- Oct 2022
-
www.eeas.europa.eu www.eeas.europa.eu
-
between what we announce and what we implement,
-
Please, be prepared for better explanation of what we do with a time schedule.
Time component in diplomacy.
-
It does not mean anything one figure if you do not put a time dimension.
-
When we hesitate, we regret it.
-
Take more initiative. Be ready to be bold.
-
Behave as you would behave if you were an Embassy: send a telegram, a cable, a mail - quickly. Quickly, please, react.
-
I think that we have to be faster and to take risks. I need you to report fast, in real time on what is happening in your countries. I want to be informed by you, not by the press. Sometimes, I knew more of what was happening somewhere by reading the newspapers than reading your reports. Your reports come sometimes too late. Sometimes, I read something happening somewhere and I ask “what [does our Delegation [say]. For the time being, nothing. “For the time being, nothing” is not affordable. You have to be on 24-hours reaction capacity. Immediately - something happens, you inform. I do not want to continue reading in the newspapers about things that happened somewhere with our Delegation having said nothing.
What is the future of diplomatic reporting?
||Jovan||
-
It is no longer the economy, it is the identity.
-
We think that we know better what is in other people’s interests.
-
to overestimate the rational arguments.
-
more empathy
-
to listen more
-
we have the “Brussels effect” and we continue setting standards, but I believe that, more and more, the rest of the world is not ready to follow our exportation of model.
-
we try to export our model, but we do not think enough about how the others will perceive this exportation of models.
-
with Team Europe and the Global Gateway
-
we have to think more politically.
-
apart from that, there [are] the hybrid wars, there is the disinformation war that continues. I want to stress the importance of the war on information and disinformation – I will talk about it later.
-
the global system does not deliver,
-
These people do not want to be forced to take sides in this geopolitical competition.
-
the rising nationalism, revisionism plus identity politics.
-
Everything is a weapon: energy, investments, information, migration flows, data, etc. There is a global fight about access to some strategic domains: cyber, maritime, or outer space.
-
what the Mexican President said about us yesterday.
-
There is an authoritarian trend.
-
a fight between the democratic systems and the authoritarian systems.
-
We cannot say “we are the democracies”, and the ones which follow us are also democracies - that is not true. That is not true.
-
the US-China competition
-
a messy multipolarity.
-
the degree to which Russia is becoming a major factor in African theatres – yes, it is a surprise. We could not – we should [have] -, but we did not imagine how quickly, from the Central African Republic, now to Mali, and I do not know what is happening in Burkina Faso.
-
the reaction of the Central Banks raising interest rates in the United States. Everybody has to follow, because otherwise their currency will be devaluated.
-
the world food and energy crises
-
the deep US-China competition
-
So, we have a difficult cocktail – internal and external – and the old recipes do not work anymore. We have mounting security challenges and our internal cohesion is under threat.
-
You - the United States - take care of our security. You - China and Russia – provided the basis of our prosperity. This is a world that is no longer there.
-
we delegated our security to the United States
-
The best energy is the one that you produce at home.
-
the access to the big China market, for exports and imports, for technological transfers, for investments, for having cheap goods
-
on cheap energy coming from Russia
-
we have decoupled the sources of our prosperity from the sources of our security
-
uncertainty is the rule.
-
a world of radical uncertainty.
-
the new ‘frontiers of diplomacy’
-
-
unctad.org unctad.org
-
ECOWAS Programme on the Promotion of Digital Skills and Digital Entrepreneurship for Youth
ECOWAS - capacity development programme
-
The legal framework as provided by ECOWAS to regulate electronic transactions
ECOWAS legal framework for electronic transactions
- data protection
- electronic transactions
- cybercrime
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
Ukraine Enhances Cooperation With EU Cybersecurity Agencies
TITLE: Ukraine tightens collaboration with EU cybersecurity agencies
CONTENT: Recently, representatives from the European Union Agency for Cybersecurity (ENISA) and the State Service of Special Communications and Information Protection of Ukraine (SSSCIP) met to explore enhancing networking and collaboration.
The working meeting took place as part of the Cybersecurity East Project trip to the ENISA headquarters in Athens.
After the conference, Viktor Zhora, the deputy head of the SSSCIP, stated: ‘Cooperation with the European partners includes two key vectors for our country. On the one hand, Ukrainian experience in cyber-war, confronting cyber-threats from Russia would definitely be beneficial for other democracies.’
The SSSCIP claimed that the meeting was essential for European integration as well, with ENISA special partner status being a key step in that direction since the Ukrainian conflict has pushed the country even further toward its Western peers.
According to SSSCIP, achieving this accreditation is a crucial step in the process of aligning national cybersecurity laws with EU law.
DATE: 10.10.
TOPIC: Cybersecurity, Cyberconflict and warfare
EXCERPT: Ukraine and the European Union have met to discuss enhancing networking and collaboration. The meeting took place as part of the Cybersecurity East Project trip to the ENISA headquarters in Athens. SSSCIP claimed that the meeting was essential for European integration as well, with ENISA special partner status being a key step in that direction. This will also push the country's aligning of national cybersecurity laws with EU law.
LINK: https://www.infosecurity-magazine.com/news/ukraine-cooperation-with-eu/
-
-
study.diplomacy.edu study.diplomacy.edu
-
science diplomacy
I found this article very enriching because it made me reflect on the need of implementing scientific models to predict alternative outcomes in specific scenarios of world politics (such as international conflicts).
-
How can it effectively contribute to global goals and the common good
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
US airports' sites taken down in DDoS attacks by pro-Russian hackers
TITLE: US airports’ hit with DDoS by pro-Russian hackers
CONTENT: The websites of numerous major airports in the United States have allegedly been subjected to widespread distributed denial-of-service (DDoS) attacks, according to the pro-Russian hacktivist organization 'KillNet.'
Travelers are unable to login and receive information about their booked flights or make reservations for airport services because the servers hosting these sites are being overloaded by trash requests as a result of the DDoS attacks.
The Hartsfield-Jackson Atlanta International Airport (ATL), one of the nation's major air traffic hubs, and the Los Angeles International Airport (LAX), which is occasionally offline or very slow to reply, are notable examples of airport websites that are now inaccessible.
DATE: 10.10.
TOPIC: Cyberconflict and warfare, Cybercrime
EXCERPT: The websites of numerous major airports in the U.S. have allegedly been subjected to widespread distributed denial-of-service attacks caused by pro-Russian hackers. The Hartsfield-Jackson Atlanta International Airport (ATL), and the Los Angeles International Airport are notable examples of airport websites that are now inaccessible.
-
-
qz.com qz.com
-
seven nations onboard with a moratorium on destructive tests of anti-satellite weapons
To look into: Moratorium in destructive tests of anti-satellite weapons (now with 7 countries on board). ||sorina||
-
he FCC adopted new rules for defunct satellites.
To look into: FCC rules for defunct satellites. ||sorina||
-
Firefly gets to orbit. The company has put satellites on orbit with the first launch of its Alpha rocket.
Firefly - new player in the satellites sphere
-
ViaSat merges with Inmarsat
To cover: ViaSat and Inmarsat merging -> stronger competition in this space?
-
the first Russian astronaut to depart from the US since the days of the Space Shuttle
Still some RU-US cooperation in space.
-
when NASA announced that it would study the feasibility of a privately led and funded mission that would use a Dragon to boost the Hubble space telescope to a higher altitude, thus extending the operational life of the flagship observatory
NASA looking into possibly funding a private-led mission to use a SpaceX Dragon spacecraft to boots Hubble to a higher altitude (for an expanded operational life).
A new level of #PPP in space.
-
-
footprint.diplomacy.edu footprint.diplomacy.edu
-
Diplomatic Footprintof International Geneva
The Diplomatic Footprint of International Geneva displays the visibility of 236 Geneva-based actors (link) when one searches Google for 267 policy, governance and diplomatic topics (link).
The Diplomatic Footprint of International Geneva is calculated and evaluated based on Google searches routinely conducted in 53 cities around the world.
*From the analysis on the page, I deduced that some actors were not mentioned at all. I believe that for the purpose of transparency and research integrity, they should be shown as well (as in, if they have 0 mentions, that should be visible to viewers, too). That's why I believe that there should be a link of all the actors used for each analysis (same for tech footprints and global media houses).
-
Compare to the other actors:
How is the weighted score calculated?
-
Select the topic field of interest:
The legend of this graph is not clearly presented. For example, the it wasn't shown that the color bar at the right-hand side represents the points an actor receives. The bottom axis should be named "the number of mentions an actor receives" instead of "#mentions". What the size of the dots represents isn't clear either.
As the main metric used for this analysis is by the points, maybe the X axis could be marked by the points instead of the number of mentions? Vice versa, the colors could represent the number of mentions instead?
For the y axis: How is the average rank calculated? Is it points divided by number of mentions?
-
Select the search topic:
It might be clearer if the graph information (now embedded in the "i" button) could be directly shown somewhere on the page.
-
Digital Footprint
Where could this link be found on Diplo's website?
Also, in each Footprint, there are three ways to view the data: Ranking by topics, Ranking by actors, and Actor analysis. It might be better if on this homepage, there could be explanation texts about what each of these ways allows you to see (and why view from this way).
There should also be some explanatory texts on what the Digital Footprint is in general (an analysis based on of searchability of actors/link analysis).
-
Diplomatic Footprint of Global Media
Title: "of Global Media" should be put to the second line
The Diplomatic Footprint of Global Media displays the visibility of 45 media houses (link) when one searches Google for 267 policy, governance and diplomatic topics (link).
The Diplomatic Footprint of global media is calculated and evaluated based on Google searches routinely conducted in 53 cities around the world.
-
Tech Footprint of Global Media
Title: "of Global Media" should be put to the second line
The Tech Footprint of Global Media displays the visibility of 45 media houses (link) when one searches Google for 269 tech topics (link).
The Tech Footprint of Global Media is calculated and evaluated based on Google searches routinely conducted in 12 cities around the world.
-
Tech Footprintof International Geneva
The Tech Footprint of International Geneva displays the visibility of 204 Geneva-based actors (link) when one searches Google for 269 tech topics (link).
The Tech Footprint of International Geneva is calculated and evaluated based on Google searches routinely conducted in 12 cities around the world.
-
-
www.outlookindia.com www.outlookindia.com
-
How Cyberfeminism Is Helping Women Forge Solidarities In Conservative Societies
TITLE: Expansion of cyberfeminism in the Middle East and South Asia
CONTENT: Feminist activists in Iraq started a social media campaign in September last week to call for the Ministry of Education to issue a formal resolution that will forbid ‘the imposition of the veil as a condition for academic enrollment.’
The online campaign, which emphasized the value of women's personal freedom, provided another illustration of how cyberfeminism is taking a dynamic shape in the Middle East and South Asian countries through the hashtag #No_for_forced_veiling on Iraqi social media networks.
DATE: 09.10.
TOPIC: Gender rights online
EXCERPT: Feminist activists in Iraq started a social media campaign to call for the Ministry of Education to issue a formal resolution that will forbid 'the imposition of the veil as a condition for academic enrollment'. The online campaign, which emphasized the value of women's personal freedom, generated #No_for_forced_veiling on Iraqi social media networks.
-
-
www.reuters.com www.reuters.com
-
Germany's cybersecurity chief faces dismissal, reports say
TITLE: Germany's cybersecurity chief may be dismissed
CONTENT: Due to potential interactions with individuals associated with Russian security services, German Interior Minister Nancy Faeser wants to fire the nation's cybersecurity director, according to late-Sunday reports in German media that cited official sources.
According to numerous sites, Arne Schoenbohm, the head of the federal information security organization BSI, may have had these contacts through the German Cyber Security Council.
Schoenbohm founded the organization, which includes a German firm that is a subsidiary of a Russian cybersecurity firm founded by a former KGB employee.
EXCERPT: Germany's interior minister reportedly wants to fire the nation's cybersecurity director. Arne Schoenbohm may have had contacts with individuals associated with Russian security services. His organization, BSI, is a subsidiary of a Russian cybersecurity firm founded by a former KGB employee.
TOPIC: Cybersecurity
DATE: 10.10.
-
-
www.ccdcoe.org www.ccdcoe.org
-
Thus, Russia’s preference for the UN reflects its position that states and national governments are the primary actors in information security. Other stakeholders, including the private sector, civil society and academia, play a subordinate role. While their respective roles and responsibilities are recognised, governments are ultimately seen as leading national efforts
-
Coupled with Russia’s notion of information security, the emphasis on state sovereignty again evokes human rights concerns.
-
an understanding of states and their governments as the primary actors responsible for the protection of the ICT environment.7
-
Broadly speaking, the Russian understanding of information security goes beyond concerns regarding the security of information and communication technologies systems and also includesthe regulation of information or content flows.
-
Like-minded states have, in particular,highlighted concerns over potential limitations of the free flow of information or content through greater government control.
-
Rather than negating the applicability or adequacy of international law, a treaty is presented as a critical means to clarify how existing international law applies to cyberspace. This approach also highlights the possibility of identifying and codifying additional legal norms.
-
Ever since the beginning of UN discussions in 1998, Russia has, in particular,stressed the need to negotiate a formal international legal agreement in this area.
-
Russia initiated discussions in the Committee in 1998 with a draft resolution entitled ‘Developments in the field of information and telecommunications in the context of international security’.
-
Like-minded states mainly from the Global North advocate an open, free and secure cyberspace that preserves the free flow of information globally, while another group led by Russia and China strive to establish a governance regime that would enable greater government control of cyberspace
-
-
study.diplomacy.edu study.diplomacy.edu
-
as much as you know about your own
Could people with such knowledge also be people in the middle/organge circle on the layers of persuasion? I mean, people at an organization who don't have the decision power but who you could persuade as a first step to help you persuade the actual decision makers? I guess it could be useful to get such support from someone on the "inside" who know the system, and for instance specifics like "time constraints" which is mentioned below.
-
save face
I assume this is why Macron said it was important "not to humiliate Russia". It was quite a controversial statement, but in line with this thought to allow Russia to change their position and find a peaceful solution.
-
factual evidence
Following our latest election for the parliament in Sweden, we now have a Government who wants to reduce our foreign aid. The argument from their side is often very unspecific and not at all based on facts, on the contrary, it seems to be more focused on the emotional persuasion (arguments like us vs. them, and aid is not working anyways). Most who argue agianst this do it using factual evidence. But it seems very hard to counter emotions with facts? How do we handle that in a humanitarian diplomacy situation, let's say a negotiation?
-
-
www.justice.gov www.justice.gov
-
the Clarifying Lawful Overseas Use of Data (CLOUD) Act
-
-
www.bbc.com www.bbc.com
-
The Semiconductor Industry Association, which represents chipmakers, said it was studying the regulations. It urged the United States to implement the rules "in a targeted way" and called for collaboration internationally to "help level the playing field".
-
-
www.scmp.com www.scmp.com
-
“In which case,” she noted, “US firms will lose market share and China will find a bypass to the US restrictions, a worst-case scenario.”
-
“Preserving our edge in science and technology is not a domestic issue or national security issue. It’s both,” he said.
-
China’s National Computer Centre, the Beijing Institute of Technology and Beijing Sensetime Technology Development, a subsidiary of a major Chinese AI company.
-
allows Washington to extend its reach well beyond its borders, preventing companies globally from sending products to the China firms made with US software, machinery or technology.
-
it would impose restrictions on 31 Chinese companies, research institutions and related groups effective October 21
-
-
eurohpc-ju.europa.eu eurohpc-ju.europa.eu
-
TITLE: Six countries selected to host future European quantum computers
CONTENT: The European High Performance Computing Joint Undertaking (EuroHPC JC) had announced the the selection of six sites across the EU to host and operate the first EuroHPC quantum computers: Czechia, France, Germany, Italy, Poland, and Spain. The quantum computing systems to be developed within these sites are to be made available to European users (scientific communities, industry, the public sector, etc.) mainly for research and development purposes.
For background, the EuroHPC JU is a legal and funding entity launched in 2018 to enable the EU and countries participating in the EuroHPC to coordinate efforts and resources towards developing supercomputing facilities in the EU.
TECHNOLOGY: Emerging technologies
TREND: Quantum computing
Date: 4 October 2022
-
quantum computer infrastructure will support the development of a wide range of applications with industrial, scientific and societal relevance for Europe, adding new capabilities to the European supercomputer infrastructure.
-
available primarily for R&D purpose to a wide range of European users, no matter where in Europe they are located, to the scientific communities, as well as to industry and the public sector
-
-
www.whitehouse.gov www.whitehouse.gov
-
TITLE: US White House publishes Blueprint for an AI Bill or Rights
CONTENT: The US White House, through the Office of Science and Technology Policy, has issued a Blueprint for an AI Bill of Rights to guide the development, deployment, and use of automated systems. The blueprint outlines five key principles and is accompanied by a framework to help incorporate the protections into policy and practice.
The five principles are:
- Safe and effective systems: Users should be protected from unsafe and ineffective systems.
- Algorithmic discrimination protection: Users should not face discrimination by algorithms and systems should be used and designed in an equitable way.
- Data privacy. Users should be protected from abusive data practices via built-in protections and should have agency over how data about them is used.
- Notice and explanation: Users should know that an automated system is being used and understand how and why it contributes to outcomes that impact them.
- Human alternatives, consideration, and fallback: Users should be able to opt out, where appropriate, and have access to a person who can quickly consider and remedy problems they encounter.
Within the scope of the blueprint are automated systems that have the potential to meaningfully impact the public's rights, opportunities, or access to critical resources or services.
It is important to note that the blueprint does not have a regulatory character, and is meant to serve as a guide.
TOPICS: AI
TRENDS: AI governmental initiatives
DATE: 4 October
COUNTRY: USA
-
measures taken to realize the vision set forward in this framework should be proportionate with the extent and nature of the harm, or risk of harm, to people’s rights, opportunities, and access.
proportionality
-
blueprint to help protect the public from harm
-
a two-part test to determine what systems are in scope. This framework applies to (1) automated systems that (2) have the potential to meaningfully impact the American public’s rights, opportunities, or access to critical resources or services
applicability
-
where appropriate.
-
reasonable expectations
-
You should know how and why an outcome impacting you was determined by an automated system, including when the automated system is not the sole input determining the outcome
-
Continuous surveillance and monitoring should not be used in education, work, housing, or in other contexts where the use of such surveillance technologies is likely to limit rights, opportunities, or access
-
free from unchecked surveillance; surveillance technologies should be subject to heightened oversight that includes at least pre-deployment assessment of their potential harms and scope limits to protect privacy and civil libertie
-
appropriately and meaningfully given
-
seek your permission and respect your decisions regarding collection, use, access, transfer, and deletion of your data
-
pre-deployment and ongoing disparity testing and mitigation, and clear organizational oversight
-
ensuring accessibility for people with disabilities in design and development
-
roactive and continuous measures to protect individuals and communities from algorithmic discrimination and to use and design systems in an equitable way
-
pre-deployment testing, risk identification and mitigation, and ongoing monitoring
-
Independent evaluation and reporting
-
protected from inappropriate or irrelevant data use in the design, development, and deployment of automated systems, and from the compounded harm of its reuse
-
Automated systems should be developed with consultation from diverse communities, stakeholders, and domain experts to identify concerns, risks, and potential impacts of the system
Hoe feasible this actually is?
-
this framework is accompanied by From Principles to Practice—a handbook for anyone seeking to incorporate these protections into policy and practice, including detailed steps toward actualizing these principles in the technological design process
framework to help put principles into practice
-
five principles that should guide the design, use, and deployment of automated systems to protect the American public in the age of artificial intelligence. The Blueprint for an AI Bill of Rights is a guide for a society that protects all people from these threats—and uses technologies in ways that reinforce our highest values.
Blueprint includes 5 principles. Aimed to serve as a guide.
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
The Kyiv Post reports that "tough" Russian threat actors target within their own country as reprisal for the Ukrainian war and the overall situation in Russia. The organization, known as the National Republican Army (NRA), apparently launched several attacks, including one on Unisoftware, a Russian software company that purportedly collaborates closely with government clients.
NRA claimed to have stolen all data held by the firm, such as banking and personal account credentials, employee information, phone numbers, addresses, contracts, and proprietary code for Unisoftware clients and software.
The group has also been linked to the attack on Russian IT retail chain DNS, which confirmed earlier this week that it had been breached without providing additional information
-
-
www.coindesk.com www.coindesk.com
-
Fumio Kishida, Prime Minister of Japan, has stated in a policy speech that the country's plans for investing in digital transformation include the Metaverse and non-fungible tokens (NFTs) services. In his address to Japan's parliament, Kishida stated Japan will continue to focus on 'supporting the social implementation of digital technology' and will 'promote efforts to expand the use of Web3 services that utilize the metaverse and NFTs.' Previously, Japan had recently established a Web3 policy office under the Ministry of Economy, Trade and Industry (METI), which is focused on improving the business environment related to Web 3.0. Furthermore, METI is reportedly looking into a proposal to offer tax exemptions to Japanese crypto companies to entice them to keep their business in the country and further fuel the nation's evolving Web3 sector.
-
-
cpj.org cpj.org
-
Taliban shuts down two news websites in Afghanistan
TITLE: Taliban deactivate two news websites due to ‘false propaganda’ in Afghanistan
CONTENT: According to a tweet from the ministry's spokesperson Anayatullah Alokozay and a report by the London-based independent Afghanistan International TV station, the Taliban's Ministry of Telecommunications and Information Technology shut down the websites of Hasht-e Subh Daily and Zawia News on Monday, October 3, due to 'false propaganda' against the Taliban.
In separate statements on Monday, the Hasht-e Subh daily and Zawia News sites, which are run by Afghan journalists who have been reporting from exile since the August 2021 Taliban takeover, said the Taliban had deactivated their website domain names.
Since then, Hasht-e Subh Daily has resumed its online presence under a new domain. According to Zawia News, it will keep publishing news on the website of Zawia Media, its parent firm.
LINK: https://cpj.org/2022/10/taliban-shuts-down-two-news-websites-in-afghanistan/
EXCERPT: Afghanistan's Ministry of Telecommunications and Information Technology shut down the websites of Hasht-e Subh Daily and Zawia News on Monday, October 3. The sites are run by Afghan journalists who have been reporting from exile since the August 2021 Taliban takeover.
DATE: 04.10.
TOPIC: Freedom of the press
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
FBI and CISA Publish Advisory on Malicious Cyber Activity Against Election Infrastructure
TITLE: FBI and CISA joined in a public announcement on malicious cyber activities against election infrastructure
CONTENT: An official public service announcement about hostile cyber activity intended to compromise election infrastructure has been released by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA).
The agencies stated in the letter made public on Tuesday that it is unlikely that attempts to breach election infrastructure will result in widespread disruptions or stop voting.
The notice also made clear that authorities employ a range of safeguards to lessen the possibility of hostile cyber activity compromising the security, reliability, or accessibility of election infrastructure systems.
The Election Security Group (ESG), a body created at the end of August by the US Cyber Command (USCYBERCOM) and the National Security Agency (NSA), was created to safeguard electoral processes from hacking and disinformation before and during the November elections.
EXCERPT: An official public service announcement about hostile cyber activity intended to compromise election infrastructure has been released by the FBI and CISA. The agencies stated that it is unlikely that attempts to breach election infrastructure will result in widespread disruptions or stop voting. Election Security Group (ESG) was created to safeguard electoral processes from hacking and disinformation.
LINK: https://www.infosecurity-magazine.com/news/fbi-cisa-advisory-cyber-activity/
DATE: 06.10.
TOPIC: Cyberconflict and warfare, Cybersecurity, Cybercrime
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
US govt shares top flaws exploited by Chinese hackers since 2020
TITLE: US government agencies reveal top weak points exploited by Chinese hackers since 2020
CONTENT: In order to attack government and critical infrastructure networks, hackers supported by the People's Republic of China (PRC) most frequently use certain security flaws, according to information released today by the NSA, CISA, and the FBI.
In a combined alert, the three government agencies claimed that Chinese-sponsored hackers are targeting tech businesses and networks in the United States and its allies in order to enter private networks and steal intellectual property.
The report also includes suggestions for addressing each of the security holes that Chinese threat actors use the most, as well as detecting techniques and weak technologies to aid defenses in identifying and thwarting incoming attacks.
TOPIC: Cyberconflict and warfare, Cybercrime
DATE: 06.10.
EXCERPT: NSA, CISA, and FBI warn that Chinese-sponsored hackers are targeting tech businesses and networks in the U.S. and its allies to steal intellectual property. Report also includes suggestions for addressing each of the security holes that Chinese threat actors use the most.
-
-
study.diplomacy.edu study.diplomacy.edu
-
Development
Hi , greetings from South Sudan, the land of fish from the mighty River Nile in the middle of Africa!
-
-
-
Mexico continued to use spyware against activists
TITLE: Spyware still used by Mexico against activists
CONTENT: Despite a commitment by President Andrés Manuel López Obrador to halt such activities, it is reported that the Mexican government or army has continued to utilize spyware meant to hack into the cellphones of activists.
Press freedom advocacy organizations reported on Monday that they had discovered proof of recent attempts to target activists looking into Mexican army human rights violations using the Israeli spyware tool Pegasus. The University of Toronto group Citizen Lab conducted a forensic study to confirm the Pegasus virus.
The targets included rights campaigner Raymundo Ramos, according to a report by the press freedom organization Article 19, The Network for the Defense of Digital Rights, and Mexican media outlets.
TOPIC: Cybercrime, Freedom of expression
LINK: https://apnews.com/article/technology-mexico-caribbean-hacking-cd4e4a0bcf13705072af19b2d97bbf63
EXCERPT: Despite a commitment by President Andrés Manuel López Obrador to halt such activities, it is reported that the Mexican government or army has continued to utilize spyware. Targets included rights campaigner Raymundo Ramos, according to a report by the press freedom organization Article 19.
DATE: 03.10.
-
-
www.itu.int www.itu.int
-
ICTs for the environment
Q6/2: ICTs for environment
-
option of telecommunications/ICTs and improving digital skills
Q5/2: Adoption of telecom and improving digital skills
-
Securing information and communication networks: Best practices for developing a culture of cybersecurity
-
e-health and e-education
Q2/2: e-health and e-education
-
Sustainable smart cities and communities
-
enable inclusive communication
-
tions/information and communication technologies for rural and remote areas
-
aspects of national telecommunications/ICTs1Statement
-
The use oftelecommunications/ICTsfor disaster risk reduction and management
-
tudy Group Questions
SG Qs
-
Fostering telecommunication/ICT-centric entrepreneurshipand digital innovation ecosystems for sustainable digital development
Res...: Fostering telecom/ICT-centric entrepreneurship and digital innovation ecosystems
-
he ITU Partner2Connect Digital Coalition
Res...: ITU Partner2Connect digital coalition
-
Connecting every school to the Internet and every young person to information and communication technology services
Res...: Connecting every school
-
ESOLUTION WGPLEN/1 (Kigali, 2022)Digitaltransformation for sustainable development
Res...: Digital transformation for sustainable dev
-
RESOLUTION 85(Rev. Kigali, 2022)Facilitating the Internet of Things and smart sustainable cities and communities for global development
Res 85: Facilitating IoT and smart sustainable cities and communities for global development
-
RESOLUTION 76(Rev. Kigali, 2022)Promoting information and communication technologiesamong young women and men for socialand economic empowerment
Res 76: Promoting ICTs among young women and men for social and economic empowerment
-
RESOLUTION 67(Rev. Kigali, 2022)The role of the ITU Telecommunication Development Sector in child online protection
Res 67: Role of ITU-D in child online protection
-
RESOLUTION66(Rev. Kigali, 2022)Information and communication technology, environment, climate change and circular economy
Res 66: ICT, environment, climate change and circular economy
-
RESOLUTION 58(Rev. Kigali, 2022)Telecommunication/information and communication technology accessibility for persons with disabilities and persons with specific needs
Res 58: Telecom/ICTs accessibility
-
promote efforts to enhance educational opportunities for women and girls in STEM and telecommunication/ICT skills and careers across their lifespan, with particular attention to women and girls in rural and underserved areas;11continue to assist developing countries to close the gender digital divide, including enhancing women's and girls' access to reliable connectivity, digital literacy and digital skills;12support the continuation of the Network of Women (NoW) advisory group, working on a voluntary basis, composed of two women representative coordinators per region designated in collaboration with the regional groups
-
promote educational programmes to protect women and girls from online forms of abuse and harassmentand to address their safety needs
-
evelop partnerships with other United Nations agencies to promote the use of telecommunications/ICTs in projects aimed at women and girls in line with ITU's mandate, with the aimof encouraging women and girls to connect to the Internet, increasing training for women and girls, and monitoring the telecommunication/ICT gender divide, including actively participating in and promotingEQUALS –The Global Partnership for Gender Equality in the Digital Age
-
mobilize resources for gender-sensitive projects, including projects to ensure that women and girlscan use ICTs for their own empowerment and in daily personaland professional activities,and create services and develop applications that contribute to the equality and empowerment of all women and girls
-
design, implement and support projects and programmes in developing countries and countries with economies in transition that are either specifically targeted to women and girls or are gender sensitive, for the purpose of tackling the barriers that women and girls encounter in access to and use of ICTs in terms of digital literacy and skills, training in science, technology, engineering and mathematics (STEM) fields, affordability, trustand confidence, at the international, regional and national levels, taking into account SDG target 5.b
-
continue to work to promote gender equality in the field of telecommunications/ICTs, recommending and supporting the implementation of actionsonpolicies and programmes at the international, regional and national level in order toimprove the socio-economic condition of women, with greater emphasis on developing countries
-
support gender mainstreaming in the Union's activities
-
shall continue to support the development of activities, projects and events aimed at closing the gender digital divide
-
RESOLUTION55(Rev.Kigali, 2022)Mainstreaming a gender perspective1in ITU to enhance women's empowerment through telecommunications/ICTs
Res 55: Mainstreaming a gender perspective in ITU to enhance women's empowerment through telecom/ICTs
-
RESOLUTION 46(Rev.Kigali, 2022)Assistance toindigenouspeoples and communities through information and communication technologies
Res 46: Assistance to indigenous people and communities
-
RESOLUTION45(Rev. Kigali, 2022)Mechanisms for enhancing cooperation on cybersecurity, including countering and combating spam
Res 45: Mechanisms for enhancing cooperation on cybersecurity, including countering and combating spam
-
in order to
-
to maintain the Group on capacity-building initiatives(GCBI),composed of competent capacity-development experts familiar with the needs of their regions, to enhance the ability of ITU Member States, Sector Members, Associates, Academia, experienced and expert professionals and organizations with relevant expertise to assist ITU-D, and to contribute to the successful implementation of its capacity andskills-developmentactivities in an integrated manner in cooperation with the two ITU-D study groups and in accordance with adopted Kigali Action Planpriorities and regional initiatives, each according to its respective field of competence
-
RESOLUTION 40(Rev.Kigali, 2022)Group on capacity-building initiatives
Res 40: Group on capacity-building initiatives
CD
-
RESOLUTION 37(Rev. Kigali, 2022)Bridging the digital divide
Res 37: Bridging the DD
-
RESOLUTION 34(Rev. Kigali, 2022)The role of telecommunications/information and communication technology in disaster preparedness, early warning, rescue, mitigation, relief and response
Res 34: The role of telecom/ICT in disaster preparedness, early warning, rescue, mitigation, relief and response
-
RESOLUTION 15(Rev. Kigali, 2022)Applied research and transfer of technolo
Res15: transfer of tech
-
RESOLUTION 11(Rev.Kigali, 2022)Telecommunication/information and communication technology services in rural, isolated and poorly served areas
Res 11: Telecom/ICT services in rural, isolated and poorly served areas
-
RESOLUTION 5(Rev. Kigali, 2022)Enhanced participation by developing countries1in the activities of the Union
Res 2: Enhanced participation by developing countries in ITU activities
-
Resolutions
Resolutions
-
REGIONAL INITIATIVES
Overview of regional initiatives
-
Implementation of ITU-D Priorities
PKI for implementing ITU-D priorities
-
Affordable Connectivity
Kigali AP: ITU-D priorities: affordable connectivity, digital transformation, enabling policy and regulatory environ, resource mobilisation and international cooperation, inclusive and secure telecom/ICTs for sustainable development
-
WorldTelecommunicationDevelopmentConferencecallsuponthe ITUmembership and all development-oriented stakeholders,includingthosein theUnitedNations system,tocontribute activelytowardsthesuccessfulimplementationofthis Declaration
-
Promoting international cooperation and partnership among ITU membership and development-oriented stakeholders for achieving sustainable development using telecommunication/ICT-centric digital technologies.
Kigali Decl: international coop, partnerships with 'development-oriented SH'
-
Providing support to and cooperating with developing countries, LDCs, LLDCs, and SIDS in addressingtheir constraints for accessing digital-centric new and emerging telecommunication/ICT technologies and services and for the integration thereof into different sectors, such as government services, agriculture, education, health, finance, transport, etc
Kigali Decl: support for developing countries
-
implement evidence-based decision-making
-
Promoting sound, open, transparent, collaborative and future-proof policy and regulatory decisions with a view to facilitating digital transformation in the aftermath of the COVID-19 pandemic and beyond. We will implement innovative strategies and policy/regulatory initiatives to bridge the widening digital divides by enabling universal, secure and affordable broadband connectivity and promoting increased digital inclusion, while enhancing confidence and security in the use of telecommunication/ICT infrastructure and services. As such, we will develop and implement policy/regulatory frameworks to help ensure infrastructure resiliency, interoperability and protection of data, as well as increase broadband uptake. Besides, we will adopt effective plans to develop and enhance digital capacities and skills that are required in the online world, without which the digital divides will continue to widen
Kigali Decl: good governance? DD, cybersec, infra, digital capacities and skills
-
bold and innovative national plans and recovery strategies for ensuring governance, business, education and social-life continuity. This includes providing the necessary platforms and networks for essential activities such as teleworking, e-commerce, remote learning, telemedicine and digital financial services, while paying special attention to the needs of women and girls, persons with disabilities and persons with specific needs, the elderly and children, and at the same time preparing the ground for future developments in the post-COVID-19 era
Kigali Decl: governance?
-
We are also fully committed to tackling environmental and climate-change issues, notably in implementing telecommunication/ICT tools to mitigate the impact of climate change and addressing the impact of telecommunications/ICTs on the environment, in collaboration with users, the private sector, policy-makers and regulators
Kigali Decl: environment and climate change
-
Accelerating the expansion and use of efficient and up-to-date digital infrastructures, services and applications for building and further developing the digital economy,including mobilization of financial resources for providing universal, secure and affordable broadband connectivity to the unconnected as soon as possible. This will also include promoting investments in broadband infrastructure deployment, adoption and acces
Kigali Decl: investments in BB infra; access
-
Multistakeholder cooperation
-
Digital inclusionis a necessity, and insufficient digital capacity and lack of digital skills are core barriers to digital transformation and the digital economy. The demand for digitally skilled workers will increase with the accelerated move towards digital transformation. While many jobs have been and will be lost due to the COVID-19 pandemic, digital transformation and the digital economy can nurture new ICT-centric jobs. Education and capacity building for youth, and their access to digital skills and tools, are essential for youth engagement in shaping the digital future
Kigali Decl: digital inclusion, skills, education, capacity building
-
We recognize that available, affordable, dependable and accessible ICTs when leveraged through adequate digital skills can provide powerful drivers for development and are instrumental in timely, inclusive and resilient recovery from the COVID-19 pandemic. Capacity building/development in different ICT areas, including spectrum management, remains a challenge
Kigali Decl: access, skills and capacity development
-
ualities
-
build confidence, trust and security in the use of telecommunications/ICTs
Kigali Decl: cybersec
-
In the digital era, universal, secure and affordable broadband connectivity is indispensable and provides opportunities for boosting productivity and efficiency, ending poverty, improving livelihoods and ensuring that sustainable development becomes a reality for all.
-
Another first for WTDC-22 is the Network of Women (NoW)
Gender: First meet-up of Network of Women
-
The Kigali conference revised Resolution 55 on mainstreaming a gender perspective in ITU to enhance women’s empowerment through telecommunications/ICTs to encourage Member States to have gender parity in their delegations to ITU-D activities to help solve the issue of under representation of women
Gender: Revision of Res 55
-
SeveralpledgesweremadedirectlyinsupportofITUprojects,including
Pledges by govs and development agencies (GIZ, UK, UAE...)
-
Thefirst-everITUPartner2Connect (P2C) Digital DevelopmentRoundtablewas heldon7-9June2022asanintegralpartofWTDC-22.Atthetimeofthiswriting(13June2022),374pledges had been announced, representinganestimatedvalueofUSD24.5billion.Thedriveforuniversalandmeaningfulconnectivityrepresentedinthesepledgesisexpectedtobenefitbillionsofpeoplearoundtheworld,especiallyindevelopingcountries.
Partner2Connect roundtable and Digital Coalition
-
The digital divide continues to be a challenge, particularly for the LDCs, LLDCs, and SIDS. In response to this challenge, in September 2021 at the margins of the United Nations General Assembly, ITU launched the Partner2Connect (P2C) Digital Coalition, a multistakeholder alliance to foster meaningful connectivity and digital transformation globally. Launched in close cooperation with the Office of the Secretary-General’s Envoy on Technology, and in line withthe United Nations Secretary General’s Roadmap for Digital Cooperation, P2C provides a leadership platform to mobilize and announce new resources, partnerships and commitments around four focus areas:
-
-
-
Regions
Interesting that North Africa scores as the least expensive region when it comes to the average costs of 1GB of mobile data. But the ranking is solely based on the costs, without measuring what that cost means relative to incomes within regions.
-
-
-
A Bolsonaro reelection poses biggest threat to Brazilian press freedom, says RSF
TITLE: Election campaign and online attacks pose threat to Brazilian press freedom
CONTENT: The image of the media by President Bolsonaro as an enemy of the state that must be stopped has always resonated strongly with his support base, which is well-organized on social media, but especially during this election campaign.
Since the campaign's launch on August 16th, RSF has carefully tracked (put this link on ‘carefully tracked’: https://rsf.org/en/press-under-pressure-brazil-rsf-analyzes-online-attacks-against-journalists-during-presidential ) these online attacks and has recorded no less than 2.8 million posts that target and degrade journalists.
In terms of direct assaults, 86% of victims were female journalists. The president's family and government officials, who have millions of followers on social media, have shared the vast majority of this offensive material.
LINK: https://rsf.org/en/bolsonaro-reelection-poses-biggest-threat-brazilian-press-freedom-says-rsf
EXCERPT: RSF has recorded more than 2.8 million posts that target and degrade journalists in Brazil since the beginning of election campaign.
TOPIC: Freedom of the press
DATE: 30.09.
-
-
-
common sense is not one precise thing, and therefore cannot be easily defined by rules
-
Common sense is different from intelligence in that it is usually something innate and natural to humans that helps them navigate daily life, and cannot really be taught.
common sense vs intelligence
-
-
thenextweb.com thenextweb.com
-
but research seems to show that combining synthetic data with real data gives statistically sound results
-
Synthetic data can give smaller players the opportunity to turn the tables.
-
it can reduce biased outcomes
-
it can protect privacy and copyright
-
he synthetic data comes perfectly labeled
-
it’s easier to collect way more of it
-
Synthetic data, however it is produced, offers a number of very concrete advantages over using real world data.
advantages of synthetic data
-
There are a couple of ways this synthetic data generation happens
How synthetic data is produced.
-
-
www.infosecurity-magazine.com www.infosecurity-magazine.com
-
Lazarus-Associated Hackers Weaponize Open-Source Tools Against Several Countries
TITLE: Lazarus hacker group weaponize open-source software against several countries
CONTENT: Legitimate open-source software has been weaponized by threat actors connected to North Korea and is now being used to target personnel in businesses from a variety of industries.
The information was obtained by the Microsoft Threat Intelligence Center (MSTIC), which on Thursday released a warning about the threat.
The Lazarus Group, also known as the actor Microsoft tracks as Zinc, is said to have carried out the attacks, the technical write-up stated.
According to the advisory, Zinc has successfully compromised numerous organizations in the media, defense and aerospace, and information technology sectors in the United States, United Kingdom, India, and Russia.
EXCERPT: Open-source software has been weaponized by threat actors connected to North Korea. The Lazarus Group, also known as the actor Microsoft tracks as Zinc, is said to have carried out the attacks. Targets include media, defense and aerospace, and information technology sectors in the United States, UK, India, and Russia.
LINK: https://www.infosecurity-magazine.com/news/lazarus-group-weaponize-open/
TOPIC: Cyberconflict and warfare, Cybercrime
DATE: 30.09.
-
- Sep 2022
-
www.eeas.europa.eu www.eeas.europa.eu
-
TITLE: 54 countries outline support for human-centric approach at the core of standardisation and connectivity
CONTENT: In a joint statement delivered during the International Telecommunication Union (ITU) Plenipotentiary Conference, 54 countries endeavoured to promote 'a human rights-based approach to the whole life cycle of telecommunication/ICT technologies – including design, development, deployment, use and disposal - as part of a human-centric vision of the digital transformation, including in international standard-setting processes'. The countries encouraged the ITU to work with other standard development organisations to develop international technical standards are consistent with exiting international frameworks on human rights and fundamental freedoms. It also called on the organisation to intensify efforts to make its procedures more transparent and accessible, including to organisations active on human rights aspects of telecommunications/ICTs. Among the signatory countries were the 27 EU member states, Australia, Canada, Ghana, Chile, Japan, Rwanda, Switzerland, the UK, and others.
TOPICS: digital standards, human rights principles
DATE: 26 September 2022
-
-
-
TITLE: GSMA, IBM, and Vodafone launch Post-Quantum Telco Network Taskforce
CONTENT: GSMA, IBM, and Vodafone have launched a Post-Quantum Telco Network Taskforce to contribute to the definition of policies, regulations, and business processes for the protection of telecommunication in the context of advanced quantum computing. According to GSMA, the taskforce will help define requirements, identify dependencies, and create the roadmap to implement quantum-safe networking, mitigating the risks associated with future, more-powerful quantum computers. Activities to be undertaken by the taskforce will focus on three areas: (a) strategy: integrating quantum-safe capabilities into telecom network operators’ technology, business processes; and security; (b) standardisation: identifying the needs and common alignments for the integration of quantum-safe capabilities into existing telecom networks; and (c) policy: advising on public policy, regulation, and compliance matters.
TOPICS: Telecom infra, emerging tech
TRENDS: Quantum
DATE: 28 September 2022
-
-
www.reuters.com www.reuters.com
-
Vietnam preparing rules to limit news posts on social media accounts - sources
TITLE: Vietnam is working on a new set of rules to restrict news posts on social media accounts
CONTENT: According to Reuters, Vietnam is preparing new rules that will restrict which social media accounts can post news-related content, as authorities tighten their grip on the country's news and information sources.
The regulations would create a legal foundation for regulating news distribution on platforms such as Facebook and YouTube.
The sources confirmed that government officials have been holding confidential meetings with popular social media and internet firms to brief them on which types of accounts will be allowed to post news content under the new rules. According to them, authorities will be able to order social media companies to ban accounts that violate the rules.
The rules are anticipated to be announced before the end of the year, with specifics still being worked out.
TOPIC: Freedom of expression
DATE: 29.09.
EXCERPT: Vietnam is preparing new rules that will restrict which social media accounts can post news-related content, as authorities tighten their grip on the country's news and information sources. If the rules are announced, authorities will be able to order social media companies to ban accounts that violate the rules.
-
-
www.ohchr.org www.ohchr.org
-
Human Rights Council Holds Annual Discussion on the Integration of the Gender Perspective, Focusing on Overcoming Gender-Based Barriers to Freedom of Opinion and Expression
TITLE: HR Council’s annual debate on gender-based barriers to freedom of opinion and expression: online aspects
CONTENT: The Human Rights Council held its annual debate on the incorporation of a gender perspective, with the focus on overcoming gender-based barriers to freedom of opinion and expression.
Gender-based online violence against journalists, according to Julie Posetti of the International Centre for Journalists, is one of the most serious contemporary threats to press freedom and the safety of women journalists worldwide. Individual political actors and parties have been identified as perpetrators, instigators, and amplifiers of online violence against female journalists in many countries.
Irene Khan, Special Rapporteur on freedom of opinion and expression said that states must not use efforts to eradicate online violence, gendered hate speech, and disinformation as an excuse to limit free expression.
During the discussion that followed, speakers stated that online discrimination plays a role in censoring and silencing the voices of women and girls.
TOPIC: Gender rights online, Freedom of expression, Freedom of the press
EXCERPT: Human Rights Council held its annual debate on the incorporation of a gender perspective. The focus was on overcoming gender-based barriers to freedom of opinion and expression. Gender-based online violence against journalists is one of the most serious contemporary threats to press freedom, and states must not use efforts to eradicate online violence, gendered hate speech, and disinformation as an excuse to limit free expression.
DATE: 28.09.
-
-
www.berggruen.org www.berggruen.org
-
conceptual break with traditional human-centered understandings of the world and its politics.
-
but with the biogeochemical processes of the Earth itself.
-
do not care about our borders and political divisions
-
require processes and institutions that are inherently planetary in scale and scope.
-
-
www.fbcnews.com.fj www.fbcnews.com.fj
-
Women more vulnerable on cyber space: FWRM
TITLE: Fiji Women’s Rights Movement claims that women are more vulnerable to online violence
CONTENT: Nalini Singh, Executive Director of the Fiji Women's Rights Movement, made remarks on gender rights in cyberspace, while praising the government's intention to join the Convention on Cyber Crime.
According to Singh, cybercrime should not be approached from a gender-neutral standpoint.
She claims that women who have regular access to online spaces are more vulnerable to online violence. Singh also states that dissecting how cybercrime occurs can help the state respond more effectively.
LINK: https://www.fbcnews.com.fj/news/women-more-vulnerable-on-cyber-space-fwrm/
DATE: 28.09.
EXCERPT: Nalini Singh, Executive Director of the Fiji Women's Rights Movement made remarks on gender rights in cyberspace. She claims that women who have regular access to online spaces are more vulnerable to online violence.
TOPIC: Gender rights online
-
-
asianews.network asianews.network
-
Indonesian activists deplore latest cyberattack as ‘assault on press freedom’
TITLE: Indonesian advocates condemn latest cyberattack on press freedom
CONTENT: Indonesian advocates have condemned a series of widespread and coordinated cyberattacks on journalists and employees of the state’s media company Narasi and urged police to act immediately. This media company is known for its criticism of the government.
The attacks aimed to take control of its employees' Telegram, Instagram, Facebook, and Twitter accounts, states the head of newsroom, Laban Laisila.
Advocates condemned the attack on press freedom and urged law enforcement not to take sides when dealing with cyberattacks.
Discrepancy between the way law treated cyberattacks involving state or government institutions and those involving the press is noticeable.
EXCERPT: Indonesian advocates have condemned a series of widespread and coordinated cyberattacks on journalists and employees of the state's media company Narasi. This media company is known for its criticism of the government. Press freedom is at stake as the country deals with cyberattacks differently depending on whether they occurred against the government than against the press.
DATE: 28.09.
TOPIC: Freedom of the press, Cybercrime
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
Meta dismantles massive Russian network spoofing Western news sites
TITLE: Meta takes down Russian network spoofing Western news sites
CONTENT: According to Meta, it took down a vast network of Facebook and Instagram profiles spreading misinformation that had been spoofed on more than 60 websites across Europe.
The primarily targeted countries were Germany, France, Italy, Ukraine, and the U.K. Original articles were attacking Ukraine and Ukrainian refugees and suggesting that Western sanctions on Russia will backfire.
Meta said it succeeded to take down around thousands of Facebook and Instagram accounts, while stating that this is ‘the largest and most complex Russian-origin operation that we've disrupted since the beginning of the war in Ukraine.’
EXCERPT: Social media company Meta says it has disrupted 'the largest and most complex Russian-origin operation that we've disrupted since the beginning of the war in Ukraine'. The primarily targeted countries were Germany, France, Italy, Ukraine, and the U.K. Original articles were attacking Ukrainian refugees and suggesting that Western sanctions on Russia will backfire.
DATE: 27.09.
TOPIC: Cybersecurity, Cybercrime
-
-
www.berggruen.org www.berggruen.org
-
Berggruen Institute Books:
||minam|| It is effective way of presenting all books at one place. How can we turn ourpublicaitons into something like this.
-
-
openai.com openai.com
-
Introducing Whisper
||Cecile|| ||Jovan|| ||anjadjATdiplomacy.edu|| Cecile shared the following text with me. Is it ofa any interest for our AI research?
||sorina||
-
-
www.bleepingcomputer.com www.bleepingcomputer.com
-
Ukraine warns allies of Russian plans to escalate cyberattacks
TITLE: Ukrainian military intelligence warns allies of major upcoming Russian cyber-attacks
CONTENT: The key infrastructure of Ukraine and its allies will be the target of ‘major cyber-attacks,’ according to a warning issued today by the Ukrainian military intelligence service.
According to the Main Directorate of Intelligence of the Ukrainian Ministry of Defence (HUR MO), this upcoming ‘massive’ wave of strikes will likely target disrupting and destroying institutions and facilities related to the energy sector.
The Russian cyberattacks' most likely objective would also be to disrupt the Ukrainian Army's on-going advance and heighten the destruction caused by missile strikes against the country's eastern and southern energy supply facilities.
EXCERPT: 'Major cyber-attacks' will target key infrastructure of Ukraine and its allies, warns Ukrainian military intelligence service. Main objective would be to disrupt the Ukrainian Army's advance and heighten destruction caused by missile strikes against the country's eastern and southern energy supply facilities.
DATE: 26.09.2022.
TREND: Ukraine
TOPIC: Cyberconflict and warfare
-