
dissagreement
disagreement.
-
-
d1fdloi71mui9q.cloudfront.net d1fdloi71mui9q.cloudfront.net
-
ACKNOWLEDGEMENTS & LEGAL NOTICE
||sorina|| Are you aware of this report?
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Hayek was sceptical of forecasting in general.
-
Published in 1944, “The Road to Serfdom” argued that state intervention often produced the need for further state intervention and, with it, raised the chances of fascism.
-
Hayek moved to Britain in 1931, and events there reinforced his belief that governments were clueless.
-
After fighting in the first world war—though he saw little action—he fell under the spell of Ludwig von Mises, a fellow Austrian economist.
-
-
www.theguardian.com www.theguardian.com
-
Emmanuel Macron has accused Russia of feeding disinformation to further its “predatory project” in Africa, where France has had military setbacks.
TITLE: Macron accuses Russia of financing disinformation projects in Africa
CONTENT: In an interview with TV5 Monde, Emmanuel Macron has accused Russia of spreading disinformation to further its “predatory project” in Africa. He explained that there are several different actors with the intention to spread disinformation in the continent in order to hurt France after its military setback in the Region. In particular, there is concern regarding the Kremlin-linked Wagner Group that built connections with Mali’s military after France pulled its troops out of the country. Russia has rejected the accusations and Yevgeny Prigozhin, the businessman believed by the EU to be behind the Wagner Group called the reports “fakes, outright lies and … falsification”.
EXCERPT: In an interview with TV5 Monde, Emmanuel Macron has accused Russia of spreading disinformation to further its “predatory project” in Africa.
TREND: Fake news
DATE: 21/11/2022
COUNTRY: Russia, France, Mali
-
-
www.euronews.com www.euronews.com
-
How climate disinformation is spreading after Elon Musk’s Twitter takeover
TITLE: Activists express concerns about climate disinformation on Twitter after Musk's takeover
CONTENT: Activists have been expressing their concerns about climate disinformation on Twitter after Musk's takeover. Although there has not been an explicit policy change in Twitter’s approach to tackling climate disinformation on the platform, Musk fired Twitter’s sustainability team within a wider cull of staff two days before the start of COP27. Jennie King, head of civic action and education at the Institute for Strategic Dialogue (ISD) explained that Twitter was supposed to be the voice of COP27, according to a campaign planned in advance alongside climate advocates. However, she expressed that all the intermediaries on the company were laid off and since then there has been a spike in outright climate denial on the platform,
EXCERPT: Activists have been expressing their concerns about climate disinformation on Twitter after Musk's takeover. Although there has not been an explicit policy change in Twitter’s approach to tackling climate disinformation on the platform, Musk fired Twitter’s sustainability team within a wider cull of staff two days before the start of COP27.
TREND: Fake news
DATE: 18/11/2022
-
-
www.reuters.com www.reuters.com
-
Russian Foreign Minister Sergei Lavrov was taken to hospital after arriving in Indonesia's Bali for the G20 summit, the Associated Press reported on Monday, a report that Moscow dismissed as "fake news".
TITLE: Moscow claims that reports of their hospitalised foreign minister at G20 are 'fake news'
CONTENT: Russian Foreign Minister Sergei Lavrov arrived in Bali to represent Russian President Vladimir Putin at the G20 Summit. Lavrov was taken to the hospital shortly after arriving in Bali and the Associated Press reported on Monday that Lavrov was being treated for a heart condition, citing several sources. Nevertheless, Russia's foreign ministry spokesperson claimed that the report was baseless and dismissed the situation by calling it "fake news".
EXCERPT: Russia's foreign ministry spokesperson claims that reports of their hospitalised foreign minister at G20 are 'fake news'
TREND: fake news
DATE: 14/11/2022
COUNTRY: Russia
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
A California federal judge dismissed blockchain platform Dfinity's trademark suit over the infinity-symbol logo against Meta Platforms Inc. The judge ruled that the two logos were not similar enough to sustain the lawsuit.
In a trademark infringement lawsuit, Swiss blockchain group Dfinity Foundation alleged that Mets copied its infinity-symbol logo, which was similar to the one used by the Swiss company.
The court found that Meta's logo was not likely to cause consumer confusion with Dfinity's logo as Dfinity's rainbow infinity logo is not similar in shape or colour to Meta's log. Given the targeted audience, it is unlikely to create any confusion, the court concluded.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
“The human face is the highest bandwidth communications tool we have,”
-
The reason for building a humanoid machine, Mr Jackson maintains, is to perform tasks that involve human interaction.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Pressure for peace talks is growing, even as Russia retreats from Kherson
A good analysis of Ukraine peace talks
-
Will Ukraine become a new Finland, forced to cede land to its invaders and to remain neutral for decades? Or another West Germany, with its national territory partitioned by war and its democratic half absorbed into NATO? A much-discussed template is Israel, a country under constant threat that has been able to defend itself without formal alliances but with extensive military help from America.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Institutional investors including Temasek, a Singaporean wealth fund; SoftBank, a Japanese tech-investing group; and Teachers’ Pension Plan, a Canadian pension fund, had all dipped their toes into crypto by buying stakes in ftx. Legislators will now eye the industry with even deeper suspicion.
-
the collapse of ftx may be enough to reverse the embrace of crypto by institutions, ordinary folk and the occasional government.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
the World Cup can seem a kind of secular religion, or a benign global conspiracy for quadrennial fun.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Since then many international players have used computers to help them train. But Chinese players have not embraced AI as much as the Koreans have, argues Stephen Hu, an instructor in Beijing whose company is developing a Go learning app. Mr Ke, who is still China’s best player, has complained about AI training techniques, saying they tarnish the game’s beauty.
-
-
www.mfa.gov.sg www.mfa.gov.sg
-
the rest of us do have agency and do have choices, and to the maximum extent (we) will seek to raft ourselves to each other in open, inclusive architectures. In typical Asian fashion, more circles, less lines, more balance
-
I do not believe any self-respecting Asian country wants to be trapped, or to be a vassal, or worse to be a theatre for proxy battles
-
is overlapping circles of friends
-
commitment to open science, the fair sharing and harvesting of intellectual property
-
it has to be multipolar, open, and rules-based
-
the Non-Aligned Movement (NAM) came about, basically to counterbalance the rapid bipolarisation of the globe at that point in time.
-
we can have a more open, inclusive, multilateral network of science, technology, and supply chains
-
But if they do not, or (if they) force us to choose one side or the other, we would be in a real tough spot.
-
If they reach a modus vivendi, that would be ideal for a place like Singapore.
-
The technological decoupling will also further disrupt global systems, which in fact have been the enabler of peace, stability, and prosperity for the last 75 years after the end of the Second World War.
-
Since the Renaissance in Europe and the Industrial Revolution, the entire globe has worked on a single technology stack: basic science, applied science, technology, goods, and products
-
The absence of strategic trust will lead both sides to always assume the worst.
-
to a self-fulfilling prophecy that fractures science, technology, and the economy. It is self-fulfilling.
-
Even as President Xi and other senior Chinese leaders denounce protectionism, decoupling, and unilateral sanctions, they continue to reiterate the importance of building China’s own global network of partnerships, and making China’s industrial and supply chains more resilient and secure.
-
such as AI software and quantum computing
-
The US is concerned that advancements in critical and emerging technologies can transform and empower foreign militaries, and ultimately impinge on US national security
-
I say all this so that we try to relieve our obsession with ideological labels, and to understand how and why countries and leaders adopt certain postures.
-
But the West was wrong when it wishfully believed or hoped that economic openness would invariably lead to Western-style political reforms
-
Sometimes when my American friends complain about this apparent attempt at autarky and self-reliance, we forget that it is not confined to China. In fact, today, we also have “Made in America”. That is not new either. If you go back to the 80s, there was “Made in Japan”.
-
referred to science and technology as foundational and strategic pillars,
-
But China never forgets its sense of history or its place in the world, and quite naturally and legitimately wants to reclaim its place in the world.
-
Within Asia itself, the first country to embark on modernisation was Japan. We saw that during the Meiji Restoration.
-
Consequently, it missed out on the Industrial Revolution
-
the compass, gunpowder, paper-making, and printing.
-
A thousand years ago, that country – and obviously, I am referring to China – probably constituted at least 30% of global GDP.
-
To be fair, the rest of the word, especially small city-states like us in Southeast Asia, benefited from those five decades. In the case of Singapore, our per capita GDP grew from about US$500 57 years ago – it went up more than a hundredfold.
-
at a time when it was about 40% of global GDP (gross domestic product), to benefit,
-
it basically set up a world which was not based on ‘winner takes all’.
-
the United States did to rebuild its enemies during th
-
The febrile relationship between the United States and China is of great concern to us – I think not just to Singapore, but indeed to all countries in the world.
-
The first word – trust. The second word is fracture. The third is Newton’s third law of motion.
Three key words: trust, fracture, and motion.
-
-
study.diplomacy.edu study.diplomacy.edu
-
rade and investment promotion
-
-
www.taipeitimes.com www.taipeitimes.com
-
The company said that its Texas fab would start volume production in the first quarter of 2025 at the earliest.
-
Such wafers are mostly used to manufacture chips for 5G phones, high-performance computing and medical devices.
-
-
www.sas-globalwafers.com www.sas-globalwafers.com
-
“With the global chips shortage and ongoing geopolitical concerns, GlobalWafers is taking this opportunity to address the United States semiconductor supply chain resiliency issue by building an advanced node, state-of-the-art, 300-millimeter silicon wafer factory. Instead of importing wafers from Asia, GlobalWafers USA (GWA) will produce and supply wafers locally thereby reducing significant carbon footprint benefitting both customers and GWA in the current ESG tide worldwide.”
-
his new Texas investment could also support as many as 1,500 jobs with production volumes ultimately reaching 1.2 mn wafers per month after multiple stages of equipment installation, in alignment with market demand.
-
Taiwan-based global semiconductor silicon wafer company, GlobalWafers, announced today that it plans to build a state-of-the-art 300-millimeter silicon wafer factory in Sherman, Texas, which is the first of its kind in the USA over twenty (20) years.
-
-
www.bbc.com www.bbc.com
-
電也比亞洲便宜很多。同時,加上當地人才支援(德州很多優秀的大學)最終在德州設廠拍板
-
徐秀蘭向記者強調環球晶圓到美國設廠,絶對是理性計算過後的選擇。她解釋,公司這幾年受許多國家邀請,最後選擇美國有完全的自主性。
-
這次美國禁令確實針對AI或超級電腦,目標是限制中國軍事發展,對於手機等消費性產業鏈影響不大,而力積電只做40奈米以上的成熟制程晶片,沒有受到美國影響,甚至未來美國會更依賴台灣的成熟制程代工。
-
我們政策一直就是不能歧視,沒有對來自哪裏的客戶特別排斥……不過,我們也是守法的公司,所以如果國際之間有一些特殊約定,那我們當然就必須要遵循。
-
晶片大戰,絶對不僅是台灣海峽兩岸的角逐,還與日本韓國等半導體大國相關。而美國的角色在這場晶片大戰中,是重中之重。2019年前任美國總統就開始以國家安全為由,對中國電信巨頭華為等進行制裁,拜登上任後,進一步加碼制裁中國半導體產業,全力限制美國晶片技術進入中國公司。
-
新的「全球本土化」(Glocalization)正在半導體生態圈發生。他說,美國為鉗制中國在5G等運算科技的發展,與主要戰略合作伙伴特別是七大工業國(G7),及三星和台積電半導體大廠協作,融入當地的半導體供應鏈及產業生態系統,這些生態系統和供應鏈會被安全地包圍起來,這就是所謂新的「全球本土化」。
-
此次談併購德國將這一因素看得如此之重——過去在併購時主要都在回答有關壟斷或綠電一類的問題,但此次併購德國公司,則花費許多氣力在解釋地緣政治風險。
-
-
identity.diplomacy.edu identity.diplomacy.edu
-
TITLE:Govt. hosts capacity building for persons with disability in digital technology
CONTENT:The government of Ghana is advancing digital inclusion for Persons with Disability (PWDs) to enable them to take advantage of the digital and financial technology services. During a workshop on digital accessibility for persons with disability, the Minister of Communications and Digitalisation, Ursula Owusu-Ekuful, disclosed that empowering persons with disability with the right skills and knowledge builds their capacity to contribute to national development. ‘We will ensure that all citizens benefit equally and equitably from digital skills, products and services, as we are determined to narrow all forms of the digital divide’, she said. Issues of the importance of digital accessibility for persons with disability, interventions, gaps in digital accessibility and solutions to strengthen policies were part of the discussions during the workshop.
EXCERPT: To reduce the digital divide in Ghana, the government has taken the initiative to train persons with disability in digital technology.
LINK: https://publicsectormag.net/tag/ministry-of-communications-and-digitalisation/
TOPIC: Rights of persons with disability
COUNTRY: Accra, Ghana
-
-
newsonair.withgoogle.com newsonair.withgoogle.com
-
Fighting Misinformation Online
TITLE: Fighting Misinformation Online
CONTENT: Fighting Misinformation Online summit in Brussels and online. The event will be hosted by Annette Kroeber-Riel, (VP, Government Affairs & Public Policy, Europe at Google) alongside YouTube, the EUI and the Calouste Gulbenkian Foundation at De Warande, Brussels.
Speakers
Věra Jourová, Vice President for Values and Transparency, European Commission Jon Ronson, non-fiction author and documentary maker Krisztina Stump, Head of Unit, Media Convergence and Social Media, European Commission Alexander Stubb: former President of Finland and Director at the European University Institute Tali Sharot, Professor of Cognitive Neuroscience, University College London Rasmus Kleis Nielsen, Director, Reuters Institute for the Study of Journalism
EXCERPT: Fighting Misinformation Online summit in Brussels and online.
LINK: https://newsonair.withgoogle.com/events/fighting-misinformation-online
TREND: Fake news
DATE: 29/11/2022
COUNTRY: Belgium (and online)
-
-
elpais.com elpais.com
-
Primera condena en España por difundir ‘fake news’ sobre los menores migrantes
TITLE: Police Officer becomes first person in Spain with criminal conviction for spreading fake news
CONTENT: A Guardia Civil officer becomes the first person in Spain with a criminal conviction for spreading fake news on social media. He was convicted for publishing a video of a brutal aggression to a woman and assigning the blame to a gang of migrant children housed at a residence in Canet de Mar (Barcelona). The aggression had actually happened in China and had nothing to do with the migrant children he had falsely accused. The police officer accepted he had posted fake news driven by his animosity towards Moroccan immigrants and was given a 15-month prison sentence. However, he will be exempted from spending time in jail as long as he attends a reeducation course and does not commit any further xenophobic crimes. The court stated that posts like this are very harmful for democracy, as they increase prejudice towards vulnerable groups.
EXCERPT: A Guardia Civil officer becomes the first person in Spain with a criminal conviction for spreading fake news on social media. He was convicted for publishing a video of a brutal aggression to a woman and assigning the blame to a gang of migrant children housed at a residence near Barcelona.
TOPIC: Freedom of expression
TREND: Fake News
PROCESS: Related process(es)
DATE: 9/11/2022
COUNTRY: Spain
-
-
geopolitique.eu geopolitique.eu
-
when threatened, the United States resolved to tightly control the technologies underpinning economic growth and military superiority.
-
Brazil and Indonesia, leaders in orchestrating past nonalignment movements, are also taking advantage of their new pull. Europe should not underestimate the interest of postcolonial elites in charting an independent course.
-
“If China and India spoke with one voice, the whole world will listen. If China and India joined hands, the whole world will pay attention.”
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Brazil will indeed be back, but possibly in a minor key.
-
What Nicolás Maduro, Venezuela’s autocrat, wants is relief from American sanctions. So Brazil would have to work closely with Mr Biden’s people.
-
Lula’s victory means that left-wing governments are in charge in all of Latin America’s bigger countries.
-
Russia is one of the few issues on which Lula and Mr Bolsonaro agree. Brazil condemns the invasion but, like many developing countries, will not cut ties. Though Lula will be friendly to China, his team worry that the two countries’ trade has undermined Brazilian industry.
-
Its main instruments were the BRICS group (in which Brazil joined Russia, India, China and South Africa) and initiatives in Latin America and Africa, including the Mercosur trade block with Argentina, Paraguay and Uruguay. “Back then multipolarity seemed reasonably easy to achieve in a quite benign way,” Celso Amorim, who was foreign minister and is now Lula’s chief foreign-policy adviser, told Bello. “Now things are much fuzzier.”
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Expecting geopolitical tensions between the West and China to go away is naive at best. So is expecting an autocrat like Mr Xi, who makes no bones about wanting to indigenise Chinese industry, to respect all commercial commitments to foreigners. Not cutting all business ties with China is understandable, and perfectly sensible. Deepening them looks reckless.
-
-
ec.europa.eu ec.europa.eu
-
Is globalisation going back to localisation and centralisation?
The US government announced the Chips and Science Act of 2022 to strengthen the chips supply chain and provide more STEM job opportunities to Americans.
The UK Digital Strategy sets semiconductors and advanced computing as critical supply chains and builds partnerships with the US government.
The European Commission proposed the Chips Act in Feb. 2022 to enhance productivity and technology leadership. Then, the Commission approved the Italian measure to improve the semiconductor supply chain. To achieve the goals of digital and green transition.
Some advanced economies try to deindustrialization, keep the research and development in these developed countries and set manufacturing processes in less economically developed countries before 2022. The economic activity is called the "global division of labour."
But these national and regional strategies or bills seem to make the whole manufacturing process in the local country or the region and try to decouple with some controversial countries.
-
The project, which is planned to be completed in 2026, will be the first industrial scale, integrated epitaxy SiC wafers production line in Europe
-
contribute to achieving both the digital and green transition.
-
strengthen Europe's security of supply, resilience and digital sovereignty in semiconductor technologies,
-
The European Commission has approved, under EU State aid rules, a €292.5 million Italian measure made available through the Recovery and Resilience Facility ('RRF') to support STMicroelectronics in the construction of a plant in the semiconductor value chain in Catania, Sicily.
-
-
www.gov.uk www.gov.uk
-
We will form alliances with like-minded partners on topics that require supra-national cooperation, such as highly complex R&D projects, semiconductor supply chain resilience and telecoms supply chain diversification.
-
In emerging fields such as artificial intelligence (AI), advanced semiconductor design and quantum computing, the UK is a world leader. And our global network of partners and allies provide the foundation to act as a force for digital good on the world stage.
-
grow the UK tech sector’s annual gross value added (GVA) by an additional £41.5 billion by 2025, and create a further 678,000 jobs.
-
-
www.eenewseurope.com www.eenewseurope.com
-
-
It claims it has patents that are being infringed within ICs made by Samsung on 14nm and smaller process nodes and by TSMC on 16nm and smaller process nodes.
-
-
www.usitc.gov www.usitc.gov
-
the USITC has not yet made any decision on the merits of the case.
-
certain semiconductor devices, mobile devices containing the same, and components thereof that infringe patents asserted by the complainant. The complainant requests that the USITC issue a limited exclusion order and cease and desist orders.
-
filed by Daedalus Prime LLC of Bronxville, NY on September 13, 2022.
-
-
www.bis.doc.gov www.bis.doc.gov
-
Finally, after several days shutdown, I can see the original message from the US government.
-
Implementation of Additional Export Controls: Certain Advanced Computing and Semiconductor Manufacturing Items; Supercomputer and Semiconductor End Use; Entity List Modifications” which implements new export controls
-
-
www.nytimes.com www.nytimes.com
-
But more than any single post, the danger of manipulated media lies in the way it risks further damaging the ability of many social media users to depend on concepts like truth and proof. The existence of deepfakes, which are usually created by grafting a digital face onto someone else’s body, is being used as an accusation and an excuse by those hoping to discredit reality and dodge accountability — a phenomenon known as the liar’s dividend
Title: Misinformation experts express concern about manipulated content on TikTok
Content: Experts who study misinformation are expressing concerns about manipulated video and photo content on TikTok. Manipulated media is a key feature on the platform and is mostly used as an entertainment or humorous resource. However, fake news stories and deepfake images of politicians are starting to become a pervasive reality on the popular video platform. These techniques are being applied to posts that sow political division, advance conspiracy theories and threaten the core tenets of democracy ahead of the midterm elections. Henry Ajder, an expert on manipulated and synthetic media stated: “When this volume of content can be created so quickly and at such scale, it completely changes the landscape.” Experts also said it is especially difficult to detect and moderate this kind of content on TikTok, where an estimated 1.6 billion active users put their own stamp on someone else’s content, and where objective facts, satire and outright deceit sometimes blend together in the fast-moving feed. Regardless of single posts, the largest concern is about how these apps where manipulated media is a feature blurs the users ability to tell the difference between truth and fake.
Excerpt: Experts who study misinformation are expressing concerns about manipulated video and photo content on TikTok. The largest concern is about how these apps where manipulated media is a key feature blurrs the users ability to tell the difference between truth and fake.
Link: (https://www.nytimes.com/2022/11/04/technology/tiktok-deepfakes-disinformation.html)
Trend: Fake news
Date: November 4th
-
-
h.diplomacy.edu h.diplomacy.edu
-
TITLE: INTERPOL launches first INTERPOL Global Crime Trend Report 2022 (IGCTR)
CONTENT: With a view to improving law enforcement's access to timely and accurate criminal intelligence analysis, INTERPOL has produced the first INTERPOL Global Crime Trend Report 2022 (IGCTR), which also includes a summary of key findings on global crime trends. The IGCTR is INTERPOL's first assessment to greatly rely upon the Organisation's data holdings and contributions from its global network of 195 member countries as well as private sector partners
Among the top five global trends ranks cybercrimes, for which ransomware, phishing, online scams and computer intrusion are perceived as 'high' or 'very high' threats by INTERPOL member countries. Also among the top ten crime trends was Online Child Sexual Exploitation and Abuse (OCSEA), for which 62% of member countries expected these crimes to "increase" or "significantly increase" in the future.
TOPIC: cybercrime
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
they prioritise the upside of long-shot projects rather than seeking to minimise failure.
-
handing out grants by lottery
-
darpa models
-
a one-size-fits-all approach
-
to fund “people not projects”
-
the darpa model does best when its programme directors have a clear understanding of the sort of breakthroughs that are needed
-
The dARPA model, which has more in common with venture capital than traditional funding structures, is an attempt to do just that
-
The most common way research is funded, through peer review—in which academics in similar fields score proposals—deserves some blame
-
The more knowledge humans have, the longer it takes a budding researcher to get to the frontier, and thus to push things forward. In a paper provocatively titled, “The burden of knowledge and the death of the Renaissance man”, Mr Jones argued humanity’s growing knowledge would slow scientific progress and thus economic growth.
-
-
www.fmprc.gov.cn www.fmprc.gov.cn
-
Some other reference:
- Germany and China: Bilateral relations - Oct. 27
-
Title: The German Chancellor will visit Beijing to push human rights and an open market
The German Chancellor, Olaf Scholz, will visit Beijing on Nov 4. The trip aims to discuss human rights and push an open market. The Chancellor will probably focus on establishing a mutually beneficial business relationship between Germany and China, especially for all European and enterprises. (link)
The German government allowed the Chinese shipping company to set up a terminal in Hamburg. The government is still assessing a Sweden company's acquisition of a small-scale, German-based semiconductor company with €85 million. The Sweden company is owned by one of the Chinese microchip manufacturers. (link)
The U.S. Government published the rule to restrict chips in advanced technology export to Chinese entities in Oct. To prevent the Chinese government uses advanced chips in military applications. Chinese enterprises begin to search for any opportunity to own the chip technology to prosper their technical development, i.e., supercomputer, artificial intelligence, autonomy technology and aerospace technology. Many related companies have stopped providing services or materials to Chinese companies.
-
-
study.diplomacy.edu study.diplomacy.edu
-
10)
-
Training (ASEFPDT10)
-
-
www.govexec.com www.govexec.com
-
empowering long-serving career officials ensures the most experienced officials are influential in the policy process and incentivizes the development of expertise through a career in government service
||Katarina_An|| Is this related to your research on diplomatic functions?
@kishan rana what indian diplomacy
-
-
h.diplomacy.edu h.diplomacy.edu
-
TITLE: The White House to host the second Counter Ransomware Initiative Summit
CONTENT: This week, the White House will host the Counter Ransowmare Initiative Summit with representatives from 13 international firms and representatives from 36 countries and the European Union to discuss the growing threat posed by ransomware and other cybercrime on critical infrastructure and individuals. The goal of the Summit is to “institute a set of cyber norms and rules of the road that are recognized across the globe to counter criminal ransomware threats and hold malicious actors accountable”. A joint statement by participants is expected at the end of the Summit.
EXCERPT: The White House will host the second Counter Ransowmare Initiative Summit with representatives from 36 countries and the EU as well as private sector actors to discuss the threats posed by ransomware and other cybercrime on critical infrastructure.
TOPIC: Critical Infrastructure, Cybersecurity
TREND: Protection of Critical Infrastructure
PROCESS: -
DATE: 31October 2022
COUNTRY: United States
-
TITLE: Australia releases a practical framework for cyber governance principles
CONTENT: The Australian Institute of Company Directors (AICD) and the Cyber Security Cooperative Research Centre (CSCRC) have published the Cybersecurity Governance Principles, a set of governance principles and a “practical framework” for organizations to strengthen their cyber resilience. The principles cover five main areas: roles and responsibilities, cyber strategy, cyber risk management, cyber resilient culture, and cyber incident planning.
These guidelines build on the recently published Cybersecurity Performance Goals for Critical Infrastructure by the US Department of Homeland Security as an example of best practice and are being considered by the Australian government as it reviews its cyber laws following a spate of recent high-profile hacks.
EXCERPT: The Australian Institute of Company Directors (AICD) and the Cyber Security Cooperative Research Centre (CSCRC) have published the Cybersecurity Governance Principles, a set of governance principles and a “practical framework” for organizations to strengthen their cyber resilience.
TOPIC: Critical Infrastructure, Cybersecurity
TREND: Protection of Critical Infrastructure
PROCESS: -
DATE: 27 October 2022
COUNTRY: Australia
-
TITLE: The US Department of Homeland Security releases New Cybersecurity Performance Goals for Critical Infrastructure (CPGs)
CONTENT: On 27 October 2022, the United States Department of Homeland Security (DHS) released new Cybersecurity Performance Goals (CPGs). CPGs are voluntary and non-comprehensive “prioritized subset of IT and operational technology (OT) cybersecurity practices)” that identify the highest priorities and measures owners of critical infrastructures and supply chains should follow to protect against cyber attacks.
As part of the White House efforts and new investments in cybersecurity, the CPGs were developed by the Cybersecurity and Infrastructure Security Agency (CISA) in collaboration with governmental and private sector actors. These procedures are meant to be implemented in the National Institute of Standards and Technology's (NIST) Cybersecurity Framework (CSF), covering the following issues: account security, device security, data security, governance and training, vulnerability management, supply chain and third parties security, and finally recovery and response.
EXCERPT: The United States Department of Homeland Security released new New Cybersecurity Performance Goals for Critical Infrastructure (CPGs) to identify priorities and measures owners of critical infrastructures and supply chains should follow to protect against cyber attacks.
TOPIC: Critical Infrastructure, Cybersecurity
TREND: Protection of Critical Infrastructure
PROCESS: -
DATE: 27 October 2022
COUNTRY: United States
-
-
www.coindesk.com www.coindesk.com
-
India's central bank will introduce a pilot wholesale central bank digital currency (CBDC)
Central Bank of India will introduce the pilot project to test the ability of the Central Bank Digital currency. Similar programs were launched around the world in an effort to test the future widespread use of the CBDCs.
Pilot project in India is supported by nine largest Indian banks. The starting date of the pilot project is November first among the selected a group of merchants and users for this program.
Central Bank Digital Currency is a digital version of countries respective currency issued by the Central Bank of that state.
-
- Oct 2022
-
www.finnegan.com www.finnegan.com
-
www.diplomacy.edu www.diplomacy.edu
-
therell
||JovanK||||MarcoLotti||
Another typo: "there'll"
-
Were
||JovanK||||MarcoLotti||
I spotted a typo here! "We're"
-
-
www.europol.europa.eu www.europol.europa.eu
-
Intellectual Property Crime Threat Assessment 2022
-
-
-
Dutch corporations have unknowingly supplied Russia with high tech.
Dutch high-tech companies have unknowingly sold technology to firms founded by the Russian military intelligence service, the head of the Dutch military (MIVD) secret service revealed in an interview with Financieele Dagblad.
As explained by MIVD head, Jan Swillens, the Russian secret service created dozens of businesses functioning in the Netherlands as 'front companies' to purchase technology in the Netherlands and smuggle it to Russia, thus evading sanctions. The products range from microchips to rubber for the tires of military vehicles.
Such practices have existed since the Russian annexation of Crimea in 2014, 'but with the war in Ukraine, it is increasing significantly', Swillens said.
Duch official has called on high-tech companies to conduct more thorough research into their customers and inquire about their products' actual end users and has informed defense minister Kajsa Ollongren about the smuggling routes.
-
-
www.reuters.com www.reuters.com
-
A Russian diplomat warned that commercial satellites used by the US and its allies to help Ukraine in the war could become legitimate targets for attacks.
Speaking at the first special session of the UN General Assembly on Disarmament, Konstantin Vorontsov, deputy director of the Russian foreign ministry's department for non-proliferation and arms control, said that:
'Quasi-civilian infrastructure may be a legitimate target for a retaliatory strike,' and noted that helping through civilian satellites constitutes indirect participation in military conflicts, calling it 'an extremely dangerous trend'.
A senior official from the American administration quickly responded in reaction to threats made by a Russian diplomat.
John Kirby, National Security Council Coordinator for Strategic Communications, said at a news conference that 'any attack on US infrastructure will be met with a response and that will be met with a response appropriate to the threat that's posed to our infrastructure.'
Likewise, Kirby promised that the US would continue supporting Ukrainian war efforts.
-
-
www.federalregister.gov www.federalregister.gov
-
Title: The U.S. BIS announced new Export Administration Regulations for national security and foreign policy concerned https://www.federalregister.gov/documents/2022/10/13/2022-21658/implementation-of-additional-export-controls-certain-advanced-computing-and-semiconductor
The US Commerce Department's Bureau of Industry and Security (BIS) is concerned about its national security and foreign policy. The BIS made critical changes to the Export Administration Regulations (EAR).
Based on the published document, advanced integrated circuits (ICs) used in supercomputing, semiconductor manufacturing in ICs, software, and technology in new advanced computing and military defense usage are in the EAR. They need to apply for export permission. The document also listed twenty-eight entities in China which were identified for the national security and foreign policy concerned.
The US BIS knows the new rule will impact to the supply chain, they also set two changes to minimize the short term impact on the supply chains. The new rule gives some companies a one-year waiver to produce their products in China .
-
-
asia.nikkei.com asia.nikkei.com
-
TAIPEI -- Taiwan Semiconductor Manufacturing Co. has secured a one-year license to continue ordering American chipmaking equipment for its expansion in China after the U.S. rolled out tough export controls to block Beijing's tech ambitions.C.C. Wei, CEO of the world's biggest contract chipmaker, confirmed on Thursday that it had been given a one-year license covering its Nanjing manufacturing facility in China, confirming an earlier report by Nikkei Asia.
-
-
www.reuters.com www.reuters.com
-
The Biden administration had planned to spare foreign companies operating in China such as SK Hynix and Samsung Electronics Co (005930.KS) from the brunt of new restrictions, but the rules published Friday did not exempt such firms.
-
The U.S. government assured TSMC that it will be able to ship the equipment to a manufacturing facility in the Chinese city of Nanjing,
-
Taiwan Semiconductor Manufacturing Co (2330.TW) secured a one-year license to continue ordering American chipmaking equipment for its expansion in China, Nikkei Asia reported on Thursday.
-
new restriction took effect, South Korean memory chipmaker SK Hynix Inc (000660.KS) said it got authorization from the United States to receive goods for its chip production facilities in China without additional licensing imposed by the new rules
-
-
-
The two South Korean chipmakers obtained a one-year waiver to continue to use semiconductor equipment containing American technology in China -- one of the targets of Washington's curbs.
-
-
www.politico.eu www.politico.eu
-
Elmos is one of Germany's smaller semiconductor companies, which mainly produces chips for the automotive industry. Silex plans to take over the plant for €85 million. Elmos will use the investment to give up its own production and instead process chips bought from contract manufacturers.
-
German Chancellor Olaf Scholz not only ignored warnings from the EU but also from six of his own federal ministries, including the Greens' Vice Chancellor Robert Habeck.
-
The deal is currently being reviewed by the German economy ministry. A final decision on approval is expected within the next few weeks.
-
which would see a takeover of the semiconductor production of Dortmund-based Elmos by Sweden's Silex, a wholly owned subsidiary of China's Sai Microelectronics — was set to get the green light against security advice.
-
-
focustaiwan.tw focustaiwan.tw
-
The MOF said Taiwan's semiconductor exports totaled US$45.7 billion in the first quarter of this year and grew further to US$47.13 billion in the second quarter before falling to US$46.85 billion in the third quarter due to weakening global demand.
-
-
-
especially to American and other Western observers, is the inclusion of a reference to “indivisible security”, a term associated with Russian rhetoric. But the Chinese-language equivalent can also mean “inalienable” or “inseparable”.
-
China put forward the Global Development Initiative (GDI) last year. Seen as a continuation of the Belt and Road Initiative, the GDI prioritises the alignment of areas for cooperation with the UN’s 2030 Sustainable Development Goals. China emphasises cooperation through UN development agencies in implementing the GDI, as opposed to the Belt and Road Initiative, which is primarily a bilateral endeavour.
||sorina|| One of the main shifts in China's Global Development Initiative is that it should focu son SDGs and it should be implemented via the UN (unlike Belt and Road Initaitive).
-
Mao Zedong would call him a forerunner in China’s pursuit of modernisation. In terms of China’s foreign relations, Sun’s idea that “all [nations] are equal” (tianxia datong) resonates with framings such as the “five principles of peaceful coexistence” and “a world community with a shared future”.
-
-
study.diplomacy.edu study.diplomacy.edu
-
ASEF Public Diplomacy Training (ASEFPDT10)
-
-
www.npr.org www.npr.org
-
The White House wants to reverse that. "We invented this industry in the United States. I mean, there's a reason it's called Silicon Valley," said Chatterji, who was chief economist at the Commerce Department, and was part of former President Barack Obama's Council of Economic Advisers.
-
-
science.house.gov science.house.gov
-
Trustworthy AI: Managing the Risks of Artificial Intelligence
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Could the UN Framework Convention on Climate Change be an approach to a global Cyber Framework Convention? Few thoughts here. Thanks Asoke for the idea! PS I made public comments, so that we could possibly involve others to comment as well in future.
||asokemATdiplomacy.edu|| ||Pavlina|| ||JovanK||
-
The UNFCCC is a “Rio Convention”, one of two opened for signature at the “Rio Earth Summit” in 1992.
There could be an umbrella related to various digital policy issues (cybercrime at least, if not also LAWS, and some IG topics like human rights). But, it would be additionally complex (if not impossible) to do such a cluster. But, there should be some mechanism that can connect all these dots (and future and emerging - like negotiations on AI).
-
Parties wanted more certainty on impacts of and vulnerability to climate change
In cyber, we are through with this, and could move to mitigation already.
-
The Convention acknowledges the vulnerability of all countries to the effects of climate change and calls for special efforts to ease the consequences, especially in developing countries which lack the resources to do so on their own.
This is the same in cyber.
-
Sets a lofty but specific goal.
This would be trickier for cyber, as there seems to be nothing as a specific goal discussed so far. How to define it? It could bind states to clarify and agree on (in future) how existing international law applies - ie find the way for it to apply; leaving it to further negotiations on regular basis to clarify bit by bit, through additional Protocols?
Or, should it be related to something quantitatively measurable, like number of attacks or loss, etc? This may be tricky to measure since, unlike global scientific measurements on the environment which can't be hidden by states, here, some aspects about attacks can be hidden by states to ensure deniability.
Can we borrow anything from other disarmament or other peace and security treaties for this mater?
-
Charts the beginnings of a path to strike a delicate balance.
This remains important for cybersecurity as well. Thinking about cybersecurity generally slows down digitalisation (though without it, digitalisation might bring more challenges than benefits).
While environment seems to be at the opposite side of development, cybersecurity can actually be seen as an enabler of development, and might be easier to make countries accept both (thus not striking 'a balance' in essence).
But in practice, it is sort of a balance of investment and pace in digitalisation vs/and cybersecurity, because there are limited funds and thus priorities.
-
Keeps tabs on the problem and what's being done about it.
Current OEWG is shaping 'National survey' (proposed by Mexico) which may further turn into a more complex and substantial reporting mechanism.
PoA is proposing a regular review process.
Perhaps combining the two - and asking multistkeholder venues (esp. academia?) to come up with measurement/assessment methodology of the progress (also linked to the concrete goal of the treaty above)?
-
providing financial support for action on climate change-- above and beyond any financial assistance they already provide to these countries
OEWG and GGE had capacity building as one of the key pillars. Yet, funding was not directly discussed; rather, support to developing countries to be able to implement the agreed norms. This is a solid basis.
There might not need to be specific fund for cybersecurity. Instead, digitalisation funds should be extended/used for this. Perhaps, a more direct link between development aid and cybersecurity can be made. On one hand, it obliges developed countries to not only export digitalisation, but also security. On the other, it obliges developing countries to take both.
-
Puts the onus on developed countries to lead the way.
Here, it is rather the P5+ that can lead the way, as it is about armament and stability.
Should they have a particular role, by leading by the example? Most state-backed attacks are linked to a handful of countries - how to put the onus on them (and how to make this list without going into a tricky bit on attribution)?
Certainly, developed countries would have greater capacities for offense and defence. But, they would also be more vulnerable since they are more digitalised.
-
Recognized that there was a problem.
OEWG and GGE already recognised 'emerging threats' clearly, and there is a broad agreement. It could cover still some more threats which are not recognised openly (like exploitation of vulnerabilities). It could bind member states to act in the interests of human safety and international peace.
Tags
Annotators
URL
-
-
www.reuters.com www.reuters.com
-
Interpol says metaverse opens up new world of cybercrime
Madan Oberoi, Interpol's executive director for technology and innovation warned about the potential of cybercrime in the metaverse and said the agency is preparing for dangers posed by the virtual world(s).
Metaverse could potentially amplify the cybercrime challenges already present online while also introducing a host of new ones. Cybercrime might operate differently when augmented reality and virtual reality are involved. Oberoi cautioned
"Some of the crimes may be new to this medium, some of the existing crimes will be enabled by the medium and taken to a new level," Oberoi said.
He underlined other serious concerns, such as child safety and the possibility that virtual reality can make crime in the real world easier.
‘If terror group wants to attack a physical space they may use this space to plan and simulate and launch their exercises before attacking,’ he said.
Law agencies are increasingly interested in the metaverse, with Interpol developing its own virtual environment that will allow police forces around the world to communicate with one another and even participate in immersive training courses. At the same time, Europol recently published its second report about the metaverse named ‘Policing in the metaverse: what law enforcement needs to know’.
-
-
www.reuters.com www.reuters.com
-
Apple Inc lost an appeal in a London court over key technology patents that are used in Apple's devices. The Court of Appeal confirmed the lower court’s previous decision that Optis Cellular Technology LLC can restrict Apple from using the crucial patents for 3G and 4G telecommunications unless Apple commits to fair and reasonable terms of use.
Judge Richard Arnold stated that Apple merely needed to agree to accept a global license over the standard essential patents on terms that a court considered to be fair and reasonable to avoid an injunction on using the patents in England and Wales.
The ruling is the latest in a dispute that has been ongoing since 2019 when Optis accused Apple of infringing eight of its patents on key telecommunications technology through the sale of products, including iPhone and iPad. In contrast, Apple claimed that Optis has been abusing its dominant position.
The legal battle between Apple viruses Optis has already prompted six separate trials and three appellate hearings in Uk alone, with two further Court of Appeal hearings due next year.
Also, the mentioned companies led a legal dispute before a court in the US, where a judge fined Apple $300 million for infringing on Optis' patent rights related to wireless standards. Apple attempted to appeal the decision, but an East Texas court denied its bid for a third trial in May.
-
-
www.cnbc.com www.cnbc.com
-
The bill is especially concerned with the protection of children, having been developed in response to the death of Molly Russell, a U.K. teen who took her own life after being exposed to suicide-related posts on Instagram
UK's telecom regulator chief (Ofcom)said Meta and Microsoft will not be allowed to self-regulate their metaverses in the UK and will be subject to the country's proposed Online Safety Bill. Breach of the online safety legislation, which is yet to be approved, may result in heavy fines of up to 10% of annual global revenues. Furthermore, senior executives of those companies could even face criminal charges in case of extreme violations.
Melanie Dawes, CEO of Ofcom, stated that businesses in the metaverse wouldn't be allowed to self-regulate their virtual worlds and would instead need to comply with the Online Safety Bill in the UK.
The Online Safety Bill is a proposed legislation drafted to prevent the online sharing of harmful content. The law, which is yet to be approved, would require companies to create a set of strict measures to address harmful content. The legislation focuses particularly on protecting children.
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
Tata Power
The Hive ransomware group has claimed responsibility for a cyberattack against India's largest power company Tata Power. As reported by bleepingcomputer, the threat actor began leaking data allegedly stolen from Tata Power on their leak site after failed ransom negotiations.
According to details shared by security researcher Rakesh Krishnan, the leak contains personally identifiable information (PII), including Aadhaar identity numbers, permanent account numbers (PAN), drivers' license, salary specifics, and engineering drawings.
The incident is said to have occurred on 3 October 2022 and was confirmed by Tata Power; however, the company refused to provide any additional details (about the incident).
-
-
www.reuters.com www.reuters.com
-
Apple filed a lawsuit against medical tech company Masimo Corp in federal court in Delaware, accusing the company of 'copying' its Apple Watch. According to the case, Masimo Corp, W1 smartwatches infringed several Apple Watch patents.
An Apple spokesperson said in a statement that it hoped the suit would 'protect the innovations we advance on behalf of our customers.'
On the other hand, Masimo spokesperson said Apple's suit was an effort to 'divert attention from the litigations brought by Masimo,' and accused Apple of intellectual property theft "instead of competing fairly."
Previously, Masimo, which specializes in health-monitoring devices for medical patients, sued Apple in California federal court in 2020. The company claimed that Apple had stolen its trade secrets and infringed its patents, including measuring heart rate and blood-oxygen levels. Last year, it also asked the US government to halt imports of Apple Watches that violate its patents.
-
-
cert.gov.ua cert.gov.uaCERT-UA1
-
Tropical Scorpius
The Computer Emergency Response Team of Ukraine (CERT-UA) reported the spread of phishing emails that target critical infrastructure with Cuba Ransomware.
As explained by CERT-UA Team, phishing emails impersonated the Press Service of the General Staff of the Armed Forces of Ukraine, enticing recipients to click a link. The victims are lured to a third-party website to update the PDF Reader software to read the embedded document. Upon clicking the 'DOWNLOAD' button, victims are infected with malware known as 'ROMCOM RAT.' The operations are linked to the threat actor 'Tropical Scorpius'.
-