1. Jul 2022
    1. -

      digital standards

    2. based on the multi-stakeholder model of Internet governance.

      shift from dual approach of multilateral and multistakeholder approach. Internet governance is considered in narrower context as governance of technological infrastructure. It is departure from the WSIS definition of IG which considers IG as not only governance of the Internet but also governance on the Internet (data, economy, human rights, etc.).

    3. -

      technology

    4. -

      human rights

    5. a human-centric and human rights-based approac
    6. -

      geopolitics

    7. common geopolitical priorities
    8. 5.

      Cybersecurity

    9. built on universal human rights, fundamental freedoms, the rule of law and democratic principles.
    10. its technological and digital sovereignty
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Pakistani reporters are being harassed by the government army

      Since Shehbaz Sharif took over as a Pakistani prime minister in April, there have been a dozen reports of army-related agencies harassing the media, as RSF cautioned. Critical journalists have been a target of a major army campaign to intimidate their work, parallelly destabilizing Pakistan’s democracy.

      This serious decline in press freedom was bolstered with the latest case on 9 July when BOL news anchor, Sami Ibrahim, got attacked by three people. The next day, he posted a YouTube video, saying that the attack was planned to prevent him from filming the scene, and the attackers later left in a vehicle with clear signs of being state-owned.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Calibre is a good software for ebooks publishing

      ||Jovan||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Virtual interaction is a simulation of real human life.
    2. my temporal body to be genuine flesh and my soul something that is authentic and eternal
    3. Many scientists and philosophers have suggested that we all might be living in a simulation of some advanced civilization. As fantastic as it sounds, Scientific American reported in 2020 that the odds of this are probably about 50–50.
    4. no-Zoom weekends and a complete moratorium during your summer vacation
    5. on boundaries around our use of the technology
    6. good Zoom hygiene
    7. keeping virtual meetings, classes, and conversations short and to-the-point.
    8. For happiness and productivity, virtual interactions are better than nothing. But in-person interactions are better than virtual ones for life satisfaction, work engagement, and creativity.
    9. videoconferencing inhibits the production of creative ideas.
    10. the Journal of Applied Psychology, researchers who monitored 103 virtual workers’ fatigue during meetings found that when workers used their camera (versus having it turned off), they were less engaged during meetings that day and the one after as well.
    11. One 2021 study in the journal NeuroRegulation found that almost 94 percent of undergraduates had “moderate to considerable difficulty with online learning.”
    12. may be better for well-being than having no social interactions, using video-calling to the point of fatigue has been shown to predict high rates of depression, anxiety, stress, and dissatisfaction with life.
    13. it mutes mirror neurons (which help us understand and empathize with others) and confounds our Global Positioning System neurons (which code our location).
    14. Zoom fatigue has six root causes: asynchronicity of communication (you aren’t quite in rhythm with others, especially when connections are imperfect); lack of body language; lack of eye contact; increased self-awareness (you are looking at yourself a lot of the time); interaction with multiple faces (you are focusing on many people at once in a small field of view, which is confusing and unnatural); and multitasking opportunities (you check your email and the news while trying to pay attention to the meeting).

      On emotional aspects of tele-conferencing.

    15. Zoom fatigue rises with frequency and duration of meetings.
    16. Videochatting may promise the benefits of face-to-face meeting without germs and commuting. But it can provoke burnout for many, and even depression. When it comes to human interaction, it is like junk food: filling and convenient, but no substitute for a healthy diet.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. ISBNs will need to be changed if certain changes are made to your book.
    2. The 13 digit ISBN number is broken up into 5 parts that identify the following:

      Meaning of 13 digits.

    3. But, as we will mention further along in this post, be sure you have only one ISBN number registered to your self-published book and not multiple numbers spread out over various platforms.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Most important ap

      ||sorina||||VladaR|| Here you have some statistic on time of use of computers, use of apps, etc.

    2. African youth consider universal WiFi to be a fundamental human right

      ||sorina||||VladaR|| Universal WiFi should be a fundamental human right according to African youth.

    3. The majority (53%) of youth believe that Western style democracy is not necessarily suitable for the African context, and contend that African countries will need to find their own democratic systems and structures that work for the continent and its people.

      ||VladaR||||sorina|| This is an interesting study where 53% of African youth believe that AFrica should develop itsown type of democracy with the most important aspect to be equality of all citizens.

    4. African youth see equality of all citizens under the law as the most important democratic value.
    5. equality of all citizens under the law as the most important democratic value.
    6. equality of all citizens under the law as the most important democratic value.
    7. Political instability may be another reason for the decline in Afro-optimism, particularly in countries afflicted with conflict, civil war, and violent extremism in recent years
    8. hree-quarters of African youth believe that owning land is essential for their financial wellbeing
    9. early two-thirds of African youth find the price of mobile data coverage to be high, and just one-in-eight can afford data coverage at all times. In terms of news outlets,
    10. equality of all citizens under the law, freedom of speech, and free and fair elections as the most important pillars of democracy
    11. for African-style democracy
    12. remain optimistic about their personal future and look ahead into an African century.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. t is crucial that African governments adopt multi-stakeholder policies and legal frameworks that leverage nongovernment expertise and ensure adequate oversight of security actors wading into the ICT arena.
    2. The lack of knowledge of cyber issues has contributed to a lack of effective regulation and oversight, while amplifying opportunities for abuse.
    3. Eighteen have established the equivalent of national computer incident response teams (CIRTs), or multi-stakeholder groups of cybersecurity professionals who help countries respond to and recover from major security incidents.

      Do we have list of AFrican CERTs?

    4. Governments frequently fail to monitor threats, collect digital forensic evidence, and prosecute computer-based crime.  Ninety-six percent of cyber security incidents go unreported or unresolved, meaning that cyber threats in Africa are likely much worse than recognized.
    5. Drones are already used by 14 African countries and have been acquired and used for intelligence purposes by African militant groups.
    6. Despite Liberia’s appeals abroad for assistance, authorities did not make arrests until after the software employed in the attack was used to disable Deutsche Telecom, the German telecommunications giant, months after the attacks began.
    7. In Africa, attacks on critical infrastructure are becoming frequent. Banks are particularly common targets, losing billions of dollars to theft and service disruption. The National Security Agency of Nigeria and the municipal government of Johannesburg have each been victims of attacks that shut down services or leaked sensitive information. With cyberattacks against maritime infrastructure on the rise ranging from piracy to stealing database logs, experts worry that Africa’s ports and shipping industries could suffer an attack causing major disruptions in trade and commerce.

      ||sorina||||VladaR|| the most vulnerable parts of African society

    8. China may have similar capabilities elsewhere in Africa, where it has built up to 80 percent of all existing telecommunications networks and set up government networks in over 20 countries.

      ||sorina|| Chinese presence in Africa.

    9. For example, Pegasus malware, among the most sophisticated pieces of espionage software ever invented, was recently discovered to have infected systems in 11 African countries.
    10. In June 2020, the Ethiopian Information Network Security Agency (INSA) thwarted a cyberattack from an Egypt-based actor known as the Cyber_Horus Group.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. These include the Policy and Regulation Initiative for Digital Africa (PRIDA), the West African Response on Cybersecurity and Fight against Cybercrime  (OCWAR-C), the AU Commission’s-Global Forum on Cyber Expertise (GFCE) joint cyber capacity building initiatives, and efforts by the Africa Computer Emergency Response Team (AfricaCERT
    2. More cyber-mature countries should focus on overcoming obstacles to interagency coordination, regularly updating their strategies, and attempting to look ahead to meet the next generation of threats. They can and should play a leading role in establishing good practices, building capacity, supporting indigenous research and development of digital tools (including algorithms and encryption technologies), and improving regional and international cyber cooperation in Africa.
    3. As a result, most African nations are woefully underprepared to confront advances in artificial intelligence, wireless communications, quantum computing, and automation that are likely to characterize the coming decade.
    4. A central challenge for African legislatures, then, is to enact laws that empower regulators to quickly adapt in a dynamic environment without trying to legislate minutia.

      ||VladaR||||sorina|| This is of relevance for parliamentarians in AFrica.

    5. national cybersecurity strategies should ideally be updated every 5 years as a matter of course.
    6. the five African countries that have not updated their national cybersecurity strategies in the past 5 years—Kenya, Mauritius, Morocco, South Africa, and Uganda—are widely considered to be among the continent’s most cyber mature.
    7. Strategies are key instruments that designate society-wide roles and responsibilities, in part to overcome obstacles to interagency coordination
    8. For example, because the African financial sector is a primary target for cyber fraud, Africa-based banks invest significant resources in complying with international cybersecurity norms, regulations, and standards.
    9. The logic for including private sector actors and making public-private partnerships a focal point of national cybersecurity strategies is straightforward.
    10. Fewer than half of all countries with national cybersecurity strategies possessed either threat assessments (which help justify the strategy’s existence and tailor the response to the threat) or resource allocations (which are necessary to ensure a strategy’s implementation).

      Here is an interesting survey of national cybersecurity strategies.

      ||sorina||||VladaR||

    11. about a third (17) of Africa’s 54 countries have completed a national cybersecurity strategy, which is less than half the global average.

      ||VladaR||||sorina|| Low level of adoption of national cybersecurity strategies.

    12. At the regional level, there is no dearth of initiatives that aim to address the continent’s growing cyber-related threats and challenges. Beginning in 2019, the Economic Community of West African States (ECOWAS) Commission, in partnership with the European Union (EU), initiated the West African Response on Cybersecurity and Fight against Cybercrime (OCWAR-C) and adopted a Regional Cybersecurity and Cybercrime Strategy. The African Union Mechanism for Police Cooperation (AFRIPOL) created a Cybercrime Strategy 2020-2024 that seeks to enhance coordination, develop specialized police capacities, and harmonize legal and regulatory frameworks. Meanwhile, the African Union (AU) is working to craft and implement its own continental cybersecurity strategy through its recently established Cyber Security Experts Group. Through the formation of the Africa Cyber Experts (ACE) Community, the AU is partnering with the Global Forum on Cyber Expertise (GFCE) to support cyber capacity building.

      ||VladaR||||sorina|| Here is the survey of various cybersecurity initiatives in Africa. You may use it for training.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Islamic advisory body — Dar-al-Ifta — released a decree declaring cryptocurrencies as Haram (something prohibited in Islamic law). Islamic finance does not allow the concept of “riba” or interest. To bypass this, they introduced the Sukuk. Sukuk is an Islamic financial certificate similar to a bond in Western finance but complies with Islamic religious law. However, the income derived from the Sukuk can not be speculative, or it would no longer be permissible. That eliminates bitcoin and other cryptocurrencies because they are speculative.

      ||ArvinKamberi||||sorina||||VladaR|| Arvin, here is an interesting info on the reason why some muslim countreis ban cryptocurrencies as speculative ones which is not allowed according to Islam. It could be an interesting update to research a bit more on it.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Unfortunately, CISOs struggle to find competent staff that can handle the security alerts they receive daily,keep up with data protection regulations, andprotect networks from cybercriminals.
    2. Currently, however, only 14out of the 54countrieson the continenthave enacted specific laws against cybercrime. Another 11countries have partial laws, and 30 have no meaningful cybercrime laws. As noted previously, only 14 countries had agreed to join the 2014 Malabo Convention framework at the end of 2019
    3. only14 out of the 54countries in Africa havesigned thistreaty,and only eighthadratified the treaty atthe end of 2020.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. “In addition, one out of every three companies believes that there is insufficient integration between security and IT teams with 30% saying that hiring and retaining security skills is a challenge.”
    2. The top threats facing organizations in SSA in 2022 are data leakage (61%), insider threats (43%); targeted attacks using phishing (37%); cloud-related attacks (34%); and ransomware attacks (30%).

      ||sorina|| Not clear what is percentage of?

    3. This opens up the threat landscape considerably and puts organisations at greater risk.
    4. There is a linear relationship between GDP and cybercrime.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. increased national commitments (NDCs) and net zero targets
    2. to accelerate transitions to clean growth
    3. or a successfully negotiated outcome and overall event
    4. Allocations were made by prioritising funding for regional events, SIDS, climate vulnerable countries, smaller posts, and the four campaign goals.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Cyberwar games: Cyber Europe 2022

      One of the largest cyber crisis simulations organised by The European Union Agency for Cybersecurity (ENISA) has just been completed. With over 800 cybersecurity experts from 29 European countries and the European Free Trade Area (EFTA), it involved specialists from EU agencies and institutions as well.

      This year, the exercises involved a scenario of a simulated attack on European healthcare infrastructure and they tested how participants’ respond to incidents in coordination with EU institutions. They involve the ability of close work with CERT-EU and ENISA in order to reinforce the resilience of the healthcare sector against cyber attacks in the EU with complex business continuity and crisis management situations.

      These lessons will be published in ENISA’s ‘after-action report.’

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Costa Rica's public health system hit by Hive ransomware

      The Costa Rican Social Security Fund (CCSS), i.e. Costa Rica’s public health service was hit by Hive ransomware and forced to shut its systems down. The ransomware was deployed on at least 30 out of 1,500 government servers, CCSS told local media.

      Cybersecurity experts suggested that Hive might be working with Conti to help Conti rebrand.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Italian police thwart Eurovision cyberattack by pro-Russian hacker groups

      Italian police thwarted hacker attacks by pro-Russian hacker groups Killnet and Legion during the 10 May semi-final and 14 May final of the Eurovision Song Contest (ESC) in Turin, Italy. Russia was excluded from the competition due to what it calls its special military operation in Ukraine, while Ukraine went on to win the contest.

      Killnet denied the attack on ESC, but then declared cyberwar on 10 countries in the same Telegram post. In a separate video, the group stated that these 10 countries are ‘the US, the UK, Germany, Italy, Latvia, Romania, Lithuania, Estonia, Poland, and Ukraine.’

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. China and West start 'development battle' for, mainly, Africa. Forlong time China's Belt and Road Initiative has been the main mega-development initiative.

      BRI was criticised for being China's 'debt-trap diplomacy with investement of USD 890 billion mainly in infrastructur projects.

      This starting changing in 2022. On 26th June, G7 countries announced the Parntership for Global Infrastructure and Investement (PGII) announcing private and public investement of USD 600 billion.

      PGII and BRI could complementary with PGII focusing on 'soft development' of digital connectivity, climate, health and BRI aiming 'hard development' such as building prots and railways.

      But, China announced the Global Development Initiative (GDI) which is like to compete in 'soft development'.

      Digital development is likely to become competition zone between China's GDI and G7 PGII initiatives as focus will be on 5g telecoms, blockchain, data centers, etc.

      Together with Africa, Pacific region will be one of battle ground of this battle for geopoliticall influence via develpment assistance. In other to counter China's growing presence, Japan, South Korea, Australia, New Zealand, and United States launched Blue Pacific Pact.

      Some analysist are sceptical about G7 initiative as they see it as repackaging of the last year initiative of Build Back Better World which has to be repacked due to lack of congressional support in the USA.

      It is not yet clear how new G7 initiative will relate to other similar initiatives, including Blue Dot Network (started by USA, Japan and Australia in 2019 Global Gateway scheme of EU to mobilise USD 340 bn Clean Grean Initative by Britain.

      Thus, it is not clear how much fresh investement will go into G7 initiative. The success will answer the often posed question when West was criticising China's BRI initiative: 'What are you offering instead?

    2. There are also overlaps with the eu’s Global Gateway scheme, launched in December to “mobilise” €300bn ($340bn) in infrastructure investment by 2027, and Britain’s Clean Green Initiative, unveiled a month earlier with a pledge of £3bn ($4.1bn) for sustainable infrastructure in developing countries.
    3. t is a repackaging of an idea called Build Back Better World that was launched at the group’s summit last year.
    4. the Partners in the Blue Pacific pact, aimed at offsetting Chinese influence in the Pacific islands.
    5. by focusing on “soft” infrastructure where they have comparative advantages, Western countries aim to boost exports of their own technology and services in areas such as 5g telecoms, blockchain and clean energy.
    6. the Global Development Initiative, which is expected to focus more on sustainable development.
    7. Western officials say the scheme will not compete directly with the bri, which has focused on ports, railways and other “hard” infrastructure. Instead, it will try to play to the g7’s strengths by prioritising climate and energy security, digital connectivity, health and women’s equality.
    8. the Partnership for Global Infrastructure and Investment (pgii)
    9. On June 26th the rich democracies of the g7 unveiled a plan to mobilise $600bn of private and public investment in infrastructure in low- and middle-income countries over the next five years
    10. And every time America criticised China’s “new Silk Road”, the riposte came: “What are you offering instead?”
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Perhaps the labour market will regain some slack as Europe’s economy slows down. Soaring energy prices have soured the mood in recent weeks, as has a resurgence of covid. That would hardly be good news, except for hard-up employers—and those looking to catch a bit of downtime on a far-flung beach.
    2. handling e-commerce packages for decent pay while listening to podcasts beats arriving at 5am to ask passengers whether they have packed any liquids in their carry-on.
    3. “Everyone’s asking, where have they all gone?” pondered Tim Clark, the boss of Emirates airline, according to Bloomberg. “And the answer is always: Amazon.”
    4. Poles and Bulgarians now find plenty of good jobs at home.
    5. Unemployment in the euro area, at 6.6%, is at its lowest since the single currency was launched two decades ago. Some places have all but run out of workers: Germany’s jobless rate is just 2.8%.
    6. But airports’ difficulties are not merely the result of local labour troubles.
    7. Airports should have been prepared. Forecasting the number of travellers on a given day is not unreasonably complicated, given that they have bought tickets well beforehand.
    8. Instead it sent the euro tanking (to near parity with the American dollar), making Greek tavernas and Baltic beaches irresistible.
    9. For Europe, which attracts half the world’s international travellers, that ought to be a boon.
    10. In no sector is the lack of staff so glaring as in air travel.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Like it or not, the world wants Japan, and Japan needs the world.
    2. The country needs to quadruple the number of foreign workers by 2040 to sustain the government’s modest average growth target of 1.2%, according to a recent study by a group of Japanese think-tanks. (Without sustained investment in automation, the number would have to rise more than ten-fold.)
    3. Japan has already lost a cohort of foreign students, the very people who often go on to become bridge-builders between countries.
    4. Border closures have been popular: nearly 90% of Japanese approved when Kishida Fumio, Japan’s prime minister, tightened travel restrictions in response to the outbreak of the Omicron variant late last year.
    5. Japanese nationals were largely free to come and go. Foreigners, even those with permanent residence, faced restrictions.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Notes for future research

      Statistcs/numbers: 1 billion uses of TikTok

      • user spend 50% longer on TikTok than on Instagram.

      Engaging slogan by Tik-Tok - add to other slogans developed by Facebook, Goolge, etc.

    2. HEADLINE How future of TikTok can determine the future of the integrated Internet?

      EXCERPTS TIKTok saga will shape the future of the Internet. If TikTok is banned in the USA as a security risk, it could lead towards further disintegration of the Internet. In the same time, Chinese side has to be ready to accept higher scrutiny of TikTok algorithms and business models. By monitoring this policy issue we will monitor the future of integrated Internet.

      SUMMARY

      TikTok controversy, as the Economist put it, s a test of whether global business and the global internet can remain intact as us-China relations deteriorate.

      Context for pressure on TikTok is geopolitics and forthcoming elections in the USA. There is a concern that TikTok could be used to influence eletions.

      Is privacy protection real risk since most of TikTok data can be scraped as public data.

      The real risk that concers US is a possibility of manipuating domestic audience by company which is in Chinese ownership. For examplea quarter of American users consider TikTok to be a news source.

      TikTok algorithms that could be used for manipulation are developed mainly in Beijing.

      TikTok can address the risk of shutting down by having data held by Oracle, as already happened during Trump administration, letting third parties inspect its algorithms, including showing the source code and allowing ongoing inspection.

      According to the Economist: 'TikTok should be ultimately responsible to an independent board of its own, with members from outside China.'

      China is likely to oppose this request for supervision of TikTok's algorithms. However, by doing so, China may make this companies shut down by Western authorities. It will be one of the key decisions and trade-offs with far-reaching consequences for global Internet that China will have to make.

    3. If it refuses, the likely result is that TikTok—and more companies like it—will be locked out of the West altogether.
    4. reluctant to cede any corporate control to foreigners.
    5. classified content-recommendation algorithms as a key technology and may object to TikTok’s code being made available for dissection
    6. TikTok should be ultimately responsible to an independent board of its own, with members from outside China
    7. showing the source code and allowing ongoing inspection
    8. to let third parties inspect its algorithm.
    9. data are held by Oracle
    10. Western countries might one day have to shut TikTok down.
    11. Because each user gets a personalised feed, tampering would be hard to spot.
    12. But the app’s algorithm is nurtured in Beijing
    13. A quarter of American users say they consider TikTok to be a news source.
    14. it offers China to manipulate what the app’s vast foreign audience sees.
    15. Most such information could be scraped from TikTok’s front end
    16. risk is privacy
    17. America often accuses China of copycat capitalism. Now the boot is on the other foot.
    18. to reach $12bn this year and $23bn in 2024
    19. user spends 50% longer on the app each day than the typical user spends on Instagram.
    20. sign up its first 1bn users in half the time it took Facebook.
    21. a test of whether global business and the global internet can remain intact as us-China relations deteriorate.

      Test for integrated Internet

    22. a security risk to the Chinese Communist Party’s enemies
    23. storm in Congress
    24. elections loom in America
    25. the sunny app has a dark side
    26. its 1bn-plus users
    27. as “the last sunny corner on the internet”.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. OEWG agrees on modalities of stakeholder participation

      The OEWG reached agreement to apply modalities for the participation of stakeholders as proposed by the Chair on 20 April, through a silent procedure. NGOs both with and without ECOSOC status should inform the OEWG Secretariat of their interest to participate. If no state raises an objection to the Chair, NGOs will be invited to participate as observers in the formal sessions, make oral statements during a dedicated stakeholder session, and submit written inputs to be posted on the OEWG’s website. The modalities will be read out at the OEWG’s third substantive session for the formal record.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Five Eyes authorities issue warning against Russia-backed cyberattacks on critical infrastructure

      We’ve reported before that US authorities have been warning against imminent cyberattacks from Russia. This time, it’s the cybersecurity authorities from the Five Eyes – Australia, Canada, New Zealand, the UK, plus the USA – who are warning of the risk that cyberattacks are being planned against critical infrastructures in Ukraine and beyond.

      The warning comes in a joint cybersecurity advisory, which refers to US intelligence that the Russian government may be exploring options for potential cyberattacks.

      The advisory also notes that cybercrime groups that have recently publicly pledged support for the Russian government ‘have threatened to conduct cyber operations in retaliation for perceived cyber offensives against the Russian government or the Russian people.’ The same threat exists for countries and organisations helping Ukraine.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. DDoS attack takes Israeli government websites down

      Several government websites in Israel – including the websites of the ministries of interior, defence, and justice – were unavailable for over an hour on 14 March. The incident was caused by a distributed denial of service (DDoS) attack against a communications provider, according to the country’s National Cyber Directorate. Access to the affected websites was restored later in the day.

      No statements were made regarding attribution of the attack, although some media sources pointed to a possible Iranian involvement.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The Amazon case also influenced the new rules. In November 2020, Vestager told reporters that “data on the activity of third-party sellers should not be used to the benefit of Amazon when it acts as a competitor to these sellers.” Just a month later, her DMA proposal included an outright prohibition for gatekeepers from using the non-public data of business users to compete against them.

      The interaction between Big Tech companies and the EU regulators also influence regulations. It might hint at a potential pathway of influence for the future implementation of the DSA/DMA.

    2. Amazon is aiming to solve Commission concerns by leaning on the recently-adopted Digital Markets Act (DMA), by potentially sharing some data with other sellers on the platform, two individuals with direct knowledge of the case said.

      This indicates that even before the roll-out of DMA, companies are already forwardly conform to the rules. This "foreshadowing effect" of the DMA could happen because 1) the past EU regulatory regime has shown a decent level of efficacy in execution and 2) the benefits of compliance outweigh the costs of non-compliance.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Digital Security Lab launching

      Reporters Without Borders (RWB) is an international non-profit public interest organization in France which has defended the promotion of freedom of information since 1985.

      On 18 July, RWB will present its newly founded Digital Security Lab: a digital forensic laboratory that will help combat the threats of online surveillance. Based in Berlin, the Digital Security Lab is designed to analyze the devices of journalists who suspect they are under any digital surveillance. Journalists are a target of many threats that can affect their devices or personal social accounts for malicious reasons. This requires a rigorous and united response, and that is why any journalist will be able to contact the Digital Security Lab if they suspect they are the target of digital espionage because of their work.

      Journalists often receive sophisticated phishing messages, and Digital Security Lab experts will search for clues with the analysis of suspicious messages to find out if they are for sent spying purposes. The team will also examine installed programmes and will check for other data traces that might offer traces about previous activities and spying technologies.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Turkish court jails 16 Kurdish journalists over alleged terrorist links

      A Turkish court has jailed 16 Kurdish journalists for "belonging to a terrorist organisation" and their close cooperation with the pro-Kurdish Peoples’ Democratic Party (HDP) in Diyarbarkir. They were also accused of spreading terrorist propaganda and since 2016 several hundred HDP members have already been detained. Nazim Bilgin, the president of the Journalists' Association of Turkey warns that: "We are living in the darkest days of our country as far as press freedom is concerned." It is also alarming that Turkey has jailed more reporters than most other countries in the previous decade, according to the Committee to Protect Journalists.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Relatives of Al Jazeera reporter Shireen Abu Akleh accused the U.S. of trying to erase Israel’s responsibility for her death

      Relatives of Al Jazeera reporter Shireen Abu Akleh, who was killed while covering an Israeli raid in the occupied West Bank in May, showed their deep disappointment in President Joe Biden in a letter released over his administration’s response to her death.

      They accused the U.S. of trying to deny Israel’s responsibility for her death, saying in an official statement that Israeli fire most likely killed her but that the May 11 shooting in the West Bank was an accident. The family sent a request to Biden for meeting with them when he visits the region, which The White House declined to comment on, alongside with the matters of the letter.

      Palestinian eyewitnesses who claimed they saw she was shot by Israeli forces gained support from a reconstruction made by The Associated Press, investigations by CNN, New York Times, and The Washington Post as well as monitoring by the U.N. human rights office.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Ukraine state agency publishes cyberattacks statistics

      The State Service of Special Communications and Information Protection (SSSCIP) of Ukraine published statistics about the number, targets, and type of cyberattacks since the beginning of the Russian invasion.

      The government and local authorities, defence, finance, commercial organisations, and the energy sector, in that order, were the main targets of the 796 recorded cyberattacks. Information gathering, malicious code, infiltration attempts, and availability were important cyberattack strategies.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Ukraine warns of massive cyberattack targeting telecommunications operators

      The Computer Emergency Response Team of Ukraine (CERT-UA) has warned about widespread cyberattacks targeting telecommunications providers. The CERT-UA claims it had learned about the mass distribution of emails with the subject 'LIST of links to interactive maps' among Ukrainian media entities. The emails contain malicious attachments and may begin downloading CrescentImp malware if opened

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. European mayors fooled into calls with fake Kyiv mayor

      The mayors of several European cities held meetings via video link with a person they thought was the mayor of Kyiv, Vitali Klitschko, only to find out they were deceived by a deepfake of Klitschko.

      The office of Berlin Mayor Franziska Giffey tweeted Friday night that his conversation with the alleged mayor of Kyiv was ended after his comments raised suspicion.

      A screenshot of the tweet by the office of Berlin Mayor. Source: PNP.de Jose Luis Martinez-Almeida, the mayor of Madrid, likewise cancelled a video call when he suspected he was not speaking with his Kyiv colleague. Meanwhile, Budapest mayor Gergely Karácsony said in a Facebook post that he had also recently been targeted and had ended the call following 'several strange, suspiciously provocative questions’. Meanwhile, Michael Ludwig, the mayor of Vienna, was convinced he had talked with Klitschko and even tweeted that they had a video chat. The tweet was deleted after the official account of the Austrian capital published a statement that Ludwig appeared to be the victim of a ‘serious case of cybercrime’.

      Questions arose whether the fake Klitschko was a deepfake. German investigative journalist Daniel Laufer found an earlier interview with Klitschko on YouTube that served as the digital source material for the scam. Had a deepfake been used, Laufer argues, the video frames would have been altered in ways that no longer matched the YouTube recording. Apparently this might have been an edited version, not a more-sophisticated deepfake.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Russian hackers accused of launching attacks against targets in Lithuania and Norway

      Several public and private sector websites in Lithuania were temporarily down on Monday following a cyberattack reportedly carried out by a Russian-backed hacking group. The Lithuania National Cyber Security Centre (NKSC) warned of an 'intense ongoing' Distributed Denial of Service (DDoS) attack against the Secure National Data Transfer Network, as well as governmental institutions and private companies. Killnet, a pro-Russian group, claimed responsibility for at least some of the attacks, claiming it was in reprisal for Lithuania blocking the delivery of certain products to the Russian outpost of Kaliningrad.

      Meanwhile, in Norway, a DDOS attack targeted a secure national data network, affecting several private and public institutions. According to Norwegian officials, Russian hackers were likely behind the cyberattack, although there was minimal damage, with 'no sensitive information taken’.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Paradoxically, a digital way to send across continents a person’s list of diagnoses, medical conditions or allergies in a standard, universally accepted terminology and an interoperable format is not available, although it is technically possible, and lures as a hard-to-reach target. If we accept the progressive nature of Digital Healthcare Systems (Martins 2020), chained globalisation in health will mean one thing: Global Digital Health.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. But the predictable is as much a human need as are ruptures from the predictable.
    2. to offer what is so beloved about rules, which is the increase of what Daston terms the “radius of predictability.”
    3. Alice’s Wonderland is a place where the only rule is that the rules will keep changing.
    4. Daston describes how, historically, sovereignty in Europe has been derived from a mix of “divine authority, the patriarchal power of the male head of household over his wife and children, and the power of the conqueror over the vanquished in war.”
    5. Carl Schmitt’s definition of sovereignty as “the power to decide on the exception,”
    6. Rules that allow no exception seem free of human frailty but alien, and unable to admit properly of complexity.
    7. Rules that leave a ruler, or a judge, in charge of interpreting them feel at once humanized and corruptible.
    8. In this way, the nonsense nested within the cadence of sense becomes vivid.
    9. Algorithms, which were closely associated with reason, came to be valued as more ideal than error-prone human judgment.
    10. Daston suggests that rules tend to succeed when they are also norms.
    11. A computer algorithm is an example of a thin rule—long, perhaps, but intended to be deployed without the need of any human thought or intervention.
    12. thin rules “aspire to be self-sufficient.”
    13. they require interpretation, and because examples are given, and because they make room for all sorts of exceptions.
    14. rules were derived from models:
    15. Similarly, the Latin term regula connects both to straight planks used for measuring and building and to a model by which others are measured more metaphorically—the ruler of a nation, say.
    16. Daston helps us see rules (and their neighbors, such as laws and regulations) through the concepts of thickness and thinness, paradigms and algorithms, failures
    17. when reasoning as we would recognize it proves even minimally consequential.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. less than two weeks after CYBERCOM disrupted Trickbot’s operations, Microsoft engaged in operations toward that same end. Microsoft has previously coordinated botnet disruptive operations with the FBI, including the 2013 operations against the Citadel and ZeroAccess botnets and the recent disruption of the Zloader botnet.

      (continuation of the previous comment)

    2. Its Digital Crimes Unit applies legal and technical solutions to identify, investigate, and disrupt malware-facilitated cybercrime and nation-state-sponsored activity.

      This, and the example below, of Microsoft's actions against malicious infrastructure are worth exploring in greater details. Part of it was taking over malicious domains - that is somewhat legal and certainly welcomed. But were there any 'penetrations' and exploits? I doubt so.

    3. Many U.S. private-sector companies have strong corporate incentives to support conformance with proposed prohibitive norms. Some also have the capacity, capability, and legal standing to engage in responsible, exploitation-based activities.

      A very interesting - and, indeed, dangerous - claim that companies have legal standing to engage in 'responsible, exploitation-based activities' against malicious actors.

      Does Microsoft really have legal ground to exploit any system (be in malicious or not) in another state - or even in US? (Not to ask if this goes against its own philosophy against exploiting vulnerabilities and vulnerable systems)

      Do Huawei or Kaspersky have legal grounds to exploit systems in the NL or US - systems that they, or their governments, deem as malicious? What would the US say in such occasion (even if they dismantle C2 based in US - which is, btw, host of majority of malicious C2s)?

      From the US defence perspective, this is, of course, very acceptable. From an international perspective - including legal and diplomatic - this is very problematic. It could actually put private sector actors on list of 'non grata' for many other countries, as they will be seen in breaching sovereignty of states. It is counter-productive.

      This is not to say that such cooperation - and overall 'defence forward' - against malicious actors is a wrong way to go. It is not about 'if', but about 'how': if it is unilaterally done by the US (and allies), it resembles the US political and military dominance of the 21st century - its understanding of a role of international policeman. We have seen where that lead geopolitically.

      It is much better to approach this 'new approach' through garnering broader international support for such actions - even through the UN. It is slower ,but more legit and with less risks for escalations and further political polarisation.

      ||JovanK|| ||Pavlina|| WDYT - from legal and political perspective?

    4. CYBERCOM’s hunt-forward operations enable anticipatory resilience by discovering adversary malware, techniques, tactics, and procedures as well as indicators of compromise and releasing this information through VirusTotal and Cybersecurity and Infrastructure Security Agency (CISA) alerts to inoculate U.S. companies from malicious cyber activity.

      This is, however, different from active attacks: this is information sharing, which is - no doubt - very efficient and needed

    5. The FBI itself recently removed the CyclopsBlink C2 malware associated with a Russian APT-built botnet off of thousands of devices before it was activated toward malicious ends. It also closed the external management ports being exploited to access the C2 malware.

      Another useful example

    6. or example, to preclude technical disruption and interference in the 2020 U.S. elections, CYBERCOM reportedly engaged in an operation to temporarily disrupt what was then the world’s largest botnet: Trickbot.

      Useful example

    7. The U.S. Department of Defense’s defend forward cyber strategy as operationalized by U.S. Cyber Command’s (CYBERCOM) doctrine of persistent engagement embodies the notion of achieving security through responsible, persistent exploitation-based operations, campaigns, and activities.

      Link to US 'defence forward'

    8. Cultivating conformance through a cyber persistence-based approach should aim to coordinate campaigns among government agencies with cyber capabilities and authorities and, where possible, with private-sector actors that have legal standing to engage in such behavior

      Another explanation of 'cyber persistence' concept

    9. overt naming and shaming, which seeks to exert such pressures to achieve conformance, may be counterproductive to stability

      Valid point - naming and shaming attacks a reputation (and often without publicly valid evidences), which doesn't help de-escalation

    10. Covert operations scholarship suggests that secrecy dampens risks of instability by reducing potential pressures from domestic or other audiences and by allowing states to manage reputational concerns. Leveraging the “open secrecy” of persistent cyber campaigns is thus not just a more promising approach but also a more prudent one.

      Interesting point on covert operations, and the importance of reputation! When it comes to espionage and eventually striking malicious infrastructure, this may make sense. But if the strike spills over to an infrastructure that is critical or public (say: adversaries use a hijacked public infrastructure of a country - a hospital network or other - as part of their C2) covert wouldn't be covert any more, and could actually be both embarrassing and dangerous.

    11. It is time better spent tacitly communicating to the malicious source by exposing, disrupting, and contesting threatening behaviors.

      One 'problem' with many such analysis is that they only observe the US perspective. This is not healthy even from the military point of view, and let alone from diplomatic point of view (norms) which should strive towards a compromise.

      Let's put ourselves in the shoes of Russians, or Chine. For them, the threat is not cyber groups, but Microsoft, for instance. Microsoft is vulnerable; Microsoft is dominating the market and imposing solutions; Microsoft is engaging against their sovereignty... Whether we agree or not with this stand, we have to understand their view. Using this strategy, Russians would legitimately act against a threat to them: Microsoft. Or Cyber peace institute. Or any other institution which they deem causes a threat to them.

      If we 'legitimise' intrusion into other systems as defence, it may have a counter-effect of escalations, and setting erroneous precedents.

    12. revealing publicly indicators and warnings of malicious activity, the techniques, tactics, and procedures associated therewith, and malicious malware itself that was discovered after an opponent’s intrusion or in anticipation of one

      This is a second part of suggested strategy - besides attacking malicious actors: it boils down to publishing the know details about the threat actor and threat infrastructure, and sharing all this intelligence among various actors. This info exchange indeed is a cornerstone of better protection.

    13. set security conditions in one’s favor by exploiting adversary vulnerabilities and reducing the potential for exploitation of one’s own

      This might look meaningful from the US perspective. But if you would put this in the mouth of, say, Russians - the US would be heavily against it. So 'it is in the eye of a beholder'. It is rather a military (zero-sum) than a diplomatic strategy (win-win).

    14. exploiting and then closing a vulnerability for the sole purpose of removing malicious malware

      In theory, this looks smart: you attack the attackers. There are good examples of successful campaigns (also illustrated below).

      In practice, it is not so smart: any exploitation of an existing vulnerability involves developing an exploit - usually a sophisticated one, if developed by the US security services, say. That exploit can leak (as we have seen before, from CIA stockpiles), and can get in hands of malicious actors including petty criminals (we have seen that as well).

      That's why 'closing a vulnerability' is done to prevent? Can't work. Even though 'zero days' are most dangerous ones, most exploited vulnerabilities are actually years (and even decades long) - a CISA list of most exploited vulnerabilities, which it publishes regularly to motivate CI sector to patch, shows just that. Thus there is no way to instantly close an old vulnerability around the world (even in US) - and creating a powerful exploit for it doesn't help at all. If it is about a zero-day exploit, it is certainly welcomed that it would be reported to a vendor which would immediately patch it - but again, the existing exploit is even more dangerous, since patching process will take years.

      In a word - very dangerous strategy.

    15. persist and responsibly leverage exploitation-based activities that preclude, inhibit, or otherwise constrain behaviors inconsistent with proposed prohibitive norms.

      Basically using activities that inhibit irresponsible behaviour

    16. cyber persistence, which manifests as a threat through the malicious exploitation of cyber vulnerabilities.

      new concept explained below - basically, 'defence forward' ie a) attacking malicious groups and infrastructure preemtively and b) sharing publicly information about those structures and attacks

    17. All three mechanisms have a poor track record, in isolation and in combination, for cultivating conformance by malicious state and non-state actors with proposed prohibitive peacetime cyber norms.

      Gut-feeling is that this is right - there is no high adherence to cybernoms. Here, an Oxford article is added to support this argument

    18. Martha Finnemore and Duncan Hollis outline three discrete mechanisms for cultivating conformance: persuasion, socialization, and incentives (positive and negative inducements).

      Useful resource by respected authors in the field: three ways that conformance is cultivated now - persuasion, socialisation, and incentives

    19. Unlike the U.N. GGE and OEWG products, the GCSC report proposes prohibitive norms addressing ongoing destabilizing behaviors.

      Good point that GCSC norms are more 'down to earth' and reflect actual problems

    20. States are engaging in a range of cyber behaviors that undermine peace and stability, but these proposed prohibitive norms do not address those behaviors. There is no reported instance of states engaging in cyber operations against another state’s cyber emergency response teams or using their teams for malicious purposes. And, although states have targeted critical infrastructure in armed conflict and non-state actors have done so in peacetime, the proposed prohibitive norms are not framed in a manner addressing that context or those actors, respectively.

      Interesting observation: that current prohibitive norms of GGE/OEWG actually mis-shoot. Example on CERTs is a good one: while this norm is important - it doesn't reflect the reality (there were no documented cases. The one on CI, however, doesn't stay: this is the major issue between US and Russia - it is a valid norm.

    21. Interesting blog that comments on lack of conformance of states to cyber norms: that OEWG/GGE norms don't reflect the reality of attacks, while GCSC which reflect better are not in the game; and on three ways conformance is currently cultivated (persuasion, socialization, and incentives) - all three failing.

      Then, it proposes 'a new way' which should complement this process of turning norms into customary law - by inhibiting the ability for misbehavior/irresponsible behaviour . This should be done through 'defence forward': actively disrupting malicious groups and their systems (malware, botnet C2 infrastructure, etc) before they strike (includling through exploitation of vulnerabilities!), and publicly disclosing the information about such operations. To them, this would support better conformity to norms (by preventing them to misbehave?)

      There is a number of valid points in the doc. But, there are also many problematic ones; to start with - do you, by preventing someone to misbehave, actually promote adherence to norms? Or are these two distinct issues - norms, and defence/military strategy.

      I added number of comments throughout.

      ||Pavlina|| ||AndrijanaG|| ||JovanK||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The party can probably tighten security in its own internal networks. But governing in China, as elsewhere, is all about priorities. And continued surveillance over its own citizens will remain far more important to the authorities than protecting those citizens’ data.
    2. the party’s competence.
    3. The hashtag “data leak” was blocked on Weibo, a microblog, soon after news started to circulate. Discussion on WeChat, a messaging app, is also constrained.
    4. “China is a dictatorial state but that does not mean the state can do anything it likes, because individuals are going to get a bit angry,”
    5. the law is enforced less strictly on officialdom, and there is little evidence of any change.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The document is ridiculously broad. It says the state should “promote the culinary and gastronomic heritage” of Chile and recognise “spirituality as an essential element of the human being”. Everyone has a “right to sports”. Non-humans get a look in, too: the state “will promote an education based on empathy…for animals”.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Title: Resolution on Safeguarding Humanitarian Data

      Resolution on Safeguarding Humanitarian Data addresses the centrality of data for humanitarian actions. It reiterates previous initiatives and resolutions of the International Red Cross and Red Crescent Movement.

      Here are a few key points from the resolution:

      • unauthorised access to data could undermine the principle of impartiality of humanitarian organisations;
      • states and other actors should respect humanitarian purpose of data;
      • work on a digital emblem as a sign to identify data of humanitarian organisations;
      • apply humanitarian principles online as it is done offline.

      Data breaches put humanitThe data breach against the Movement discovered this year has highlighted a growing trend in cyber-operations targeted at humanitarian organisations. Data breaches risk causing severe consequences for the people those organisations serve – those that are already among the most vulnerable. The Movement will reaffirm its commitment and responsibility to implement data protection rules and cyber security measures. It will also emphasize the urgency of protecting humanitarian data and send a call from the Movement to States and other actors to protect humanitarian organisations online as they do offline.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. the broad refusal to recognize the right of the West to lead means there will no longer be a world order based on Western rules.
    2. the specter of China looms – a systemic competitor to the West and, even better, an accomplice of ‘the Russians’.
    3. the former third world is becoming more demanding and picky
    4. it has now completely lost the desire to share its advantages.
    5. former third world today have money, skills, and to some extent, technology.
    6. it is difficult for the West to offer the leading countries of the rest of the world anything that would force them to radically change their positions.
    7. And almost in parallel with the events in Europe, Modi participated in a virtual BRICS summit, and Argentina, it seems, together with Iran, has applied to join this emerging association.
    8. it’s not about sympathy for Russia, but antipathy to the West.
    9. The reason is not support for Russia’s actions, but opposition to the West’s attempts to impose its will on others, which often harms their own interests.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL