1. Aug 2022
    1. Human rights and gender equality will be cross-cutting themes of the Summit of the Future
    2. These include a general commitment to integrity in public information; a commitment to ensuring meaningful youth engagement at the United Nations; and a commitment to metrics that go beyond Gross Domestic Product and take vulnerability into account.  
    3. more effective multilateral arrangements.
    4. the Emergency Platform.
    5. outer space
    6. a Declaration on Future Generations.
    7. a Global Digital Compact,
    8. the Pact for the Future.
    9. The Pact for the Future must demonstrate to the world that while we face daunting challenges, we can overcome them with co-operation, compromise and global solidarity.
    10. The Permanent Representatives of the Netherlands and Fiji are developing an elements paper for a Declaration for Future Generations –a major step towards the proposed Summit of the Future. The Permanent Representatives of New Zealand and Oman are leading negotiations on the modalities resolution that would enable that the Summit of the Future to take place.
    11. Futures Lab.
    12. UN Behavioural Science Week
    13. the potential of data for people, planet and the SDGs.
    14. a new culture and new capabilities in data, digital, innovation, behavioural science, and strategic foresight.
    15. the Scientific Advisory Mechanism.
    16. a roadmap for the development and effective implementation of international law.
    17. to ensure legal identity for all
    18. And an upgrading of the United Nations, so that we are better equipped to support governments in finding and implementing multilateral solutions.
    19. An effort to deliver public goods and manage global shocks and crises more effectively;
    20. A focus on the future, with steps to enhance youth engagement and to take future generations into account in policy decisions;
    21. A New Global Deal to redistribute power and resources, and a renewal of the social contract;
    22. Four countries have already defaulted on their debts

      What are 4 countries?

    23. the efforts and the pressure over societies - especially in the developing world, will remain very high.
    24. supply chain disruptions, high costs of transportation, high costs of energy,
    25. the triple planetary crisis of climate breakdown, air pollution and biodiversity los
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Montenegro’s digital infrastructure hit by a unprecedented cyberattack

      CONTENT: Montenegro's government digital infrastructure has been hit by a ‘unprecedented’ cyber attack, and swift measures have been taken to minimize the impact, officials said on Friday. ‘A persistent and ongoing cyber-attack is in process in Montenegro,’ The U.S. Embassy in Podgorica posted a warning on its website.

      ‘Certain services were switched off temporarily for security reasons but the security of accounts belonging to citizens and companies and their data have not been jeopardised,’ said Public Administration Minister Maras Dukaj on Twitter.

      According to Reuters, in 2016, cyber criminals also targeted Montenegro's state digital infrastructure on election day, and again several months later in 2017, as this small Balkan state prepared to join NATO.

      The Western military alliance is aware of reports of cyber attacks in Montenegro and is prepared to assist its authorities if needed, according to an unidentified NATO official quoted by Voice of America.

      EXCERPT: Montenegro’s government digital infrastructure has been hit with an unprecedented cyber attack. The hacker’s origin is still not officially known, but it woke concerns among NATO members. This is not the first time the cyber attack of this range happened in Montenegro, but it is considered to be a persistent and ongoing according to the U.S. Embassy in Podgorica.

      DATE: 26.08.2022.

      LINK: https://www.reuters.com/world/europe/montenegros-state-infrastructure-hit-by-cyber-attack-officials-2022-08-26/

      TOPIC: Cyberconflict and warfare, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. SpaceX has already undercut the rest of the industry with its cheap, reusable Falcon rockets, and regularly flies both cargo and astronauts to the International Space Station.
    2. private-sector “New Space” industry,
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Over half of items are returned because they are the wrong size.
    2. The outbound system is highly automated and streamlined; a return must be opened and someone has to decide what to do with it. “A worker in an Amazon warehouse can pick 30 items in a minute, but a return can take ten minutes to process,” says Mr Rogers.
    3. In America 21% of online orders, worth some $218bn, were returned in 2021, according to the National Retail Federation, up from 18% in 2020.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. “The Russian word for hospital is bol’nitsa, which comes from the word pain. The Ukrainian is likarnya, from the word to cure. That tells you a story, and there are many other examples like this.”
    2. Millions of Russian-speaking Ukrainians, appalled at what is being done in their name, are making a point of switching to Ukrainian.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Nobody can counter aggression through dollars and semiconductors alone.
    2. Ukraine marks a new era of 21st-century conflict in which the military, technological and financial elements are intertwined.
    3. Given that more countries depend on China than America as their largest trading partner, enforcing a global embargo would be even harder than with Russia.
    4. the West could seize China’s $3trn of reserves and cut off its banks.
    5. The biggest flaw is that full or partial embargoes are not being enforced by over 100 countries with 40% of world gdp. Urals oil is flowing to Asia. Dubai is brimming with Russian cash and you can fly with Emirates and others to Moscow seven times a day. A globalised economy is good at adapting to shocks and opportunities, particularly as most countries have no desire to enforce Western policy.
    6. Energy sales will generate a current-account surplus of $265bn this year, the world’s second-largest after China. After a crunch, Russia’s financial system has stabilised and the country is finding new suppliers for some imports, including China. Meanwhile in Europe, an energy crisis may trigger a recession. This week natural-gas prices rose by a further 20% as Russia squeezed supplies.
    7. But the Russia embargo takes sanctions to a new level by aiming to cripple the world’s 11th-biggest economy, one of the biggest exporters of energy, grain and other commodities.
    8. Sanctions seemed to offer an answer by allowing the West to exert power through its control of the financial and technological networks at the heart of the 21st-century economy.
    9. As well as satisfying Western public opinion, these measures have strategic objectives. The short-term goal, at least initially, was to trigger a liquidity and balance-of-payments crisis in Russia that would make it hard to finance the Ukraine war and thus alter the Kremlin’s incentives. In the long run the intent is to impair Russia’s productive capacity and technological sophistication so that, if Vladimir Putin aspires to invade another country, he would have fewer resources to hand. A final aim is to deter others from warmongering.

      reasons for sanctions

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: CPJ joins letters urging the U.S. government to hold the NSO Group accountable for spyware that surveilled journalists

      CONTENT: In August, the Committee to Protect Journalists joined human rights and press freedom organizations in separate actions demanding the US government to hold NSO Group accountable for providing Pegasus spyware to governments that have secretly surveilled journalists around the world. The Israeli-owned NSO Group claims that it only licenses its Pegasus spyware to government agencies investigating crime and terrorism and that it should be immune from prosecution in US courts because it acted as an agent of foreign governments under the doctrine of sovereign immunity.

      Nevertheless, according to the CPJ’s letter it is clear their actions are malicious: ‘The evidence of the use of Pegasus spyware against human rights defenders, journalists, opposition parties, and state officials by repressive regimes continues to mount, contrary to NSO Group’s claim that their spyware is used as a tool for investigating criminal activity and terrorism.’

      EXCERPT: Committee to Protect journalists (CPJ) joins the letters of human rights and press freedom organizations in their separate actions urging the U.S. government to hold the Israeli-owned NSO Group accountable for providing Pegasus spyware to governments that have secretly surveilled journalists.

      LINK: https://cpj.org/2022/08/cpj-joins-letters-urging-u-s-government-to-hold-nso-group-accountable-on-spyware/

      DATE: 25.08.2022.

      TOPIC: Freedom of expression, Freedom of the press, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. regain autarchy in key areas, from cyber components to pharmaceutical products

      What would be the cost of this autarchy? Can Swiss small economy support economic autharchy? How far this autarchy should extend (only Switzlerand, EU, USA, like-minded countries, developing countries)?

    2. On the strategic level there were Strategic Arms Limitation Talks (SALT I and SALT II); The Anti-Ballistic Missile Agreement (ABM Treaty), Strategic Arms Reduction Talks (START I and II) and the «New START» agreement. At the intermediate range level there was INF (Interme

      A good summary of the main disarmament agreements.

    3. the installation of a «red phone» between Washington and Moscow to be able to speak in a crisis with each other directly and immediately.

      Are there red phones today? Do USA and Russia communicate in time of crisis?

    4. The creation of NATO in 1949 (whose purpose it, as a British general put it, was to keep the Russians out, the Americans in, and the Germans down)

      Good summary of raison d' etre of NATO.

    5. Many felt that it would be possible to put the genie back into the bottle.

      It was not possible to reverse impact of nuclear technology.

    6. Ambassador Theodor H. Winkler asks, "Has The West been Sleeping?" in his article for Stratos Digital journal. His answer is positive. The West is falling behind China and Russia in many military and strategic areas.

      One reason was the West's acceptance of the "end of history" view after the Cold War. The Ukraine war serves as a wake up call.

      Ambassador Winkler shared his thoughts on both the changes in thinking about war, security, politics, and practical steps to be taken to avoid strategic sleepwalking in Western societies.

    7. We must support the international commu-nity in its effort to prevent this, anticipate the impact of such a war on us, and do everything to reduce it
    8. the concepts of comprehensive defence again
    9. has not so many technological inroads into our economy that it can freeze or stop it at will
    10. reduce our economic dependence on Rus-sia and, above all, China
    11. We should form something like half a dozen brigades with national defence as main task; fully equip them with armour, modern artillery, and the latest in infan-try fighting equipment
    12. We can offer Geneva as negotiating table and we have the three Geneva Centers initiated by Switzerland as islands of excellence.
    13. render our world less secure.
    14. they must be understood as tools to formulate and im-plement political strategies
    15. We must, above all, cease to perceive weapons (as the peace movement does) as instruments of the evil, which should be abolished as soon as possible.
    16. Through the use of artificial intelligence and quantum computers it should be possible to throw a cloud of obstacles into their trajectory. Any collision, as small as it may be, would lead to the immediate dis-integration of the glider
    17. Particularly in the US, more recently also in Russia, there is, moreover, a growing attraction of small or very small nuclear weapons that could be used as easily as conventional weapons. That is wrong and it is dangerous.
    18. We must realize that Putin may begin to prepare the ground for a nuclear surprise attack – if he chooses so.
    19. The time of nuclear arms control is over; the time has come for rearmament
    20. As a super-anti-subma-rine weapon. A large hydrogen bomb detonated in an area known to be frequented by US SSBN might be able to destroy, or at least weaken, the US underwa-ter deterrent.
    21. While the West believes that the world ends once the red but-ton is pushed, for the Russians and the Chinese the war enters simply a new phase, once the nuclear exchange has started.
    22. Xi is building the potentially largest ICBM force in the world, roughly the equivalent of the US and the Russian arsenals combined.
    23. attributed to China a total nuclear force of 200–400 warheads, comparable to the arsenals of the UK and of France (but far below the numbers of the US and Russian arsenals)
    24. that are placed under the direct control of the Communist Party’s (KPC) Central Military Commis-sion (CMC), headed by Xi Jinping
    25. It refuses until today to enter into any arms control negotiations.
    26. France, where control of the warheads and the land-based launchers lay not with the armed forces but with the Gendarmerie nationale, shows the same attitude.

      Interesting phenomenon

    27. based on minimal deterrence, and announced a «No First Use» policy
    28. He believed that even a single nuclear weapon that would hit the attacker in retalia-tion would be totally unacceptable price – and hence constitute a sufficient deterrent.
    29. The hyperve-locity missiles entering the Russian and Chinese order of battle can now bypass the whole collection.
    30. Both projects need, though, still several years until becoming operational while their Russian and Chinese equivalents are al-ready operational today (the Russian models were suc-cessfully used in the war with Ukraine)
    31. The Columbia class boats will displace some 21,000 tons, mount 16 tubes for Trident D5 SLBM each, and be the most sophisticated submarines ever built by the US.
    32. China has tested (and is about to introduce) hypersonic glider systems.
    33. The Sarmat, the Avangard, and the Iskander-M are already deployed.
    34. «Iskander-M»
    35. «Status-6»,
    36. «Avangard»
    37. he airborne «Kinzhal»
    38. «Zirkon» hypersonic glider (GL)
    39. finds itself today – as far as armour is concerned – with two partially equipped, skeleton armoured di-visionstructures with a total of 244 main battle tanks.
    40. Under the impression of having won the Cold War, the West felt it needed no longer armed forces capable to fighting a succession of major conventional battles against powerful Russian invasion forces.
    41. The truth is that the US has, after the end of the Cold War, largely neglected its strategic nuclear forces.
    42. national security cannot be ultimately guar-anteed without the possession of nuclear weapons.
    43. Ukraine is helpless. It can prevail on the battlefield, but it cannot force an end to the aggression
    44. The hell a nuclear war would un-leash would be too close to result in the extinction of the human race, and thus deprive words like «victory» of any meaning.
    45. he ensuing ABM Treaty limited both sides to one field of 100 ABM interceptors. The Russians completed under this regime their ABM defensive ring protecting Moscow, while the US chose to protect an ICBM field in Wyoming
    46. The US went down from a peak of more than 31,000 weap-ons in 1967 to an inventory of 5,428 today (of which 1,744 are deployed and ready to be launched, 1’964 in a stockpile, and 1’720 retired, awaiting dismantling). The USSR/Russia went from close to 40’000 weapons in 1985 down to 5’977 in 2022 (1,528 deployed, 2’949 in stockpile, and 1,500 retired, awaiting dismantling).
    47. diate Range Nuclear Forces), at the conventional level CFE (Conventional Forces in Europe).
    48. The nuclear nightmare would not disappear but be-come less costly
    49. This German unease has always been recognized by the So-viet Union (and later Russia) as NATO’s Achilles’ heel
    50. the US would rather go nuclear than being overwhelmed.
    51. and frozen to death in the «nuclear winter»
    52. would suffice to bomb the attacker back to the stone age.
    53. to be the political destiny of our planet.
    54. De-terrence and Mutual Assured Destruction (MAD) had rendered the nuclear confrontation a dead end and hence essentially stable.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Arrest of suspected developer of Tornado Cash

      TITTLE: The Netherland's financial crime agency arrested the Tornado Cash developer.

      On August 10, the Dutch Fiscal Information and Investigation Service (FIOD) arrested Alexey Pertsev (29) as a suspect to be a developer behind the Tornado Cash online service.

      A couple of days earlier, on August 8, the US Treasury sanctioned the Tornado Cash online service and froze all of their property in hand of the US regulators. The Treasury also issued a list of cryptocurrency wallet addresses that are affected by this sanctions.

      The FIOD mentioned in the statement that 'advanced technologies, such as decentralised organisations (DAO) that may facilitate money laundering are receiving extra attention' from the financial watchdog.

      'Investigations showed that at least one billion dollars' worth of cryptocurrencies of criminal origin passed through the mixer. It is suspected that persons behind this organisation have made large-scale profits from these transactions'

      This is a rare case in which the open source developer is charged for the illicit activities that are performed on the platform he created.

      The investigation is led by the Public Prosecutor’s Office for serious fraud, environmental crime and asset confiscation.

      LINK: https://www.fiod.nl/arrest-of-suspected-developer-of-tornado-cash/

      TOPIC: Cryptocurrency, Blockchain, Legal, cybercrime,

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. U.S. Treasury Sanctions Notorious Virtual Currency Mixer Tornado Cash

      The US Treasury sanctions the cryptocurrency mixer Tornado Cash

      TITLE: The US Treasury sanctions the cryptocurrency mixer Tornado Cash

      CONTENT: On August 8th 2022, The US Treasury's Office of Foreign Assets Control (OFAC) sanctioned the online service Tornado Cash that served as a mixer for the Ether cryptocurrency since 2019. The cryptocurrency mixers are online places where users could obfuscate the origin of cryptocurrency. Mixers use utility of decentralised exchanges and peer-to-peer trading, to create massive amount of transactions in short period of time - mixing tinted coins with the rest of the online supply. Mixers don't collect any user data related to people behind the cryptocurrency funds, therefore they are in a violation of the US federal regulations, and the global AML/CFT regulation. The Treasury stated an issues of national security to be one of the reasons for such action. The FBI and the OFAC are arguing that Tornado Cash facilitated a money laundry operation for the ransomware group Lazarus attributed to the DPRK. The OFAC is calming that cryptocurrency mixer was mostly used for illicit founds. and issued a list of Ether wallet addresses that are sanctioned in this case. It is not an usual practice for OFAC to sanction online service as they main targets are individuals. The OFAC called for the cryptocurrency industry to address challenges that anonymising features can present to AML/CFT obligations.

      The Tornado Cash was decentralized entity that run on an open source code.

      EXCERPT: The US Treasury, Office of Foreign Assets Control (OFAC) sanctioned the cryptocurrency mixer Tornado Cash and

      LINK: https://home.treasury.gov/news/press-releases/jy0916

      https://home.treasury.gov/policy-issues/financial-sanctions/recent-actions/20220808 - LIST OF CRYPTOCURRENCY WALLETS

      TOPIC: Cryptocurrency, Blockchain, Legal,

      TREND:

      PROCESS:

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: RSF’s new investigation on online media attacks throughout the Brazilian election campaign

      CONTENT: Throughout Brazil's election campaign, Reporters Without Borders (RSF) will track and analyze internet threats, violence, and attacks against the media as a part of their ongoing project. The election campaign was launched on 16 August and it will end with the election of a new president, members of both houses of the national congress, governors and members of the legislative assemblies in Brazil’s states on 2 or 30 October.

      During the campaign, RSF's Latin America bureau will monitor, analyze, and denounce online attacks on journalists in collaboration with the Laboratory for Image and Cyberculture Studies (LABIC), a leading research center specializing in social media analysis and digital trends affiliated with the Federal State University of Espirito Santo.

      The results of this research will be collected and posted on the RSF website on a regular basis. Following the elections, a detailed report analyzing the main trends and attacks observed during the project will be published. The project's goal is to better understand the origin, structure, and spread of these online attacks, to expose the main perpetrators, and to find effective and long-term solutions to combat this phenomenon.

      RSF published the findings of a survey of Twitter users' behavior in 2021, the platform used for the majority of attacks against the media and journalists in Brazil. Bolsonaro supporters were the primary perpetrators of these attacks, with the main targets being female journalists and media outlets critical of the government.

      EXCERPT: RSF is planning to investigate the online attacks on Brazilian media during the ongoing election in their new project. The results will be posted on a regular basis, and after the elections end, a detailed report on main trends and attacks during the project will also be published. The main goals of this analysis are to better understand what caused the spread of these online attacks, as well to expose the main perpetrators whilst finding a solution to combat this phenomenon.

      DATE: 23.08.2022.

      LINK: https://rsf.org/en/rsf-will-analyse-online-attacks-against-media-during-brazilian-election-campaign

      TOPIC: Freedom of the press, Freedom of expression

      COUNTRY: Brazil

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. blockchain investments these top corporations made from September 2021 to mid-June 2022.

      TITLE: Research on the corporate investments in the blockchain technology for the 2021-2022 period.

      CONTENT: According to the latest research from the Blockdata company, 40 corporations invested in companies in the blockchain/crypto space during the September 2021 till June 2022.

      Korean tech giant Samsung is the most active, having an invested share in 13 companies.

      Research look at the total funding amounts of the rounds companies participated in.

      Based on this, the investors active in the biggest funding rounds are Alphabet ($1,506M in 4 rounds), Blackrock ($1,171M in 3 rounds), Morgan Stanley ($1,10M in 2 rounds), Samsung ($979M in 13 rounds), Goldman Sachs ( $698M in 5 rounds, BNY Mellon ($690M in 3 rounds), and PayPal ($650M in 4 rounds).

      EXCERPT: Approximately $6 billions invested in the blockchain based startups in 2021. Samsung and Alphabet are leading the pack followed by the financial industry corporations

      LINK: https://www.blockdata.tech/blog/general/top-100-public-companies-investing-in-blockchain-and-crypto-companies

      TOPIC: Blockchain, Cryptocurrency,

      TREND: -

      PROCESS: -

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Dominican Republic government agency was disrupted by a quantum ransomware attack

      CONTENT: The Quantum ransomware assault that affected the Instituto Agrario Dominicano in the Dominican Republic and encrypted numerous services and workstations, occurred on August 18, local media reports. ‘They ask for more than 600 thousand dollars. We were affected by four physical servers and eight virtual servers; virtually all servers,’ Walixson Amaury Núñez, the IAD's director of technology, told the local press.

      As IAD does not have enough money to pay the ransom and with only basic security software systems - the company’s data was completely compromised.

      According to the National Cybersecurity Center (CNCS), who has been helping the agency recover from the attack, the attackers' IP addresses came from the United States and Russia.

      BleepingComputer investigated the case and found out that the Quantum ransomware operation was the attacker. If IAD did not pay the ransom publicly, the threat actor, who claimed having stolen over 1TB of data, threatened to release it. This ransomware actor is supposedly an offshoot of the Conti ransomware operation which adopted the earlier name of the MountLocker ransomware operation.

      EXCERPT: Instituto Agrario Dominicano, Dominican Republic’s government agency, suffered a ransomware attack by the Quantum ransomware operation. They are threatening them with a ransom of around 650.000 dollars. As the agency is not able to afford the ransom, and with only basic software security, their data is at stake. As the National Cybersecurity Center reports, the IP addresses of the attackers come from the U.S. and Russia.

      LINK: https://www.bleepingcomputer.com/news/security/quantum-ransomware-attack-disrupts-govt-agency-in-dominican-republic/

      TOPIC: Cyberconflict and warfare, Cybercrime

      COUNTRY: Dominican Republic

      DATE: 24.08.2022.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Patrick Hillmann, chief communications officer at the world’s largest crypto exchange, Binance, claims scammers made a deepfake of him to trick contacts into taking meetings.

      The CCO of the world biggest cryptocurrency exchange, wrote about this case in his blog published on a company website. In his words: 'this deep fake was refined enough to fool several highly intelligent crypto community members”

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Russia’s Yandex to sell off news service as state tightens grip on online media

      TITLE: Russia's Yandex sells news and blogging services as state tightens control over online media

      CONTENT: In a transaction that would expand direct state control over the news that many Russians view online, the largest internet firm in Russia will sell off its news and blogging services to the state-controlled social media site VK.

      Yandex.ru's main page, which was sold together with the news aggregator and blogging platform Zen, is expected to turn into a social media-style news feed managed by Gazprom-owned VK as a result of the transaction, with its chief executive being the son of a Kremlin official tasked with integrating the occupied territories of Ukraine.

      News articles on Yandex were already perceived as having been deliberately selected to abstain from controversial subjects in Russia, particularly criticism of the war in Ukraine. By reducing Yandex's exposure to politics, the sale of the company's media holdings is reportedly an effort to protect it from the threat of western sanctions.

      LINK: https://www.theguardian.com/world/2022/aug/23/russia-yandex-sell-news-service-state-tightens-grip-online-media

      DATE: 23.08.2022.

      TOPIC: Freedom of the press

      COUNTRY: Russia

      EXCERPT: Russia’s Yandex sells its news and blogging services to the state-controlled social media site VK. Yandex.ru’s main page is expected to turn into a social media-style news feed managed by Gazprom-owned VK, as a result of this transaction. The goal was reportedly an effort to loosen up the threats from western sanctions.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The TikTok threat to Google’s business isn’t just limited to YouTube, as it turns out. Core Google services, including Search and Maps, are also being impacted by a growing preference for social media and videos as the first stop on younger users’ path to discovery, a Google exec acknowledged today, speaking at an industry event.

      It is interesting to see that Google is getting threatened even on search function by TikTok and Instagram.

      We should monitor this development.

      ||Jovan||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Greece’s largest natural gas distributor DESFA suffered ransomware-related data breach

      CONTENT: Greece’s largest natural gas distributor (DESFA) suffered a limited scope data breach and IT system outage which were followed by a cyberattack, this Saturday.

      DESFA shared in a public statement that hackers tried to infiltrate its network, but were faced with a quick response from their IT team. Nevertheless, the attack possibly caused the leakage of some files and data and a network intrusion was definitely made, although limited. DESFA is working on returning to normal operations and is ensuring the customers this incident would not impact the gas supplies.

      The attack was confirmed on Friday by Ragnar Locker ransomware operation, a threat actor. It is said in a recent FBI report that Ragnar Locker made 52 intrusions in critical U.S. infrastructure entities since January this year.

      This ransomware actor is threatening to publish all files that would victimize DESFA, if they do not answer their demands. The timeline of this attack is tough for European gas suppliers after being cut from Russia’s natural gas.

      The upcoming period is believed to be full of shortages, power cuts, and growing energy prices, leaving everyone involved even more vulnerable to ransomware attacks against gas distributors.

      EXCERPT: DESFA, Greece’s largest gas distributor was targeted with an ransomware attack. This attack was confirmed to be made by Ragnar Locker - a ransomware operation, familiar to FBI for their previous intrusions. This attack comes at a vulnerable time for European gas suppliers after being cut from Russian gas, and it is believed that the situation will get worse if similar attack should happen in this region again.

      LINK: https://www.bleepingcomputer.com/news/security/greek-natural-gas-operator-suffers-ransomware-related-data-breach/

      COUNTRY: Greece

      TOPIC: Cyberconflict and warfare, Cybercrime

      DATE: 22.08.2022.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Jordanian journalist arrested for allegedly violating Jordan’s cybercrime law by writing posts on Facebook

      CONTENT: On August 15, Adnan Al-Rousan, a Jordanian journalist, has been arrested by seven unidentified men, with two of them being in military uniform. The reasons behind this arrest are Al-Rousan’s posts on his Facebook profile, which were considered to be ‘insulting to Jordan.’ His most recent one, on August 14, was directed towards the ruler of Jordan, King Abdullah II bin Al-Hussein, saying ‘Jordan isn’t your property, it’s for us Jordanians.’

      He is believed to be violating Jordan’s cybercrime law with these posts on social media, while regularly publishing political commentary of similar content as above mentioned. Committee to Protect Journalist asks for an immediate release of the reporter, while trying to get any contact information for the Jordanian public prosecutor.

      EXCERPT: Adnan Al-Rousan, a Jordanian journalist has been arrested for allegedly violating the country’s cybercrime law. He regularly posts on his Facebook profile, criticizing the regime. Recently he wrote a post directed towards the King Abdullah II bin Al-Hussein, which caused his arrest. Committee to Protect Journalists condemns this arrest and asks for his immediate release.

      LINK: https://cpj.org/2022/08/jordanian-journalist-adnan-al-rousan-arrested-over-critical-columns-posted-on-facebook/

      TOPIC: Freedom of the press

      DATE: 18 August 2022

      COUNTRY: Jordan

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Estonia's Battle Against a Deluge of DDoS Attacks

      TITLE: Estonia battles a series of DDoS attacks during August

      CONTENT: According to Infosecurity magazine, Estonian public authorities and businesses have been the subject of increased large-scale distributed denial-of-service (DDoS) attacks in August. The Head of the incident response (CERT-EE) department, Tõnu Tammer, said that these attacks are a daily occurrence in Estonian cyberspace. Nevertheless, the Estonian Information System Authority (RIA) is highlighting that data confidentiality is not at risk, as attackers are not able to access or change the data. On August 18, Estonia faced the most extensive cyber-attack since 2007.

      Since the start of the invasion of Ukraine, Russian stated-backed cybercriminals are believed to be the main suspect for numerous cyberattacks on neighboring countries. This is why it is advised to Governments in Eastern Europe to heighten their alerts and ensure their cyber-defenses are as robust as they can be.

      EXCERPT: Estonian public authorities and businesses are facing a large number of DDoS attacks during the month of August 2022. Infosecurity magazine has talked about this issue with Tõnu Tammer, the Head of the CERT-EE department. Estonia is not the only Eastern European country at risk of potential cyber attacks since the start of the Russian invasion on Ukraine in February this year. Strengthening cyber-defenses of these actors is highly recommended.

      LINK: https://www.infosecurity-magazine.com/news-features/estonias-battle-against-a-deluge/

      TOPIC: Cyberconflict and warfare, Cybercrime

      TREND:

      PROCESS:

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. On 5 July, the USA National Institute for Standardisation and Technology (NIST) selected candidate to become standard for Post-Quantum Cryptography (PQC)

      The new PQC standards should prevent risk that powerful quantum computing will pose to existing cryptography and encryption of digital traffic.

      It is anticipatory standard that should prevent risk that will come with deployment of quantum computing for cracking encrypted communication.

      See more here: https://csrc.nist.gov/projects/post-quantum-cryptography

    2. The Candidates to be Standardized and Round 4 Submissions were announced July 5, 2022. NISTIR 8413, Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process is now available. NIST has developed Guidelines for Submitting Tweaks for Fourth Round Candidates.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. the Open Technology Fund
    2. hese efforts could be used to improve legislative oversight of Chinese ICT companies and other entities seeking involvement in a host country’s digital information stack
    3. closer to Chinese data policy regulations that focus on state sovereignty over personal data, even when couched in the language of protecting privacy.
    4. extensive training programs at both the popular and elite levels aimed at fostering dependence on, and brand loyalty to, Chinese telecommunications firms like Huawei and ZTE
    5. a state-centric model of cyber governance
    6. The digital information stack consists of five layers – network infrastructure, devices, applications, content, and governance – and each layer of the stack includes several components.
    7. to be more aware of the tradeoffs of China’s involvement in their digital information stacks
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Most who implement pqc will not see any difference, and have no need to fuss with the 600-digit numbers in use today.
    2. nist’s new standards are unlikely to be the last, as quantum computers’ strengths develop and protocols are tested to destruction in the white-hat hackers’ white-hot heat.
    3. Eventually the new standards must percolate through every device and service that transmits encrypted data—every browser tab, every nuclear facility, every payment gizmo, every military digital radio.
    4. None has yet become a trusted standard, but now nist has picked a set of recipes that have survived years of tyre-kicking.
    5. “post-quantum cryptography”
    6. Cryptography protocols involve calculations that are harder to undo than do.
    7. the National Institute of Standards and Technology (nist)
    8. When quantum computers reach their potential, decades of secret intelligence, credit-card details, intellectual property and military and medical data will become as easy to read as the words before your eyes.
    9. One defence is to use encryption, but in the fast-approaching era of quantum computers that defence will fail.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. We will now allow singular use of data alongside the plural. Specifically, when considered as a concept—as in data is the new oil—the singular will be acceptable, as well as when the data in question is considered as a mass (the data on this mobile-phone plan is insufficient). However, when data points are considered as a group of pieces of information, the plural should still be used: data from the National Oceanic and Atmospheric Administration indicate the hottest summer of all time.

      The Economist allows use of data as both singular and plural. For example, data is the new oil. But, as it was indicated 'data from the National Oceanic and Atmospheric Administration indicate the hottest summer of all time.'

      The Economist explains plural and singular use of 'data' here.

    2. Plural data in the sense of “data points” will probably appear in one kind of story exclusively (ie, those reporting on a study based on a number of observations), and mass-style singular data in others (especially those to do with computing). In any case, our style guide already allows some collective nouns, like council or staff, to be singular or plural depending on whether it is the entity or its constituents under discussion, with no resulting chaos.
    3. Singular data is now more common than the plural in books, and far more prevalent on the web.
    4. Data, as every child at a grammar school once knew, is the plural of Latin’s datum, “something given”.
    5. We will now allow singular use of data alongside the plural. Specifically, when considered as a concept—as in data is the new oil—the singular will be acceptable, as well as when the data in question is considered as a mass (the data on this mobile-phone plan is insufficient). However, when data points are considered as a group of pieces of information, the plural should still be used: data from the National Oceanic and Atmospheric Administration indicate the hottest summer of all time.

      ||GingerP|| We should update our editorial text on data.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Tencent is Chinese company behind WeChat, one of the most used Internet applications. Tencent is also major gaming company globally. It has investment in hundreds of tech start-ups.

      While Tencent is strong in China, its global activiteis could be endangered by Splinternet building around Sino-American digital tensions.

      More at the Economist article.

    2. As Sino-American tensions worsen, that is a game no one can win.
    3. as well as its games, run the risk of arousing hostility from China hawks in America
    4. Mr Xi’s crackdown on internet firms has hit its gaming arm, its fintech plans and local investments such as Didi. It has to censor itself vigorously.
    5. Tencent is embedded in almost every aspect of life there
    6. are fascinatingly idiosyncratic,
    7. As Ms Chen puts it, it has become an incubator of startups, not a killer of potential competitors.
    8. all of Tencent’s transformational ideas, including WeChat, came from second-tier teams competing against each other, not from the top brass
    9. (“You either wait for someone to kill you or you kill yourself first,” is how he describes the firm’s constant efforts at reinvention)
    10. That threatens its reputation in the West, where it is a huge investor in gaming (among other businesses) and where it is keen to expand its reach.
    11. WeChat is Tencent’s flagship product, a “Swiss Army Knife” of a super app, offering messages, search, ride-hailing, food delivery and other applications on a single platform. But in a paranoid regime, its power is also a threat.
    12. It was a rare moment when WeChat (Weixin within China) was used to express people’s anger and pain, rather than the blander stuff—swanky dinners, clouds at dusk—that people usually post.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. "extremely straightforward, very open and friendly. He's got a pretty good sense of humor."
    2. He was CEO of the Center for a New American Security, a Washington-based national security think tank, before becoming CEO of Endgame, a cybersecurity software firm that was acquired by the cloud computing firm Elastic in 2019.
    3. to make the case for developing countries to incorporate openness and freedom into their regulation of the internet rather than authoritarian control.
    4. imit the flow of information to and among their citizens.
    5. lighter regulation biased in favor of the free flow of information
    6. It's a battle over who controls the digital environment."
    7. for security and digital policy
    8. The bureau combines three pre-existing policy units within the State Department: International Cyberspace Security, International Information and Communications Policy, and Digital Freedom.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Casting the prosecution of a presidential candidate as a deep-state conspiracy is peculiarly compelling.
    2. Not charging Mr Trump gives him an air of impunity; charging him unsuccessfully would make him look invincible.
    3. But the possibility of prosecution seems to fire Mr Trump and his supporters up, rather than turn them off. They treat it as offering a form of vindication—evidence of how much “the regime” wants him off the scene.
    4. “People are happy—overwhelmingly—with the direction of the party. And that means America First,” says Ms Longwell. “Even if Trump the man loses some altitude…the party has now changed for ever.”
    5. Much of it has come from former Trump donors who think the risk of another loss against Mr Biden is too high.
    6. “We will bring Big Tech down to their knees!” screamed Lauren Boebert, a Republican congresswoman.
    7. The Republican parties in various other potential swing states, including Michigan and Nevada, have chosen to field Big Lie endorsers as their candidates for some or all of the same offices (see chart 2).
    8. Any investigative committees they come to control will abruptly lose interest in Mar-a-Lago’s safes and turn their attention to President Joe Biden’s administration and family.
    9. they will act as fierce Trump loyalists
    10. The party’s base is still devoted to Mr Trump (65% net approval in polls) and to his Big Lie about the 2020 election (70% tell pollsters they believe it was stolen from him), and he can focus their ire on anyone whose head rises above the parapet. His power in the party is not absolute. But it is unquestionable.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. This is rare, optimistic, article on EU and Brussels. Author returns after 10 years to Brussels. EU survived 'decennium horribilis'.

      EU has not moved into direction of more democarcy. National governments make deals in the late night negotiations. But, while they criticise Brussels, they often pass difficult political issues to the EU.

      New mantra is 'a Europe that protects'. But the real question is if EU will manage to protect from problems that are beyond EU's power to shape.

    2. “we will live in a world determined by others, with stifling constraints on our ability to shape our future”.
    3. The mantra these days in Brussels is to provide “a Europe that protects”, whether from the vagaries of globalisation, a changing climate or foreign tyrants.
    4. That model largely endures to this day. This is a disappointment to purists of European integration, for whom the project should aim to mitigate the power of selfish national governments, not enhance it.
    5. during the euro crisis Brussels became a venue for national leaders to broker late-night deals rather than the home of institutions which themselves made decisions.
    6. No national watchdog in Europe could boss around an Amazon or Google. The eu’s regulation of such tech giants, in contrast, has given the concerns of Europeans, whether on privacy or rapacious business models, real heft.

      Good point on limitations of national governments in handling big tech companies.

    7. national leaders kick things up to the European level because they realise there is no way any single government can tackle them alone.
    8. A decade ago the mantra in Brussels was “more Europe”: every problem had a solution that required power to be handed to the eu
    9. the collective satisfaction of having come through a decennium horribilis in one piece (minus Britain)
    10. Brussels is brimming with confidence, even as Europe’s prospects look more tenuous. What happened?
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Something for Sorina and her work on standardisation. It is a very interesting story on the way how the U.S. National Institute of Standards and Technology (NIST) works. NIST's work is explained on examples of peanut butter and marijuna/hemp.

    2. formula is “right on the cusp of a pharmaceutical”, because it is many babies’ sole source of nutrition. Getting exactly the recommended levels of vitamins—not 90%, not 110%—is crucial.
    3. every foodstuff can be seen as a combination of fat, protein and carbohydrate.
    4. The nascent nbs worked with iron founders to define the precise alloys that railway-builders should use.
    5. They need physical embodiments of the standards they define.
    6. Often they began as repositories for lumps of metal of precisely a kilogram’s mass or a metre’s length, though these fundamental units are now defined in terms of natural phenomena rather than iridium-platinum artefacts.

      How standards started?

    7. Standard methods and units are the bedrock of scientific endeavours from atom-smashing to astronomy.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. He was saying that nato forces and the Ukrainian government had trained him to “eliminate” peace-loving citizens.
    2. Schools are preparing to start teaching the Russian curriculum
    3. Ukrainian mobile numbers no longer work.
    4. Ukrainians can open accounts at one of two new Russian banks, but only if they get a Russian passport.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. China is more complex politically and socially than it is portrayed in most of the Western media. The Economist brings an interesting article on neo-Maoist group 'Red song society'.

      The ruling elite walks delicate line of tolerating neo-Maoist to the point that may (in)directly criticise, especially, social policy of the Communist party.

      In this case, government-controlled media is trying to stop Red song society through economic fines for misuse of copyright-materials. This court case cannot happen without approval of the Communist Party.

      it is interesting that 'economist censorship' is becoming favourite approach in countries worldwide. Instead of closing media outliet, they are forced to close via high fines for breach of copyright law or libel.

    2. such as whether the party responded forcefully enough to the recent visit to Taiwan by Nancy Pelosi
    3. their support for Bo Xilai, a red-song-loving rival to China’s then leader-in-waiting, Xi Jinping.
    4. The neo-Maoists know well that the government watches them warily.
    5. Among officials, the flare-up of neo-Maoist discontent will not be welcome.
    6. Neo-Maoist websites, as well as others run by nationalists of a less ideological hue, often serve a useful purpose for the party.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The future of the United States will determine future of the world. In the center of America's future is future of Donalnd Trump.

      This article shows how the raid on Mar-a-Lago compound may shake the very foundation of the United States (and the world).

      Mishandling of classified document could be legally sufficient but, politically, most likely not sufficient to stop Trump's return to political leadership.

      Fasten seat belts!

    2. It is tearing at America’s governing institutions.
    3. the black hole at the centre of its politics.
    4. what was it about Mr Trump that drew people to him like this? “I don’t think about it…” he called back over his shoulder, with a grin. “Whatever it is, it is.”
    5. not giving direct orders that might implicate him but speaking “in a code.” The president who had the foresight to bar the White House photographer from his presence on January 6th, and leave no phone trail that day, seems unlikely to have left incriminating evidence lying around Mar-a-Lago.

      It is serious insight about Trump's modus operandi.

    6. The raid appears to stem from an investigation into how he handled classified information
    7. America faces the possibility of an indicted or convicted candidate winning a presidential election while campaigning against the rule of law.
    8. The constitution, which spells out the qualifications for serving as president, is silent on the question of a criminal record.
    9. Mr Trump was able to present himself in his favourite light, as the victim of dark, partisan forces out to protect the establishment by dragging him down.
    10. “Another day in paradise,”
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Trust your instinct. Do not overthink. Avoid 'paralysis by analysis'.

      These are some advises from the Economist. Big organisations are designed to stamp our instinct, which helped us to survive for centuries as much as our rationality. Should we rethink organisations of modern era? Could a bit of survival instinct help us to save us from crazy decision that may end humanity?

      This text opens many questions. Answers could be discovered by intuition. The first step is to decide faster, move on, reflect, adjust, and move on.

      We advanced a lot in this direction over the last few years especially on adjusting Diplo's tech and creative activities. Now, we should move to content and courses.

      Trust your guts more! There is a lot of intelligence in guts!

    2. When to use intuition in the workplace rests on its own form of pattern recognition.

      Can AI and pattern recognition help intuition? ||JovanNj||||anjadjATdiplomacy.edu||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL