1. Sep 2022
    1. RSF calls on Azerbaijan to end online harassment of Swedish journalist

      TITLE: RSF urges Azerbaijan to stop harassing Swedish journalist online

      CONTENT: Reporters Without Borders (RSF) demands that supporters of Azerbaijani President Ilham Aliyev stop smearing Swedish freelance journalist Rasmus Canbäck, particularly on Twitter.

      Canbäck has been called a ‘Islamophobe,’ a ‘terrorist,’ a ‘spy,’ and ‘funded by the Armenian lobby’ on Twitter as a result of his articles about Azerbaijan, particularly for the online magazine Blankspot. He has been writing about Nagorno-Karabakh, a region with an Armenian majority where a long-running conflict has recently resurfaced, as well as Azerbaijan's alleged use of bribes in its ‘caviar diplomacy’ and lobbying.

      According to RSF, Canbäck's account was mentioned in nearly 900 tweets between September 1 and September 21. Therefore, RSF also requests that Swedish Foreign Minister Ann Linde remind Azerbaijan's Ambassador Ahmadov to maintain press freedom and journalistic independence. Nevertheless, Ambassador himself participated in the online harassment.

      TOPIC: Freedom of the press

      LINK: https://rsf.org/en/rsf-calls-azerbaijan-end-online-harassment-swedish-journalist

      DATE: 23.09.2022.

      EXCERPT: Reporters Without Borders (RSF) demands that supporters of Azerbaijani President Ilham Aliyev stop smearing Swedish freelance journalist Rasmus Canbäck, highlighting the one on Twitter. His account was mentioned in nearly 900 tweets between September 1 and September 21, and he suffers from online harassment in all of them. RSF also urges Swedish Foreign Minister Ann Linde to remind Azerbaijan's Ambassador Ahmadov to maintain press freedom and journalistic independence.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Ukraine dismantles hacker gang that stole 30 million accounts

      TITLE: The Security Service of Ukraine dismantles hacker group which stole around 30 mil. accounts

      CONTENT: The Security Service of Ukraine (SSU) has dismantled a group of hackers who stole the accounts of nearly 30 million people and sold them on the dark web.

      On victim systems in the European Union and Ukraine, the hackers deployed malware to steal login information and other sensitive data. Several hard drives containing stolen personal data, as well as computers, SIM cards, mobile phones, and flash drives, were discovered and confiscated during raids on the perpetrators' homes in Lviv, Ukraine.

      Although the number of people detained is still unknown, they are all being prosecuted on criminal accusations related to the illegal sale or dissemination of information with restricted access kept in computers and networks. Sentences for these offenses carry long prison terms.

      Since the first days of the Russian invasion, spreading false information about the conflict has become common throughout Ukraine. Misinformation and deception are still flooding the internet.

      EXCERPT: The Security Service of Ukraine (SSU) has dismantled a group of hackers. They stole the accounts of nearly 30 million people and sold them on the dark web. Hard drives containing stolen personal data, as well as computers, SIM cards, mobile phones, and flash drives were all discovered and confiscated during raids in Lviv. The number of detained people remains unknown, but sentences for the offenses in question will be quite long.

      DATE: 23.09.2022.

      LINK: https://www.bleepingcomputer.com/news/security/ukraine-dismantles-hacker-gang-that-stole-30-million-accounts/

      TOPIC: Cybercrime, Cyberconflict and warfare

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The experts also called attention to the radical impact of digital technologies on any humanitarian response. They highlighted the dependence on digital identity programs – particularly the collection of sensitive biometric data as a condition to access humanitarian aid – despite dangers to human rights as illustrated recently in breaches, data loss, and the exclusion of at-risk communities. They implored humanitarian actors to account for human rights impacts to ensure that digital solutions do not cause further harm to those most vulnerable.

      This is an interesting epistemological challenge: how to link this notion on humanitarian issues to digital identity and human rights.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. a unique holistic view of technology and deep experience in multiple genres of research communities
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. researchers at the Stanford Internet Observatory determined that the web of accounts—on Twitter, Facebook, Instagram, and five other social-media platforms—had been promoting pro-Western narratives, posting in Russian, Arabic and Farsi. The researchers characterise it as “the most extensive case of covert Western influence operations…analysed by open-source researchers to date.”
    2. Governments in Latin America, Africa and South-East Asia have avoided condemning Russia not because they buy tales of Ukrainian neo-Nazis, but because they want Russia’s guns, oil and grain. Traditions of nonalignment and resentment towards the West exist independently of Russian propaganda.
    3. And while eyeballs may be a “necessary precondition” for effectiveness, “high engagement doesn’t necessarily translate into effectiveness,” notes Ms Grossman
    4. In a poll of six African countries commissioned by The Economist earlier this year, support for Russia’s invasion was strongest in Mali and Ivory Coast.
    5. “Russia is very effective at building on sentiments that already exist,”
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The five permanent members (America, Britain, China, France and Russia) should wield their veto only in “rare, extraordinary situations”, Mr Biden said
    2. On global health, Mr Biden pledged help to ensure the world is better prepared to confront the next pandemic
    3. food security
    4. The second part of the West’s strategy is to mitigate the repercussions of the war
    5. First, Mr Biden softened his long-standing division of the world into rival camps of democracies against autocracies.
    6. “Ukraine fatigue”,
    7. “I have come to say that Africa has suffered enough of the burden of history; that it does not want to be the breeding ground of a new cold war,” said Macky Sall, the president of Senegal and current chairman of the African Union. Like others, he managed to bemoan the impact of the Ukraine war without mentioning Russia. He urged de-escalation, a ceasefire and a negotiated solution.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Eastern Europeans are keen on enlargement, but also want to keep the veto, particularly in matters of foreign policy, where they do not trust France or Germany
    2. Hungary (along with Poland) is currently not receiving any of the pandemic cash, specifically because of its rule-of-law shortcomings
    3. The Luxembourg Compromise protects against federalist overreach. The Reverse Luxembourg would protect Europe from diplomatic blackmail.
    4. But because the proposal to move away from unanimity itself requires unanimity, it is unlikely to go anywhere.
    5. threatening to kibosh Europe’s participation in a global corporate-tax deal.
    6. This includes anything relating to defence and foreign policy, enlargement, taxation and policing.
    7. But in several policy areas unanimity among member states is still needed
    8. Most eu business now is agreed by a qualified majority of countries.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. This article is interesting for a few reasons:

      Firstly, it introduces 'planetary' into the policy language; after term 'globalisation' got tired and 'tainted', planetary is new term. Thus be prepared for digital planetarisation, cyber planteraism, etc.

      Secondly, authors are trying to revitalise some western concepts (humantiarian intervention) via Chinese philosophical concepts

      Thirdly, we are preparing cooperaiton with Berggruen Institute. I started annotating their text in order to see their thinking.

      ||VladaR|| ||sorina|| ||StephanieBP||||Pavlina||||Katarina_An||

    2. the notion of limited sovereignty, the conception of just war, the obligation of states to exercise self-restraint in the use of force, states’ obligation to protect human dignity and human rights, the legitimacy of humanitarian intervention, and the role and responsibility of the dominant states in the maintenance of international peace
    3. to formulate a minimalist morality
    4. it must at once acknowledge the plurality of moral ideals that are defining of the world’s cultures,
    5. it is in clarifying the next phase of the discussion.
    6. Relationality is ontologically more basic than individuality.
    7. While new technologies and artificial intelligence can contribute to the emergence of a new geopolitical order, the human predicament today is fundamentally an ethical issue.
    8. now need to “de-colonize” themselves from the forms of knowledge imposed upon them by the West
    9. it also exerted a form of epistemic violence by imposing divisive ideas, particularly its ideas concerning nations, races, and gender.
    10. mechanism of transformational harmony.
    11. Zhao argues that the key to the Tianxia system lies in how, via its methods of “relational rationality” and “Confucian improvement,”14 it constitutes a world with no outsiders.
    12. Today’s China is a sovereign state and not Tianxia
    13. A looming Pax Sinica rivaling the Pax Americana, China is projecting its soft power and brandishing its culture around the world
    14. China does not seek to forcefully impose its worldview onto others
    15. It believes that each ethnic group and nation can have its own history, but just as in the end all streams return to the sea, ultimately all groups will submit willingly to a higher-order culture and its institutions
    16. It advocates ‘transformation’ and thus works by winning over the hearts of others instead of subduing them by force.
    17. First, Tianxia means the Earth under the sky, ‘all under heaven.’ Second, it refers to the general will of all peoples in the world, entailing a universal agreement. It involves the heart more than the mind, because the heart has feelings. And third, Tianxia is a universal system that is responsible for world order.
    18. This strategic shift towards coexistence is rational because it continues to produce positive payoffs when copied by other players.
    19. The ancient Chinese concept of Tianxia translates roughly as “all under heaven existing harmoniously.”
    20. Tianxia begins from an ecological understanding of international relations that acknowledges the mutuality and interdependence of all economic and political activity.
    21. The idea of Tianxia (天下) — conventionally translated as “all under heaven” — is a familiar term in everyday Chinese parlance that simply means “the world.” But Tianxiais also a geopolitical term found throughout canonical Chinese literature that has deeper philosophical and historical significance.
    22. for rethinking global governance and rebuilding trust in humanity’s shared future.
    23. a global consciousness — an awareness of our interdependence in addressing issues on a planetary scale
    24. inadequacy of our modern state system to respond effectively to a global crisis.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. ||sorina||

      If space should remain a shared resource with equitable access to the orbits and frequencies around Earth, there is a need for additional international regulation.

      The main threat for limiting 'carrying capacity' of low earth orbit (LEO) is launching of commercial mega-constellations with thousands of satellites.

      As space is over-exploited through the 'move fast and break things' approach of corporate sector, there are more and more risks, including:

      • risk of collisions of increasingly busy outer space
      • the light pollution as satellites may soon outnumber visible starts
      • the threat of mega-constellations for environment.

      ||sorina|| possible update. ||Jovan||

    2. “move fast and break things” approach
    3. to place reasonable multilateral constraints
    4. International treaties have long recognised that nations must have equitable access to the orbits and frequencies around Earth.

      What is international treaty that indicates 'equitable access to the orbits and frequencies'. Who regulates this?

    5. “carrying capacity” can help us assess how to best use the resource to benefit all.
    6. LEO is a shared natural resource
    7. the environmental footprint of each LEO constellation.
    8. total mass of the LEO mega-constellations has been increasing at an alarming rate.
    9. the light pollution caused by countless satellites may soon outnumber visible stars, interfering with optical and radio astronomy.
    10. crisis of debris in space
    11. a cascade of collisions,
    12. the over-exploitation of limited space resources

      riks of over-exploitation

    13. Mega-constellations incorporating thousands, and soon tens of thousands, of satellites are crowding into low-Earth orbit, or LEO, and claiming the right to occupy it
    14. Space is a shared resource which must remain available to all nations.

      Key principle.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. We need to be sure that the capacity to innovate — to be fully engaged in making the future — isn’t constrained by class, ethnicity or gender. That really would be disruptive.
    2. We need innovation that is accessible and organic — that is owned by the communities to which it matters and that’s adapted to local cultures, rather than being the whim of iconoclasts
    3. rather than recognize the dogged and meticulous hard work that makes for real innovation.
    4. The marketization of expertise over the past few decades has also created a climate in which expertise is taken to be something that can be treated like just another commodity.
    5. have had enough of experts,
    6. experts — at least the visible ones — are easily dismissed as being in hock to special interests, too, even by other elites.
    7. an image of expertise that we’ve inherited from the Victorians
    8. Innovation really is the work of multitudes, not singularities.

      Good point

    9. Tesla failed

      Tesla may failed individually (fortune), but he prevailed utimately. He lost 'battle' with Edison but wan the war of innovation on all fronts from electricity to wireless communcatin.

    10. that successful innovation requires collective effort.
    11. Russell’s Earthlings were Kuhnians to the aliens’ disruptive Popperians, we might say, and their example offers an antidote to our persistent habit of succumbing to Tesla Syndrome.
    12. “Legwork” might be fiction, but I think there’s something very human about the way the humans’ triumph over the disruptive aliens is portrayed as the ultimate application of teamwork.
    13. “Legwork” by the British writer Eric Frank Russell, a brilliant piece of post-war science fiction published in Astounding Science Fiction in 1956, serves as an exploration of the collective against the disruptive in fictional form.
    14. cryptocurrencies
    15. Popper’s problem, though — and the problem of tech disruptors, too — is that the experience of political disruptors shows us disruption generates chaos, not innovation.
    16. Normal science was boring, and not really science at all, he argued.
    17. Karl Popper,
    18. Thomas Kuhn’s “The Structure of Scientific Revolutions,” with its emphasis on the routines of consensual normal science, was very much a product of this post-war view of technoscientific innovation as a collective activity. Kuhn’s argument was that successful science depended on rule-following. Innovation was generated by going by the book. This was a philosophy of science that mirrored post-war consensus about progress and its requirements.
    19. Much of this was driven by the spectre of the Cold War. During the 1980s and 1990s, Reaganism, Thatcherism and the end of the Cold War broke those connections.
    20. The decades immediately following the Second World War were the decades of big government. They were also the decades of big science and big corporations.
    21. Political institutions are seen as being there to serve their own interests rather than those of citizens. It’s that perception that makes the strident calls to “drain the swamp” that have become prevalent in USA politics since the 1980s appear so seductive.
    22. The roots of disruption’s attraction in politicians lie in the long, slow decline of trust in post-war political institutions.

      It is interesting hypothesis that needs to be revisited.

    23. that disruption has gained a foothold outside of tech culture.
    24. Why has it — and the notion of disruption it captures — acquired so much resonance now?

      No reference to Schumpeter?

    25. untrammelled by compromise

      Use of compromise in negative context.

    26. There he is held up as the epitome of the otherworldly maker of the future, an iconoclastic breaker of rules interested only in innovation for its own sake and doomed to failure because of his single-minded focus on invention.
    27. in this ability to break with established routine.

      Correct.

    28. The 19th-century inventors of the idea of progress imagined that the future would be produced through accumulation. Innovation would build on innovation. Built into the idea of disruption is the sense that successful innovation means abandoning the old entirely for the new.

      I am not sure it is the case. Accumulation happends in different context as in the case of Tesla who brought into his innovation unique family combination of mother (innovaitve genious) and father (Ortodox priest with interest in Asian sprituality). Tesla always higlighted spiritual origins of his innovations.

    29. the erosion of trust in institutions.

      Which institutions? Military are doing well in 'trust analysis' in many countries worldwide. It is not good sign. I would prefer higher standing of diplomacy. But, it is reality.

    30. Why has the idea that the best innovators are disruptive gained such traction over the past decade or so, to the extent that it is now, paradoxically, orthodox to be heterodox?

      It is part of framing of narrative which questioned today. "Ortodoxy' was created by intellectual, media, and policy framing. 'Traction' are gradually developed. It is not necessarily matter of coordinated or counciousness actions. But, it is action of people and institutions that shape the dominant narrative in society.

    31. why do we see disruption as a virtue?

      Who are 'we'? Maybe author? Maybe myself? But, what about Trump or Brexit voters? What about stratas of society that is 'thrown under the bus' of disruption?

      This statement poses clear bias in framing narrative.

    32. It’s all about the individual, and particular sorts of individuals at that.

      Is it only about individuals? Bezos decided to open Amazon while he heard news on radio in his car on the decision of the U.S. Supreme Court on taxation. It gave him a chance to sell books from Washington State to other states without paying taxes.

    33. whom society rewards precisely because they refuse to follow convention.

      It is 'meritocracy' argument. Did 'society' or 'market' rewarded them? Why we equalise society with market?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. European Convention.

      more?

    2. legally binding mechanism that ensures solidarity.

      important emphasis

    3. new initiative on mental health

      interesting and useful

    4. If we want to be credible when we ask candidate countries to strengthen their democracies, we must also eradicate corruption at home

      internal EU challenges

    5. Many of us have taken democracy for granted for too long
    6. These lies are toxic for our democracies

      This really reminds me so much of the rethorics of China, Russia and Balkan autocrats. Am I missing something? ||JovanK||

    7. a university in Amsterdam shut down an allegedly independent research centre, which was actually funded by Chinese entities.

      No independent research centres in China, Russia, ... funded by EU?

    8. Their disinformation is spreading from the internet to the halls of our universities.

      Disinformation is fastly climbing the ladder of importance

    9. Foreign entities are funding institutes that undermine our values

      Like? BTW one could equally put this in mouth of Putin, Xi, or Erdogan

    10. In this spirit, President Biden and I will convene a leaders' meeting to review and announce implementation projects.

      First reference to the US

    11. great challenges of this century, such as climate change and digitalisation.

      the two leading challenges of the century: climate and digital (yet not much said on digital at all here)

    12. European Political Community

      EU+?

    13. So I want the people of the Western Balkans, of Ukraine, Moldova and Georgia to know

      Georgia in

    14. This starts with those countries that are already on the path to our Union. We must be at their side every step of the way.

      focus on pre-accession regions

    15. core group of our like-minded partners: our friends in every single democratic nation on this globe

      following the US policy of blocks

    16. Let's make sure that the future of industry is made in Europe.

      ambitious

    17. European Sovereignty Fund.
    18. Last year I announced the European Chips Act. And the first chips gigafactory will break ground in the coming months.

      interesting pattern

    19. European Critical Raw Materials Act

      new

    20. one country dominates the market

      Russia or China?

    21. Today, China controls the global processing industry. Almost 90 % of rare earths and 60 % of lithium are processed in China.
    22. nd for this reason, I intend to put forward for ratification the agreements with Chile, Mexico and New Zealand. And advance negotiations with key partners like Australia and India.

      Will they respect environmental aspects?

    23. Trade that embraces workers' rights and the highest environmental standards is possible with like-minded partners

      Seeing how things work in Serbia with western companies, I am not really convinced

    24. Lithium

      for bateries

    25. rare earths

      for microchips

    26. raw materials

      focus on raw materials (dominantly held out of EU, many of which in Russia)

    27. As a first important step, we need to speed up and facilitate the recognition of qualifications also of third country nationals.

      important

    28. It is financing new wind turbines and solar parks, high-speed trains and energy-saving renovations.
    29. The summer of 2022 will be remembered as a turning point.

      this is certainly true

    30. Norway.

      Norway was not so keen in the recent past. Now, they might need to play along, but probably asking for some benefits in future

    31. But in these times it is wrong to receive extraordinary record profits benefitting from war and on the back of consumers.

      important change

    32. proposing a cap on the revenues of companies that produce electricity at a low cost.
    33. Last year, Russian gas accounted for 40% of our gas imports. Today it's down to 9% pipeline gas.
    34. US, Norway, Algeria
    35. we agreed on joint storage. We are at 84% now: we are overshooting our target.
    36. But dependency on Russian fossil fuels comes at a much higher price. We have to get rid of this dependency all over Europe.
    37. We will bring Ukraine into our European free roaming area.

      Fast-track free roaming. Balkans might be furious, but then again it makes sense

    38. In March, we connected successfully Ukraine to our electricity grid. It was initially planned for 2024. But we did it within two weeks. And today, Ukraine is exporting electricity to us.

      interesting

    39. Ukraine is already a rising tech hub and home to many innovative young companies. So I want us to mobilise the full power of our Single Market to help accelerate growth and create opportunities.

      Ukraine recognised as a tech hub

    40. The Russian military is taking chips from dishwashers and refrigerators to fix their military hardware, because they ran out of semiconductors.

      hm... likely in future, but - really, to put this into the speech?!

    41. And you have given hope to all of us.

      It is much about EU, not (only) about Ukraine

    42. Putin

      Direct name. I don't remember this ever. Yet, a signal it's about Putin, not Russia.

    43. as climate change and digitalisation.
    44. the green and digital transition.
    45. our response was united, determined and immediate

      Longer term it might be tough and different, though

    46. months

      Rather years...

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Iran reins in access to Instagram and WhatsApp, last platforms available to Iranians

      TITLE: Iranians lose access to Instagram and WhatsApp: RSF sees it as an attack on the right to news and information

      CONTENT: According to Reporters Without Borders, the Iranian government's decision to restrict access to Instagram and WhatsApp, which had been circulating information about a wave of protests triggered by the death of Mahsa Amini in police custody following her arrest by the morality police on September 16, is an unprecedented attack on the right to news and information in Iran.

      Since the beginning of the protests, the Islamic Republic has imposed numerous Internet shutdowns, and the shutdown is now complete in western Iran's Kurdistan province, where Amini was born and where the first protests began. Other major cities, including Tehran, have reported partial Internet restrictions.

      The government has made contradictory statements about Internet censorship. ICT Minister Issa Zarepour insisted he had been misquoted after initially saying on September 21 that Internet restrictions could be imposed for security reasons.

      However, since 2011, the government has invested in a ‘national Iranian Internet’ project that attempts to force Iranians to connect through a network controlled by the authorities before accessing content located elsewhere.

      LINK: https://rsf.org/en/iran-reins-access-instagram-and-whatsapp-last-platforms-available-iranians

      EXCERPT: According to Reporters Without Borders, the Iranian government's decision to restrict access to Instagram and WhatsApp is an unprecedented attack on the right to news and information in Iran. Internet shutdowns are complete in some regions - such as Western Iran’s Kurdistan province. These shutdowns follow the beginning of a wave of protests triggered by the death of Mahsa Amini. The Iranian government has started a ‘national Iranian Internet’ project that attempts to force Iranians to connect through a network controlled by the authorities before accessing content located elsewhere. This may seriously affect some basic human rights of the Iranian people.

      TOPIC: Freedom of expression

      DATE: 22.09.2022.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Optus Hit By Cyber-Attack, Breach Affects Nearly 10 Million Customers

      TITLE: Optus hit by cyberattack which affected around 10 million customers

      CONTENT: Optus, the Australian subsidiary of Singapore Telecommunications, announced earlier today that it was investigating unauthorized access to customer data following a cyber-attack.

      The company confirmed that the attack was instantly stopped, preventing customers' payment information and account passwords from being compromised. However, Optus confirmed that the attacker may have obtained some home addresses, driver's license numbers, and passport numbers.

      Optus, which has 9.7 million subscribers according to publicly available data, said it also notified key financial institutions about the attack and subsequent breach.

      Optus customers are now more vulnerable to phishing, with their credentials potentially already on the dark web, according to the executive.

      EXCERPT: Optus, the Australian subsidiary of Singapore Telecommunications, was hit by a cyber-attack. Customers' payment information and account passwords were not compromised, but personal details may have been accessed. Optus customers are now more vulnerable to phishing, with their credentials potentially already on the dark web.

      LINK: https://www.infosecurity-magazine.com/news/optus-hit-by-cyberattack/

      DATE: 22.09.2022.

      TOPIC: Cyberconflict and warfare, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Expanding broadband safely and inclusively to reach digital gender equality

      TITLE: Insight by UN Women Executive Director on reaching digital gender equality

      CONTENT: Ms. Sima Bahous, Broadband Commissioner, UN Under-Secretary-General and UN Women Executive Director has shared her ‘Insight’ regarding digital gender equality.

      Sexual harassment, stalking, and zoom bombing are all examples of online and ICT-facilitated violence against women and girls that are expanding. Misogyny and sexual violence are finding new digital homes in virtual reality and the metaverse. Women journalists, politicians, and activists who rely on an online presence for their work are therefore especially impacted. A concerning fact is that more than half of girls and young women surveyed globally have already experienced some form of online violence.

      She firstly recommends that governments should establish strong and clear codes of conduct for law enforcement officials dealing with online violence against women and girls, as well as to invest in specialized justice officers to deal with such violence in a human rights and gender-sensitive manner. Secondly, she suggested that internet intermediaries make high-level, clear commitments to ensure the safety of women and girls in online spaces.

      You can read more about her recommendations on the topic here (please insert link on ‘here’).

      DATE: 18.09.2022.

      LINK: https://www.unwomen.org/en/news-stories/op-ed/2022/09/expanding-broadband-safely-and-inclusively-to-reach-digital-gender-equality

      TOPIC: Gender rights online

      EXCERPT: Sima Bahous, Broadband Commissioner, UN Under-Secretary-General and UN Women Executive Director has shared her 'Insight' regarding digital gender equality. One of her recommendations for achieving online gender equality is that governments establish strong and clear codes of conduct for law enforcement officials dealing with online violence against women and girls.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. ‘Anonymous’ hacks Iran state websites after Mahsa Amini’s death

      TITLE: Iranian websites hacked after Mahsa Amini’s death

      CONTENT: After a Twitter account connected to the ‘Anonymous’ hacking collective claimed to have conducted cyberattacks on them in support of protests following the tragic death of 22-year-old Mahsa Amini, multiple government and state-affiliated media websites in Iran were taken down.

      The attacks appear to have targeted the Iranian government's two main websites. One is the government's ‘smart services’ website, which provides a variety of online services, and another is dedicated to publishing government news and interviews with officials.

      ‘All databases have been deleted,’ a social media linked to Anonymous claimed. claimed a social media account linked to Anonymous. The Iranian government has yet to issue an official response to the attacks.

      LINK: https://www.aljazeera.com/news/2022/9/21/anonymous-hacks-iran-state-websites-after-mahsa-aminis-death

      EXCERPT: ‘Anonymous’ hackers have taken down government and state-affiliated media websites in Iran. ‘All databases have been deleted,’ a social media account linked to ‘Anonymous’ claimed. The Iranian government has yet to issue an official response to the attacks.

      DATE: 21.09.2022.

      TOPIC: Cyberconflict and warfare

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. La Suisse est fière d’avoir créé dans cet esprit la Fondation GESDA,le Geneva Science Diplomacy Anticipator. GESDAa pour but d’anticiper les défis posés par les nouvelles technologiques, de manière à en maximiser les bénéfices et en minimiser les risques pour l’homme, et à garantir un avenir durable sur notre planète.

      GESDA initiative

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Theeffortstowardsaso-calledDigitalGenevaConventionarejustifiedandneeded

      Call for Digital Geneva Convention

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. And crises like the lack of guardrails around promising new technologiesto healdisease, connect people and expand opportunity.

      Lack of guardrails

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The right to privacy in the digital age

      ||MarcoLotti|| ||JovanK||

      There was a report from OHCHR on "the right to privacy in the digital age" presented during the Human Rights Council on September 16th. I will look deeper into this if it concerns Diplo's interest!

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Microsoft 365 phishing attacks impersonate U.S. govt agencies

      TITLE: Microsoft 365 phishing attacks pose as US government agencies

      CONTENT: There is an ongoing phishing campaign aimed at the US government contractors that has grown to include higher-quality lures and better-crafted documents. Phishing emails show a request for bids on lucrative government projects, which leads them to phishing pages that look exactly like legitimate federal agency portals.

      This appears to be the same operation that INKY reported on in January this year, with the threat actors attaching PDFs with instructions on how to bid on US Department of Labor projects.

      This campaign's operatives don't appear to be stopping anytime soon, since they are now expanding their targeting scope while refining their lures.

      Given that the emails, PDFs, and websites used in the phishing operation are primarily copies of the actual state’s content, detecting signs of fraud may be difficult.

      TOPIC: Cyberconflict and warfare, Cybercrime

      DATE: 19.09.2022.

      EXCERPT: US government contractors are being targeted by an ongoing phishing campaign that has grown to include higher-quality lures and better-crafted documents. Given that the emails, PDFs, and websites used in the phishing operation are primarily copies of the actual state's content, detecting signs of fraud may be difficult.

      LINK: https://www.bleepingcomputer.com/news/security/microsoft-365-phishing-attacks-impersonate-us-govt-agencies/

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Russian authorities revoke Novaya Gazeta’s online media license

      TITLE: Novaya Gazeta’s online media license revoked

      CONTENT: Only 10 days after a Moscow Court revoked Novaya Gazeta’s print license, the Russian Supreme Court has revoked its online media license. This media outlet has been working independently for nearly 30 years, and now it lost its right to exist.

      ‘You are depriving hundreds of people of jobs. You are depriving readers–there were 27 million in March–of the right to information,’ Novaya Gazeta chief editor Dmitry Muratov stated in court on September 15. He referred to the verdict as ‘media genocide’ outside of court, claiming that it would prevent Novaya Gazeta reporters from contacting authorities, remove their accreditation status, and impose several restrictions on their operations.

      LINK: https://cpj.org/2022/09/russian-authorities-revoke-novaya-gazetas-online-media-license/

      TOPIC: Freedom of the press

      EXCERPT: Only 10 days after a Moscow Court revoked Novaya Gazeta's print license, the Russian Supreme Court has revoked its online media license. This media outlet has been working independently for 30 years. Novaya Gazeta’s chief editor Dmitry Muratov referred to this action as ‘media genocide.’

      DATE: 15.09.2022.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The second Summit for Information and Democracy to be held in New York on 22 September 2022

      TITLE: The second Summit for Information and Democracy will be held on the sidelines of the UNGA

      CONTENT: The Second Summit of the Partnership for Information and Democracy will be held on September 22, 2022 on the sidelines of the UN General Assembly. The Partnership is currently supported by 45 countries, and serves as a framework for multilateral reflection on the implementation of democratic guarantees in the global communication and information space.

      The Summit's second edition will bring together Foreign Ministers from the Partnership's member countries as well as representatives from civil society. Among other initiatives, the recommendations of the Forum's working group on accountability regimes (please insert this link for ‘accountability regimes’: https://informationdemocracy.org/working-groups/accountability-regimes/) for social networks and their users will be published.

      In its 4 years of work, launched by Reporters Without Borders in 2018, one of the International Initiative on Information and Democracy key results is an international coalition of 43 civil society and research organizations formed to promote democratic principles in the digital space. Therefore, the Summit will allow for better coordination of efforts to create a democratic digital space.

      EXCERPT: The Second Summit of the Partnership for Information and Democracy will be held on September 22, 2022 on the sidelines of the UN General Assembly. It is currently supported by 45 countries, and serves as a framework for multilateral reflection on the implementation of democratic guarantees in the global communication and information space. The Summit aims for better coordination in creating a safe democratic digital space.

      TOPIC: Freedom of expression, Freedom of the press

      LINK: https://rsf.org/en/second-summit-information-and-democracy-be-held-new-york-22-september-2022 & https://informationdemocracy.org/working-groups/accountability-regimes/

      DATE: 19.09.2022.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Isporuka i ugradnja sledećih sistema: Realizacija strukturnog kablovskog sistema – računarsko- telefonska mreža cat.6a, optičko povezivanje. Multifunkcionalna dvorana: AV sistem za događaje uživo (pojačavanje audio signala, video projekcije, striming AV signala, snimanje događaja, Crestron integracija).

      test

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. ||VladaR||||AndrijanaG||||Katarina_An|| Here is text of Samarkand Declaration. I started annotating generic and digital aspects.

    2. the Programme for Infrastructure Development of the SCO Member States was adopted.
    3. the SCO Digital Literacy Programme.
    4. digital learning
    5. to build cooperation in the digitalization of health and consider the potential of telemedicine
    6. to cooperate in digital economy and support the development of digital technologies
    7. strengthening the potential of technoparks, joining efforts to develop the innovation ecosystem, conducting joint research and development, launching new digital projects in the SCO region
    8. comprehensive international convention on combating the use of ICTs for criminal purposes
    9. he key role of the United Nations in countering threats in the information space
    10. against the militarization of the ICT sphere,
    11. They consider it important to ensure the equal rights of all countries to regulate the Internet and the sovereign right of States to manage it in their national segment.
    12. Member States emphasize the key role of the UN in countering threats in the information space, creating a safe, fair and open information space built on the principles of respect for state sovereignty and non-interference in the internal affairs of other countries.
    13. to promote digital literacy
    14. n the field of international information security
    15. to enhance connectivity between Central Asia and South Asia
    16. approved the Comprehensive Plan for its implementation for 2023-2027
    17. the non-targeting of SCO against other states and international organizations
    18. a more representative, democratic, just and multipolar world order

      New framing to typical diplomatic language.

    19. new approaches are required to promote more equitable and effective international cooperation and sustainable economic development.
    20. stronger multipolarity, increased interconnectedness, accelerated pace of informatization and digitalization.

      three important sharpers of modern era.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Bridging the Digital Literacy Gender Gap in Developing Countries

      TITLE: New Policy Brief: Bridging the Digital Literacy Gender Gap in Developing Countries

      CONTENT: An international team worked on a Policy Brief, Bridging the Digital Literacy Gender Gap in Developing Countries to urge the G20 and other countries to address the digital literacy challenges women face.

      According to the data, when it comes to women being included in the digital sector, it is clear they are left behind. The gender gap in digital literacy in some economies, cultures, and locations inhibits women from taking advantage of improved educational possibilities and career prospects.

      This policy brief assesses the correlation between sociocultural and digital literacy gaps. The article goes on to explain why gaps in digital literacy start developing in young age and how most programs for developing digital skills miss the challenges that women confront in integrating into the digital world. In its conclusion, it identifies solutions to these problems and implores the G20 and other nations to deal with the particular difficulties associated with women's digital literacy.

      The main issue with women's access to digital resources is not the technology itself, but rather where women are situated in society. The gender digital gap is widened by elements including lack of autonomy, unequal access to education, and the perception of women as dangerous and unsafe in digital areas. You can read the full policy brief here (please insert this link on ‘here’: https://www.fenews.co.uk/wp-content/uploads/2022/09/Bridging-the-digital-literacy-gender-gap-in-developing-countries-2.pdf).

      EXCERPT: An international team worked on a Policy Brief, Bridging the Digital Literacy Gender Gap in Developing Countries. It urges the G20 and other countries to address the digital literacy challenges women face. The main issue with women's access to digital resources is not the technology itself, but rather where women are situated in society.

      DATE: 15.09.2022.

      LINK: https://www.fenews.co.uk/exclusive/bridging-the-digital-literacy-gender-gap-in-developing-countries/ & https://www.fenews.co.uk/wp-content/uploads/2022/09/Bridging-the-digital-literacy-gender-gap-in-developing-countries-2.pdf

      TOPIC: Gender rights online

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Meta-owned apps most vulnerable to cyberattacks, research suggests

      TITLE: Research shows that Meta-owned apps are the most vulnerable to cyberattacks

      CONTENT: TechShielder conducted a review of ten popular apps in the social, entertainment, and communication categories to determine which are the most likely to be hacked and what types of user data they store are at risk of being compromised.

      According to the study, the average number of Google searches each app receives about being hacked indicates its vulnerability to cybercrime. Facebook ranks first with an average of 550,000 monthly searches for ‘Facebook hacked.’ Following that, there are 246,000 searches for ‘Instagram hacked’ and 135,000 for ‘WhatsApp hacked.’

      With 49,500 and 27,100 searches, respectively, Snapchat and Twitch round out the top five. Netflix, YouTube, Telegram, Twitter, and Facebook's Messenger app were also included in the study. All of the apps reviewed by TechShielder store user email addresses and phone numbers, according to the company. Most collect names, credit card information, and cookies, which can provide a "in-depth" look into users' online lives.

      The survey also showed that Meta-owned products have the most information on their users when compared to other popular apps, and Telegram has the least.

      EXCERPT: TechShielder conducted a review of ten popular apps in the social, entertainment, and communication categories to determine which are most likely to be hacked. The average number of Google searches each app receives about being hacked indicates its vulnerability to cybercrime. Facebook ranks first with an average of 550,000 monthly searches for 'Facebook hacked'.

      LINK: https://cybernews.com/security/meta-owned-apps-vulnerable-cyberattacks/

      DATE: 14.09.2022.

      TOPIC: Cybersecurity, Cybercrime, Network security

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. 1.7.1 – Static Site Compatibility

      Newsletter Glue - Static Site Compatibility

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. DDoS Attacks on UK Firms Surge During Ukraine War

      TITLE: Increased DDoS attacks on UK companies during Ukraine war

      CONTENT: According to new Freedom of Information (FoI) data obtained from the industry regulator, the volume of DDoS attacks against UK financial institutions increased during the first few months of the Ukraine war.

      The Financial Conduct Authority (FCA) has given information that 14 DDoS attacks have occurred in 2022, compared to only five in all of 2021.

      Picus Security co-founder, Suleyman Ozarslan has explained: ‘UK financial institutions are in the crossfire of the ongoing war between Russia and Ukraine and have become a direct target for nation-state attackers and hacktivists seeking to disrupt Ukraine’s allies.’ With the importance of the finance sector as critical national infrastructure, Picus Security understands these attacks were carried out by state-sponsored and hacktivist operations.

      LINK: https://www.infosecurity-magazine.com/news/ddos-attacks-uk-firms-surge-during/

      EXCERPT: DDoS attacks against UK financial institutions increased during the Ukraine war. 14 DDoS attacks have occurred in 2022, compared to only five in all of 2021. Picus Security believes these attacks were carried out by state-sponsored and hacktivist operations

      DATE: 14.09.2022.

      TOPIC: Cyberconflict and warfare, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Iranian Hackers Launch Renewed Attack on Albania

      TITLE: Albania is yet again the target of new Iranian hacker attacks

      CONTENT: The office of Albanian Prime Minister Edi Rama tweeted over the weekend that the attacks targeted the Total Information Management System (TIMS), which assists in tracking individuals entering and exiting the country. Following a July 15 ransomware attack that knocked out multiple government services, Tirana decided last week to cut all diplomatic ties with Iran.

      The NATO member nation has long been Iran's adversary, providing refuge to tens of thousands of members of the Iranian opposition movement Mujahedeen-e-Khalq (MEK). The attack in July occurred just before the Free Iran World Summit that was scheduled to take place in Albania.

      Albania had joined forces with Microsoft and the FBI on attribution in order to ensure that the act was the result of state aggression.

      EXCERPT: The office of Albanian Prime Minister Edi Rama tweeted over the weekend that the attacks targeted the Total Information Management System (TIMS), which assists in tracking individuals entering and exiting the country. The FBI and Microsoft worked with the Albanian government to ensure that the act was the result of state aggression.

      LINK: https://www.infosecurity-magazine.com/news/iranian-hackers-launch-renewed/

      DATE: 13.09.2022.

      TOPIC: Cyberconflict and warfare, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Cyberspies drop new infostealer malware on govt networks in Asia

      TITLE: New infostealer malware dropped on Asian government networks by cyberspies

      CONTENT: Security researchers have discovered new cyber-espionage action targeting Asian governments, along with state-owned aerospace and defense companies, telecom companies, and IT organizations.

      This activity is being carried out by a distinct threat group previously associated with the "ShadowPad" RAT (remote access trojan). Recently, the threat actor used a much broader set of tools.The most current campaign appears to be almost entirely focused on Asian governments or public entities, such as some of the following: head of government/Prime Minister's office, government-owned aerospace and defense companies, state-owned media companies etc.

      Chinese hackers are most likely behind these espionage campaigns, but the evidence isn't credible enough to make a certain conclusion.

      EXCERPT: This cyber-espionage activity is being carried out by a distinct threat group previously associated with the "ShadowPad" RAT. The most current campaign appears to be almost entirely focused on Asian governments. Chinese hackers are most likely behind these espionage campaigns, but the evidence isn't credible enough to make a certain conclusion.

      DATE: 13.09.2022.

      LINK: https://www.bleepingcomputer.com/news/security/cyberspies-drop-new-infostealer-malware-on-govt-networks-in-asia/

      TOPIC: Cyberconflict and warfare, Cybercrime, Cybersecurity

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Vietnamese journalist gets five years in prison for “abusing democratic freedoms”

      TITLE: Vietnamese journalist gets five years of prison for his online criticism

      CONTENT: Le Anh Hung, a 49 year old journalist, was given a five-year prison sentence by a Hanoi court on August 30 for "abusing democratic freedoms" and "infringing upon the interests of the state." Hung frequently contributed to the Voice of America website and wrote on politics. He also frequently attacked Hoang Trung Hai, a former deputy prime minister and industry minister, whom he accused of corruption, abuse of authority, and espionage for China in his posts that criticized the ruling party's corruption and dominance.

      He published an open letter on his Facebook page that went viral three days prior to his arrest. The letter criticized government actions and demanded that a draft law designating "special economic zones" in three different regions of Vietnam be changed. The planned law had received harsh public criticism and had ignited demonstrations that were ruthlessly put down. Despite Hung's repeated claims that his mental health was excellent, he was detained in a mental institution in Hanoi for the first three years and ten months following his detention.

      This five-year prison sentence that Vietnam's authorities secretly handed down to independent journalist Le Anh Hung after imprisoning him for four years in appalling conditions apalls Reporters Without Borders (RSF). According to RSF, the authorities continue to abuse the legal system to impose draconian punishments in an effort to silence any criticism of media.

      EXCERPT: Journalist Le Anh Hung was sentenced to five years in a Hanoi court for "abusing democratic freedoms" and "infringing upon the interests of the state". Reporters Without Borders (RSF) says the authorities continue to abuse the legal system to impose draconian punishments in an effort to silence any criticism of media. Despite claims that his mental health was excellent, he was detained in a mental institution for the first three years and ten months following his detention.

      LINK: https://rsf.org/en/vietnamese-journalist-gets-five-years-prison-abusing-democratic-freedoms

      DATE: 12.09.2022.

      TOPIC: Freedom of the press, Freedom of expression

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. US Treasury Sanctions Iranian Minister Over Hacking of Govt and Allies

      TITLE: Iranian Minister Sanctioned by US Treasury for Hacking Government and Allies

      CONTENT: The Office of Foreign Assets Control (OFAC) of the US Department of the Treasury has sanctioned Iran's Ministry of Intelligence and Security (MOIS) and its Minister of Intelligence for allegations in engaging in cyber-enabled activities against the United States and its allies.

      "We will not tolerate Iran's increasingly aggressive cyber activities targeting the United States or our allies and partners," stated Brian E. Nelson, Treasury Undersecretary for Terrorism and Financial Intelligence.

      The MOIS would have guided several network connections of cyber threat actors engaged in cyber-espionage and ransomware attacks in assistance of Iran's political goals under Esmail Khatib's leadership.

      The MuddyWater ransomware operations against Turkish government entities in November 2021, the APT39 wide - spread theft of personally identifiable information (PII) in 2020, and, most recently, the cyber activity that directly impacted Albanian government websites are examples of these. These sanctions come just weeks after Microsoft revealed details of alleged hacking campaigns linked to MuddyWater that targeted Israeli organizations by exploiting Log4j 2 vulnerabilities in SysAid applications.

      EXCERPT: United States Office of Foreign Assets Control has sanctioned Iran's Ministry of Intelligence and Security (MOIS) and its Minister of Intelligence for cyber-enabled activities against the U.S. and its allies. "We will not tolerate Iran's increasingly aggressive cyber activities targeting the United States, …" said Brian E. Nelson, Treasury Undersecretary for Terrorism and Financial Intelligence.

      LINK: https://www.infosecurity-magazine.com/news/us-sanctions-iranian-ministry/

      DATE: 12.09.2022.

      TOPIC: Cyberconflict and warfare

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. North Korean Lazarus Group Hacked Energy Providers Worldwide

      TITLE: Energy providers hacked globally by North Korean Lazarus Group

      CONTENT: Between February and July 2022, the North Korean threat actor Lazarus Group ran a malicious campaign against energy providers all over the world. The campaign was previously revealed in part by Symantec and AhnLab in April and May, and Cisco Talos is now providing additional details.

      The security researchers stated in an advisory on Thursday that the Lazarus campaign involved the exploitation of vulnerabilities in VMWare Horizon to gain initial access to targeted organizations. Cisco Talos states that the recent Lazarus attacks targeted energy providers from various countries, including the United States, Canada, and Japan.

      The new Cisco Talos advisory is just the latest in a long line of documents detailing the Lazarus Group's hacking operations this summer. Elliptic, a blockchain analytics company, suggested in June that the threat actor was responsible for the $100 million theft from cryptocurrency firm Harmony. The Block recently linked the group to Axie Infinity's $600 million hack.

      LINK: https://www.infosecurity-magazine.com/news/lazarus-group-hacked-energy/

      DATE: 12.09.2022.

      TOPIC: Cyberconflict and warfare, Cybercrime

      EXCERPT: Between February and July 2022, the Lazarus Group ran a malicious campaign against energy providers all over the world. The campaign was previously revealed in part by Symantec and AhnLab in April and May. Cisco Talos is now providing additional details on the North Korean threat actor's operations.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Freedom House report on Beijing’s Global Media Influence: cyber aspects

      CONTENT: (For the next two paragraphs please use this link: https://www.voanews.com/a/china-s-global-media-influence-campaign-growing-says-freedom-house-/6736696.html) Freedom House report: Beijing's Global Media Influence: Authoritarian Expansion and the Power of Democratic Resilience, showed Beijing’s efforts to influence media in democracies, and their response. According to Freedom House, the Chinese Communist Party (CCP) employs a variety of tactics, including mass distribution of state-produced content, harassment and intimidation of local media outlets, targeted disinformation, and the use of cyberbullying and fake social media accounts.

      Sarah Cook, Freedom House's research director for China, Hong Kong, and Taiwan, and one of the report's authors said: ‘The Chinese government is using more sophisticated, more covert and more coercive tactics, like cyberbullying, or cyberattacks, or just phone calls to journalists, to try to pressure and influence coverage in countries around the world.’

      (From here on, please use this link: https://freedomhouse.org/report/beijing-global-media-influence/2022/authoritarian-expansion-power-democratic-resilience) Since 2019, more aggressive activities such as targeted harassment of individual reporters, cyberbullying, and cyberattacks against stigmatized media organizations have spread to 24 of the 30 countries under investigation in some form. Also, from 2019, news outlets or journalists from 7 countries have been targeted by cyberattacks that could be traced back to China. These cyberattacks increase the financial burden on media outlets to improve their defenses, and data theft hacking could endanger journalists and their sources.

      Nigeria has been identified as the country most vulnerable to Beijing's media influence campaigns.

      LINK: https://freedomhouse.org/report/beijing-global-media-influence/2022/authoritarian-expansion-power-democratic-resilience & https://www.voanews.com/a/china-s-global-media-influence-campaign-growing-says-freedom-house-/6736696.html

      TOPIC: Freedom of the press, Cybercrime

      DATE: 08.09.2022.

      EXCERPT: Freedom House report: Beijing's Global Media Influence: Authoritarian Expansion and the Power of Democratic Resilience, showed Beijing's efforts to influence media in democracies. Since 2019, news outlets or journalists from 7 countries have been targeted by cyberattacks that could be traced back to China. More aggressive activities such as targeted harassment of individual reporters, cyberbullying, and cyberattacks against stigmatized media organizations have spread to 24 of the 30 countries under investigation in some form. According to Freedom House, the Chinese Communist Party (CCP) employs a variety of tactics, including mass distribution of state-produced content, harassment and intimidation of local media outlets, targeted disinformation, and the use of cyberbullying and fake social media accounts.

    2. Beijing's Global Media Influence 2022

      TITLE: Freedom House report on Beijing’s Global Media Influence: cyber aspects

      CONTENT: (For the next two paragraphs please use this link: https://www.voanews.com/a/china-s-global-media-influence-campaign-growing-says-freedom-house-/6736696.html) Freedom House report: Beijing's Global Media Influence: Authoritarian Expansion and the Power of Democratic Resilience, showed Beijing’s efforts to influence media in democracies, and their response. According to Freedom House, the Chinese Communist Party (CCP) employs a variety of tactics, including mass distribution of state-produced content, harassment and intimidation of local media outlets, targeted disinformation, and the use of cyberbullying and fake social media accounts.

      (From here on, please use this link: https://www.voanews.com/a/china-s-global-media-influence-campaign-growing-says-freedom-house-/6736696.html) Sarah Cook, Freedom House's research director for China, Hong Kong, and Taiwan, and one of the report's authors said: ‘The Chinese government is using more sophisticated, more covert and more coercive tactics, like cyberbullying, or cyberattacks, or just phone calls to journalists, to try to pressure and influence coverage in countries around the world.’

      Since 2019, more aggressive activities such as targeted harassment of individual reporters, cyberbullying, and cyberattacks against stigmatized media organizations have spread to 24 of the 30 countries under investigation in some form. Since 2019, news outlets or journalists from 7 countries have been targeted by cyberattacks that could be traced back to China. These cyberattacks increase the financial burden on media outlets to improve their defenses, and data theft hacking could endanger journalists and their sources.

      Nigeria has been identified as the country most vulnerable to Beijing's media influence campaigns.

      LINK: https://freedomhouse.org/report/beijing-global-media-influence/2022/authoritarian-expansion-power-democratic-resilience & https://www.voanews.com/a/china-s-global-media-influence-campaign-growing-says-freedom-house-/6736696.html

      TOPIC: Freedom of the press, Cybercrime

      DATE: 08.09.2022.

      EXCERPT: Freedom House report: Beijing's Global Media Influence: Authoritarian Expansion and the Power of Democratic Resilience, showed Beijing's efforts to influence media in democracies. Since 2019, news outlets or journalists from 7 countries have been targeted by cyberattacks that could be traced back to China. More aggressive activities such as targeted harassment of individual reporters, cyberbullying, and cyberattacks against stigmatized media organizations have spread to 24 of the 30 countries under investigation in some form. According to Freedom House, the Chinese Communist Party (CCP) employs a variety of tactics, including mass distribution of state-produced content, harassment and intimidation of local media outlets, targeted disinformation, and the use of cyberbullying and fake social media accounts.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Increased Mortality Rates Linked to Cyber-Attacks Against Healthcare Organizations

      TITLE: Increased Mortality Rates as a Result of Cyber-Attacks on Healthcare Organizations

      CONTENT: According to new research from Proofpoint's Ponemon Institute, cyber-attacks on healthcare organizations increase mortality rates by more than 20%. The report surveyed 641 healthcare IT and security practitioners, and found out that 89% of them experienced an average of 43 attacks in the previous 12 months, with more than 20% experiencing one of these types of attacks: cloud compromise, ransomware, supply chain, and phishing.

      The most common consequences of these attacks, according to Proofpoint, were delayed procedures, which resulted in poor patient outcomes for 57% of healthcare providers and increased complications from medical interventions for approximately half of them.

      Ransomware was the most likely type of attack to have a negative impact on patient care, causing procedure or test postponements in 64% of cases and longer patient stays (59%).

      LINK: https://www.infosecurity-magazine.com/news/mortality-rates-linked-cyber/

      DATE: 11.09.2022.

      TOPIC: Cyberconflict and warfare, Cybercrime, Cybersecurity

      EXCERPT: Cyber-attacks on healthcare organizations increase mortality rates by more than 20%. 89% of healthcare IT and security practitioners experienced an average of 43 attacks in the previous 12 months. Cloud compromise, ransomware, supply chain, and phishing were the most common types of attacks.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. This is an interesting text on ways how to solve a problem with proper display of drop caps on the web.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Draft EU rules target smart devices with cybersecurity risks

      TITLE: Draft EU regulations direct smart devices that pose cybersecurity risks

      CONTENT: According to a European Commission document obtained by Reuters on Thursday, smart devices connected to the internet, such as refrigerators and televisions, will have to comply with strict European Union cybersecurity rules or risk being fined or banned from the bloc.

      On September 13, the EU executive will unveil its Cyber Resilience Act proposal. Following input from EU countries, it is likely to become law. Companies will be required to notify the EU cybersecurity agency ENISA of incidents within 24 hours of becoming aware of them, and to take corrective action.

      The paper states that if companies fail to comply, national surveillance authorities have the authority to ‘prohibit or restrict that product being made available on its national market, to withdraw it from that market or recall it.’

      EXCERPT: On September 13, the EU executive will unveil its Cyber Resilience Act proposal. Following input from EU countries, it is likely to become law. Smart devices connected to the internet, such as refrigerators and televisions, will have to comply with strict European Union cybersecurity rules.

      LINK: https://www.reuters.com/technology/draft-eu-rules-target-smart-devices-with-cybersecurity-risks-2022-09-08/

      DATE: 08.09.2022.

      TOPIC: Cybersecurity, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Battling Violence and Censors, Women in China Become ‘Invisible and Absent’

      TITLE: Women in China are being silenced online as a result of violence and censorship

      CONTENT: When an influential woman in China's #MeToo movement, Ms. Zhou Xiaoxuan, went to court against a famous TV anchor, Mr. Zhu Jun, the justice was not on her side. What happened was not the accuser, but the accused - was portrayed as the victim. Other cases of gender violence and gender related incidents also rapidly went viral. In each case, however, the conversation was quickly censored in order to reduce the ways in which the women had been assaulted. China’s Communist Party has used social media censorship to silence critics while amplifying comments that support the government's chosen narrative of social harmony. After carefully analysing the content, censors then remove popular comments or accounts which express views that deviate too far from the party line. Government censors used Weibo, a popular Chinese social media platform to boost the comments supporting the court’s decision against one of the victims of sexual assault mentioned above, while reducing and deleting messages in her support.

      TOPIC: Freedom of expression, Gender rights online

      LINK: https://www.nytimes.com/2022/09/06/business/china-women-metoo.html

      DATE: 06.09.2022.

      EXCERPT: Chinese women are not allowed to post freely about their experiences of gender-related violence. #MeToo movement in China was restricted and censored by the ruling China’s Communist Party. Social media censorship is one of the main tools the government use in order to prevent women to express themselves and point out the unjust situation in the country regarding their mistreatment.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL