1. Oct 2022
    1. Its success reshaped the industry, allowing fab-less design companies to flourish, without the financial burden of building pricey new factories every few years. Today tsmc is the biggest chipmaker in the world by market value.
    2. only outfits that manufactured huge amounts of chips would be cost-competitive. With lavish support from Taiwan’s government, TSMC was born.
    3. put into practice a long-held idea for a firm that made chips designed by customers
    4. First, the Soviet Union tried and failed to replicate Silicon Valley.

      It will be interesting to learn about this attempt. It was probably one of the reasons for the failure of the Soviet Union.

    5. In “Chip War”, his elegant new book, Chris Miller of Tufts University shows how economic, geopolitical and technological forces shaped this essential industry.

      to check this book.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Africa group of OECD and African Ambassadors could provide strategic insights.
    2. ncluding members of the Governing Board of the Development Centre
    3. over the next six months,the Secretariat will conduct extensive consultations in order to narrow down the scope and define the main pillars of the partnership.
    4. urther inclusion in OECD databases
    5. withOECD standardswhere possible
    6. Policy Reviews
    7. Knowledge sharing, peer-learning and high-level policy dialogues
    8. rely onevidence-based policy analysis and policy dialogue
    9. to strengtheningthecoherence of policy frameworks
    10. on an equal footing in global policy-making and standard-setting can enhance the international community’s response to global challengesand help further level the global playing field.
    11. in some instances–global standard-setting
    12. for greater recognition of Africa in global governance and for the development of a co-designed, mutually beneficial partnership.1

      ||sorina|| Maybe to quote it somewhere?

    13. with a platform for policy dialogue through which African partners can provide their perspectives on standards
    14. strengthenAfrican policymakers’voices

      ||sorina|| OECD wants also to 'strenghten African policy makers voices' (but not in digital field).

    15. to build an impactfulpartnershipbased ontrust,mutual understanding and enhancedco-operation on an equal footing,to addressmutually agreed priorities.
    16. Africa’s priorities are guided by Agenda 2063, a wide-ranging long-term vision for the continent.
    17. the Africa Infrastructure Index scores improved for almost all African countries between 2018 and 2020.

      to introduce this index into our statistics.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. It is a time to unite behind a new grand narrative for Europe and to build a vibrant organisation.
    2. a vibrant, influential and inclusive community
    3. there is a community that gets motivated by it and an organisation that ensures its implementation
    4. this new narrative cannot be about reaching a compromise that only disguises a common lowest denominator. It must be about making bold choices.
    5. there are anchoring points to build on.
    6. it is difficult to predict how things will unfold
    7. a unique opportunity to write history, to try to serve a greater purpose, and to make a difference.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. 2Open Loop is a global program that connects policymakers and technology companies to help develop effective and evidence-based policies around AI and other emerging technologies.

      Open Loop project of Meta/Facebook on linking policymakers and technology companies.

      ||sorina||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. 2022 Annual Report on Implementation

      This is the most serious analyusis of the US cybersecurity. It provides useful summary of international activities in the field of cybersecurity.

      ||VladaR||||AndrijanaG||||sorina||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Against this backdrop, Mr. Selassie pointed to four priorities for policy makers in the region:

      nice sentence for linking to thoughts

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: NATO establishes review board to govern responsible use of AI

      CONTENT: NATO has established a Review Board to govern the responsible development and use of artificial intelligence (AI) and data across the organisation. The decision was taken at the meeting of NATO Ministers of Defence which took place in Brussels on 12–13 October 2022. The Data and Artificial Intelligence Review Board (DARB) will work on developing a user-friendly responsible AI certification standard to help align new AI and data projects with NATO's Principles of Responsible Use. The board is also expected to act as a platform allowing the exchange of views and best practices to help create quality controls, mitigate risks, and adopt trustworthy and interoperable AI systems. NATO member states will designate one national nominee to serve on the DARB. Nominees could come from governmental entities, academia, the private sector, or civil society.

      TECHNOLOGY: AI

      DATE: 13 October 2022

    2. platform to exchange best practices, guide innovators and operational end-users throughout the development phase, thereby contributing to building trust within the innovation community
    3. develop a user-friendly Responsible AI certification standard, including quality controls and risk mitigation, that will help align new AI and data projects with NATO’s Principles of Responsible Use approved in October 2021
    4. establish a Review Board to govern the responsible development and use of Artificial Intelligence (AI)
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Turkey: new ‘disinformation’ law could jail journalists for three years

      TITLE: Turkey’s new disinformation law imposes threats to domestic journalism and social media

      CONTENT: A comprehensive new rule that could result in up to three years in prison for people suspected of disinformation spreading has been approved by the Turkish parliament.

      Wide-ranging clauses of the contentious bill, put out by the government's Justice and Development party (AKP), are designed to control domestic journalism as well as social media.

      The bill provides a framework for extensive censorship of online information and the criminalization of journalism, which will enable the government to further subdue and control public debate in the run-up to Turkey's general elections in 2023, according to a coalition of 22 press freedom organizations.

      Additionally, the new law mandates that messaging services like WhatsApp, which is also owned by Meta, submit user information to the government upon request from the nation's Information and Communication Technologies Authority.

      EXCERPT: Turkey's parliament has approved a bill that could result in up to three years in prison for people suspected of spreading disinformation online. The bill, put out by the government's Justice and Development party (AKP), is designed to control domestic journalism as well as social media.

      LINK: https://www.theguardian.com/world/2022/oct/13/turkey-new-disinformation-law-could-jail-journalists-for-3-years

      DATE: 13.10.

      TOPIC: Freedom of the press, Freedom of expression, Content policy

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Report Shows How China Has Been Using Cyberattacks Over the Past Decade

      TITLE: Report documents China's use of cyberattacks over the past ten years

      CONTENT: According to a report released on October 12, by consultancy firm Booz Allen Hamilton, Chinese state-sponsored cyberattacks pose a growing threat to US national security.

      ‘Same Cloak, More Dagger: Decoding How the People's Republic of China (PRC) Uses Cyber Attacks’ is a report aimed at CISOs of American companies and their allies, as well as threat analysts. It provides a thorough examination of more than 13 case studies of Chinese-sponsored cyberattacks over the last decade.

      According to their results, China is creating and using cyberattack capabilities to further its 'core interests' at home. These cyberattacks are a supplement to China's more well-known and varied efforts to use legal, financial, cultural, political, and technical tools to further its objectives online.

      Booz Allen did clarify that the report's main source of research was open-source. It is likely impossible to properly determine the exact extent of China's cyberattack capabilities from open sources. It's probable that China decided not to use all of its resources or that it did so secretly, based on the study.

      LINK: https://www.infosecurity-magazine.com/news/report-china-cyberattacks-past/

      DATE: 14.10.

      TOPIC: Cyberconflict and warfare

      EXCERPT: 'Same Cloak, More Dagger: Decoding How the People's Republic of China Uses Cyber Attacks' is a report aimed at CISOs of American companies and their allies. It provides a thorough examination of more than 13 case studies of Chinese-sponsored cyberattacks over the last decade. It is shown that Chinese state-sponsored cyberattacks pose a growing threat to US national security.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Kazakh outlet Orda, staff subjected to months of threats, online harassment, cyberattacks

      TITLE: Kazakh media outlet Orda’s staff suffer from months of cyberattacks and online harassment

      CONTENT: The Committee to Protect Journalists said on Wednesday that Kazakhstani authorities should fully examine recent threats against independent news website Orda and its head editor Gulnara Bazhkenova and safeguard the safety of the publication and its personnel.

      Following the publishing by the outlet of an investigation into suspected lobbying methods by a corporation apparently related to Kazakhstan's former president, Nursultan Nazarbayev, there have been several internet harassments and cyberattacks against Bazhkenova, her family, and Orda.

      While Orda has improved its cybersecurity, Bazhkenova claims that DDoS and other types of cyberattacks have been ongoing since July, with perpetrators constantly looking for ‘weak spots’ that cause the site to go offline for brief periods.

      In addition to the website cyberattacks, she claims that unidentified users have flooded Orda's Telegram chat with derogatory images and insults aimed at Bazhkenova and Orda staff. However, most recently, the online insults have been replaced by threats against her and her 7-year-old son. LINK: https://cpj.org/2022/10/kazakh-outlet-orda-staff-subjected-to-months-of-threats-online-harassme nt-cyberattacks/

      EXCERPT: Cyberattacks against independent news outlet Orda have been ongoing since July, with perpetrators constantly looking for 'weak spots' that cause the site to go offline for brief periods. The Committee to Protect Journalists said on Wednesday that Kazakhstani authorities should fully examine recent online threats.

      DATE: 12.10.2022.

      TOPIC: Freedom of the press, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Greece: At a meeting with RSF, the government commits to ban the use of spyware

      TITLE: Greek government promises ban on spyware of journalists at the meeting with RSF

      CONTENT: At their meeting on October 10th, the representative of RSF requested that the Deputy Minister to the Prime Minister and Government Spokesperson, Ioannis Oikonomou, initiate discussions for a complete reform of the legal safeguards against the arbitrary surveillance of journalists.

      The recent revelations of the intelligence agency's surveillance of reporters using spyware have increased the gap of mistrust between Greek journalists and the authorities, according to Pavol Szalai, head of RSF's European Union and Balkans desk. He further stated that the new legal framework the government promised must be both ambitious and properly consult with the main stakeholders: journalists.

      The government ‘will soon submit a bill to make the use of spyware illegal,’ according to Ioannis Oikonomou, who also reiterated that the Greek authorities did not acquire or use Predator, in response to Pavol Szalai's call for legislation on spywares.

      LINK: https://rsf.org/en/greece-meeting-rsf-government-commits-ban-use-spyware

      EXCERPT: Reporters Without Borders (RSF) has called for a complete reform of the legal safeguards against the arbitrary surveillance of journalists in Greece. The government 'will soon submit a bill to make the use of spyware illegal,' according to Ioannis Oikonomou, who also reiterated that the Greek authorities did not acquire or use Predator.

      TOPIC: Freedom of the press

      DATE: 12.10.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. criminal use

      cybercrime emphasised only, other issues not

    2. Security of and in the use of ICTs

      always interesting to observe the terminology. SCO for instance uses 'international information security' and 'threats in the information space, creating a safe, fair and open information space'

    3. contacts and exchanges

      this can be indications of what we can expect as CBMs to be developed (following good practices from the UN, OSCE, ASEAN on contact points, etc)

    4. on the basis

      interestingly, 'sovereignty' is not mentioned here, unlike in SCO. why?

    5. Sharing information, best practicesand raising awarenessin the field of security

      This is currently the only somewhat clear CBM (or two - sharing information, and raising awareness), but still underdeveloped

    6. dialogue on confidence-building

      Seems it's still in the early stage, as no specific measures exist yet. Worth following further as it develops (since members are also some states that are members of ASEAN, we can expect certain spill-over and ideas on CBMs from there possibly)

    7. reducing misunderstanding

      wording also used in UN and OSCE as a goal

    8. internationally agreed legal framework

      Hint to the work on a UN cybercrime convention

    9. Promoting open, secure, peacefuland cooperative ICT environment

      Reference to 'open'.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Chang created TSMC, which produces chips designed by its clients, as opposed to designing its own. The company now produces 92 per cent of the world’s most advanced semiconductors.
    2. after Congress passed legislation to provide $52bn to bolster domestic semiconductor production in the US.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Areas like artificial intelligence and quantum computing were particularly important, he told the audience.
    2. for a "grown-up" conversation about collaboration with China at UK universities.
    3. we understand that there is no free good here.
    4. for Chinese digital currencies
    5. New standards for the internet proposed by China
    6. the BeiDou satellite system - a rival to the established GPS network which he said had been built into exports to more than 120 countries.
    7. to create "client economies and governments" by exporting technology to countries around the world
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Otherwise, our model will perish, will not be able to survive in this world.  
    2. Our fight is to try to explain that democracy, freedom, political freedom is not something that can be exchanged by economic prosperity or social cohesion.
    3. hat are the links between political freedom and a better life.
    4. When we say that China is our rival, systemic rival, systemic rival means that our systems are in rivalry. And the Chinese are trying to explain to the world that their system is much better. Because, well, maybe you are not going to choose your head of government, but you will have food, and heat, and social services, you will improve your living conditions. Many people in the world, yes, they go and vote and choose their government, but their material conditions are not being improved. And in the end, people want to live a better life.  
    5. in this battle of narratives
    6. I need my delegations to step up on social media, on TV, in debates. Retweet our messages, our [European] External Action Service materials. Certainly, my blog, which is the everyday “consigna”. Tailor it to the local circumstances, use local languages. The first problem is that we speak English but a lot of people around the world do not speak English and do not understand if we address them in English. Do it in local languages. We still have a “reflex” of European culture: we speak our languages, and we expect the rest of the world to understand us. Many, many people around the world do not understand, not even Spanish.  
    7. We provide you with materials and I have the feeling that you do not transmit the message strongly enough.  
    8. And I am still surprised that, in some delegations, it seems that they do not take enough consideration of our communication, and they do not tweet and re-tweet the messages that we are delivering from the centre. You have to be a network that is repeating, transmitting, insisting. 

      Importance of social media.

    9. we are creating new dependencies in this link between energy, climate [and] technology.
    10. we cannot substitute one dependency by another.
    11. We have to try to think in the medium and long-term
    12. between what we announce and what we implement,
    13. Please, be prepared for better explanation of what we do with a time schedule.

      Time component in diplomacy.

    14. It does not mean anything one figure if you do not put a time dimension.
    15. When we hesitate, we regret it.  
    16. Take more initiative. Be ready to be bold.
    17. Behave as you would behave if you were an Embassy: send a telegram, a cable, a mail - quickly. Quickly, please, react.  
    18. I think that we have to be faster and to take risks. I need you to report fast, in real time on what is happening in your countries. I want to be informed by you, not by the press. Sometimes, I knew more of what was happening somewhere by reading the newspapers than reading your reports. Your reports come sometimes too late. Sometimes, I read something happening somewhere and I ask “what [does our Delegation [say]. For the time being, nothing. “For the time being, nothing” is not affordable. You have to be on 24-hours reaction capacity. Immediately - something happens, you inform. I do not want to continue reading in the newspapers about things that happened somewhere with our Delegation having said nothing.  

      What is the future of diplomatic reporting?

      ||Jovan||

    19. It is no longer the economy, it is the identity.
    20. We think that we know better what is in other people’s interests.
    21. to overestimate the rational arguments.
    22. more empathy
    23. to listen more
    24. we have the “Brussels effect” and we continue setting standards, but I believe that, more and more, the rest of the world is not ready to follow our exportation of model.
    25. we try to export our model, but we do not think enough about how the others will perceive this exportation of models.
    26. with Team Europe and the Global Gateway
    27. we have to think more politically.
    28. apart from that, there [are] the hybrid wars, there is the disinformation war that continues. I want to stress the importance of the war on information and disinformation – I will talk about it later.  
    29. the global system does not deliver,
    30. These people do not want to be forced to take sides in this geopolitical competition.
    31. the rising nationalism, revisionism plus identity politics.
    32. Everything is a weapon: energy, investments, information, migration flows, data, etc. There is a global fight about access to some strategic domains: cyber, maritime, or outer space. 
    33. what the Mexican President said about us yesterday.  
    34. There is an authoritarian trend.
    35. a fight between the democratic systems and the authoritarian systems.
    36. We cannot say “we are the democracies”, and the ones which follow us are also democracies - that is not true. That is not true. 
    37. the US-China competition
    38. a messy multipolarity.
    39. the degree to which Russia is becoming a major factor in African theatres – yes, it is a surprise. We could not – we should [have] -, but we did not imagine how quickly, from the Central African Republic, now to Mali, and I do not know what is happening in Burkina Faso. 
    40. the reaction of the Central Banks raising interest rates in the United States. Everybody has to follow, because otherwise their currency will be devaluated.
    41. the world food and energy crises
    42. the deep US-China competition
    43. So, we have a difficult cocktail – internal and external – and the old recipes do not work anymore. We have mounting security challenges and our internal cohesion is under threat. 
    44. You - the United States - take care of our security. You - China and Russia – provided the basis of our prosperity. This is a world that is no longer there. 
    45. we delegated our security to the United States
    46. The best energy is the one that you produce at home.
    47. the access to the big China market, for exports and imports, for technological transfers, for investments, for having cheap goods
    48. on cheap energy coming from Russia
    49. we have decoupled the sources of our prosperity from the sources of our security
    50. uncertainty is the rule.
    51. a world of radical uncertainty.
    52. the new ‘frontiers of diplomacy’
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. ECOWAS Programme on the Promotion of Digital Skills and Digital Entrepreneurship for Youth

      ECOWAS - capacity development programme

    2. The legal framework as provided by ECOWAS to regulate electronic transactions

      ECOWAS legal framework for electronic transactions

      • data protection
      • electronic transactions
      • cybercrime
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Ukraine Enhances Cooperation With EU Cybersecurity Agencies

      TITLE: Ukraine tightens collaboration with EU cybersecurity agencies

      CONTENT: Recently, representatives from the European Union Agency for Cybersecurity (ENISA) and the State Service of Special Communications and Information Protection of Ukraine (SSSCIP) met to explore enhancing networking and collaboration.

      The working meeting took place as part of the Cybersecurity East Project trip to the ENISA headquarters in Athens.

      After the conference, Viktor Zhora, the deputy head of the SSSCIP, stated: ‘Cooperation with the European partners includes two key vectors for our country. On the one hand, Ukrainian experience in cyber-war, confronting cyber-threats from Russia would definitely be beneficial for other democracies.’

      The SSSCIP claimed that the meeting was essential for European integration as well, with ENISA special partner status being a key step in that direction since the Ukrainian conflict has pushed the country even further toward its Western peers.

      According to SSSCIP, achieving this accreditation is a crucial step in the process of aligning national cybersecurity laws with EU law.

      DATE: 10.10.

      TOPIC: Cybersecurity, Cyberconflict and warfare

      EXCERPT: Ukraine and the European Union have met to discuss enhancing networking and collaboration. The meeting took place as part of the Cybersecurity East Project trip to the ENISA headquarters in Athens. SSSCIP claimed that the meeting was essential for European integration as well, with ENISA special partner status being a key step in that direction. This will also push the country's aligning of national cybersecurity laws with EU law.

      LINK: https://www.infosecurity-magazine.com/news/ukraine-cooperation-with-eu/

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. science diplomacy

      I found this article very enriching because it made me reflect on the need of implementing scientific models to predict alternative outcomes in specific scenarios of world politics (such as international conflicts).

    2. How can it effectively contribute to global goals and the common good
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. US airports' sites taken down in DDoS attacks by pro-Russian hackers

      TITLE: US airports’ hit with DDoS by pro-Russian hackers

      CONTENT: The websites of numerous major airports in the United States have allegedly been subjected to widespread distributed denial-of-service (DDoS) attacks, according to the pro-Russian hacktivist organization 'KillNet.'

      Travelers are unable to login and receive information about their booked flights or make reservations for airport services because the servers hosting these sites are being overloaded by trash requests as a result of the DDoS attacks.

      The Hartsfield-Jackson Atlanta International Airport (ATL), one of the nation's major air traffic hubs, and the Los Angeles International Airport (LAX), which is occasionally offline or very slow to reply, are notable examples of airport websites that are now inaccessible.

      DATE: 10.10.

      LINK: https://www.bleepingcomputer.com/news/security/us-airports-sites-taken-down-in-ddos-attacks-by-pro-russian-hackers/

      TOPIC: Cyberconflict and warfare, Cybercrime

      EXCERPT: The websites of numerous major airports in the U.S. have allegedly been subjected to widespread distributed denial-of-service attacks caused by pro-Russian hackers. The Hartsfield-Jackson Atlanta International Airport (ATL), and the Los Angeles International Airport are notable examples of airport websites that are now inaccessible.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. seven nations onboard with a moratorium on destructive tests of anti-satellite weapons

      To look into: Moratorium in destructive tests of anti-satellite weapons (now with 7 countries on board). ||sorina||

    2. he FCC adopted new rules for defunct satellites.

      To look into: FCC rules for defunct satellites. ||sorina||

    3. Firefly gets to orbit. The company has put satellites on orbit with the first launch of its Alpha rocket.

      Firefly - new player in the satellites sphere

    4. ViaSat merges with Inmarsat

      To cover: ViaSat and Inmarsat merging -> stronger competition in this space?

    5. the first Russian astronaut to depart from the US since the days of the Space Shuttle

      Still some RU-US cooperation in space.

    6. when NASA announced that it would study the feasibility of a privately led and funded mission that would use a Dragon to boost the Hubble space telescope to a higher altitude, thus extending the operational life of the flagship observatory

      NASA looking into possibly funding a private-led mission to use a SpaceX Dragon spacecraft to boots Hubble to a higher altitude (for an expanded operational life).

      A new level of #PPP in space.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Diplomatic Footprintof International Geneva

      The Diplomatic Footprint of International Geneva displays the visibility of 236 Geneva-based actors (link) when one searches Google for 267 policy, governance and diplomatic topics (link).

      The Diplomatic Footprint of International Geneva is calculated and evaluated based on Google searches routinely conducted in 53 cities around the world.

      *From the analysis on the page, I deduced that some actors were not mentioned at all. I believe that for the purpose of transparency and research integrity, they should be shown as well (as in, if they have 0 mentions, that should be visible to viewers, too). That's why I believe that there should be a link of all the actors used for each analysis (same for tech footprints and global media houses).

    2. Compare to the other actors:

      How is the weighted score calculated?

    3. Select the topic field of interest:

      The legend of this graph is not clearly presented. For example, the it wasn't shown that the color bar at the right-hand side represents the points an actor receives. The bottom axis should be named "the number of mentions an actor receives" instead of "#mentions". What the size of the dots represents isn't clear either.

      As the main metric used for this analysis is by the points, maybe the X axis could be marked by the points instead of the number of mentions? Vice versa, the colors could represent the number of mentions instead?

      For the y axis: How is the average rank calculated? Is it points divided by number of mentions?

    4. Select the search topic:

      It might be clearer if the graph information (now embedded in the "i" button) could be directly shown somewhere on the page.

    5. Digital Footprint

      Where could this link be found on Diplo's website?

      Also, in each Footprint, there are three ways to view the data: Ranking by topics, Ranking by actors, and Actor analysis. It might be better if on this homepage, there could be explanation texts about what each of these ways allows you to see (and why view from this way).

      There should also be some explanatory texts on what the Digital Footprint is in general (an analysis based on of searchability of actors/link analysis).

    6. Diplomatic Footprint of Global Media

      Title: "of Global Media" should be put to the second line

      The Diplomatic Footprint of Global Media displays the visibility of 45 media houses (link) when one searches Google for 267 policy, governance and diplomatic topics (link).

      The Diplomatic Footprint of global media is calculated and evaluated based on Google searches routinely conducted in 53 cities around the world.

    7. Tech Footprint of Global Media

      Title: "of Global Media" should be put to the second line

      The Tech Footprint of Global Media displays the visibility of 45 media houses (link) when one searches Google for 269 tech topics (link).

      The Tech Footprint of Global Media is calculated and evaluated based on Google searches routinely conducted in 12 cities around the world.

    8. Tech Footprintof International Geneva

      The Tech Footprint of International Geneva displays the visibility of 204 Geneva-based actors (link) when one searches Google for 269 tech topics (link).

      The Tech Footprint of International Geneva is calculated and evaluated based on Google searches routinely conducted in 12 cities around the world.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. How Cyberfeminism Is Helping Women Forge Solidarities In Conservative Societies

      TITLE: Expansion of cyberfeminism in the Middle East and South Asia

      CONTENT: Feminist activists in Iraq started a social media campaign in September last week to call for the Ministry of Education to issue a formal resolution that will forbid ‘the imposition of the veil as a condition for academic enrollment.’

      The online campaign, which emphasized the value of women's personal freedom, provided another illustration of how cyberfeminism is taking a dynamic shape in the Middle East and South Asian countries through the hashtag #No_for_forced_veiling on Iraqi social media networks.

      LINK: https://www.outlookindia.com/national/how-cyberfeminism-is-helping-women-forge-solidarities-in-conservative-societies-news-228660

      DATE: 09.10.

      TOPIC: Gender rights online

      EXCERPT: Feminist activists in Iraq started a social media campaign to call for the Ministry of Education to issue a formal resolution that will forbid 'the imposition of the veil as a condition for academic enrollment'. The online campaign, which emphasized the value of women's personal freedom, generated #No_for_forced_veiling on Iraqi social media networks.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Germany's cybersecurity chief faces dismissal, reports say

      TITLE: Germany's cybersecurity chief may be dismissed

      CONTENT: Due to potential interactions with individuals associated with Russian security services, German Interior Minister Nancy Faeser wants to fire the nation's cybersecurity director, according to late-Sunday reports in German media that cited official sources.

      According to numerous sites, Arne Schoenbohm, the head of the federal information security organization BSI, may have had these contacts through the German Cyber Security Council.

      Schoenbohm founded the organization, which includes a German firm that is a subsidiary of a Russian cybersecurity firm founded by a former KGB employee.

      EXCERPT: Germany's interior minister reportedly wants to fire the nation's cybersecurity director. Arne Schoenbohm may have had contacts with individuals associated with Russian security services. His organization, BSI, is a subsidiary of a Russian cybersecurity firm founded by a former KGB employee.

      LINK: https://www.reuters.com/world/europe/germanys-cybersecurity-chief-faces-dismissal-reports-2022-10-09/

      TOPIC: Cybersecurity

      DATE: 10.10.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Thus, Russia’s preference for the UN reflects its position that states and national governments are the primary actors in information security. Other stakeholders, including the private sector, civil society and academia, play a subordinate role. While their respective roles and responsibilities are recognised, governments are ultimately seen as leading national efforts
    2. Coupled with Russia’s notion of information security, the emphasis on state sovereignty again evokes human rights concerns.
    3. an understanding of states and their governments as the primary actors responsible for the protection of the ICT environment.7
    4. Broadly speaking, the Russian understanding of information security goes beyond concerns regarding the security of information and communication technologies systems and also includesthe regulation of information or content flows.
    5. Like-minded states have, in particular,highlighted concerns over potential limitations of the free flow of information or content through greater government control.
    6. Rather than negating the applicability or adequacy of international law, a treaty is presented as a critical means to clarify how existing international law applies to cyberspace. This approach also highlights the possibility of identifying and codifying additional legal norms.
    7. Ever since the beginning of UN discussions in 1998, Russia has, in particular,stressed the need to negotiate a formal international legal agreement in this area.
    8. Russia initiated discussions in the Committee in 1998 with a draft resolution entitled ‘Developments in the field of information and telecommunications in the context of international security’.
    9. Like-minded states mainly from the Global North advocate an open, free and secure cyberspace that preserves the free flow of information globally, while another group led by Russia and China strive to establish a governance regime that would enable greater government control of cyberspace
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. as much as you know about your own

      Could people with such knowledge also be people in the middle/organge circle on the layers of persuasion? I mean, people at an organization who don't have the decision power but who you could persuade as a first step to help you persuade the actual decision makers? I guess it could be useful to get such support from someone on the "inside" who know the system, and for instance specifics like "time constraints" which is mentioned below.

    2. save face

      I assume this is why Macron said it was important "not to humiliate Russia". It was quite a controversial statement, but in line with this thought to allow Russia to change their position and find a peaceful solution.

    3. factual evidence

      Following our latest election for the parliament in Sweden, we now have a Government who wants to reduce our foreign aid. The argument from their side is often very unspecific and not at all based on facts, on the contrary, it seems to be more focused on the emotional persuasion (arguments like us vs. them, and aid is not working anyways). Most who argue agianst this do it using factual evidence. But it seems very hard to counter emotions with facts? How do we handle that in a humanitarian diplomacy situation, let's say a negotiation?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The Semiconductor Industry Association, which represents chipmakers, said it was studying the regulations. It urged the United States to implement the rules "in a targeted way" and called for collaboration internationally to "help level the playing field".
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. “In which case,” she noted, “US firms will lose market share and China will find a bypass to the US restrictions, a worst-case scenario.”
    2. “Preserving our edge in science and technology is not a domestic issue or national security issue. It’s both,” he said.
    3. China’s National Computer Centre, the Beijing Institute of Technology and Beijing Sensetime Technology Development, a subsidiary of a major Chinese AI company.
    4. allows Washington to extend its reach well beyond its borders, preventing companies globally from sending products to the China firms made with US software, machinery or technology.
    5. it would impose restrictions on 31 Chinese companies, research institutions and related groups effective October 21
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Six countries selected to host future European quantum computers

      CONTENT: The European High Performance Computing Joint Undertaking (EuroHPC JC) had announced the the selection of six sites across the EU to host and operate the first EuroHPC quantum computers: Czechia, France, Germany, Italy, Poland, and Spain. The quantum computing systems to be developed within these sites are to be made available to European users (scientific communities, industry, the public sector, etc.) mainly for research and development purposes.

      For background, the EuroHPC JU is a legal and funding entity launched in 2018 to enable the EU and countries participating in the EuroHPC to coordinate efforts and resources towards developing supercomputing facilities in the EU.

      TECHNOLOGY: Emerging technologies

      TREND: Quantum computing

      Date: 4 October 2022

    2. quantum computer infrastructure will support the development of a wide range of applications with industrial, scientific and societal relevance for Europe, adding new capabilities to the European supercomputer infrastructure.
    3. available primarily for R&D purpose to a wide range of European users, no matter where in Europe they are located, to the scientific communities, as well as to industry and the public sector
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: US White House publishes Blueprint for an AI Bill or Rights

      CONTENT: The US White House, through the Office of Science and Technology Policy, has issued a Blueprint for an AI Bill of Rights to guide the development, deployment, and use of automated systems. The blueprint outlines five key principles and is accompanied by a framework to help incorporate the protections into policy and practice.

      The five principles are:

      • Safe and effective systems: Users should be protected from unsafe and ineffective systems.
      • Algorithmic discrimination protection: Users should not face discrimination by algorithms and systems should be used and designed in an equitable way.
      • Data privacy. Users should be protected from abusive data practices via built-in protections and should have agency over how data about them is used.
      • Notice and explanation: Users should know that an automated system is being used and understand how and why it contributes to outcomes that impact them.
      • Human alternatives, consideration, and fallback: Users should be able to opt out, where appropriate, and have access to a person who can quickly consider and remedy problems they encounter.

      Within the scope of the blueprint are automated systems that have the potential to meaningfully impact the public's rights, opportunities, or access to critical resources or services.

      It is important to note that the blueprint does not have a regulatory character, and is meant to serve as a guide.

      TOPICS: AI

      TRENDS: AI governmental initiatives

      DATE: 4 October

      COUNTRY: USA

    2. measures taken to realize the vision set forward in this framework should be proportionate with the extent and nature of the harm, or risk of harm, to people’s rights, opportunities, and access.

      proportionality

    3. blueprint to help protect the public from harm
    4. a two-part test to determine what systems are in scope. This framework applies to (1) automated systems that (2) have the potential to meaningfully impact the American public’s rights, opportunities, or access to critical resources or services

      applicability

    5. where appropriate.
    6. reasonable expectations
    7. You should know how and why an outcome impacting you was determined by an automated system, including when the automated system is not the sole input determining the outcome
    8. Continuous surveillance and monitoring should not be used in education, work, housing, or in other contexts where the use of such surveillance technologies is likely to limit rights, opportunities, or access
    9. free from unchecked surveillance; surveillance technologies should be subject to heightened oversight that includes at least pre-deployment assessment of their potential harms and scope limits to protect privacy and civil libertie
    10. appropriately and meaningfully given
    11. seek your permission and respect your decisions regarding collection, use, access, transfer, and deletion of your data
    12. pre-deployment and ongoing disparity testing and mitigation, and clear organizational oversight
    13. ensuring accessibility for people with disabilities in design and development
    14. roactive and continuous measures to protect individuals and communities from algorithmic discrimination and to use and design systems in an equitable way
    15. pre-deployment testing, risk identification and mitigation, and ongoing monitoring
    16. Independent evaluation and reporting
    17. protected from inappropriate or irrelevant data use in the design, development, and deployment of automated systems, and from the compounded harm of its reuse
    18. Automated systems should be developed with consultation from diverse communities, stakeholders, and domain experts to identify concerns, risks, and potential impacts of the system

      Hoe feasible this actually is?

    19. this framework is accompanied by From Principles to Practice—a handbook for anyone seeking to incorporate these protections into policy and practice, including detailed steps toward actualizing these principles in the technological design process

      framework to help put principles into practice

    20. five principles that should guide the design, use, and deployment of automated systems to protect the American public in the age of artificial intelligence. The Blueprint for an AI Bill of Rights is a guide for a society that protects all people from these threats—and uses technologies in ways that reinforce our highest values.

      Blueprint includes 5 principles. Aimed to serve as a guide.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The Kyiv Post reports that "tough" Russian threat actors target within their own country as reprisal for the Ukrainian war and the overall situation in Russia. The organization, known as the National Republican Army (NRA), apparently launched several attacks, including one on Unisoftware, a Russian software company that purportedly collaborates closely with government clients.

      NRA claimed to have stolen all data held by the firm, such as banking and personal account credentials, employee information, phone numbers, addresses, contracts, and proprietary code for Unisoftware clients and software.

      The group has also been linked to the attack on Russian IT retail chain DNS, which confirmed earlier this week that it had been breached without providing additional information

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Fumio Kishida, Prime Minister of Japan, has stated in a policy speech that the country's plans for investing in digital transformation include the Metaverse and non-fungible tokens (NFTs) services. In his address to Japan's parliament, Kishida stated Japan will continue to focus on 'supporting the social implementation of digital technology' and will 'promote efforts to expand the use of Web3 services that utilize the metaverse and NFTs.' Previously, Japan had recently established a Web3 policy office under the Ministry of Economy, Trade and Industry (METI), which is focused on improving the business environment related to Web 3.0. Furthermore, METI is reportedly looking into a proposal to offer tax exemptions to Japanese crypto companies to entice them to keep their business in the country and further fuel the nation's evolving Web3 sector.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Taliban shuts down two news websites in Afghanistan 

      TITLE: Taliban deactivate two news websites due to ‘false propaganda’ in Afghanistan

      CONTENT: According to a tweet from the ministry's spokesperson Anayatullah Alokozay and a report by the London-based independent Afghanistan International TV station, the Taliban's Ministry of Telecommunications and Information Technology shut down the websites of Hasht-e Subh Daily and Zawia News on Monday, October 3, due to 'false propaganda' against the Taliban.

      In separate statements on Monday, the Hasht-e Subh daily and Zawia News sites, which are run by Afghan journalists who have been reporting from exile since the August 2021 Taliban takeover, said the Taliban had deactivated their website domain names.

      Since then, Hasht-e Subh Daily has resumed its online presence under a new domain. According to Zawia News, it will keep publishing news on the website of Zawia Media, its parent firm.

      LINK: https://cpj.org/2022/10/taliban-shuts-down-two-news-websites-in-afghanistan/

      EXCERPT: Afghanistan's Ministry of Telecommunications and Information Technology shut down the websites of Hasht-e Subh Daily and Zawia News on Monday, October 3. The sites are run by Afghan journalists who have been reporting from exile since the August 2021 Taliban takeover.

      DATE: 04.10.

      TOPIC: Freedom of the press

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. FBI and CISA Publish Advisory on Malicious Cyber Activity Against Election Infrastructure

      TITLE: FBI and CISA joined in a public announcement on malicious cyber activities against election infrastructure

      CONTENT: An official public service announcement about hostile cyber activity intended to compromise election infrastructure has been released by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA).

      The agencies stated in the letter made public on Tuesday that it is unlikely that attempts to breach election infrastructure will result in widespread disruptions or stop voting.

      The notice also made clear that authorities employ a range of safeguards to lessen the possibility of hostile cyber activity compromising the security, reliability, or accessibility of election infrastructure systems.

      The Election Security Group (ESG), a body created at the end of August by the US Cyber Command (USCYBERCOM) and the National Security Agency (NSA), was created to safeguard electoral processes from hacking and disinformation before and during the November elections.

      EXCERPT: An official public service announcement about hostile cyber activity intended to compromise election infrastructure has been released by the FBI and CISA. The agencies stated that it is unlikely that attempts to breach election infrastructure will result in widespread disruptions or stop voting. Election Security Group (ESG) was created to safeguard electoral processes from hacking and disinformation.

      LINK: https://www.infosecurity-magazine.com/news/fbi-cisa-advisory-cyber-activity/

      DATE: 06.10.

      TOPIC: Cyberconflict and warfare, Cybersecurity, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. US govt shares top flaws exploited by Chinese hackers since 2020

      TITLE: US government agencies reveal top weak points exploited by Chinese hackers since 2020

      CONTENT: In order to attack government and critical infrastructure networks, hackers supported by the People's Republic of China (PRC) most frequently use certain security flaws, according to information released today by the NSA, CISA, and the FBI.

      In a combined alert, the three government agencies claimed that Chinese-sponsored hackers are targeting tech businesses and networks in the United States and its allies in order to enter private networks and steal intellectual property.

      The report also includes suggestions for addressing each of the security holes that Chinese threat actors use the most, as well as detecting techniques and weak technologies to aid defenses in identifying and thwarting incoming attacks.

      TOPIC: Cyberconflict and warfare, Cybercrime

      LINK: https://www.bleepingcomputer.com/news/security/us-govt-shares-top-flaws-exploited-by-chinese-hackers-since-2020/

      DATE: 06.10.

      EXCERPT: NSA, CISA, and FBI warn that Chinese-sponsored hackers are targeting tech businesses and networks in the U.S. and its allies to steal intellectual property. Report also includes suggestions for addressing each of the security holes that Chinese threat actors use the most.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Development

      Hi , greetings from South Sudan, the land of fish from the mighty River Nile in the middle of Africa!

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Mexico continued to use spyware against activists

      TITLE: Spyware still used by Mexico against activists

      CONTENT: Despite a commitment by President Andrés Manuel López Obrador to halt such activities, it is reported that the Mexican government or army has continued to utilize spyware meant to hack into the cellphones of activists.

      Press freedom advocacy organizations reported on Monday that they had discovered proof of recent attempts to target activists looking into Mexican army human rights violations using the Israeli spyware tool Pegasus. The University of Toronto group Citizen Lab conducted a forensic study to confirm the Pegasus virus.

      The targets included rights campaigner Raymundo Ramos, according to a report by the press freedom organization Article 19, The Network for the Defense of Digital Rights, and Mexican media outlets.

      TOPIC: Cybercrime, Freedom of expression

      LINK: https://apnews.com/article/technology-mexico-caribbean-hacking-cd4e4a0bcf13705072af19b2d97bbf63

      EXCERPT: Despite a commitment by President Andrés Manuel López Obrador to halt such activities, it is reported that the Mexican government or army has continued to utilize spyware. Targets included rights campaigner Raymundo Ramos, according to a report by the press freedom organization Article 19.

      DATE: 03.10.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. ICTs for the environment

      Q6/2: ICTs for environment

    2. option of telecommunications/ICTs and improving digital skills

      Q5/2: Adoption of telecom and improving digital skills

    3. Securing information and communication networks: Best practices for developing a culture of cybersecurity
    4. e-health and e-education

      Q2/2: e-health and e-education

    5. Sustainable smart cities and communities
    6. enable inclusive communication
    7. tions/information and communication technologies for rural and remote areas
    8. aspects of national telecommunications/ICTs1Statement
    9. The use oftelecommunications/ICTsfor disaster risk reduction and management
    10. tudy Group Questions

      SG Qs

    11. Fostering telecommunication/ICT-centric entrepreneurshipand digital innovation ecosystems for sustainable digital development

      Res...: Fostering telecom/ICT-centric entrepreneurship and digital innovation ecosystems

    12. he ITU Partner2Connect Digital Coalition

      Res...: ITU Partner2Connect digital coalition

    13. Connecting every school to the Internet and every young person to information and communication technology services

      Res...: Connecting every school

    14. ESOLUTION WGPLEN/1 (Kigali, 2022)Digitaltransformation for sustainable development

      Res...: Digital transformation for sustainable dev

    15. RESOLUTION 85(Rev. Kigali, 2022)Facilitating the Internet of Things and smart sustainable cities and communities for global development

      Res 85: Facilitating IoT and smart sustainable cities and communities for global development

    16. RESOLUTION 76(Rev. Kigali, 2022)Promoting information and communication technologiesamong young women and men for socialand economic empowerment

      Res 76: Promoting ICTs among young women and men for social and economic empowerment

    17. RESOLUTION 67(Rev. Kigali, 2022)The role of the ITU Telecommunication Development Sector in child online protection

      Res 67: Role of ITU-D in child online protection

    18. RESOLUTION66(Rev. Kigali, 2022)Information and communication technology, environment, climate change and circular economy

      Res 66: ICT, environment, climate change and circular economy

    19. RESOLUTION 58(Rev. Kigali, 2022)Telecommunication/information and communication technology accessibility for persons with disabilities and persons with specific needs

      Res 58: Telecom/ICTs accessibility

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL