1. Sep 2022
    1. UK condemns Iran for reckless cyber attack against Albania

      TITLE: Iran is condemned by the United Kingdom for its cyber attack on Albania

      CONTENT: On September 7, the United Kingdom officially condemned the Iranian state for a cyber attack against Albania's government which destroyed data and interrupted crucial government services such as paying utilities, booking medical appointments, and enrolling schoolchildren. According to the National Cyber Security Centre (NCSC), Iranian state-linked cyber actors are almost definitely accountable for a number of cyber attacks against Albanian government infrastructure beginning on July 15, 2022.

      UK Foreign Secretary James Cleverly declared that ‘The UK is supporting our valuable partner and NATO ally. We join Albania and other allies in exposing Iran’s unacceptable actions.’ The UK has already identified and provided advice on several cyberattacks by Iranian actors, starting with 2018.

      TOPIC: Cyberconflict and warfare

      LINK: https://www.gov.uk/government/news/uk-condemns-iran-for-reckless-cyber-attack-against-albania

      DATE: 07.09.2022.

      EXCERPT: This Wednesday, the United Kingdom condemned the Iranian state for a cyber attack against Albania's government which destroyed data and interrupted crucial government services such as paying utilities. The UK has already identified and provided advice on several cyberattacks by Iranian actors, starting with 2018.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Ransomware gang's Cobalt Strike servers DDoSed with anti-Russia messages

      TITLE: Ransomware gang’s Cobalt Strike servers receive anti-Russia messages in a series of DDoS

      CONTENT: There has been a flood of anti-Russian messages to Cobalt Strike servers run by former Conti ransomware gang members in order to disrupt their operations. Although the operators of Conti ransomware turned off their infrastructure this year in May, its members are now a part of other ransomware groups, including Quantum, Hive, and BlackCat. At the time, TeamServers (C2) used by ransomware actors to control the Cobalt Strike (CS) Beacon payloads on compromised hosts are being tracked by someone, allowing for lateral network movement. When they go inside the CS servers, the usernames they use are ‘Stop Putin!’, or they change their computer name to messages like ‘Be a Russian patriot!’, and ‘Stop the war!’ It is unknown who is sending these messages, as it could be anyone from a security researcher to law enforcement or even a cybercriminal with a grudge for siding with Russia, BleepingComputer reports. In the end, the disruption was only temporary, and the ransomware actor returned to the scene with a more robust infrastructure, allowing them to keep the stolen data accessible even in the face of distributed denial-of-service (DDoS) attacks. LINK: https://www.bleepingcomputer.com/news/security/ransomware-gangs-cobalt-strike-servers-ddosed-with-anti-russia-messages/ EXCERPT: There has been a flood of anti-Russian messages to Cobalt Strike servers run by former Conti ransomware gang members in order to disrupt their operations. At the time, TeamServers (C2) used by ransomware actors to control the Cobalt Strike (CS) Beacon payloads on compromised hosts are being tracked by someone, allowing for lateral network movement. TOPIC: Cybercrime, Cyberconflict and warfare DATE: 07.09.2022.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Albania blames Iran for the July cyberattack and suspends diplomatic relations

      CONTENT: Albanian Prime Minister, Edi Rama, declared on Wednesday that the entire staff of the Islamic Republic of Iran Embassy in Albania had been asked to leave within 24 hours.

      This decision follows the termination of diplomatic relations with Iran following the identification of an Albanian government infrastructure cyberattack to Iranian threat actors in July. Rama said that: ‘The in-depth investigation provided us with indisputable evidence that the cyberattack against our country was orchestrated and sponsored by the Islamic Republic of Iran through the engagement of four groups that enacted the aggression.’

      The U.S. government also officially blamed Iran for the July attack on Albania. The U.S. official said that they condemn this attack and that the Islamic Republic of Iran would be held responsible for endangering the security of a NATO ally. Further actions will be taken to held Iran accountable if another attack towards any of their NATO ally happens in the future. EXCERPT: Albanian Prime Minister, Edi Rama, declared on Wednesday that the entire staff of the Islamic Republic of Iran Embassy in Albania had been asked to leave within 24 hours. The U.S. government also officially blamed Iran for the July attack on Albania. The U.S. official said that they condemn this attack and that the Islamic Republic of Iran would be held responsible for endangering the security of a NATO ally. LINK: https://www.bleepingcomputer.com/news/security/albania-blames-iran-for-july-cyberattack-severs-diplomatic-ties/ TOPIC: Cyberconflict and warfare DATE: 07.09.2022.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Japan investigates the potential involvement of a pro-Russian group in cyberattacks

      CONTENT: Japan announced on Wednesday that it is looking into the possible role in cyberattacks of a pro-Russian group after numerous government websites were disrupted the day before. The ransomware group in question is ‘Killnet’, which is considered to be responsible for attacks on the government websites, as media quotes.

      According to Chief Cabinet Secretary Hirokazu Matsuno, the Japanese government is investigating whether problems accessing more than 20 websites across four government ministries were caused by a denial-of-service (DDoS) attack. Matsuno also explained that the government websites could not be reached on Tuesday evening.

      However, services were recovered the same day. He is aware this pro-Russian group is suggesting that they were behind the attack, but the case is still being investigated at the moment.

      EXCERPT: Japan announced on Wednesday that it is looking into the possible role in cyberattacks of a pro-Russian group named Killnet after numerous government websites were disrupted the day before. According to Chief Cabinet Secretary Hirokazu Matsuno, the Japanese government is investigating whether problems accessing more than 20 websites across four government ministries were caused by a denial-of-service (DDoS) attack.

      LINK: https://www.reuters.com/technology/japan-investigating-possible-involvement-pro-russian-group-cyberattack-nhk-2022-09-06/

      DATE: 07.09.2022.

      TOPIC: Cyberconflict and warfare, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The new Worok cyber-espionage group is targeting governments and high-profile corporations

      Worok, a newly discovered cyber-espionage group, has been using a combination of custom and existing malicious tools to hack governments and high-profile companies in Asia since 2020. ESET security researchers were the first to spot it, and they found out that the group also attacked targets from Middle East and Africa.

      Worok has so far been linked to attacks on telecommunications, banking, maritime, and energy companies, along with military, government, and public sector organizations. Although there have been no sightings since February 2022, ESET has linked the group to new attacks against a Central Asian energy company and a public sector institution in Southeast Asia.

      TOPIC: Cyberconflict and warfare, Cybercrime

      LINK: https://www.bleepingcomputer.com/news/security/new-worok-cyber-espionage-group-targets-governments-high-profile-firms/

      DATE: 06.09.2022.

      EXCERPT: Worok, a newly discovered cyber-espionage group, has been using a combination of custom and existing malicious tools to hack governments and high-profile companies in Asia since 2020. Although there have been no sightings since February 2022, ESET has linked the group to new attacks against a Central Asian energy company and a public sector institution in Southeast Asia.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. witzerland is well positioned to make a credible contribution towards the specification of the applicable rules in the digital space. This includes seeking to work more closely with the International Committee of the Red Cross (ICRC) on the protection of civilians in the digital space during armed conflicts

      Swiss strategic priorities

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: The JX Fund and Voronezh Mass Media Defence Center launched the information platform Shpargalka | Exile

      CONTENT: The JX Fund - European Fund for Journalism in Exile, in collaboration with the Voronezh Mass Media Defense Center, has launched the information platform Shpargalka | Exile (‘cheat sheet’ in Russian) to assist threatened media professionals in Russia in selecting a country of exile that is appropriate for them and their needs. Since the increase in anti-press legislation in Russia starting from 4 March, even the use of the word "war" can result in a 15-year prison sentence, so this type of platform is useful for media workers.

      Shpargalka | Exile has now compiled answers to 21 of the most pressing questions, like ‘How do I get a work permit?’, or ‘What do I need to do to register a media company in exile?’ All questions are being answered by lawyers from 12 countries, which currently include: Armenia, Azerbaijan, Bulgaria, Germany, Georgia, Israel, Kazakhstan, Latvia, Montenegro, Poland, Serbia, and Turkey.

      The information is regularly updated, as many countries' entry requirements and legal systems constantly change in light of the tense geopolitical situation. In recent months, the JX Fund has helped 14 media outlets rebuild, as well as five start-ups and the creation of a media hub in Tbilisi, Georgia. Since the increase in anti-press legislation in Russia starting from 4 March, even the use of the word "war" can result in a 15-year prison sentence.

      EXCERPT: The JX Fund - European Fund for Journalism in Exile, in collaboration with the Voronezh Mass Media Defense Center, has launched the information platform Shpargalka | Exile (‘cheat sheet’ in Russian) to assist threatened media professionals in Russia in selecting a country of exile that is appropriate for them and their needs. The platform gives answers to 21 of the most pressing questions, which are given by lawyers from 12 countries.

      LINK: https://rsf.org/en/cheat-sheet-media-workers-under-threat Sharpgalka | Exile: https://shpargalka-exile.web.app/

      TOPIC: Freedom of the press

      DATE: 05.09.2022.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. China accuses Washington of cyberspying on university

      TITLE: China accused Washington of breaking into computers and spying on university

      CONTENT: China accused Washington on Monday of breaking into computers at Northwestern Polytechnical University that US officials say conducts military research. Both governments complained about worrying online spying against one another.

      The National Computer Virus Emergency Response Center reported computer break-ins at Northwestern Polytechnical University in June. It stated that the center, in collaboration with a commercial security provider, Qihoo 360 Technology Co., identified the attacks back to the National Security Agency, but did not specify how.

      China accuses the US of spying on universities, energy companies, and internet service providers, among other targets. Washington accuses Beijing of stealing commercial secrets and has charged Chinese military officers with crimes.

      According to Foreign Ministry spokeswoman Mao Ning, the US actions "seriously endanger China's national security." She also accused Washington of using spyware to eavesdrop on Chinese phone calls and stealing text messages.

      As per the security experts, the ruling Communist Party's military wing, the People's Liberation Army, and the Ministry of State Security also fund outside hackers. Alongside with Russia, China and the United States are widely acknowledged as global leaders in cyberwarfare research.

      TOPIC: Cyberconflict and warfare, Cybercrime

      EXCERPT: Chinese government accused Washington of cyberspying on Monday. Northwestern Polytechnical University in June has suffered computer break-ins, according to The National Computer Virus Emergency Response Center. China also accuses the US of spying on universities, energy companies, and internet service providers, among other targets. It stated that the center, in collaboration with a commercial security provider, Qihoo 360 Technology Co., identified the attacks back to the National Security Agency, but did not specify how.

      DATE: 05.09.2022.

      LINK: https://abcnews.go.com/Technology/wireStory/china-accuses-washington-cyber-spying-university-89343366

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The technological competition was a sort of proxy war.

      Digitalisation will be in the core of technological competition.

    2. we are in an age of quite radical uncertainty, one in which the ability to learn and adapt nimbly to unexpected events is far more valuable than either predictions or overly specific preparations.

      This is crucial insight that our ability to learn and adapt is more important than predictions and preparations.

    3. For new or reinforced global institutions are critically dependent on agreement between superpowers.
    4. whether what we like to call the “rules-based order” can now be rescued, resurrected or newly built.
    5. we do not know whether China will seek to conquer Taiwan by force and bring what it sees as the final victory in China’s unfinished civil war
    6. whether, in this era of great-power competition, the US and China are destined to collaborate, to compete or even to fight.
    7. whether China will choose to reinforce or make its relationship with Russia operational, or leave it loose and non-military as it is today.
    8. a sustained assault on globalisation—by re-building high walls against economic and intellectual interchange.
    9. do not know whether nuclear weapons will be used in
    10. We also know that the factors that globalisation depends upon are overwhelmingly political.
    11. China keeps stressing that it is a partnership, not an alliance.   
    12. The world is complicated, not simple and binary.   
    13. he world is not dividing into two rival blocs—the west, or democracies, versus autocracies—as many countries in Asia, Africa and Latin America are avoiding getting involved.
    14. new “cold war” will be partial, for most countries in the world will not be joining in.
    15. the range of possible futures for humanity is wider than we thought.     
    16. we need is to create an ability to learn, and build adaptability into our systems.
    17. In such conditions of radical uncertainty it makes little sense to make plans for all sorts of unknowable potential events.
    18. True uncertainty is something we cannot calculate at all.
    19. Risks are things we can calculate.
    20. to distinguish between risk and true uncertainty.
    21. The size, complexity and connectedness of our contemporary global system means that such events can have far bigger impacts than might have been the case in the past.
    22. But they were completely unpredictable, in the sense that we had no way of knowing whether they would actually happen, and certainly no idea of when they would happen.
    23. What we do know is that the range of possible outcomes is sadly quite wide.
    24. The response has been careful, to reduce the chance of triggering a Third World War by entering into direct military conflict with a nuclear superpower. It has been unified, because all these rich allies share the view that this is a conflict not of local but more global and fundamental importance. And it has been sustained so far because of the realisation that only well-maintained economic and military pressure can prevent Putin from achieving his aims.
    25. that Russian failure, or simply weakness, in Ukraine could lead Putin to use a nuclear weapon as a desperate display of power, to force Ukraine to surrender.
    26. the question of nuclear weapons
    27. The Russian invasion, if it were to be successful, would open up the possibility of a new era of imperialism and of using control over territory as a strategic weapon.
    28. They claim that they want to increase the role of multilateral institutions in global governance.
    29. the world’s democracies look in better post-Covid shape than China does, and in much better shape than Russia, which was hit hard by the pandemic and failed to produce a vaccine that convinced its own people, let alone export markets.
    30. As a result of their lower efficacy and western firms’ success in overcoming production difficulties, western vaccines have become dominant everywhere except China (albeit by purchase, not donation).
    31. I have now been vaccinated in four inoculations using three of these vaccines—AstraZeneca, Pfizer/BioNTech and Moderna. So I am a walking example of bioscience globalisation.
    32. they have noted that the west cannot be relied upon in such an emergency.
    33. Although the WHO did well in terms of providing information to the world, it has been unable to play much of an operational role during this crisis. Any proposals for new operational roles to prevent future pandemics are therefore doomed to fail, under current conditions.
    34. the US and China have moved further apart, not closer together.
    35. introduced in part to stop intellectual property theft, but also extended into more direct efforts to disable or obstruct Chinese technological development.
    36. semiconductors, 5G and 6G telecoms, artificial intelligence—and space
    37. such technological fears centred on space
    38. a far more important measure was technological competition, along with a growing fear that China might soon take the lead.
    39. the intensification of US-China competition.
    40. a strong backlash against trade and globalisation.
    41. by the aftermath of the 2008 financial crisis, as grievances about inequality and other social ills culminated in the surprise election of Trump as president in 2016
    42. countries would never again use tariffs and other trade barriers as weapons of economic or political competition.
    43. it signalled not the embrace, but the rejection by the US of the use of global institutions to manage great-power competition.
    44. Technology lies at the heart of the process of globalisation, but its development is also accelerated by that same globalisation.
    45. he globalisation of trade, technology and ideas that facilitated this rise of new powers and spread of wealth would continue, and would help to discourage conflict and equalise progress.
    46. we nevertheless assumed that democracies would prove more resilient than autocracies, thanks to superior accountability and free information.
    47. the United States’s acceptance of and support for global institutions would rise as its hegemonic power weakened, at the same time as it came to recognise the need for a wider set of partners to achieve its goals.
    48. from being western-led, and China would inevitably play a major role in their future development.
    49. inclusive global institutions would be crucial to managing that rise of distributed power.
    50. power would be distributed broadly during the 21st century, rather than concentrated in a small number of countries.
    51. the great taboo on the use of nuclear weapons,
    52. there is Russia’s invasion of Ukraine
    53. the global coronavirus pandemic
    54. the trade war that began in 2018
    55. how that will happen, or where the changes might lead
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. U.S. reporters wary of online, legal threats in the wake of the overturn of Roe v. Wade

      TITLE: In the aftermath of the Roe v. Wade decision, US journalists are wary of online legal threats

      CONTENT: The editors of the pro-abortion rights news website Rewire unusually removed reporter biographies from the site in May.

      The move was made as a precaution after a draft of a majority Supreme Court opinion in Dobbs v. Jackson Women's Health Organization, which sought to overturn the constitutional right to abortion, was leaked. Rewire reporters were concerned about an increase in online harassment.

      Editor-in-chief Galina Espinoza said that: ‘The newsroom has for years kept a repository of harassing messages to track patterns, just in case.’ The current abortion situation in America has some abortion reporters on edge.

      In addition to their fears about online harassment, reporters notified Committee to Protect Journalists (CPJ) that they are concerned about real-world violence and how changing laws may expose them and their sources to legal threats in the aftermath of the Supreme Court's decision to overturn Roe v. Wade in June.

      EXCERPT: U.S. reporters shared their concerns with Committe to Protect Journalists (CPJ) about online harassment they face. However, it does not ned there. They are now even concerned about real-world violence in the aftermath of the Supreme Court’s decision to overturn Roe v. Wade in June. The current abortion situation in America has some abortion reporters on edge. The Rewire newsroom is keeping a repository of harassing messaged to track patterns.

      LINK: https://cpj.org/2022/09/u-s-reporters-wary-of-online-legal-threats-in-the-wake-of-the-overturn-of-roe-v-wade/

      DATE: 01.09.2022.

      TOPIC: Freedom of the Press, Freedom of expression

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. New ransomware hits Windows, Linux servers of Chile govt agency

      TITLE: Ransomware attack hits Windows, Linux servers of Chilean government agency

      CONTENT: Chile's national computer security and incident response team (CSIRT) has confirmed that a ransomware attack has affected the country's government agency's operations and online services.

      The attack began on Thursday, August 25, and targeted the agency's Microsoft and VMware ESXi servers. The hackers offered Chile’s CSIRT a communication channel through which they could negotiate the payment of a ransom that would prevent the files from being leaked. The malware used in this attack, according to CSIRT, also had functions for stealing credentials from web browsers, listing removable devices for encryption, and evading antivirus detection via execution timeouts.

      In their announcement, Chile's CSIRT does not title the ransomware group responsible for the attack, nor does it offer enough information to identify the malware. Because it has been used by multiple threat actors, the extension appended to the encrypted files provides no clue. Very limited information provided by Chile's CSIRT on the malware's behavior points to the 'RedAlert' ransomware (aka "N13V"). Nevertheless, indicators of compromise (IoCs) in the announcement could be associated with Conti.

      According to what Chilean threat analyst Germán Fernández told BleepingComputer, the strain appears to be entirely new, and the researchers he spoke with were unable to associate the malware with known families. Based on what BleepingComputer has learned so far about this ransomware, it is a new operation that began in early August.

      EXCERPT: BleepingComputer learned about a brand new ransomware operation that started in August, targeting Chile's national computer security and incident response team (CSIRT). The hackers have affected the agency's Microsoft and VMware ESXi servers with their operations. According to CSIRT, the malware used in this operations had functions for stealing credentials from web browsers, listing removable devices for encryption, and evading antivirus detection via execution timeouts.

      LINK: https://www.bleepingcomputer.com/news/security/new-ransomware-hits-windows-linux-servers-of-chile-govt-agency/

      DATE: 01.09.2022.

      TOPIC: Cyberconflict and warfare

      COUNTRY: Chile

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Platforms such as the Humanitarian Data and Trust Initiative and DigitHarium should be explored as avenues for stakeholders to meet and discuss local and global solutions to these tools’ weaknesses.
    2. Innovative technology won’t solve these issues unless there are corresponding policies that safeguard migrants.
    3. In South Africa, Operation Dudula, which started as an online campaign against foreigners, has been used for xenophobic attacks and racial discrimination against migrants.
    4. Biometrics collected for humanitarian purposes can be used by governments in law enforcement, border management and counter-terrorism without the affected person’s knowledge.
    5. The GSMA Mobile for Humanitarian Innovation programme uses mobile technologies to address humanitarian problems in several African countries.
    6. After the 2014 Ebola outbreak in West and Central Africa, the World Health Organization used new technology such as mHealth and eHealth to collect and share timely data and geolocate local outbreaks.
    7. The Digital Vault allows migrants to upload and store important documents such as identity cards, passports and birth certificates in a cloud-type service.
    8. Biometric data – such as fingerprints and face recognition – is widely used in voucher assistance programmes.
    9. Digital humanitarianism, which refers to interventions conducted online, usually without in-person presence, is a product of information and technological advancement.

      What is digital humanitarianism?

    10. the UN Sustainable Development Goal 16.9 gave every person the right to a legal identity, including birth registration, by 2030.
    11. as biometrics, spatial mapping and social media platforms in humanitarian programming.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. China-Taiwan military tension fuels an active cyberwar

      TITLE: Military tensions between China and Taiwan fuel an active cyberwar

      CONTENT: The world was relieved when tensions between China and Taiwan did not escalate into a larger military engagement in August. Nevertheless, both countries are influenced by an active cyberwarfare.

      According to researchers at threat intelligence firm Cyberint, cyber activity between China and Taiwan is defined by multi-vector attacks, similar to what experts have observed happening between Russia and Ukraine. Based on a recent report, cyber tensions are high, and the number of national-level cyberattacks targeting China and Taiwan has recently significantly increased. Cyberint Research Team states that the growing number of cyberattacks will encourage more competing hackers organizations, raising the risk of an escalating cyber conflict.

      One obvious sign of increased activity, according to the researchers, is the increasing number of comments on Chinese and Taiwanese breaches in cybercriminal leak forums, with the number of comments on Chinese data leaks increasing four times in July compared to June. When it comes to Taiwan, the number of comments under data leaks from its companies also increased during July.

      The new tactic may eventually lead to a gradual increase from minor cyberattacks on government websites to more serious crimes involving hacking of critical infrastructure. If the cyber conflict between Taiwan and China resembles what happened in Ukraine, China should prepare its infrastructure to withstand a series of new of distributed denial-of-service (DDoS) attacks.

      EXCERPT: Even though military tensions between China and Taiwan have not escalated, there is an ongoing cyber war between them. The engagement in these attacks is similar to the ones in Ukraine and Russia, and there are clear signs that there is an increasing number of comments on Chinese and Taiwanese breaches in cybercriminal leak forums. The new tactic may include a gradual increase from minor cyberattacks on government websites to more serious crimes involving the hacking of critical infrastructure.

      DATE: 01.09.2022.

      LINK: https://cybernews.com/news/china-taiwan-military-tension-fuels-an-active-cyberwar/

      TOPIC: Cyberconflict and warfare

      COUNTRY: China, Taiwan

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Military tensions between China and Taiwan fuel an active cyberwar

      CONTENT: The world was relieved when tensions between China and Taiwan did not escalate into a larger military engagement in August. Nevertheless, both countries are influenced by an active cyberwarfare.

      According to researchers at threat intelligence firm Cyberint, cyber activity between China and Taiwan is defined by multi-vector attacks, similar to what experts have observed happening between Russia and Ukraine. Based on a recent report, cyber tensions are high, and the number of national-level cyberattacks targeting China and Taiwan has recently significantly increased. Cyberint Research Team states that the growing number of cyberattacks will encourage more competing hackers organizations, raising the risk of an escalating cyber conflict.

      One obvious sign of increased activity, according to the researchers, is the increasing number of comments on Chinese and Taiwanese breaches in cybercriminal leak forums, with the number of comments on Chinese data leaks increasing four times in July compared to June. When it comes to Taiwan, the number of comments under data leaks from its companies also increased during July.

      The new tactic may eventually lead to a gradual increase from minor cyberattacks on government websites to more serious crimes involving hacking of critical infrastructure. If the cyber conflict between Taiwan and China resembles what happened in Ukraine, China should prepare its infrastructure to withstand a series of new of distributed denial-of-service (DDoS) attacks.

      EXCERPT: Even though military tensions between China and Taiwan have not escalated, there is an ongoing cyber war between them. The engagement in these attacks is similar to the ones in Ukraine and Russia, and there are clear signs that there is an increasing number of comments on Chinese and Taiwanese breaches in cybercriminal leak forums. The new tactic may include a gradual increase from minor cyberattacks on government websites to more serious crimes involving the hacking of critical infrastructure.

      DATE: 01.09.2022.

      LINK: https://cybernews.com/news/china-taiwan-military-tension-fuels-an-active-cyberwar/

      TOPIC: Cyberconflict and warfare

      COUNTRY: China, Taiwan

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Ragnar Locker ransomware claims attack on Portugal's flag airline

      TITLE: TAP Air Portugal hit by ransomware: Ragnar Locker claims responsibility

      CONTENT: The Ragnar Locker ransomware gang has claimed responsibility for an attack on Portugal's flag carrier, TAP Air Portugal, which was revealed by the airline after its systems were compromised on Thursday night.

      The company stated that the attack was stopped and that no evidence suggested that the attackers gained access to the customer data stored on the affected servers. The airline also issued an alert on Monday, stating that its website and app are unavailable due to the Thursday ransomware attack.

      TAP has yet to confirm whether this was a ransomware attack. However, the Ragnar Locker ransomware gang posted a new entry on their data leak website today, claiming responsibility for last week's cyberattack on TAP's network.

      The ransomware group believes to have "reasons" to assume that hundreds of Gigabytes of data were compromised in the incident and has threatened to provide "irrefutable evidence" to negate TAP's claim that its customers' data was not accessed. Ragnar Locker also shared a screenshot of a spreadsheet that appears to contain customer data stolen from TAP's servers, such as names, dates of birth, emails, and addresses.

      DATE: 31.08.2022.

      EXCERPT: The Ragnar Locker ransomware gang claims responsibility for the ransomware attack on Portugal’s flag carrier, TAP Air Portugal. The company itself says that the attack was prevented, and customers’ information has been untouched. On the other hand, the ransomware gang states that they can easily provide evidence that the data has been compromised.

      LINK: https://www.bleepingcomputer.com/news/security/ragnar-locker-ransomware-claims-attack-on-portugals-flag-airline/

      TOPIC: Cyberconflict and warfare, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  2. Aug 2022
    1. AI and other new technologies will increase strategic instability.

      Another important element that the document realises: link between cybersecurity and AI. This is missing in OEWG discussions. There will need to be links of OEWG with AI-related processes like LAWS as well - or, at least, diplomats will need to be aware of all those other related processes.

    2. The United States has historically separated cyber and information security, but American adversaries have traditionally not distinguished between the two. In their view, the confidentiality, integrity, and assurance of computer networks are integral—and in some sense subordinate—to the battle over information spaces, and cyberattacks enabled significant capabilities in information operations. Numerous Russian documents and strategies describe cyber operations as integral to information security. After the creation of U.S. Cyber Command (CYBERCOM), at a meeting of Russian and U.S. defense officials, one Russian officer reportedly derided the lack of information warfare in Cyber Command’s mission. General Nikolai Makarov told his counterparts, “One uses information to destroy nations, not networks.”

      A well presented crucial difference between the two paradigms. Yet, this gap is vanishing. In a way, Russians (to the extent they were behind disinformation campaigns) managed to change the US position to accept the same paradigm.

      Could this close-to-common understanding that both networks and information are part of the dialogue change the course of future negotiations, and perhaps even allow for more space for comprimise as everyone discusses the same issues?

      ||Pavlina|| ||AndrijanaG|| ||JovanK||

    3. Zero days are expensive to buy and develop. They have historically been deployed by state-backed groups, yet in 2021 one-third of all hacking groups exploiting zero days were financially motivated criminals.48

      Important point: what used to be a privilege of big states in terms of offensive cyber capabilities (esp. weapons) is not any more - there are powerful criminal groups, dark researchers, international vulnerability brokers, and even legit businesses like NSO that offer tools and 'as a service' sophisticated attacks and tools. Though, most sophisticated and stealth attacks require more than that: lots of skills and (conventional) intelligence - resources that not many states have.

    4. The risk is not just financial. Ransomware attacks have paralyzed local governments, school districts, and hospitals. In 2019, a ransomware attack shut down the operations of a U.S. Coast Guard facility for thirty hours, and the University of Vermont Medical Center furloughed or reassigned about three hundred employees after an attack on the hospital’s networks. Homeland Security officials worried that ransomware attacks on voter registration systems could disrupt the 2020 elections. In May 2022, the new president of Costa Rica, Rodrigo Chaves Robles, declared a national emergency after a ransomware attack by the Conti gang crippled the Finance and Labor Ministry as well as the customs agency. The group also posted stolen files to the dark web to extort the government to pay the ransom.

      Useful examples of ransomware effects ||AndrijanaG||

    5. Figure 4. U.S. ADVERSARIES ARE SPONSORING CYBERATTACKS

      Interesting breakdown of main attacks against US, including types and attributed sources ||AndrijanaG|| ||teodoramATnetwork.diplomacy.edu|| ||Pavlina||

    6. These types of attacks were, however, the exceptions. Over the last decade, most cyber operations have been attacks that violate sovereignty but remain below the threshold for the use of force or armed attack

      This is very true: most cyber attacks are sophisticated, multi-months, covert, serving for disruption or espionage, not for causing physical damage. This is changing somewhat with the power of ransomware, which caused tangible (though not physical) damage in cases like Colonial pipeline, Costa Rica state of emergency, etc.

    7. The U.S. withdrawal from the Trans-Pacific Partnership and continued aversion to multilateral trade agreements severely limit its ability to shape the rules guiding digital trade. Although the digital chapters of the U.S.-Korea Free Trade Agreement (KORUS) and the U.S.-Mexico-Canada Agreement (USMCA), as well as the U.S.-Japan Digital Trade Agreement, have strong protections for cross-border data flows, the United States has been sidelined as other trade groups come together. The Regional Comprehensive Economic Partnership (RCEP), an agreement among fifteen countries in the Asia-Pacific, for example, represents 30 percent of global gross domestic product (GDP) and entered into force without the United States on January 1, 2022. RCEP’s provisions regarding data localization, restrictions on cross-border data flows, and policies that champion domestic industry are, however, weak

      Useful overview of digital trade bilateral and multilateral processes where US is involved ||MariliaM||

    8. The United States has taken itself out of the game on digital trade.

      ||MariliaM|| What say you about this?

    9. For many years, this global internet served U.S. interests, and U.S. leaders often called for countries to embrace an open internet or risk being left behind. But this utopian vision became just that: a vision, not the reality. Instead, over time the internet became less free, more fragmented, and less secure. Authoritarian regimes have managed to limit its use by those who might weaken their hold and have learned how to use it to further repress would-be or actual opponents.

      A sobering thought: internet is not a mechanism of US foreign policy any more; rather, 'adversaries' are using it against US values more and more. Open internet is a utopia, it says.

    10. Analysis of the US cyber foreign policy, co-signed by the future US Cyber Ambassador just weeks ago. It signals what we can expect from the US digital foreign policy in the next years.

      In a nutshell, they recognise that their strategy of an open internet that would change autocratic societies has failed, that in reality internet is backfiring against US priorities through insecurity, disinformation, etc etc. They seem to give up on the single open internet, and opt for an open internet among like-minded. Importantly, they suggest a change of narrative from 'human rights' to 'free flow of data' to be able to bring on board also those countries that might not be fully democratic or for human rights only (esp. big states like Brazil, India, South Africa). In this regards, they opt for dialogue (read: concessions) with EU on privacy/GDPR and big tech…

      Further comments below.

    11. Develop the expertise for cyber foreign policy

      Cyber foreign policy is becoming recognised as an increasingly important field. It is not only for diplomats and decision makers, but increasingly for businesses and their officials as well - like CISOs which need to understand geopolitical momentum and consequences this has on the security of their systems...

    12. domestic intelligence gap

      What should this be about?

    13. offering incentives for internet service providers (ISPs) and cloud providers to reduce malicious activity within their infrastructure

      Adding more liability to businesses to clean their portions. This may bring in limitations by ISPs and cloud providers on the use of encryption, or allow them to do DPI to scan the packages. It may be tricky with regards to freedoms in some aspects.

    14. greater transparency about defend forward actions

      Also a very important proposal: greater transparency about weapons (exploits, vulnerabilities) and how these are collected and managed (that's VEP above) + about operations (who and how can deploy those and other tools, in what circumstances, under whose authorization, against what targets, etc)

      This was already raised at the OEWG through the Geneva Dialogue contribution.

    15. Develop coalition-wide practices for the Vulnerabilities Equities Process (VEP).

      It is good there is recognition that vulnerabilities are among key challenges. Current US VEP is a good and positive example, but not sufficiently transparent. It is not expected that US 'adversaries' will do the same, but they expect at least partners.

      Yet, an open question will be how to make sure other parties are not exploiting vulnerabilities (and thus having advantages)? It would have to be done as combination of a) more secure products by partners (security by design practices)<br> b) stricter supply chain control to avoid vulnerabilities in imported products c) strengthening vulnerability disclosure processes and policies, as well as resources/capabilities (eg. finding ways to lure Chinese researchers to report vuln. to western institutions in spite of Chinese law)

    16. Declare norms against destructive attacks on election and financial systems.

      Possible further norms. Though the more norms they have, the bigger limitations the US will have on their possible offensive operations referred to above and below. ||AndrijanaG|| ||Pavlina||

    17. Create an international cybercrime center

      This is very strange and confusing. What should such a center do? Would it be a law enforcement body (but then there is interpol...)? Or forensics support? Or awareness and capacity building? ||AndrijanaG|| ||bojanakATnetwork.diplomacy.edu||

    18. Agree to and adopt a shared policy on digital privacy that is interopera-ble with Europe’s General Data Protection Regulation (GDPR).• Resolve outstanding issues on U.S.-European Union (EU) data transfers.

      US would need to find a way to agree on privacy, data, big tech issues with EU

    19. its policy for digital competition with the broader enterprise of national security strategy

      Washington to link its digital competition (economic and trade policies) with national security. Another signal that digital trade and data flow will be more strongly linked to national security.

      ||JovanK|| ||MariliaM||

    20. balance more targeted diplomatic and economic pressure on adversaries, as well as more disruptive cyber operations, with clear statements about self-imposed restraint on specific types of targets

      when it comes to adversaries, a combination of economic pressure and 'disruptive' (read also: offensive?) cyber operations - while respecting the OEWG/GGE norms endorsed by partners

      Question is if partners (esp. beyond EU - eg. India, Brazil) would accept that offensive approach of the US against their adversaries - even if respecting the norms and int. law?

    21. consolidate a coalition of allies and friends around a vision of the internet

      In other words, if internet has to fragment, let's make sure we get the biggest part of it ruled by a common set of rules that support democratic values.

    22. Cybercrime is a national security risk

      This is an important recognition: cybercrime used to be discussed separately from national security and int. peace and security. This won't be possible any more, because tools, tactics and procedures are similar (eg. ransomware, exploits), and resources of perpetrators are similar (eg. organised criminal groups) or adversaries are linked or work together (eg. APT groups with states).

      In that sense, keeping global dialogue about cybercrime fully separated from peace and stability won't be possible any more; there will need to be links.

      ||AndrijanaG|| ||Pavlina|| ||bojanakATnetwork.diplomacy.edu|| ||teodoramATnetwork.diplomacy.edu||

    23. Indictments and sanctions have been ineffective in stopping state-backed hackers.

      Another rather blunt recognition: indictments and sanctions don't work when it comes to deterrence. Yet, some believe they are powerful as part of a set of measures. (There is certain broader question about the effectiveness of sanctions, though)

    24. Norms are more useful in binding friends together than in constraining adversaries

      An interesting and well articulated point: US should make sure that friends and partners (in broader sense - esp. swing states) adhere to norms. They can't expect that Russia and China will adhere, so for them they might need a different approach (combining multiple options as discussed elsewhere in the document)

    25. The United States can no longer treat cyber and information opera-tions as two separate domains

      Another merging area: information warfare and cyber conflict. For long, the US has been pushing back strongly not to bring discussions about content into cybersecurity discussions. It was the main difference between the US and Russia/China in understanding the scope. As content becomes weapon in full sense, this won't be possible any more. Likely, US will bring the two together in discussions with like-minded partners, but not (yet) in global negotiations where their 'adversaries' are present.

      ||AndrijanaG|| ||Pavlina|| ||asokemATdiplomacy.edu||

    26. Increased digitization increases vulnerability,

      As we would put it: "Whatever is connected can be hacked". The paper proposes further cooperation on reducing (and disclosing) vulnerabilities, and has some good points on zero-day exploits and various groups of adversaries.

      ||AndrijanaG|| ||Pavlina||

    27. Data is a source of geopolitical power and competition and is seen as central to economic and national security.

      Re-focusing from (promoting) values of an open society to (promoting) data flow and economic aspects

      ||MariliaM|| ||GingerP||

    28. U.S. policies promoting an open, global internet have failed, and Wash-ington will be unable to stop or reverse the trend toward fragmentation.

      Fragmentation can not be prevented.

    29. As former Japanese Prime Minister Shinzo Abe put it, the goal should be to establish “data flows with trust,” not to promote Western-style democracy

      The key of the suggested new framing: it is not about western values of openness and human rights (that might not be acceptable by everyone) - it is about free and trusted data flow. This boils down to economy, and might be more broadly understood and endorsed.

      With Fick's background of enterpreneurship, and some signals in this document, as well as with composition of third departments of the bureau which deal with 'other' issues (norms, int.orgs, human rights), should we expect that his priority agenda will be digital trade? Thus, that we will see high importance of WTO and other digital trade negotiations (at least with 'like-minded' and swing states) in the future State Department agenda? ||MariliaM|| ||JovanK|| ||GingerP||

    30. The era of the global internet is over

      A clear and provocative thought, coming from the US. ||JovanK|| ||MariliaM|| ||sorina|| ||GingerP||

    31. Frankly, U.S. policy toward cyberspace and the internet has failed to keep up. The United States desperately needs a new foreign policy that confronts head on the consequences of a fragmented and dangerous internet.

      A blunt recognition that the former US approach to an open internet has failed. Also, a call for a new digital foreign policy.

      ||JovanK|| ||sorina||

    32. known cyber campaign to cause physical damage

      Same old vocabulary: Stuxnet, which destroyed a facility, was 'cyber campaign' ('to cause physical damage'), not 'an attack'. Yet, Iranian strike against Saudi Aramco (just a line below) is 'attack'.

      [Maybe it's only to me, but this is the same pattern of 'campaign' (and not 'attack' or 'aggression') against Iraq or Yugoslavia, yet 'aggression' (and not 'special operation') about Russia's strike against Ukraine.]

    33. Nathaniel Fick

      Nathaniel Fick is a likely future US cyber ambassador (ie ambassador at large, to lead the Cyber Bureau of the State Department). The report was prepared in July, when he was already the candidate. Thus, we can probably read this as his programme - or at least that he is not against it.

    34. Foreign Policy for a Fragmented Internet

      The title already signals what the paper confirms: US should/will accept that single internet is no more a reality.

    1. TITLE: Saudi woman sentenced to 45 years in prison for social media posts

      CONTENT: A Saudi Arabian court convicted Nourah bint Saeed al-Qahtani to 45 years of prison time for posts on social media, according to a rights group. According to a Washington-based DAWN organization, she was convicted by the Saudi Specialized Criminal Court on charges of ‘using the internet to tear the (Saudi) social fabric’ and for ‘violating public order by using social media.’

      DAWN stated that almost nothing is known about Qahtani or even what her social media posts stated and that the investigation into her case was ongoing. Salma al-Shehab, a mother of two and doctoral candidate at the University of Leeds in the United Kingdom, was sentenced to 35 years in prison for following and retweeting dissidents and activists on Twitter just a few weeks before Qahtani's conviction.

      According to Abdullah al-Aoudh, Director of Research for the Gulf Region at DAWN, Saudi authorities used "abusive" laws in both the Shebab and Qahtani cases to target and sanction Saudi citizens for opposing the government on Twitter.

      According to what Saudi officials told Reuters last month, the kingdom has no political prisoners, and the thought of it is ridiculous. On the other hand, a request for comment was not responded to by the Saudi government's media office.

      LINK: https://www.reuters.com/world/middle-east/saudi-woman-gets-45-year-prison-term-social-media-posts-rights-group-2022-08-30/

      DATE: 30.08.2022.

      EXCERPT: Saudi Arabian woman, Nourah bint Saeed al-Qahtani, has been sentenced to 45 years in prison for her posts on social media platforms. A few weeks before that, another woman, Salma al-Shehab was sentenced to 35 years in prison for following and retweeting dissidents and activists on Twitter. A Washington-based DAWN organization is still investigating into al-Quahtani’s case, as it is not clearly known what her posts contained. Presumably, she criticized the government. Saudi authorities are using abusive laws to punish citizens who dare to oppose the rulers.

      TOPIC: Freedom of expression

      COUNTRY: Saudi Arabia

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. UK Spies Fund New Course for Female Coders

      TITLE: UK Spies are funding a new course for female coders

      CONTENT: With a new bootcamp course, the UK's main intelligence agency for dealing with cyber-threats hopes to attract more female coders to its workforce. GCHQ is sponsoring one of Code First Girls' 14-week 'nanodegree' courses, which are designed to appeal to women considering a career switch.

      According to Jo Cavan, the security agency's director of strategy, policy, and engagement, teams such as counter-terrorism have performed better since becoming more diversified. Cavan claims that one key area where GCHQ needs more diversity is in countering threats from the east. She also added: ‘We have been working hard to increase that number so we have more diverse teams and better get across the threats we need to today.’

      According to the certification organization ISC2, women still make up only 25% of cybersecurity roles global level. When it comes to its 2021 industry report, fewer women (38%) than men (50%) came from an IT background, while women have higher rates of entry through self-learning than men (20% vs. 14%). These figures suggest that there may be a sizable group of female job seekers looking to change careers to one that involves cyber.

      LINK: https://www.infosecurity-magazine.com/news/uk-spies-fund-new-course-for/

      DATE: 30.08.2022.

      TOPIC: Gender rights online

      EXCERPT: The UK’s main intelligence agency for dealing with cyber-threats is aiming to attract more female workers, in order to increase diversity. Studies have shown that teams such as counter-terrorism have performed better since becoming more diversified. In this article, you can also see the percentage of women in cybersecurity roles and the level of their entry through self-learning compared to men. The information is provided by the certification organization, ISC2.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Chinese hackers use ScanBox malware to target the Australian government

      CONTENT: Threat actors based in China have been targeting Australian government agencies and wind turbine fleets in the South China Sea by directing select individuals to a fake news media outlet impersonating an Australian news outlet. The sender pretended to be an employee of the hoax media outlet "Australian Morning News," with a link leading to the malicious website. The site included plagiarized content from legitimate news websites.

      Victims started arriving at the fraudulent site after receiving phishing emails with appealing lures, and the ScanBox reconnaissance framework delivered a malware payload. From April to June of this year, the campaign targeted individuals at local and federal Australian Government agencies, Australian news media organizations, and global heavy industry manufacturers which provide maintenance to wind turbines in the South Chinese Sea.

      Proofpoint and PwC (PricewaterhouseCoopers) security researchers who observed the campaign concluded that the goal was cyberespionage. They attribute the activity with moderate confidence to a Chinese-based threat group known as APT40 (a.k.a. TA423, Leviathan, Red Ladon).

      LINK: https://www.bleepingcomputer.com/news/security/chinese-hackers-target-australian-govt-with-scanbox-malware/

      EXCERPT: China-based actors have been targeting Australian government agencies and wind turbine fleets by directing individuals to a fake media outlet, pretending to be an Australian media outlet. The site they were led on, contained plagiarized information from legitimate news websites. From April to June 2022, the campaign targeted individuals at local and federal Australian Government agencies, Australian news media organizations, and global heavy industry manufacturers working to maintain wind turbines in the South Chinese Sea.

      TOPIC: Cyberconflict and warfare, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. there are multiple high-level events planned in 2023, including the SDG Summit, the High Level meeting on Universal Health Coverage, Global stocktake, and the High Level Dialogue on Financing for Development. Within the High Level Week itself, we have several High Level Meetings, for which we would also have preparatory meetings and negotiations.
    2. 7. Second, the Group is also concerned regarding stakeholders consultations convened by the co-facilitators for the modalities resolution. This is quite unusual and do not have past precedence for any UN meeting. Negotiations on modalities resolutions have been solely under the domain of member states.

      Not very multistakeholdre enthusiastic.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Acronis’ Mid-year Cyberthreat Report warns that global ransomware damage will exceed $30bn by 2023

      CONTENT: Switzerland-based cybersecurity company Acronis reported in its Mid-Year Cyberthreat Report, published on August 24, that almost half of breaches during the first six months of 2022 involved stolen credentials. The primary goal of cybercriminals using these credentials is to launch ransomware attacks, which remain the number one threat to large and medium-sized businesses, including government organizations, the report says.

      Acronis found that out of 600 malicious email campaigns in the first half of 2022, 58% were phishing attempts, and 28% featured malware. Unpatched or software vulnerabilities are now also being targeted by cybercriminals in order to extract data, with a recent increase in Linux operating systems and managed service providers (MSPs) and their network of SMB customers.

      The Swiss firm is highlighting: ‘Ransomware is worsening, even more so than we predicted.’ They also mentioned Conti and Lapsus gangs as the prime targets for international security services. It is expected that global ransomware damage will exceed up to $30bn by next year.

      EXCERPT: Swiss-based cybersecurity company Acronis reports in their Mid-Year Cyberthreat that the first six months of this year involved stolen credentials. With hacking methods in development, like targeting unpatched or software vulnerabilities, and malicious email campaigns, ransomware is worsening. It is excepted that global ransomware will exceed up to $30bn by 2023.

      LINK: https://www.infosecurity-magazine.com/news/ransomware-exceed-30bn-dollars-2023/

      TOPIC: Cybercrime, Cyberconflict and warfare

      DATE: 29.08.2022.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Montenegro says Russian cyberattacks threaten key state functions

      TITLE: Montenegro suspects the cyberattacks are coming from Russia

      CONTENT: Cyberattacks are persistent in Montenegro and targets are the main infrastructure objects, such as electricity and water supply systems, transportation services, and online portals citizens use. At the time of writing, Bleeping Computer states that the official website of the government of Montenegro is unreachable.

      The country's Defense Minister has blamed Russian actors for the attacks, telling local media on Saturday that there is enough evidence to suspect the attack was "directed by several Russian services."

      The country's currently battling polarization which has been impacted by the current government's decision to support sanctions against Russia. This has sparked outrage from certain demographic groups and, in some cases like now, even external attacks.

      Montenegro is currently receiving assistance from NATO allies to block the attacks. Most notable efforts come from France. The country has deployed an ANSSI (French Agency for Information Systems Security) team to assist in the defense of critical systems and the restoration of compromised networks.

      DATE: 29.08.2022.

      TOPIC: Cyberconflict and warfare

      LINK: https://www.bleepingcomputer.com/news/security/montenegro-says-russian-cyberattacks-threaten-key-state-functions/

      EXCERPT: Montenegro suffers a series of cyberattacks directed toward their vital infrastructure. The country’s Defense Minister is attributing these attacks to Russia, as Montenegro decided to support sanctions against them. Currently, Montenegro receives help from NATO allies, but mainly from France.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. This could include connecting those not yet connected; equitable use of digital public goods; avoiding fragmentation of the internet; providing people with options for how their data is used; safeguarding human rights in digital spaces; introducing accountability for disinformation and misleading content; and aligning the regulation of artificial intelligence with our universally shared values.

      The UN SG suggests the following issues to be covered in the Global Digital Compact:

      • access and connectivity
      • digital public good
      • preventing Internet fragmentation
      • data protection and privacy
      • safeguarding human rights in digital spaces
      • accountability for disinformation and misleading content
      • artificial intelligence

      ||Jovan||||sorina||

    2. This could include a commitment to negotiate an international instrument on the prevention of an arms race in outer space; common principles for the governance of outer space activities; and measures to accelerate agreement on the removal of space debris, and to coordinate space traffic.

      In the Pact for the Future which should be adopted during the UN Summit for the Future to be held in September 2023, one of seven pillars is outer space.

      The UN SG aims to achieve a high-level political agreement on the peaceful, secure and sustainable use of outer space with commitment 'to negotiate an international instrument on the prevention of an arms race in outer space; common principles for the governance of outer space activities; and measures to accelerate agreement on the removal of space debris, and to coordinate space traffic.'

      You can more information in the UN SG remarks to the UN GA Consultation on 'Our Common Agenda'.

    3. UN SG established terminology that will be used. It will be the UN Pact for the Future with 7 elements

      1. A New Agenda for Peace
      2. A Global Digital Compact
      3. A Declaration on Future Generations
      4. Outer Space (international instrument on the prevention on an arms race in outer space
      5. The Emergency Platform
      6. More Effective Multilateral Arrangements
      7. 'Seventh thread' will include topics in making: integrity in public information, a commitment to ensuring meaningful youth engagement at the UN, commitment to metric that go beyond GDP and take vulnerabilities into account.

      Other issues of the Pact for Future will include: human rights including safeguarding human rights in digital spaces, gender equality, inclusion of marginalised groups,

      UN SG also mentioned the following other initiatives as part of 'Our Common Agenda':

      • the Scientific Advisory Mechanisms
      • Transformation towards a UN 2.0 including: a new culture and new capabilities in data, digital innovation, behavioural science, and strategic foresight.
    4. a New Agenda for Peace.

      ||Jovan||

      For the Peace Week, you can consider this linkage to the UN Pact for Future and in particular development of the UN toolbox to prevent the outbreak and escalation of hostilities on land, at sea, in space and in cyberspace.

    5. We see these two meetings as twin summits, with the same overall objective: to create conditions for a sustainable, equitable and inclusive future.
    6. The SDG Summit
    7. a Global Digital Compact will be meaningless without the input of technology companies and scientists.
    8. Human rights and gender equality will be cross-cutting themes of the Summit of the Future
    9. These include a general commitment to integrity in public information; a commitment to ensuring meaningful youth engagement at the United Nations; and a commitment to metrics that go beyond Gross Domestic Product and take vulnerability into account.  
    10. more effective multilateral arrangements.
    11. the Emergency Platform.
    12. outer space
    13. a Declaration on Future Generations.
    14. a Global Digital Compact,
    15. the Pact for the Future.
    16. The Pact for the Future must demonstrate to the world that while we face daunting challenges, we can overcome them with co-operation, compromise and global solidarity.
    17. The Permanent Representatives of the Netherlands and Fiji are developing an elements paper for a Declaration for Future Generations –a major step towards the proposed Summit of the Future. The Permanent Representatives of New Zealand and Oman are leading negotiations on the modalities resolution that would enable that the Summit of the Future to take place.
    18. Futures Lab.
    19. UN Behavioural Science Week
    20. the potential of data for people, planet and the SDGs.
    21. a new culture and new capabilities in data, digital, innovation, behavioural science, and strategic foresight.
    22. the Scientific Advisory Mechanism.
    23. a roadmap for the development and effective implementation of international law.
    24. to ensure legal identity for all
    25. And an upgrading of the United Nations, so that we are better equipped to support governments in finding and implementing multilateral solutions.
    26. An effort to deliver public goods and manage global shocks and crises more effectively;
    27. A focus on the future, with steps to enhance youth engagement and to take future generations into account in policy decisions;
    28. A New Global Deal to redistribute power and resources, and a renewal of the social contract;
    29. Four countries have already defaulted on their debts

      What are 4 countries?

    30. the efforts and the pressure over societies - especially in the developing world, will remain very high.
    31. supply chain disruptions, high costs of transportation, high costs of energy,
    32. the triple planetary crisis of climate breakdown, air pollution and biodiversity los
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Montenegro’s digital infrastructure hit by a unprecedented cyberattack

      CONTENT: Montenegro's government digital infrastructure has been hit by a ‘unprecedented’ cyber attack, and swift measures have been taken to minimize the impact, officials said on Friday. ‘A persistent and ongoing cyber-attack is in process in Montenegro,’ The U.S. Embassy in Podgorica posted a warning on its website.

      ‘Certain services were switched off temporarily for security reasons but the security of accounts belonging to citizens and companies and their data have not been jeopardised,’ said Public Administration Minister Maras Dukaj on Twitter.

      According to Reuters, in 2016, cyber criminals also targeted Montenegro's state digital infrastructure on election day, and again several months later in 2017, as this small Balkan state prepared to join NATO.

      The Western military alliance is aware of reports of cyber attacks in Montenegro and is prepared to assist its authorities if needed, according to an unidentified NATO official quoted by Voice of America.

      EXCERPT: Montenegro’s government digital infrastructure has been hit with an unprecedented cyber attack. The hacker’s origin is still not officially known, but it woke concerns among NATO members. This is not the first time the cyber attack of this range happened in Montenegro, but it is considered to be a persistent and ongoing according to the U.S. Embassy in Podgorica.

      DATE: 26.08.2022.

      LINK: https://www.reuters.com/world/europe/montenegros-state-infrastructure-hit-by-cyber-attack-officials-2022-08-26/

      TOPIC: Cyberconflict and warfare, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. SpaceX has already undercut the rest of the industry with its cheap, reusable Falcon rockets, and regularly flies both cargo and astronauts to the International Space Station.
    2. private-sector “New Space” industry,
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Over half of items are returned because they are the wrong size.
    2. The outbound system is highly automated and streamlined; a return must be opened and someone has to decide what to do with it. “A worker in an Amazon warehouse can pick 30 items in a minute, but a return can take ten minutes to process,” says Mr Rogers.
    3. In America 21% of online orders, worth some $218bn, were returned in 2021, according to the National Retail Federation, up from 18% in 2020.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. “The Russian word for hospital is bol’nitsa, which comes from the word pain. The Ukrainian is likarnya, from the word to cure. That tells you a story, and there are many other examples like this.”
    2. Millions of Russian-speaking Ukrainians, appalled at what is being done in their name, are making a point of switching to Ukrainian.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Nobody can counter aggression through dollars and semiconductors alone.
    2. Ukraine marks a new era of 21st-century conflict in which the military, technological and financial elements are intertwined.
    3. Given that more countries depend on China than America as their largest trading partner, enforcing a global embargo would be even harder than with Russia.
    4. the West could seize China’s $3trn of reserves and cut off its banks.
    5. The biggest flaw is that full or partial embargoes are not being enforced by over 100 countries with 40% of world gdp. Urals oil is flowing to Asia. Dubai is brimming with Russian cash and you can fly with Emirates and others to Moscow seven times a day. A globalised economy is good at adapting to shocks and opportunities, particularly as most countries have no desire to enforce Western policy.
    6. Energy sales will generate a current-account surplus of $265bn this year, the world’s second-largest after China. After a crunch, Russia’s financial system has stabilised and the country is finding new suppliers for some imports, including China. Meanwhile in Europe, an energy crisis may trigger a recession. This week natural-gas prices rose by a further 20% as Russia squeezed supplies.
    7. But the Russia embargo takes sanctions to a new level by aiming to cripple the world’s 11th-biggest economy, one of the biggest exporters of energy, grain and other commodities.
    8. Sanctions seemed to offer an answer by allowing the West to exert power through its control of the financial and technological networks at the heart of the 21st-century economy.
    9. As well as satisfying Western public opinion, these measures have strategic objectives. The short-term goal, at least initially, was to trigger a liquidity and balance-of-payments crisis in Russia that would make it hard to finance the Ukraine war and thus alter the Kremlin’s incentives. In the long run the intent is to impair Russia’s productive capacity and technological sophistication so that, if Vladimir Putin aspires to invade another country, he would have fewer resources to hand. A final aim is to deter others from warmongering.

      reasons for sanctions

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: CPJ joins letters urging the U.S. government to hold the NSO Group accountable for spyware that surveilled journalists

      CONTENT: In August, the Committee to Protect Journalists joined human rights and press freedom organizations in separate actions demanding the US government to hold NSO Group accountable for providing Pegasus spyware to governments that have secretly surveilled journalists around the world. The Israeli-owned NSO Group claims that it only licenses its Pegasus spyware to government agencies investigating crime and terrorism and that it should be immune from prosecution in US courts because it acted as an agent of foreign governments under the doctrine of sovereign immunity.

      Nevertheless, according to the CPJ’s letter it is clear their actions are malicious: ‘The evidence of the use of Pegasus spyware against human rights defenders, journalists, opposition parties, and state officials by repressive regimes continues to mount, contrary to NSO Group’s claim that their spyware is used as a tool for investigating criminal activity and terrorism.’

      EXCERPT: Committee to Protect journalists (CPJ) joins the letters of human rights and press freedom organizations in their separate actions urging the U.S. government to hold the Israeli-owned NSO Group accountable for providing Pegasus spyware to governments that have secretly surveilled journalists.

      LINK: https://cpj.org/2022/08/cpj-joins-letters-urging-u-s-government-to-hold-nso-group-accountable-on-spyware/

      DATE: 25.08.2022.

      TOPIC: Freedom of expression, Freedom of the press, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. regain autarchy in key areas, from cyber components to pharmaceutical products

      What would be the cost of this autarchy? Can Swiss small economy support economic autharchy? How far this autarchy should extend (only Switzlerand, EU, USA, like-minded countries, developing countries)?

    2. On the strategic level there were Strategic Arms Limitation Talks (SALT I and SALT II); The Anti-Ballistic Missile Agreement (ABM Treaty), Strategic Arms Reduction Talks (START I and II) and the «New START» agreement. At the intermediate range level there was INF (Interme

      A good summary of the main disarmament agreements.

    3. the installation of a «red phone» between Washington and Moscow to be able to speak in a crisis with each other directly and immediately.

      Are there red phones today? Do USA and Russia communicate in time of crisis?

    4. The creation of NATO in 1949 (whose purpose it, as a British general put it, was to keep the Russians out, the Americans in, and the Germans down)

      Good summary of raison d' etre of NATO.

    5. Many felt that it would be possible to put the genie back into the bottle.

      It was not possible to reverse impact of nuclear technology.

    6. Ambassador Theodor H. Winkler asks, "Has The West been Sleeping?" in his article for Stratos Digital journal. His answer is positive. The West is falling behind China and Russia in many military and strategic areas.

      One reason was the West's acceptance of the "end of history" view after the Cold War. The Ukraine war serves as a wake up call.

      Ambassador Winkler shared his thoughts on both the changes in thinking about war, security, politics, and practical steps to be taken to avoid strategic sleepwalking in Western societies.

    7. We must support the international commu-nity in its effort to prevent this, anticipate the impact of such a war on us, and do everything to reduce it
    8. the concepts of comprehensive defence again
    9. has not so many technological inroads into our economy that it can freeze or stop it at will
    10. reduce our economic dependence on Rus-sia and, above all, China
    11. We should form something like half a dozen brigades with national defence as main task; fully equip them with armour, modern artillery, and the latest in infan-try fighting equipment
    12. We can offer Geneva as negotiating table and we have the three Geneva Centers initiated by Switzerland as islands of excellence.
    13. render our world less secure.
    14. they must be understood as tools to formulate and im-plement political strategies
    15. We must, above all, cease to perceive weapons (as the peace movement does) as instruments of the evil, which should be abolished as soon as possible.
    16. Through the use of artificial intelligence and quantum computers it should be possible to throw a cloud of obstacles into their trajectory. Any collision, as small as it may be, would lead to the immediate dis-integration of the glider
    17. Particularly in the US, more recently also in Russia, there is, moreover, a growing attraction of small or very small nuclear weapons that could be used as easily as conventional weapons. That is wrong and it is dangerous.
    18. We must realize that Putin may begin to prepare the ground for a nuclear surprise attack – if he chooses so.
    19. The time of nuclear arms control is over; the time has come for rearmament
    20. As a super-anti-subma-rine weapon. A large hydrogen bomb detonated in an area known to be frequented by US SSBN might be able to destroy, or at least weaken, the US underwa-ter deterrent.
    21. While the West believes that the world ends once the red but-ton is pushed, for the Russians and the Chinese the war enters simply a new phase, once the nuclear exchange has started.
    22. Xi is building the potentially largest ICBM force in the world, roughly the equivalent of the US and the Russian arsenals combined.
    23. attributed to China a total nuclear force of 200–400 warheads, comparable to the arsenals of the UK and of France (but far below the numbers of the US and Russian arsenals)
    24. that are placed under the direct control of the Communist Party’s (KPC) Central Military Commis-sion (CMC), headed by Xi Jinping
    25. It refuses until today to enter into any arms control negotiations.
    26. France, where control of the warheads and the land-based launchers lay not with the armed forces but with the Gendarmerie nationale, shows the same attitude.

      Interesting phenomenon

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL