1. Oct 2022
    1. German Chancellor Olaf Scholz not only ignored warnings from the EU but also from six of his own federal ministries, including the Greens' Vice Chancellor Robert Habeck.
    2. The deal is currently being reviewed by the German economy ministry. A final decision on approval is expected within the next few weeks.
    3. which would see a takeover of the semiconductor production of Dortmund-based Elmos by Sweden's Silex, a wholly owned subsidiary of China's Sai Microelectronics — was set to get the green light against security advice.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The MOF said Taiwan's semiconductor exports totaled US$45.7 billion in the first quarter of this year and grew further to US$47.13 billion in the second quarter before falling to US$46.85 billion in the third quarter due to weakening global demand.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. especially to American and other Western observers, is the inclusion of a reference to “indivisible security”, a term associated with Russian rhetoric. But the Chinese-language equivalent can also mean “inalienable” or “inseparable”.
    2. China put forward the Global Development Initiative (GDI) last year. Seen as a continuation of the Belt and Road Initiative, the GDI prioritises the alignment of areas for cooperation with the UN’s 2030 Sustainable Development Goals. China emphasises cooperation through UN development agencies in implementing the GDI, as opposed to the Belt and Road Initiative, which is primarily a bilateral endeavour.

      ||sorina|| One of the main shifts in China's Global Development Initiative is that it should focu son SDGs and it should be implemented via the UN (unlike Belt and Road Initaitive).

    3. Mao Zedong would call him a forerunner in China’s pursuit of modernisation. In terms of China’s foreign relations, Sun’s idea that “all [nations] are equal” (tianxia datong) resonates with framings such as the “five principles of peaceful coexistence” and “a world community with a shared future”.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The White House wants to reverse that. "We invented this industry in the United States. I mean, there's a reason it's called Silicon Valley," said Chatterji, who was chief economist at the Commerce Department, and was part of former President Barack Obama's Council of Economic Advisers.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Could the UN Framework Convention on Climate Change be an approach to a global Cyber Framework Convention? Few thoughts here. Thanks Asoke for the idea! PS I made public comments, so that we could possibly involve others to comment as well in future.

      ||asokemATdiplomacy.edu|| ||Pavlina|| ||JovanK||

    2. The UNFCCC is a “Rio Convention”, one of two opened for signature at the “Rio Earth Summit” in 1992.

      There could be an umbrella related to various digital policy issues (cybercrime at least, if not also LAWS, and some IG topics like human rights). But, it would be additionally complex (if not impossible) to do such a cluster. But, there should be some mechanism that can connect all these dots (and future and emerging - like negotiations on AI).

    3. Parties wanted more certainty on impacts of and vulnerability to climate change

      In cyber, we are through with this, and could move to mitigation already.

    4. The Convention acknowledges the vulnerability of all countries to the effects of climate change and calls for special efforts to ease the consequences, especially in developing countries which lack the resources to do so on their own.

      This is the same in cyber.

    5. Sets a lofty but specific goal.

      This would be trickier for cyber, as there seems to be nothing as a specific goal discussed so far. How to define it? It could bind states to clarify and agree on (in future) how existing international law applies - ie find the way for it to apply; leaving it to further negotiations on regular basis to clarify bit by bit, through additional Protocols?

      Or, should it be related to something quantitatively measurable, like number of attacks or loss, etc? This may be tricky to measure since, unlike global scientific measurements on the environment which can't be hidden by states, here, some aspects about attacks can be hidden by states to ensure deniability.

      Can we borrow anything from other disarmament or other peace and security treaties for this mater?

    6. Charts the beginnings of a path to strike a delicate balance.

      This remains important for cybersecurity as well. Thinking about cybersecurity generally slows down digitalisation (though without it, digitalisation might bring more challenges than benefits).

      While environment seems to be at the opposite side of development, cybersecurity can actually be seen as an enabler of development, and might be easier to make countries accept both (thus not striking 'a balance' in essence).

      But in practice, it is sort of a balance of investment and pace in digitalisation vs/and cybersecurity, because there are limited funds and thus priorities.

    7. Keeps tabs on the problem and what's being done about it.

      Current OEWG is shaping 'National survey' (proposed by Mexico) which may further turn into a more complex and substantial reporting mechanism.

      PoA is proposing a regular review process.

      Perhaps combining the two - and asking multistkeholder venues (esp. academia?) to come up with measurement/assessment methodology of the progress (also linked to the concrete goal of the treaty above)?

    8. providing financial support for action on climate change-- above and beyond any financial assistance they already provide to these countries

      OEWG and GGE had capacity building as one of the key pillars. Yet, funding was not directly discussed; rather, support to developing countries to be able to implement the agreed norms. This is a solid basis.

      There might not need to be specific fund for cybersecurity. Instead, digitalisation funds should be extended/used for this. Perhaps, a more direct link between development aid and cybersecurity can be made. On one hand, it obliges developed countries to not only export digitalisation, but also security. On the other, it obliges developing countries to take both.

    9. Puts the onus on developed countries to lead the way.

      Here, it is rather the P5+ that can lead the way, as it is about armament and stability.

      Should they have a particular role, by leading by the example? Most state-backed attacks are linked to a handful of countries - how to put the onus on them (and how to make this list without going into a tricky bit on attribution)?

      Certainly, developed countries would have greater capacities for offense and defence. But, they would also be more vulnerable since they are more digitalised.

    10. Recognized that there was a problem.

      OEWG and GGE already recognised 'emerging threats' clearly, and there is a broad agreement. It could cover still some more threats which are not recognised openly (like exploitation of vulnerabilities). It could bind member states to act in the interests of human safety and international peace.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Interpol says metaverse opens up new world of cybercrime

      Madan Oberoi, Interpol's executive director for technology and innovation warned about the potential of cybercrime in the metaverse and said the agency is preparing for dangers posed by the virtual world(s).

      Metaverse could potentially amplify the cybercrime challenges already present online while also introducing a host of new ones. Cybercrime might operate differently when augmented reality and virtual reality are involved. Oberoi cautioned

      "Some of the crimes may be new to this medium, some of the existing crimes will be enabled by the medium and taken to a new level," Oberoi said.

      He underlined other serious concerns, such as child safety and the possibility that virtual reality can make crime in the real world easier.

      ‘If terror group wants to attack a physical space they may use this space to plan and simulate and launch their exercises before attacking,’ he said.

      Law agencies are increasingly interested in the metaverse, with Interpol developing its own virtual environment that will allow police forces around the world to communicate with one another and even participate in immersive training courses. At the same time, Europol recently published its second report about the metaverse named ‘Policing in the metaverse: what law enforcement needs to know’.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Apple Inc lost an appeal in a London court over key technology patents that are used in Apple's devices. The Court of Appeal confirmed the lower court’s previous decision that Optis Cellular Technology LLC can restrict Apple from using the crucial patents for 3G and 4G telecommunications unless Apple commits to fair and reasonable terms of use.

      Judge Richard Arnold stated that Apple merely needed to agree to accept a global license over the standard essential patents on terms that a court considered to be fair and reasonable to avoid an injunction on using the patents in England and Wales.

      The ruling is the latest in a dispute that has been ongoing since 2019 when Optis accused Apple of infringing eight of its patents on key telecommunications technology through the sale of products, including iPhone and iPad. In contrast, Apple claimed that Optis has been abusing its dominant position.

      The legal battle between Apple viruses Optis has already prompted six separate trials and three appellate hearings in Uk alone, with two further Court of Appeal hearings due next year.

      Also, the mentioned companies led a legal dispute before a court in the US, where a judge fined Apple $300 million for infringing on Optis' patent rights related to wireless standards. Apple attempted to appeal the decision, but an East Texas court denied its bid for a third trial in May.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The bill is especially concerned with the protection of children, having been developed in response to the death of Molly Russell, a U.K. teen who took her own life after being exposed to suicide-related posts on Instagram

      UK's telecom regulator chief (Ofcom)said Meta and Microsoft will not be allowed to self-regulate their metaverses in the UK and will be subject to the country's proposed Online Safety Bill. Breach of the online safety legislation, which is yet to be approved, may result in heavy fines of up to 10% of annual global revenues. Furthermore, senior executives of those companies could even face criminal charges in case of extreme violations.

      Melanie Dawes, CEO of Ofcom, stated that businesses in the metaverse wouldn't be allowed to self-regulate their virtual worlds and would instead need to comply with the Online Safety Bill in the UK.

      The Online Safety Bill is a proposed legislation drafted to prevent the online sharing of harmful content. The law, which is yet to be approved, would require companies to create a set of strict measures to address harmful content. The legislation focuses particularly on protecting children.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Tata Power

      The Hive ransomware group has claimed responsibility for a cyberattack against India's largest power company Tata Power. As reported by bleepingcomputer, the threat actor began leaking data allegedly stolen from Tata Power on their leak site after failed ransom negotiations.

      According to details shared by security researcher Rakesh Krishnan, the leak contains personally identifiable information (PII), including Aadhaar identity numbers, permanent account numbers (PAN), drivers' license, salary specifics, and engineering drawings.

      The incident is said to have occurred on 3 October 2022 and was confirmed by Tata Power; however, the company refused to provide any additional details (about the incident).

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Apple filed a lawsuit against medical tech company Masimo Corp in federal court in Delaware, accusing the company of 'copying' its Apple Watch. According to the case, Masimo Corp, W1 smartwatches infringed several Apple Watch patents.

      An Apple spokesperson said in a statement that it hoped the suit would 'protect the innovations we advance on behalf of our customers.'

      On the other hand, Masimo spokesperson said Apple's suit was an effort to 'divert attention from the litigations brought by Masimo,' and accused Apple of intellectual property theft "instead of competing fairly."

      Previously, Masimo, which specializes in health-monitoring devices for medical patients, sued Apple in California federal court in 2020. The company claimed that Apple had stolen its trade secrets and infringed its patents, including measuring heart rate and blood-oxygen levels. Last year, it also asked the US government to halt imports of Apple Watches that violate its patents.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Tropical Scorpius

      The Computer Emergency Response Team of Ukraine (CERT-UA) reported the spread of phishing emails that target critical infrastructure with Cuba Ransomware.

      As explained by CERT-UA Team, phishing emails impersonated the Press Service of the General Staff of the Armed Forces of Ukraine, enticing recipients to click a link. The victims are lured to a third-party website to update the PDF Reader software to read the embedded document. Upon clicking the 'DOWNLOAD' button, victims are infected with malware known as 'ROMCOM RAT.' The operations are linked to the threat actor 'Tropical Scorpius'.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Iran's atomic energy organization says e-mail was hacked

      TITLE: Iran’s nuclear energy agency’s email got hacked from a foreign country

      CONTENT: Iran's atomic energy organization announced on Sunday that an e-mail server belonging to one of its subsidiaries had been hacked from a foreign country and material had been published online.

      Black Reward, an Iranian hacker collective, claimed in a statement posted on Twitter that it has made leaked information about Iranian nuclear programs, calling the move a gesture of support for Iranian protesters.

      According to Black Reward, the documents released included atomic development contracts and agreements with domestic and foreign partners, management and operational schedules of different parts of the Bushehr power plant, and passports and visas of Iranian and Russian specialists working there.

      In a statement made on October 21, Black Reward threatened to reveal hacked data within 24 hours if the government did not free political prisoners and those detained during the uprising.

      EXCERPT: An e-mail server belonging to Iran's atomic energy organization was hacked from a foreign country. Black Reward, an Iranian hacker collective, claims it has made leaked information about Iran's nuclear programs public. Documents include atomic development contracts, management and operational schedules of different parts of Bushehr power plant.

      TOPIC: Cybercrime, Cyberconflict and warfare

      DATE: 23.10.

      LINK: https://www.reuters.com/world/middle-east/irans-atomic-energy-organization-says-e-mail-was-hacked-state-media-says-2022-10-23/

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. New Phishing Campaign Targets Saudi Government Service Portal

      TITLE: Saudi government’s service site becomes a target of a new phishing campaign

      CONTENT: Multiple phishing domains imitating Absher, the Saudi government service site, have been set up to supply citizens with fake services and steal their passwords.

      CloudSEK cybersecurity researchers made the finding and published an advisory about the threat on Thursday.

      Government services in the Saudi region have reportedly recently been a top target for cybercriminals looking to steal user credentials and exploit them in other cyberattacks, according to CloudSEK.

      In order to lessen the effects of these assaults, CloudSEK urged government agencies to keep an eye on phishing attempts that target citizens and warn and educate them about the risks, such as by advising them not to click on questionable links.

      EXCERPT: Saudi citizens are being targeted by phishing websites that mimic Absher, the Saudi government service site. Cybercriminals are looking to steal user credentials and exploit them in other cyberattacks, researchers say. Government services in the Saudi region have reportedly been a top target for cybercriminals.

      LINK: https://www.infosecurity-magazine.com/news/phishing-campaign-saudi-government/

      DATE: 21.10.

      TOPIC: Cybercrime, Cybersecurity, Cyberconflict and warfare

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Voltaire remains today an iconic hero for everyone who sees a positive linkage between critical reason and political resistance in projects of progressive, modernizing reform.
    2. Marx’s famous thesis that philosophy should aspire to change the world, not merely interpret it, owes more than a little debt Voltaire.
    3. The model he offered of the philosophe as critical public citizen and advocate first and foremost, and as abstruse and systematic thinker only when absolutely necessary, was especially influential in the subsequent development of the European philosophy.
    4. By also attaching what many in the nineteenth century saw as Voltaire’s proto-positivism to his celebrated campaigns to eradicate priestly and aristo-monarchical authority through the debunking of the “irrational superstitions” that appeared to anchor such authority
    5. All of Voltaire’s public campaigns, in fact, deployed empirical fact as the ultimate solvent for irrational prejudice and blind adherence to preexisting understandings
    6. the most important project was defending empirical science as an alternative to traditional natural philosophy
    7. made him in some respects the leading philosophical advocate and ideologist for the new empirico-scientific conception of philosophy that Newton initiated.
    8. Both Hume and Voltaire began with the same skepticism about rationalist philosophy, and each embraced the Newtonian criterion that made empirical fact the only guarantor of truth in philosophy.
    9. to become a leading evangelist for this new Newtonian epistemology, and by consequence a major reason for its widespread dissemination and acceptance in France and throughout Europe
    10. the currents of Newtonianism
    11. the power and value of careful empirical science.
    12. in a hedonistic calculus of maximizing pleasure and minimizing pain.
    13. his hedonistic morality
    14. the free and public use of critical reason, and from the liberty that allows such critical debate to proceed untrammeled
    15. makes him an unquestioned forerunner of modern civil libertarianism.
    16. Voltaire to this dictum is the fact that even while he did not write these precise words, they do capture, however imprecisely, the spirit of his philosophy of liberty.
    17. “I disagree with what you say, but I will defend to the death your right to say it.”
    18. But since many were incapable of such self-knowledge and self-control, religion, he claimed, was a necessary guarantor of social order.
    19. For Voltaire, humans are not deterministic machines of matter and motion, and free will thus exists. But humans are also natural beings governed by inexorable natural laws, and his ethics anchored right action in a self that possessed the natural light of reason immanently
    20. Central to this complex is Voltaire’s conception of liberty.
    21. a singular role
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The prehistory of the Internet

      Ian Peter's pre-history of the Internet

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Special attention will be paid to knowledge networks, economic and material means, productions (scriptural, artistic or other) and vectors of influence
    2. This conference wants to contribute to a transnational and decompartmentalized history of these circulations.

      Idea for Jovan's book

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. This text sent by ||sorina|| discusses the way how machines can simulate common sense.

      It is rather realistic because it starts with assumption that AI cannot replace human consciousness, but it can 'simulate' it by observing and measuring.

      It is based on 'heuristic', philosophical concept, that deals with the way how we make decisions.

      Practically speaking, AI is learning from experience by human evaluation of AI decisions and 're-inforced' learning. In that sense, what we do with the text is methodologically similar: we ask AI to provide us with drafts and we react to it based on our intelligence and knowledge.

      ||Jovan||

    2. but with the development of benchmarking tools like AGENT, we’ll be able to measure how close we’re getting.

      It is a good point. We may not simulate human counsciousness but we can observe it.

    3. ‘cost-reward trade-offs’, which means an understanding of how humans take actions “based on utility, trading off the rewards of its goal against the costs of reaching it.”

      What motivates human actions?

    4. A model must then judge how surprising the agent’s behaviors in the ‘test’ videos are, based on the actions it learned in the ‘familiarization’ videos. Using the AGENT benchmark, that model is then validated against large-scale human-rating trials, where humans rated the ‘surprising’ ‘test’ videos as more surprising than the ‘expected’ test videos.

      AGENT works on reinforced learning as well.

    5. Researchers from IBM, MIT, and Harvard have created just that: AGENT, which stands for Action-Goal-Efficiency-coNstraint-uTility.

      We should follow AGENT development. It is also interesting for diplomacy since diplomat is AGENT.

    6. a “naive sense of physics” — this means that we know certain things about physics without having to work through physics equations, like why you shouldn’t put a bowling ball on a slanted surface.

      It is an important part of 'common sense'

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The Europol Innovation Lab has published its second report under its Observatory function, ‘Policing in the metaverse: what law enforcement needs to know’. The reports are intended to aid in the understanding, adaptation, and planning of law enforcement agencies for policing in the metaverse.

      Based on in-depth consultations with law enforcement experts, industry and academia, the report provides a detailed overview of the potential for criminal activities within the metaverse, recommendations for tackling crime (within the metaverse) alongside the opportunities and best practices for building a police presence online.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Zscaler

      Internet connectivity was on 19 October impacted after a major cable cut in the south of France, affecting subsea cable connectivity to Europe, Asia, the United States and potentially other parts of the world. As a result, customers may see packet loss or latency for websites and applications which cross these impacted routes. Cloud security company Zscaler reports that they made routing adjustments to reduce the impact.

      According to Zscaler, three French links - from Marseille-Lyon, Marseille-Milano, and Marseille-Barcelona- were cut.

      While the repair crews reached the spots quickly, they had to wait for the police to collect evidence. As of now, the issue has been resolved, and all internet connectivity should resume usually.

      Coincidently, the undersea cable that connects the Shetland Islands to the Scottish mainland has reportedly also suffered damage, according to the BBC. Since cables between the Faroe Islands and Shetland were also recently damaged, this is the second incidence involving marine cables in that area in a short period.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Ransomware is Being Used As a Precursor to Physical War: Ivanti

      TITLE: Ivanti’s Ransomware Index Report Q2–Q3 2022: Ransomware leads to physical war

      CONTENT: Since 2019, ransomware has expanded by 466%, and it is increasingly being utilized as a precursor to actual combat.

      The findings came from Ivanti's Ransomware Index Report Q2-Q3 2022, which the company released earlier today to Infosecurity.

      The data also suggests that ransomware groups are becoming more sophisticated and widespread, with 35 vulnerabilities becoming related with ransomware in the first three quarters of 2022 and 159 trending active exploits. Based on the report, 47.4% of ransomware vulnerabilities threaten healthcare systems, 31.6% damage energy systems, and 21.1% affect key manufacturing.

      The Ivanti research claims that hostile nations are increasingly using state-sponsored threat groups to infiltrate, destabilize, and disrupt operations in their target countries. As shown in the recent Russia-Ukraine war, ransomware is being utilized as a precursor to physical warfare in many of these operations.

      Ivanti executive also noted that IT and security teams need to work on employing automation technology that can not only correlate data from disparate sources, but also quantify risk, provide early warning of weaponization, predict assaults, and prioritize remedial actions.

      TOPIC: Cyberconflict and warfare, Cybercrime, Critical infrastructure

      DATE: 20.10.

      LINK: https://www.infosecurity-magazine.com/news/ransomware-precursor-to-physical/

      EXCERPT: Ivanti's Ransomware Index Report Q2-Q3 2022 states that ransomware is being utilized as a precursor to physical warfare. The report shows percentage of ransomware expansion since 2019, as well as ransomware vulnerabilities that threaten some of the most critical infrastructure. It is suggested that IT and security teams work on quantifying risk, providing early warning of weaponization, predicting assaults, and prioritizing remedial actions.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Interpol unveiled the first-ever 'metaverse' designed for law enforcement worldwide at its ongoing 90th General Assembly in Delhi. The metaverse platform is envisioned to aid police forces worldwide to interact with other officers and even take 'immersive training courses in forensic investigation and other policing capabilities'. Likewise, the platform allows users to visit virtual Interpol headquarters in Lyon, France.

      'The metaverse has the potential to transform every aspect of our daily lives with enormous implications for law enforcement,' Madan Oberoi, Interpol's Executive Director of Technology and Innovation, said in a statement.

      'But in order for police to understand the metaverse, we need to experience it'., added Oberoi

      In addition, Interpol announced the formation of a metaverse expert group to voice law enforcement's concerns worldwide and guaranteed that the new virtual world was safe by design.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. “People living in New Zealand have a right to understand what the government is asking them to do, and what their rights are, what they’re entitled to from government
    2. Officials will need to communicate clearly with the public as part of a bid to improve accessibility for all parts of society

      ||VladaR||, ||JovanK||

    3. New Zealand has bid its farewell to grandiloquent memos and sesquipedalian documents, passing a new law to banish jargon and complex language from its bureaucracy.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The 5×5—The future of cyber diplomacy

      Cyber Diplomacy document by the Atlantic Council

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Ajman Police General Command said its metaverse project is the first such police service in the UAE and the development makes it the first government body in the emirate of Ajman to take the digital leap.

      The Ajman Police in Dubai has become the first law enforcement organization in the world to provide metaverse services. The Ajman Police stated that its metaverse initiative is the first of its kind for the United Arab Emirates and marks the Ajman government's entry into the metaverse.

      According to the Police force, citizens will be able to interact with police officials in the metaverse by wearing Virtual Reality (VR) headsets, smartphones, tablets, laptops or desktop computers.

      Lieutenant Colonel Mohammed bin Abdullah Abu Shehab, head of the Services Development Team, stated, 'the project came within Ajman Police's efforts to strengthen cooperation with its customers and involve them in the design and development of services. Metaverse comes within the framework of facilitating the meeting between customers through VR, which brings them together with police officers without the need for a personal presence at the police station.'

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Russia's ministry of industry and trade recommended that industrial enterprises stop using Zoom, Skype, and WhatsApp for official purposes and choose Russian systems as an alternative.

      As Kommersant reports, the ministry explained its decision 'as the requirement to comply with the government's requirements and strengthen information security measures.'

      Another high-ranking Russian official had made a similar request. A 'full ban on WhatsApp use for official purposes by the Russian state and municipal employees' employees' was demanded by Anton Gorelkin, deputy chairman of the information policy committee of the Russian parliament.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. “There could be — in time, if it grows — financial stability problems. There also are investor issues around a lack of certainty.”

      The head of the EU's financial services has called US lawmakers to create new regulations to control the cryptocurrency market, stressing that if digital assets remain unregulated, it might threaten financial stability.

      Mairead McGuinness, the European Commission's financial services commissioner, told the Financial Times in a recent interview that they need to look at global regulation of cryptocurrencies.

      'We do need to see other players also legislating … perhaps differently, but with the same objective. … We need to look at the global regulation of crypto. There would be a lot of concern at a European level as to [what would happen] if crypto were not to be regulated.' warning digital assets could pose a threat to financial stability if left to grow unregulated. Stated McGuinness

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. European Commission president Ursula von der Leyen has published her ‘2022 State of the Union Letter of Intent’, underpinning the Metaverse as an important digital opportunity and trend while also setting out plans for potential regulations of the Metaverse.

      The president acknowledges that Europe must adapt to the digital age and added that the EU ‘will continue looking at new digital opportunities and trends, such as the metaverse’. However, the letter provides little specifics on EU actions.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The United Kingdom's Competition and Markets Authority (CMA) rejected Meta's (formerly known as Facebook) appeal and ordered the company to sell the animated-images platform Giphy. CMA's decision cited that taking over Giphy was harmful to the competition.

      The decision came after CMA found that Meta's purchase of Giphy could allow Meta to limit other social media platforms' access to GIFs, making those sites less attractive to users and less competitive. CMA also ruled that such a deal removed Giphy' as a potential challenger in the UK display advertising market, preventing UK businesses from benefiting from innovation in this market.'

      Previously, in November, the CMA ordered Meta to sell Giphy after finding it would raise competition concerns. Meta tried to appeal the decision. However, in June, a court ruled against the company's appeal, promoting the final decision to the CMA.

      The final decision by CMA ruled the deal would enable Meta to further increase its market power.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The US International Trade Commission (USITC) revealed it would open investigations into divisions of Taiwan Semiconductor Manufacturing Company (TSMC), Samsung Electronics and Qualcomm on allegations of patent infringement. USITC stated that it would look into allegations made by the complainant that parts and mobile devices imported into the US violated its semiconductors and integrated circuits patents.

      According to the USITC's investigation, the patent infringement claims cover chips manufactured by Samsung using its 14nm and smaller process nodes and by TSMC using its 16nm and smaller process nodes. The investigation will also include the aforementioned processors as well as mobile devices like smartphones, tablets, and smartwatches. In contrast, Qualcomm has been named in a separate patent infringement filed by the same company.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. However, the organization came under fire after Russia launched its war in Ukraine over the connection of one of its members to the Kremlin.

      German cybersecurity chief Arne Schönbohm was fired over alleged ties with Russian security services. According to media reports, German Interior Minister Nancy Faeser sacked the head of the Federal Office for Information Security (BSI) due to recent media reports of his ties with Russia and due to the damaged public trust in Schönbohm's leadership.

      According to reports in German media, Schönbohm was tied to Russia through his role in the Cyber Security Council of Germany. In 2012, Schönbohm co-founded the organization, which advises the private and public sectors on cybersecurity issues. However, the organization came under fire over the connection of one of its members to the Kremlin.

      The layoff was initially reported by the German news publication Spiegel, and was later confirmed by a representative for the Interior Ministry.

      'The background to this is not least the allegations, which are well known and widely discussed in the media, and which have permanently damaged the necessary public confidence in the neutrality and impartiality of the conduct of his office as president of Germany's most important cybersecurity authority,' the spokesperson said.

      The departure of Schoenbohm will be followed by an investigation from Germany's Interior Ministry over the allegations in question.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. ||dusandATdiplomacy.edu|| Ovo je gruap organizacija koje odlicnom poznajem. Oni prave kontekst za SSO projekat. Upozoravaju na centralizovani digital ID.

    2. It is far from being proven that most digital identity programmes have brought additional benefits to users, without placing them at risk.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Hackers compromised Hong Kong govt org's network for a year

      TITLE: Hong Kong’s government org’s network compromised by hackers for a year

      CONTENT: Cyberattacks on government institutions in Hong Kong by the China-linked espionage actor APT41 (also known as Winnti), which compromised them, went unnoticed for up to a year in certain cases, have been discovered by Symantec researchers.

      The threat actor has been employing a piece of customized malware known as Spyder Loader that has previously been linked to the organization.

      The newly detected Hong Kong activity appears to be a component of the same operation, according to Symantec's research, and the targets of Winnti are local governments in the special administrative area.

      Although Symantec was unable to recover the full malware, it appears that the objective of APT41's most recent effort was to gather intelligence from significant Hong Kong institutions.

      EXCERPT: Symantec has discovered a year long China-linked cyberattacks, coming from espionage actor known as Winnti. They have been compromising government institutions in Hong Kong. The full malware was not yet found, but their most recent object is local governments special administrative area.

      LINK: https://www.bleepingcomputer.com/news/security/hackers-compromised-hong-kong-govt-orgs-network-for-a-year/

      DATE: 18.10.

      TOPIC: Cybercrime, Cyberconflict and warfare

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Shanghai Action Plan for Cultivating "Metaverse"

      A policy paper released by the Shanghai city government on 8 July 2022 outlined its developmental plan to cultivate a metaverse industry worth 350 billion yuan ($52 billion) by the end of 2025.

      The development action plan refers to the Metaverse as a new generation of information technology integration and innovation that would drive the growth of the internet toward Web3. The innovation plan focuses on promoting the development of Metaverse-related industries and helping Beijing build a benchmark city for the digital economy.

      The action plan aims at 'strengthening cutting-edge technological breakthroughs,' focusing on virtual reality headsets, chips, cloud computing and 5G technology.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Pro-Russia Hackers DDoS Bulgarian Government

      TITLE: Bulgarian government attacked with DDoS by pro-Russian hackers

      CONTENT: Over the weekend, the Bulgarian government was subject to a wave of DDoS attacks, with Russia being the main suspect, according to sources.

      According to various local reports, traffic flooded the websites of the Bulgarian President, the National Revenue Agency, and the departments of internal affairs, defense, and justice.

      The campaign on October 15 also targeted telecom businesses, airports, banks, and a few media outlets, Sofia Globe reported.

      The suspects were recognized as being from the Russian city of Magnitogorsk by the authorities, according to Borislav Sarafov, the director of Bulgaria's National Investigation Service.

      However, according to some reports, the notorious Russian cybercrime group Killnet had already taken responsibility for the said DDoS attack.

      LINK: https://www.infosecurity-magazine.com/news/prorussia-hackers-ddos-bulgarian/

      DATE: 18.10.

      TOPIC: Cyberconflict and warfare, cybercrime

      EXCERPT: The Bulgarian government was subject to a wave of DDoS attacks, with Russia being the main suspect. Traffic flooded the websites of the Bulgarian President, National Revenue Agency, and departments of internal affairs, defense, and justice. Some reports claim Russian cybercrime group Killnet had already taken responsibility for the attack.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The European Parliamentary Research Service ('EPRS') published, on 24 June 2022, its briefing, titled 'Metaverse: Opportunities, Risks and Policy Implications'. While the metaverse's exact scope and impact on society are still unknown, it can already be seen that it will open up a range of opportunities and risks in a variety of policy areas.

      The briefing, in particular, summarizes studies on the possible effects of metaverse platforms on several policy concerns, including competition, data protection, liability, financial transactions, cybersecurity, health, and accessibility and inclusiveness.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. 1 million roubles ($16,150)

      A Moscow court on Tuesday fined US giant Amazon.com Inc a total of 41 million roubles ($16,150), Interfax reported.

      Interfax said the court ruled that Amazon had failed to delete material that 'propagandises suicide', which is illegal under Russian law.

      It is the first such fine imposed on Amazon, although other US-based giants have come under pressure in Russia in recent months, with Meta being labelled as an 'extremist' organization and Google and Apple receiving fines.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Horizon Worlds, Meta’s flagship metaverse for consumers, is failing to meet internal performance expectations, according to The Wall Street Journal, which reviewed internal company documents.

      Horizon Worlds, Meta’s flagship metaverse platform, is failing to meet internal performance expectations, The Wall Street Journal reported, which reviewed internal company documents. The Journal said the records showed the user base had been progressively falling since the spring, and many Horizon users have left after the first month on the platform.

      Meta had set a target of 500,000 monthly active users but recently reduced it to 280,000; at this time, there are fewer than 200,000.

      Horizon’s services include several interactive virtual spaces or worlds letting users socialize, play and have fun. Internal statistics have shown that only 9% of developed worlds have more than 50 visitors, while many are never visited.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Australian police secret agents exposed in Colombian data leak

      TITLE: Colombian data leak exposes personal information of Australian Federal Police

      CONTENT: Following the release of data taken from the Colombian government by hackers, the identities of covert agents for the Australian Federal Police (AFP) have been made public.

      More than five terabytes of sensitive information, including emails, documents, and strategies AFP agents were employing to prevent drug cartels from conducting business in Australia, were leaked by the hacktivist collective Guacamaya.

      Details exposed this way come from 35 AFP operations, some of them still active, and also contain surveillance reports from agents, phone tap recordings, and salary data for Colombian personnel.

      LINK: https://www.bleepingcomputer.com/news/security/australian-police-secret-agents-exposed-in-colombian-data-leak/

      DATE: 14.10.

      TOPIC: Cyberconflict and warfare, Cybercrime

      EXCERPT: The identities of covert agents for the Australian Federal Police (AFP) have been made public. This follows the release of data taken from the Colombian government by hackers. More than five terabytes of sensitive information were leaked by the hacktivist collective Guacamaya.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The Microsoft Threat Intelligence Center (MSTIC) reports that it has tracked new ransomware dubbed Prestige that is being used to target transportation and logistics organizations in Ukraine and Poland. The latest ransomware campaign has not been attributed to any known threat actor.

      However, MSTIC added that 'the activity shares victimology with recent Russian state-aligned activity, specifically on affected geographies and countries, and overlaps with previous victims of the FoxBlade malware (also known as HermeticWiper)'.

      According to MSTIC, deployment of Prestige ransomware has not been previously recorded, and its activity was not connected to any of the 94 currently active ransomware activity groups that Microsoft tracks.

      The method of initial access remains unknown, with Microsoft noting that the threat actor had already obtained privileged access to the compromised environment to deploy the ransomware using three different methods.

      Microsoft reported observing three different methods for deploying the ransomware. Two involved attackers uploaded the payload to an admin-shared folder and then activated it on network systems using remote code tools to trigger them on victim systems. A third involved the payload being added to the Active Directory Domain Controller and deployed across networks.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Education Sector Experienced 44% Increase in Cyber-Attacks Over Last Year

      TITLE: Education sector recorded a 44% increase in cyberattacks since last year

      CONTENT: According to Check Point's 2022 Mid-Year Report, the education sector saw a 44% increase in cyberattacks from 2021 to 2022, with an average of 2297 attacks against organizations every week.

      The research illustrates that a factor in the attraction is the enormous amount of personal information that threat actors can amass by picking on businesses in this industry.

      According to the monthly threat index produced by the research team, the education sector will be most negatively affected in 2022. It is obvious that cybercriminals are finding success with these operations, and schools and colleges should be planning for a rise in the frequency of these attacks.

      In contrast to most businesses, which only have employees, academic institutions also have students. This makes the sector's networks much larger, more accessible, and harder to secure.

      TOPIC: Cyberconflict and warfare, Cybercrime, Cybersecurity

      LINK: https://www.infosecurity-magazine.com/news/education-experienced-44-increase/

      DATE: 14.10.

      EXCERPT: The education sector saw a 44% increase in cyberattacks from 2021 to 2022, with an average of 2297 attacks against organizations every week. Cybercriminals are finding success with these operations, and schools and colleges should be planning for a rise in the frequency of these attacks.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Microsoft says Ukraine, Poland targetted with novel ransomware attack

      TITLE: Microsoft discovers new novel ransomware attack on Ukraine and Poland

      CONTENT: According to a blog post by Microsoft on Friday, a recently identified hacker group has used a novel kind of ransomware to assault logistics and transportation firms in Poland and Ukraine.

      In less than an hour on Tuesday, the attackers targeted a variety of computers, according to Microsoft, which added that it had not yet been able to connect the attacks to any known group.

      Researchers discovered that the cyberattacks, however, closely resembled past assaults by a cyber team connected to the Russian government that had affected Ukrainian government services.

      LINK: https://www.reuters.com/technology/microsoft-says-ukraine-poland-targetted-with-novel-ransomware-attack-2022-10-14/

      TOPIC: Cyberconflict and warfare, Cybercrime

      EXCERPT: A hacker group has used a novel kind of ransomware to attack logistics and transportation firms in Poland and Ukraine. In less than an hour on Tuesday, the attackers targeted a variety of computers. Microsoft has not yet been able to connect the attacks to any known group.

      DATE: 15.10.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Veći deo trgovine među njima tada bi se obavljao u domaćim valutama. Ali da bi se poravnale one neizbežne razlike (viškovi i manjkovi u platnom bilansu), Centralna banka će stvoriti zajedničku valutu.
    2. Ono što je Rusiji zaista neophodno jesu kritični industrijski proizvodi poput kompjuterskih čipova. A njih bi mogla da traži da ih uveze iz Kine, da a ih plaća juanima koje je Rusija već obezbedila.”
    3. Duh reformi usmerenih na obuzdavanje ‘slobodnog tržišta’ počeo je da se širi među studentima još pre deset godina, a ti isti su sada već počeli svoj uspon po lestvicama partijske hijerarhije.”
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Identity is today the real battlefield. Identity is coming back as a powerful matter. Remember what someone said, “it is the economy, stupid”? Now, “it is the identity, stupid”.

      ||dusandATdiplomacy.edu|| Ovde se 'identity' koristi u sirem znacenju, ali ce to postati veliko politicko i ekonomsko pitanje. Borrell u ovom govoru kaze 'It is the indetity, stupid'.

    2. The beauty of the European experience is “you and me”, overcoming the heritage of the past and offering to the world the recipe for peaceful coexistence, cooperation, integration and development.  
    3. “it is the identity, stupid”
    4. do not have anymore on their mind their country – well, they will always have their country on their mind.
    5. Nothing similar in scope and content is available today in Europe, I am sure.
    6. The big difference between us and an important part of the rest of the world is that we have institutions.
    7. It is very difficult to build institutions.
    8. the rest of the world

      It is too generic statement. There are many other countries with good institutions.

    9. “People [matter], institutions [matter] much more”. People go by, institutions remain.
    10. working on institution-building
    11. They have to work in a different way because today everybody is a Minister of Foreign Affairs, because the foreign is internal and the internal is external. There is no longer a clear boundary. Who takes care of the internal dimension and who takes care of the external dimension? “You are in charge of the external dimension” - yes, but there is not a clear border between one thing and the other.  
    12. You are very close to Brussels.

      This is a problem. European Academy should have some distance from Brussels in order to understand the rest of the world. Understanding EU machinery is not enough.

    13. it will become a period of instability and we will have to build a new security order.
    14. And any nuclear attack against Ukraine will create an answer, not a nuclear answer but such a powerful answer from the military side that the Russian Army will be annihilated, and Putin should not be bluffing.
    15. I know that diplomacy is about values, and also about interest.
    16. When more or less 20% of the world community decided not to support or not to reject the Russian annexation – for me, it is too many. It is too many.
    17. Thank you also to the Florence Institute, the Maastricht Institute for conducting the feasibility study which will [pave] the way in order to make this pilot project a permanent reality.
    18. It is not the same thing to be a national diplomat and a European Union’s diplomat
    19. Thanks to the strong support of the European Parliament that has been very much instrumental in ensuring the funding to create this pilot project, we finally see a certain number of European young people - young diplomats - that want to become fully-fledged European diplomats. 
    20. we are certainly living also a “moment of creation” of a new world.
    21. But if we want to engage frankly and honestly, to discuss about the real problems and looking for solutions, then you have to tell all the truth – but we will do it later. 
    22. political freedom, economic prosperity, social cohesion
    23. The gardeners have to go to the jungle.
    24. Most of the rest of the world is a jungle, and the jungle could invade the garden.
    25. Europe is a garden.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Solving sovereignty for security and data control is well under way.
    2. hybrid cloud approaches are becoming more popular so that organisations can leverage the potential of large providers while retaining their most sensitive processes under their own control or the control of local providers. 

      ||Jovan||

    3. including around the relevant regulatory authority

      compliance power of Google.

    4. homogenisation

      what is 'homogenisation'?

    5. to lessen the risks of dependence on foreign technology,

      In the digital realm, it is mainly the US technology (social platform, semi-conductors, data farms, etc.).

    6. policy changes and leverage digital sovereignty

      Does the Economist accept digital sovereignty as 'given'?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. to establish the network of people who have both mastery of science and diplomacy
    2. The ripple effects of all this bifurcation goes beyond just science and technology. It risks the decoupling of global systems that have been the enablers of peace and stability for the last seventy-five years
    3. we are now in danger of perhaps a technological bifurcation due to geopolitical conflic
    4. are our current regimes for intellectual property protection and dissemination fit for purpose
    5. This involves governments playing a role not simply the regulator and a producer of rules but being a proactive enabler, providing the necessary frameworks and infrastructure for progress and excellence, and to translate this research into useful, and if I may add, ethical applications for commercialisation.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. leaps in chip technology are often boosted by government research grants.
    2. CHIPS Act,

      What do we know about this act?

      ||sorina||||VladaR||

    3. Only TSMC and Samsung, a South Korean tech giant, know how to make the world’s most advanced chips.
    4. Its success reshaped the industry, allowing fab-less design companies to flourish, without the financial burden of building pricey new factories every few years. Today tsmc is the biggest chipmaker in the world by market value.
    5. only outfits that manufactured huge amounts of chips would be cost-competitive. With lavish support from Taiwan’s government, TSMC was born.
    6. put into practice a long-held idea for a firm that made chips designed by customers
    7. First, the Soviet Union tried and failed to replicate Silicon Valley.

      It will be interesting to learn about this attempt. It was probably one of the reasons for the failure of the Soviet Union.

    8. In “Chip War”, his elegant new book, Chris Miller of Tufts University shows how economic, geopolitical and technological forces shaped this essential industry.

      to check this book.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Africa group of OECD and African Ambassadors could provide strategic insights.
    2. ncluding members of the Governing Board of the Development Centre
    3. over the next six months,the Secretariat will conduct extensive consultations in order to narrow down the scope and define the main pillars of the partnership.
    4. urther inclusion in OECD databases
    5. withOECD standardswhere possible
    6. Policy Reviews
    7. Knowledge sharing, peer-learning and high-level policy dialogues
    8. rely onevidence-based policy analysis and policy dialogue
    9. to strengtheningthecoherence of policy frameworks
    10. on an equal footing in global policy-making and standard-setting can enhance the international community’s response to global challengesand help further level the global playing field.
    11. in some instances–global standard-setting
    12. for greater recognition of Africa in global governance and for the development of a co-designed, mutually beneficial partnership.1

      ||sorina|| Maybe to quote it somewhere?

    13. with a platform for policy dialogue through which African partners can provide their perspectives on standards
    14. strengthenAfrican policymakers’voices

      ||sorina|| OECD wants also to 'strenghten African policy makers voices' (but not in digital field).

    15. to build an impactfulpartnershipbased ontrust,mutual understanding and enhancedco-operation on an equal footing,to addressmutually agreed priorities.
    16. Africa’s priorities are guided by Agenda 2063, a wide-ranging long-term vision for the continent.
    17. the Africa Infrastructure Index scores improved for almost all African countries between 2018 and 2020.

      to introduce this index into our statistics.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. It is a time to unite behind a new grand narrative for Europe and to build a vibrant organisation.
    2. a vibrant, influential and inclusive community
    3. there is a community that gets motivated by it and an organisation that ensures its implementation
    4. this new narrative cannot be about reaching a compromise that only disguises a common lowest denominator. It must be about making bold choices.
    5. there are anchoring points to build on.
    6. it is difficult to predict how things will unfold
    7. a unique opportunity to write history, to try to serve a greater purpose, and to make a difference.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. 2Open Loop is a global program that connects policymakers and technology companies to help develop effective and evidence-based policies around AI and other emerging technologies.

      Open Loop project of Meta/Facebook on linking policymakers and technology companies.

      ||sorina||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. 2022 Annual Report on Implementation

      This is the most serious analyusis of the US cybersecurity. It provides useful summary of international activities in the field of cybersecurity.

      ||VladaR||||AndrijanaG||||sorina||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Against this backdrop, Mr. Selassie pointed to four priorities for policy makers in the region:

      nice sentence for linking to thoughts

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: NATO establishes review board to govern responsible use of AI

      CONTENT: NATO has established a Review Board to govern the responsible development and use of artificial intelligence (AI) and data across the organisation. The decision was taken at the meeting of NATO Ministers of Defence which took place in Brussels on 12–13 October 2022. The Data and Artificial Intelligence Review Board (DARB) will work on developing a user-friendly responsible AI certification standard to help align new AI and data projects with NATO's Principles of Responsible Use. The board is also expected to act as a platform allowing the exchange of views and best practices to help create quality controls, mitigate risks, and adopt trustworthy and interoperable AI systems. NATO member states will designate one national nominee to serve on the DARB. Nominees could come from governmental entities, academia, the private sector, or civil society.

      TECHNOLOGY: AI

      DATE: 13 October 2022

    2. platform to exchange best practices, guide innovators and operational end-users throughout the development phase, thereby contributing to building trust within the innovation community
    3. develop a user-friendly Responsible AI certification standard, including quality controls and risk mitigation, that will help align new AI and data projects with NATO’s Principles of Responsible Use approved in October 2021
    4. establish a Review Board to govern the responsible development and use of Artificial Intelligence (AI)
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Turkey: new ‘disinformation’ law could jail journalists for three years

      TITLE: Turkey’s new disinformation law imposes threats to domestic journalism and social media

      CONTENT: A comprehensive new rule that could result in up to three years in prison for people suspected of disinformation spreading has been approved by the Turkish parliament.

      Wide-ranging clauses of the contentious bill, put out by the government's Justice and Development party (AKP), are designed to control domestic journalism as well as social media.

      The bill provides a framework for extensive censorship of online information and the criminalization of journalism, which will enable the government to further subdue and control public debate in the run-up to Turkey's general elections in 2023, according to a coalition of 22 press freedom organizations.

      Additionally, the new law mandates that messaging services like WhatsApp, which is also owned by Meta, submit user information to the government upon request from the nation's Information and Communication Technologies Authority.

      EXCERPT: Turkey's parliament has approved a bill that could result in up to three years in prison for people suspected of spreading disinformation online. The bill, put out by the government's Justice and Development party (AKP), is designed to control domestic journalism as well as social media.

      LINK: https://www.theguardian.com/world/2022/oct/13/turkey-new-disinformation-law-could-jail-journalists-for-3-years

      DATE: 13.10.

      TOPIC: Freedom of the press, Freedom of expression, Content policy

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Report Shows How China Has Been Using Cyberattacks Over the Past Decade

      TITLE: Report documents China's use of cyberattacks over the past ten years

      CONTENT: According to a report released on October 12, by consultancy firm Booz Allen Hamilton, Chinese state-sponsored cyberattacks pose a growing threat to US national security.

      ‘Same Cloak, More Dagger: Decoding How the People's Republic of China (PRC) Uses Cyber Attacks’ is a report aimed at CISOs of American companies and their allies, as well as threat analysts. It provides a thorough examination of more than 13 case studies of Chinese-sponsored cyberattacks over the last decade.

      According to their results, China is creating and using cyberattack capabilities to further its 'core interests' at home. These cyberattacks are a supplement to China's more well-known and varied efforts to use legal, financial, cultural, political, and technical tools to further its objectives online.

      Booz Allen did clarify that the report's main source of research was open-source. It is likely impossible to properly determine the exact extent of China's cyberattack capabilities from open sources. It's probable that China decided not to use all of its resources or that it did so secretly, based on the study.

      LINK: https://www.infosecurity-magazine.com/news/report-china-cyberattacks-past/

      DATE: 14.10.

      TOPIC: Cyberconflict and warfare

      EXCERPT: 'Same Cloak, More Dagger: Decoding How the People's Republic of China Uses Cyber Attacks' is a report aimed at CISOs of American companies and their allies. It provides a thorough examination of more than 13 case studies of Chinese-sponsored cyberattacks over the last decade. It is shown that Chinese state-sponsored cyberattacks pose a growing threat to US national security.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Kazakh outlet Orda, staff subjected to months of threats, online harassment, cyberattacks

      TITLE: Kazakh media outlet Orda’s staff suffer from months of cyberattacks and online harassment

      CONTENT: The Committee to Protect Journalists said on Wednesday that Kazakhstani authorities should fully examine recent threats against independent news website Orda and its head editor Gulnara Bazhkenova and safeguard the safety of the publication and its personnel.

      Following the publishing by the outlet of an investigation into suspected lobbying methods by a corporation apparently related to Kazakhstan's former president, Nursultan Nazarbayev, there have been several internet harassments and cyberattacks against Bazhkenova, her family, and Orda.

      While Orda has improved its cybersecurity, Bazhkenova claims that DDoS and other types of cyberattacks have been ongoing since July, with perpetrators constantly looking for ‘weak spots’ that cause the site to go offline for brief periods.

      In addition to the website cyberattacks, she claims that unidentified users have flooded Orda's Telegram chat with derogatory images and insults aimed at Bazhkenova and Orda staff. However, most recently, the online insults have been replaced by threats against her and her 7-year-old son. LINK: https://cpj.org/2022/10/kazakh-outlet-orda-staff-subjected-to-months-of-threats-online-harassme nt-cyberattacks/

      EXCERPT: Cyberattacks against independent news outlet Orda have been ongoing since July, with perpetrators constantly looking for 'weak spots' that cause the site to go offline for brief periods. The Committee to Protect Journalists said on Wednesday that Kazakhstani authorities should fully examine recent online threats.

      DATE: 12.10.2022.

      TOPIC: Freedom of the press, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Greece: At a meeting with RSF, the government commits to ban the use of spyware

      TITLE: Greek government promises ban on spyware of journalists at the meeting with RSF

      CONTENT: At their meeting on October 10th, the representative of RSF requested that the Deputy Minister to the Prime Minister and Government Spokesperson, Ioannis Oikonomou, initiate discussions for a complete reform of the legal safeguards against the arbitrary surveillance of journalists.

      The recent revelations of the intelligence agency's surveillance of reporters using spyware have increased the gap of mistrust between Greek journalists and the authorities, according to Pavol Szalai, head of RSF's European Union and Balkans desk. He further stated that the new legal framework the government promised must be both ambitious and properly consult with the main stakeholders: journalists.

      The government ‘will soon submit a bill to make the use of spyware illegal,’ according to Ioannis Oikonomou, who also reiterated that the Greek authorities did not acquire or use Predator, in response to Pavol Szalai's call for legislation on spywares.

      LINK: https://rsf.org/en/greece-meeting-rsf-government-commits-ban-use-spyware

      EXCERPT: Reporters Without Borders (RSF) has called for a complete reform of the legal safeguards against the arbitrary surveillance of journalists in Greece. The government 'will soon submit a bill to make the use of spyware illegal,' according to Ioannis Oikonomou, who also reiterated that the Greek authorities did not acquire or use Predator.

      TOPIC: Freedom of the press

      DATE: 12.10.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. criminal use

      cybercrime emphasised only, other issues not

    2. Security of and in the use of ICTs

      always interesting to observe the terminology. SCO for instance uses 'international information security' and 'threats in the information space, creating a safe, fair and open information space'

    3. contacts and exchanges

      this can be indications of what we can expect as CBMs to be developed (following good practices from the UN, OSCE, ASEAN on contact points, etc)

    4. on the basis

      interestingly, 'sovereignty' is not mentioned here, unlike in SCO. why?

    5. Sharing information, best practicesand raising awarenessin the field of security

      This is currently the only somewhat clear CBM (or two - sharing information, and raising awareness), but still underdeveloped

    6. dialogue on confidence-building

      Seems it's still in the early stage, as no specific measures exist yet. Worth following further as it develops (since members are also some states that are members of ASEAN, we can expect certain spill-over and ideas on CBMs from there possibly)

    7. reducing misunderstanding

      wording also used in UN and OSCE as a goal

    8. internationally agreed legal framework

      Hint to the work on a UN cybercrime convention

    9. Promoting open, secure, peacefuland cooperative ICT environment

      Reference to 'open'.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Chang created TSMC, which produces chips designed by its clients, as opposed to designing its own. The company now produces 92 per cent of the world’s most advanced semiconductors.
    2. after Congress passed legislation to provide $52bn to bolster domestic semiconductor production in the US.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Areas like artificial intelligence and quantum computing were particularly important, he told the audience.
    2. for a "grown-up" conversation about collaboration with China at UK universities.
    3. we understand that there is no free good here.
    4. for Chinese digital currencies
    5. New standards for the internet proposed by China
    6. the BeiDou satellite system - a rival to the established GPS network which he said had been built into exports to more than 120 countries.
    7. to create "client economies and governments" by exporting technology to countries around the world
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Otherwise, our model will perish, will not be able to survive in this world.  
    2. Our fight is to try to explain that democracy, freedom, political freedom is not something that can be exchanged by economic prosperity or social cohesion.
    3. hat are the links between political freedom and a better life.
    4. When we say that China is our rival, systemic rival, systemic rival means that our systems are in rivalry. And the Chinese are trying to explain to the world that their system is much better. Because, well, maybe you are not going to choose your head of government, but you will have food, and heat, and social services, you will improve your living conditions. Many people in the world, yes, they go and vote and choose their government, but their material conditions are not being improved. And in the end, people want to live a better life.  
    5. in this battle of narratives
    6. I need my delegations to step up on social media, on TV, in debates. Retweet our messages, our [European] External Action Service materials. Certainly, my blog, which is the everyday “consigna”. Tailor it to the local circumstances, use local languages. The first problem is that we speak English but a lot of people around the world do not speak English and do not understand if we address them in English. Do it in local languages. We still have a “reflex” of European culture: we speak our languages, and we expect the rest of the world to understand us. Many, many people around the world do not understand, not even Spanish.  
    7. We provide you with materials and I have the feeling that you do not transmit the message strongly enough.  
    8. And I am still surprised that, in some delegations, it seems that they do not take enough consideration of our communication, and they do not tweet and re-tweet the messages that we are delivering from the centre. You have to be a network that is repeating, transmitting, insisting. 

      Importance of social media.

    9. we are creating new dependencies in this link between energy, climate [and] technology.
    10. we cannot substitute one dependency by another.
    11. We have to try to think in the medium and long-term
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL