256 Matching Annotations
  1. Feb 2023
    1. TITLE: Upcoming South Korea’s ‘strategic command’ to oversee cyber units

      CONTENT: Speaking at a security forum, Ryoo Moo-bong, deputy defense minister for defense reform, detailed key features of the command that Seoul has been seeking to launch next year to counter evolving North Korean nuclear and missile threats.

      South Korea's military plans to task its envisioned "strategic command" with overseeing space and cybersecurity units, and those running F-35 stealth jets and submarines, a defense ministry official said. The command is designed to take charge of the Cyber Operations Command, units for missile, space and electromagnetic spectrum operations as well as those operating F-35 jets and submarines. Ryoo also highlighted the need to improve cyberspace and electromagnetic capabilities, which can be used to neutralize threats from hostile missiles even before their launch.

      EXCERPT: South Korea's military plans to task its envisioned "strategic command" with overseeing space and cybersecurity units, and those running F-35 stealth jets and submarines, a defense ministry official said

      LINK:

      TOPIC: Cyberconflict and warfare

      TREND: N/A

      PROCESS: N/A

      DATE: February 9, 2023

      COUNTRY: South Korea

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: The US and UK issue joint cyber sanctions against a cybercrime gang Trickbot

      CONTENT: In a joint press release, the United States and United Kingdom announce “historic joint cyber sanctions against the seven individuals who are part of Russia-based cybercrime gang Trickbot”. This action represents the very first sanctions of their kind for the U.K., and result from a collaborative partnership between the U.S. Department of the Treasury’s Office of Foreign Assets Control and the U.K.’s Foreign, Commonwealth, and Development Office; National Crime Agency; and His Majesty’s Treasury to disrupt Russian cybercrime and ransomware.

      EXCERPT: The US and UK coordinate actions in issuing sanctions against a cybercrime gang Trickbot that are described as the first major move of a “new campaign of concerted action”

      LINK:

      TOPIC: Cyberconflict and warfare

      TREND: N/A

      PROCESS: N/A

      DATE: February 9, 2023

      COUNTRY: Global

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Ransomware hacking campaign targeting Europe and North America

      CONTENT: Italy’s National Cybersecurity Agency (ACN) warned of a large-scale campaign to spread ransomware on thousands of computer servers across Europe and North America. France, Finland and Italy are the most affected countries in Europe at the moment, while the U.S. and Canada also have a high number of targets, the ACN warned, according to Italian news agency ANSA.

      France was the first country to detect the attack, according ANSA. The French cybersecurity agency ANSSI on Friday released an alert to warn organizations to patch the vulnerability.

      It is estimated that thousands of computer servers have been compromised around the world, and according to analysts the number is likely to increase. Experts are warning organizations to take action to avoid being locked out of their systems.

      EXCERPT: Italy’s National Cybersecurity Agency warns of ransomware hacking campaign targeting Europe and North America

      LINK:

      TOPIC: Cyberconflict and warfare

      TREND: N/A

      PROCESS: N/A

      DATE: February 5, 2023

      COUNTRY: Europe, North America

    2. TITLE: Russian telecommunications regulator Roskomnadzor blocks access toCIA, FBI websites for 'spreading false information'

      CONTENT: Russian telecommunications regulator Roskomnadzor blocked access to the U.S. State Department’s Rewards for Justice website on Friday, alongside the sites for the Central Intelligence Agency and the Federal Bureau of Investigation.

      "Roscomnadzor has restricted access to some resources that are owned by government organizations of hostile countries for dissemination of materials that are aimed at the destabilization of the social and political situation in Russia," the agency told TASS in a statement.

      The agency acted based on Federal Law #149 On Information, Information Technologies and Protection of Information, it said.

      The websites were found to contain materials that "contain inaccuracies in socially important information and discredit the Russian Federation’s armed forces," Roscomnadzor said.

      EXCERPT:

      Russian agency says it blocked access to CIA, FBI websites which were found to include materials that "contain inaccuracies in socially important information and discredit the Russian Federation’s armed forces"

      LINK:

      TOPIC: Cyberconflict and warfare

      TREND: N/A

      PROCESS: N/A

      DATE: January 27, 2023

      COUNTRY: Russian Federation

    3. TITLE: The US-EU cooperation in fields of Cyber Resilience

      CONTENT: US Secretary of Homeland Security Alejandro N. Mayorkas and European Commissioner for Internal Market Thierry Breton, released the joint statement on the cooperation between the US and the EU in the fields of Cyber Resilience.

      In the context of the EU-US Cyber Dialogue, the US Department of Homeland Security (DHS) and the European Commission's Directorate-General for Communications Networks, Content and Technology (DG CNCT) intend to launch dedicated workstreams in the fields of:

      • Information Sharing, Situational Awareness, and Cyber Crisis Response;
      • Cybersecurity of Critical Infrastructure and Incident Reporting Requirements; and
      • Cybersecurity of Hardware and Software.

      The workstreams are expected to invite and involve as appropriate other relevant institutions and agencies working on cyber issues, including the European External Action Service, the Directorate-General for Defence, Industry, and Space, and the U.S. Department of State. In addition, a cyber fellowship led by DHS and DG CNCT is expected to be launched with a pilot that will involve an exchange of cyber experts in 2023.

      The statement further quotes, “Today, we discussed the initial deliverables, which include:

      • Deepening structured information exchanges on threats, threat actors, vulnerabilities, and incidents to support a collective response to defend against global threats to include crisis management and support of diplomatic responses.
      • Finalizing a working arrangement between ENISA and CISA to foster cooperation and sharing of best practices.
      • Collaborating on the topic of cyber incident reporting requirements for critical infrastructure, including guidelines and templates.
      • Collaborating on the cybersecurity of software and hardware.
      • Exploring how we can work together to better protect civilian space systems.”

      The first deliverables from these workstreams are expected to be reported on at the 9th EU-US Cyber Dialogue, foreseen in the second half of 2023.

      EXCERPT:

      The US and EU will launch workstreams in the fields of Cyber Resilience to establish deeper cooperation and more structured cybersecurity information exchanges on threats between the US DHS and EU DG CNCT as well as other relevant agencies.

      LINK: [https://www.dhs.gov/news/2023/01/26/joint-statement-united-states-secretary-mayorkas-and-european-union-commissioner]

      TOPIC: Cyberconflict and warfare, Network security

      TREND: N/A

      PROCESS: N/A

      DATE: January 26, 2023

      COUNTRY: US, EU

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  2. Jan 2023
    1. Brazil Justice Moraes fines Telegram for not complying with court order

      TITLE: Brazil Justice Moraes fines Telegram for not complying with court order.

      CONTENT: Brazil's Supreme Court Justice Alexandre de Moraes fined messaging app Telegram for failing to comply with a court order that instructed the suspension of accounts of supporters of former President Jair Bolsonaro who were spreading disinformation and hate speech. Telegram will be fined 1.2 million reais ($236,527). Telegram did not immediately respond to Reuters on their request to comment.

      EXCERPT: Brazil's Supreme Court Justice Alexandre de Moraes fined messaging app Telegram for failing to comply with a court order that instructed the suspension of accounts spreading disinformation and hate speech.

      LINK: https://www.reuters.com/business/media-telecom/brazil-justice-moraes-fines-telegram-not-suspending-pro-bolsonaro-accounts-2023-01-25/

      TREND: Fake news

      DATE: 31/01/2023

      COUNTRY: Brazil

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Extremists use social media to lure to women and girls into (online) extremism

      CONTENT: The European Commission’s Radicalisation Awareness Network Practitioners (RAN Practitioners) network published a paper which explores narratives and strategies used by right-wing and Islamist extremist actors to persuade and recruit young women and girls into violent extremism. Especially due to the COVID-19 pandemic, Preventing and Countering Violent Extremism (P/CVE) programs struggled to maintain access to their target groups, especially in offline spaces. The document notes that digital platforms have not been used enough to reach out to girls and women in a strategic manner. On the contrary, the perpetrators took better advantage of social media in approaching and recruiting young women and girls. The paper looks into their tactics and young women and girls’s vulnerabilities. Vulnerabilities the perpetrators take advantage of include, but are not limited to, discrimination young women and girls experience online and offline, desire to belong to a sisterhood-like group, and other issues related to understanding sexuality and other insecurities. While misogynist narratives are on the rise over the past several years and women are being targeted with defamatory hate speech and anti-feminist discussion online, in parallel right-wing extremism (RWE) groups, such as neo-Nazi organisations and identitarian organizations, strategically engage in producing content and using specific hashtags with the aim of persuading girls and women into online extremism. It particularly looks into online platforms such as YouTube, Facebook and Telegram. The paper offers recommendations for preventing and countering extremists’ online targeting of girls and women.

      EXCERPT: The European Commission’s Radicalisation Awareness Network Practitioners (RAN Practitioners) network paper explores narratives and strategies used by extremist actors to persuade and recruit young women and girls into violent extremism. Perpetrators take advantage of their insecurities and vulnerabilities to lure them into online extremism.

      LINK:

      TOPIC: Violent extremism, Gender rights online

      TREND: n/a

      DATE: February 25, 2022

      COUNTRY: Global

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: US government launches Digital Transformation with Africa

      TEXT: The US government has launched a Digital Transformation with Africa (DTA) initiative dedicated to 'expand[ing] digital access and literacy and strengthen[ing] digital enabling environments across the continent'. The USA plans to dedicate over US$350 million to this initiative, which is expected to support the implementation of both the African Union's Digital Transformation Strategy and the US Strategy Towards Sub-Saharan Africa. DTA's objectives revolve around three pillars:

      1. Digital economy and infrastructure: (a) expanding access to an open, interoperable, reliable, and secure internet; (b) expanding access to key enabling digital technologies, platforms, and services and scale the African technology and innovation ecosystem; (c) facilitating investment, trade, and partnerships in Africa’s digital economy.
      2. Human capital development: (a) facilitating inclusive access to digital skills and literacy, particularly for youth and women; (b) fostering inclusive participation in the digital economy; (c) strengthening the capacity of public sector employees to deliver digital services.
      3. Digital enabling environment: (a) strengthening the capacities of authorities and regulators to develop, implement, and enforce sound policies and regulations; (b) supporting policies and regulations that promote competition, innovation, and investment; (c) promoting governance that strengthens and sustains an open, interoperable, reliable, and secure digital ecosystem.

      Date: 14 December 2022

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. False outrage

      TITLE: Pro-Kremlin media spreads false claims about President Putin's international support.

      CONTENT: Pro-Kremlin comments have been frequently appearing on articles in leading European media. According to permeate public discourse, according to the Security, Crime and Intelligence Innovation Institute at Cardiff University in Wales, these comments are intended to permeate public discourse in Western media. A 2021 study by the institute analysed comments on 32 European media outlets, such as Die Welt and Der Spiegel in Germany. The study concluded accounts are using the space on reader comments in Russia-related news articles to post provocative pro-Russian/anti-Western statements. Comments often They often contradict what the public opinion on a given country really think about Russia, Ukraine, and sanctions against Moscow.

      EXCERPT: Pro-Kremlin comments have been frequently appearing on articles in leading European media in order to permeate public discourse in Western media.

      LINK: https://www.dw.com/en/how-russian-fake-news-paints-the-germans/a-64394917

      TREND: Fake news

      DATE: 24/01/2023

      COUNTRY: Germany

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Climate change denial is making a ‘stark comeback’ on social media, study finds

      TITLE: Report finds Big Tech companies recommend climate change denial content

      CONTENT: A new report from the Climate Action Against Disinformation (CAAD) coalition revealed that fossil fuel sector-linked entities spent approximately 4 million USD on Meta for paid advertisements to spread false and misleading claims on climate crisis, net-zero targets and necessity of fossil fuels prior to and during COP27. This would imply that not only are social media platforms not managing to crack down on content that rejects widely accepted science risks, but they are even making it worse by promoting climate change denialism. Some of these Big Tech companies were requested to comment, but journalists reporting on the topic have not received an answer yet.

      EXCERPT: A new report from the Climate Action Against Disinformation (CAAD) coalition revealed that Big Tech companies are promoting climate change denialism on their platforms.

      LINK: https://www.theverge.com/2023/1/19/23562269/climate-change-denial-social-media-meta-facebook-instagram-twitter

      TREND: Fake news

      DATE: 20/01/2023

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The company made no outreach to Getty Images to utilize our or our contributors’ material so we’re taking an action to protect our and our contributors’ intellectual property rights

      In the High Court of Justice in London, Getty Images has filed a lawsuit against Stability AI, for allegedly infringing the intellectual property rights of millions of images to train its AI image generator, Stable Diffusion. Reports The Verge. According to the lawsuit, Stability AI violated several of Getty Image’s Terms of Service, such as image scraping to train its AI image generator.

      Getty Image is alleging that Stability AI has unlawfully copied and processed millions of images from its website without obtaining a license for their commercial exploitation, including copyright in content that belongs to or is represented by Getty Images.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: New report examines TikTok’s algorithm in recommending harmful content to vulnerable teen users

      CONTENT: Researchers from the Center for Countering Digital Hate look into how TikTok's For You feed's algorithmic recommendations react to teen users who express interest in eating disorders, body image, and mental health.

      By creating two brand-new accounts for users in the USA, UK, Australia, and Canada, all of whom were 13 years old, researchers looked at the algorithm behind TikTok. One of these accounts has a username that suggests a preoccupation with one's appearance. They watched and liked any videos about body image, mental health, or eating disorders for each account, and then they recorded the first 30 minutes of algorithmically suggested content on each account's "For You" feed. The resulting recordings were examined to see how frequently eating disorder, self-harm, and body image recommendations were made.

      The study found that TikTok gave suicide-related information recommendations in under 2.6 minutes. Within 8 minutes, TikTok offered material on eating disorders. Every 39 seconds, teens on TikTok received recommendations for videos on body image and mental health. According to the study, self-harm videos were recommended to vulnerable accounts with the vulnerable phrase in their usernames 12 times more frequently than they were to regular accounts. The overwhelming deluge of increasingly more suggested films that appear on the feeds of young people who interact with this content is something they must endure.

      EXCERPT: Researchers from the Center for Countering Digital Hate look into how TikTok's For You feed's algorithmic recommendations react to teen users who express interest in eating disorders, body image, and mental health. By creating two brand-new accounts for teen users, the report found that TikTok recommended information related to suicide within 2.6 minutes. Teens on TikTok were given recommendations for videos regarding body image and mental health every 39 seconds. The "vulnerable" accounts were recommended self-harm and suicide videos 12 times more frequently than the typical accounts.

      LINK: https://counterhate.com/research/deadly-by-design/

      TOPIC: Child safety online

      TREND: Tik Tok, harmful content, algorithmic recommendations

      DATE: December 15, 2022

      COUNTRY: Global

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Meta restricts advertisers to see teen user’s gender information

      CONTENT: The way that Meta's apps manage advertising and young users is changing. The new regulations limit how much individualised data advertisers on Facebook and Instagram may use to target ads at teenagers. Additionally, users under the age of 18 will now have more control over the ads they view and the reasons behind them.

      Beginning the following month, Meta will discontinue the option for gender-based ad targeting of users who are teenagers. Additionally, the business will stop allowing marketers to target under-18 users with tailored advertising based on their in-app behaviour, such as which Facebook pages they like and who they follow on Instagram. After the adjustments, the only factors used to determine the relevance of tailored advertising on those applications will be a user's age and location.

      EXCERPT: Starting next month, Meta will remove the option for targeting advertising to teen users based on gender. The company will also end advertisers’ ability to target personalized ads to under-18 users based on their in-app activity, including who they follow on Instagram and what Facebook pages they like.

      LINK: https://about.fb.com/news/2023/01/age-appropriate-ads-for-teens/

      TOPIC: Child safety online

      TREND: gender, online advertising

      DATE: January 10, 2023

      COUNTRY: Global

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: New report reveals how the U.S. adolescents engaged with or experienced pornography online

      CONTENT: According to a research by Common Sense Media, 75% of teens have seen online porn by the time they are 17, with the average age of first exposure being 12 years old. The report's goals are to provide a baseline for understanding U.S. teens' pornography use and to comprehend the role that internet pornography plays in adolescent life in the United States.

      The study by Common Sense was based on a poll of 1,358 Americans between the ages of 13 and 17. More than half of those surveyed admitted to seeing pornographic footage of violent crimes like rape, suffocation, or people in pain. The majority of respondents claimed that Asian, Black, and Latino stereotypes were depicted in pornography. After seeing porn, more than half of respondents claimed they felt bad or ashamed. Meanwhile, 45% of respondents felt that pornography gave them useful information about sex. Teenagers who identify as L.G.B.T.Q. in particular claimed it helped them learn more about their sexuality.

      EXCERPT: According to a research by Common Sense Media, 75% of teens have seen online porn by the time they are 17, with the average age of first exposure being 12 years old. The report's goals are to provide a baseline for understanding U.S. teens' pornography use and to comprehend the role that internet pornography plays in adolescent life in the United States.

      LINK: https://www.commonsensemedia.org/research/teens-and-pornography

      TOPIC: Child safety online or Children’s rights

      TREND: Child safety online; adolescents;

      DATE: January 10, 2023

      COUNTRY: United States

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Finland’s THL leaves Twitter, citing volume of disinformation

      TITLE: Finish Institute for Health and Welfare withdraws from Twitter due to disinformation.

      CONTENT: The Finish Institute for Health and Welfare (THL) announced that they have withdrawn from Twitter due to the high amount of disinformation and inappropriate remarks contained in replies to their posts. Marjo Loisa, the director of communications at THL, explained that although the platform has always been prone to spreading disinformation, the situation worsened during the coronavirus pandemic. Especially given that the THL tweeted about the virus and vaccines. Consequently, the institute took the decision of leaving Twitter because they consider it presently offers little benefits as a channel of official information.

      EXCERPT: The Finish Institute for Health and Welfare (THL) announced that they have withdrawn from Twitter due to the high amount of disinformation and inappropriate remarks contained in replies to their posts.

      LINK: https://www.helsinkitimes.fi/finland/finland-news/domestic/22811-finland-s-thl-leaves-twitter-citing-volume-of-disinformation.html

      TREND: Fake news

      DATE: 17/01/2023

      COUNTRY: Finland

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Crean un juego de aventuras para enseñar a detectar y combatir los bulos

      TITLE: Researchers launch first video game to teach fake news detection

      CONTENT: Researchers from the University of Extremadura in Spain have developed and launched a video game aimed at teaching how to detect fake news and combat online disinformation. The game is called "Forge of Destiny (FoD)” and it is the first multi platform initiative designed for this ends. The game is already available online for free use.

      EXCERPT: Researchers from the University of Extremadura in Spain have developed and launched a video game aimed at teaching how to detect fake news and combat online disinformation.

      LINK: https://www.antena3.com/noticias/sociedad/crean-juego-aventuras-ensenar-detectar-combatir-bulos_2023011063bde40fefc27f0001183578.html

      TREND: Fake news

      DATE: 11/01/2023

      COUNTRY: Spain

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Covid misinformation spikes in wake of Damar Hamlin’s on-field collapse

      TITLE: Covid misinformation spikes on Twitter after NFL player's on-field collapse

      CONTENT: NFL player Damar Hamlin collapsed on the field after suffering a cardiac arrest during a game on Monday night. After the incident, anti-vaxxers tweets sought to link the Hamlin's condition and the coronavirus vaccine, without any evidence. These claims were posted by many relevant influencers on the platform and getting as much as 10 million views per tweet, like in the case of a tweet by Charlie Kirk. The massive spread of these claims was also explained by changes in the direction of the Twitter’s policy against covid misinformation in November when new owner Elon Musk took charge. The company has also restored the accounts of many previously suspended individuals, including multiple high-profile anti-vaxxers.

      EXCERPT: Excerpt (a brief, tweet-like summary of your update); excerpts should be no longer than 300 characters

      LINK: https://www.washingtonpost.com/technology/2023/01/03/covid-misinfo-damar-hamlin-collapse/

      TOPIC: freedom of speech

      TREND: fake news

      DATE: 04/01/2023

      COUNTRY: United States

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  3. Dec 2022
    1. TITLE: Turkish court releases first journalist jailed under new 'disinformation' law

      CONTENT: A Turkish court ordered the release of a journalist that was detained under the country's new disinformation law. Sinan Aygul became the first journalist to be jailed pending trial under the new law, approved by the Turkish parliament two months ago. Aygul, a journalist in the Kurdish-majority Bitlis province, had written on Twitter last week that a 14-year-old girl had allegedly been sexually abused by the police and soldiers but then apologised because the story was not confirmed with the authorities. Nevertheless, he was prosecuted and put under arrest. The government expressed ghat the disinformation law is aimed at protecting the public, but critics say it can be abused to stifle dissent.

      EXCERPT: A Turkish court ordered the release of a journalist that was detained under the country's new disinformation law.

      LINK: https://www.reuters.com/world/middle-east/turkish-court-releases-journalist-detained-under-disinformation-law-2022-12-24/

      TOPIC: Freedom of the press

      TREND: Fake news

      DATE: 29/12/2022

      COUNTRY: Turkey

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TechChina is about to get tougher on deepfakes in an unprecedented way.

      TITLE: China to introduce pioneering regulation on “deepfakes”

      CONTENT: In January, China will introduce pioneering regulation on “deepfakes”, reinforcing their policies of control over internet content. Deepfakes are synthetically generated or altered images or videos built using artificial intelligence. This technology can be used to alter an existing video, for example, by creating realistic fake speech. China announced its new rules for governing “deep synthesis technologies” earlier this year, and finalized them in December. These new legislation will come into effect on Jan. 10.

      EXCERPT: In January, China will introduce pioneering regulation on “deepfakes”, reinforcing their policies of control over internet content.

      LINK: https://www.cnbc.com/2022/12/23/china-is-bringing-in-first-of-its-kind-regulation-on-deepfakes.html

      TOPIC: Freedom of expression

      TREND: Fake News

      DATE: 23/12/2022

      COUNTRY: China

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: More time spent online might increase the risk of OCD for children

      CONTENT: Preteens are more likely to develop the obsessive-compulsive disorder if they spend more time playing internet games or watching videos. The most extensive long-term investigation of brain development in American children, the Adolescent Brain Cognitive Development research, has reached this conclusion. The preteens had a 13% higher chance of developing obsessive-compulsive disorder within two years for every additional hour they spent playing video games. Additionally, for every additional hour they spent watching internet videos, their chance of OCD increased by 11%. According to the report, schools can be vital in ensuring that adolescents form positive digital habits at a crucial juncture in their growth.

      EXCERPT: Preteens are more likely to develop the obsessive-compulsive disorder if they spend more time playing on internet games or watching videos. The most extensive long-term investigation of brain development in American children, the Adolescent Brain Cognitive Development research, has reached this conclusion.

      LINK: https://www.edweek.org/leadership/screen-time-can-raise-childrens-chance-of-ocd-educators-can-help-prevent-that/2022/12

      TOPIC: Children’s rights

      TREND: online gaming, screen time, mental health

      DATE: December 20, 2022

      COUNTRY: the U.S.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Title: Nigeria and Rwanda sign Artemis Accords

      Content: Nigeria and Rwanda signed the Artemis Accords, becoming the first two African countries to adhere to the a set of nonbinding commitments to facilitate the peaceful and safe exploration of outer space.

      The Artemis Accords, signed by 23 countries up to December 2022, outlines a series of principles, guidelines, and best practices to o enhance the governance of the civil exploration and use of outer space. Intended to apply to civil space activities conducted by the civil space agencies of each signatory countries, the principles cover issues such as peaceful purposes, transparency, interoperability, emergency assistance, registration of space objects, release of scientific data, deconfliction of activities, protection of space heritage, and mitigation of orbital debris, including spacecraft disposal.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The so-called request for consultations is the first step in a long procedure at the global trade body. The United States has blocked appointments to the WTO's top ruling body on trade disputes, meaning some rows never get settled.

      TITLE: China-USA trade dispute at WTO on the U.S. chip export control measures.

      CONTENT: China initiated a trade dispute procedure against the U.S. chip export control measures arguing that these measures 'threatened the stability of the global industry supply chains."

      The WTO process will start with request for consultations. But, any resolution is not likely as WTO's arbitration body has been disfunctional due to the U.S. blockage of appointing new judges. The WTO's arbitration mechanisms are not likely to be de-blocked.

      Thus, China's move has more symbolic relevance in ongling 'chip war' between two countries.

      TOPIC: e-commerce

      LINK:

      PROCESS: The WTO Joint Statement Initiative (JSI) on e-commerce

      ||VladaR|| ||AndrijanaG|| Do we have any page on microchips?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Gender equality in space diplomacy

      CONTENT: Space negotiation should become more gender-inclusive. This article calls Australia to have leading role in space diplomacy and gender in the wider context of UN women, peace and security (WPS) agenda with the following specific proposals:

      • to use of gender-neutral language such as ‘piloted’ or ‘automated’ rather than ‘manned’ or ‘unmanned’ when referring to spacecraft;
      • to ensure greater participation by women diplomats and decision-makers in space security negotiations; and
      • to take into account the disproportionate impact on girls and women when space-based technologies are interrupted, interfered with or attacked in grey-zone and conflict situations.

      EXCERPT: Space diplomacy should become more gender inclusive from changes in language used in space negotiations to more involvement in women in space diplomacy.

      TOPIC: Space diplomacy

      LINK:

      ||sorina|| Let us also publish this on Space Diplomacy at Diplo website

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Australia signed a bilateral security agreement with Vanuatu on Tuesday which will include cooperation over cybersecurity matters, the Department of Foreign Affairs and Trade (DFAT) announced. The agreement was signed as Australian Foreign Minister Penny Wong visited the island nation in the wake of a severe ransomware attack in November. The attack left the Pacific island’s government in disarray; internal systems were completely unavailable impacting a host of emergency services, alongside schools and hospitals. The Sydney Morning Herald reported that officials from the Australian Cybersecurity Centre assisted Vanuatu’s government in rebuilding the systems following the attack. The two countries have historically had strong diplomatic ties. The pact involves cooperation in a range of areas, including humanitarian assistance and disaster relief, as well environmental and resource security, maritime and aviation safety and security, as well as defense and policing, according to DFAT. It “reflects Australia and Vanuatu’s ongoing commitment to working together as members of the Pacific family to address shared security challenges,” said Australia’s deputy prime minister Richard Marles. Australia, which is rewriting its own national security strategy following the ransomware attack on health insurance business Medibank, has ramped up its diplomatic work in the region as it competes with China. Beijing attempted — although ultimately failed in May — to sign regional trade and security agreements with the 10 Pacific Island states it has diplomatic relations with. An unexpected security deal between China and the Solomon Islands in April provoked enormous concern — particularly plans that would permit China to create a military base just 2,000 km from Australia itself.  Following the announcement of the agreement, the Solomon Islands’ prime minister Manasseh Sogavare stressed that he would not allow a Chinese military base in the country. He said the agreement covered the contingency of “a gap” in the kinds of security that Australia can provide: “When it comes to security issues in the region, we will call on them [the Australians] first.” The details of China’s agreement with the Solomon Islands have not been published, although a leaked draft was posted online revealing broad access to the Solomon Islands was being offered to China’s military and police. Australia’s agreement with Vanuatu “will be publicly available,” said Wong on Tuesday, because both nations are “committed to democracy, accountability and transparency.”

      TITLE: Australia and Vanuatu conclude pact on defense, including cybersecurity

      CONTENT: The agreement includes cybersecurity cooperation. Australia already helped Vanuatu after November randsomwere attack that impacted emergency services, schools and hospitals.

      This agreement is part of Australia's renewed push to strengthen its relationships with other countries in the Pacific in the context of increasing presence of China.

      EXCERPT: Australia strengthens cybersecurity cooperation in the Pacific region by singing safety pact with Vanuatu.

      LINK:

      TOPIC: cybersecurity

      TREND: n/a

      PROCESS: n/a

      DATE: 12 December 2022

      COUNTRY: Australia, Vanuatu

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Twitter dissolves Trust and Safety Council

      TITLE: Twitter abruptly dissolves its Trust and Safety Council.

      CONTENT: Twitter abruptly dissolved its Trust and Safety Council on Monday night. This happened just moments before a scheduled meeting with company representatives. The Trust and Safety Council was created to make the platform safer and more civil, after years of work towards that goal. Members of Twitter’s Trust and Safety Council received an email informing them the council was no longer “the best structure” to bring “external insights into our product and policy development work.”

      EXCERPT: Twitter abruptly dissolved its Trust and Safety Council on Monday night.

      LINK: https://www.washingtonpost.com/technology/2022/12/12/musk-twitter-harass-yoel-roth/

      TREND: Fake News

      PROCESS: Freedom of expression

      DATE: 12/12/2022

      COUNTRY: United States

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Concern as US media hit with wave of layoffs amid rise of disinformation

      TITLE: Wave of layoffs in US media raises concerns about the spread of disinformation

      CONTENT: A wave of layoffs in US media raises concerns about the spread of disinformation. Several major companies, including CNN, BuzzFeed and Gannett, have laid off hundreds of workers in recent weeks citing economic volatility and uncertainty. The recent staff cuts have triggered new worries over the health of the US media at a time of democratic crisis.

      EXCERPT: A wave of layoffs in US media raises concerns about the spread of disinformation.

      LINK: https://www.theguardian.com/media/2022/dec/10/media-layoffs-cnn-buzzfeed-gannett-recount-protocol

      TREND: Fake news

      DATE: 12/12/2022

      COUNTRY: United States

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Meta, the parent company of Facebook today said that it is partnering with the Independent National Elections Commission (INEC), civil society groups and local radio stations to stop spread of fake news and protect the integrity of the Nigerian 2023 general elections.

      TITLE: Meta partners with Nigerian organisations to combat disinformation ahead of 2023 elections

      CONTENT: Meta announced they will partner with the Independent National Elections Commission (INEC), civil society groups and local radio stations to combat the spread of disinformation and protect the integrity of the Nigerian 2023 general elections. The approach has also been informed by conversations with human rights groups, NGOs, local civil society organisations, regional experts and local election authorities and consists of a series of measures to promote good practices and make it easier for audiences to distinguish trusted content from dubious claims. For instance, the official Facebook page on the 2023 elections on its platform will have a blue tick which confirms the authentic of the results posted on the INEC official website. Additionally, Meta has quadrupled the size of its global teams working on safety and security to about 40,000 people, including over 15,000 content reviewers in every major timezone. Collectively, these reviewers are able to review content in more than 70 languages- including Yoruba, Igbo and Hausa.

      EXCERPT: Meta announced they will partner with the Independent National Elections Commission (INEC), civil society groups and local radio stations to combat the spread of disinformation and protect the integrity of the Nigerian 2023 general elections.

      LINK: https://leadership.ng/meta-partners-inec-ngos-to-combat-2023-elections-fake-news/

      TREND: Fake news

      DATE: 08/12/2022

      COUNTRY: Nigeria

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  4. Nov 2022
    1. TITLE: New evidence revealed the disparity in the internet access for children in five African countries

      CONTENT: A recent UNICEF research brief estimated the level of internet access for children in Ethiopia, Kenya, Namibia, Uganda, and the United Republic of Tanzania, as well as the most common barriers to connecting children to the digital world and their consequences. The report classified these common barriers into three categories: infrastructure-related, resource-constrained, and adult permission-related. According to the findings, 90% of children in the five countries surveyed reported having at least one barrier to regular internet access. The most frequently mentioned barrier was the high cost of data.

      The report identified three priorities for addressing the digital divide and enabling equal access to digital connectivity: investing in electricity and connectivity with a focus on marginalised communities and users; lowering the cost of connectivity and devices; and addressing cultural and social norms as barriers to address for children and adolescents.

      EXCERPT: A recent UNICEF research brief revealed that 90% of children in Ethiopia, Kenya, Namibia, Uganda, and Tanzania experienced at least one of three common barriers to regular internet access - infrastructure-related, resource-constrained, and adult permission-related barriers. The most frequently mentioned barrier was the high cost of data.

      LINK: https://www.unicef-irc.org/publications/1559-estimates-of-internet-access-for-children-in-ethiopia-kenya-namibia-uganda-and-the-united-republic-of-tanzania.html

      TOPIC: Children’s rights

      TREND: internet access; internet connectivity; digital divide; digital inclusion.

      DATE: November 2022

      COUNTRY: Ethiopia, Kenya, Namibia, Uganda and Tanzania

    1. TITLE: WHO report evaluates online safety and violence against children educational programmes for youth.

      CONTENT: Based on a review of evaluations of online safety programmes and online VAC programmes for children and adolescents, the report, What Works to Prevent Online Violence Against Children, discovered strong evidence that prevention education for children can work, and that this is a key strategy for addressing online VAC. Educational programmes have been widely demonstrated to improve overall safety and health. These educational programmes are particularly effective in preventing one type of online VAC, cyberbullying (both victimisation and perpetration).

      This report also captured a number of structural and skill components that contribute to the effectiveness of educational programmes and should be widely adopted.

      • Structural components include multiple and varied learning strategies and tools; more lessons, more message exposures, more reminders, and follow-ups; using peer engagement, role-plays, and interactions; getting a supportive whole-school environment; and parental involvement.
      • Skill components include problem-solving, assertiveness, empathy, self-regulation, help-seeking, bystander or defender mobilization, social norm instruction, sex education, and substance abuse education.

      The report also revealed that there is a lack of evidence about the success of prevention programmes for online child sexual exploitation and abuse.

      The report suggests implementing school-based educational programmes with multiple sessions that encourage youth interaction and involve parents. It emphasises the need for more violence prevention programmes that integrate content about online dangers with offline violence prevention. It suggested less emphasis on stranger danger and more emphasis on acquaintance and peer perpetrators, who are responsible for the majority of online violence against children.

      EXCERPT: The WHO report on what works to prevent online violence against children, based on a review of evaluations of online safety programmes for youth, found strong evidence that prevention education for children can work and can increase safety and health in general.

      LINK: https://www.who.int/publications/i/item/978924006206

      TOPIC: Child safety online

      TREND: Violence against children; online violence against children; educational program; cyberbullying; online child sexual exploitation and abuse; evidence review.

      DATE: 24 November 2022

      COUNTRY: Global

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: UNICEF released a future-ready, child-centered digital framework to address inequalities in children's lives.

      CONTENT: Given that digital exclusion mirrors and magnifies existing social, cultural, and economic inequities and pushes vulnerable children closer to the edges of marginalisation, the digitization of society has an uneven consequence on all children. In order to address the effects of the shifting digital and governance landscape, as well as emerging and embedded technologies, on children's experience with digital technologies, a future-oritened framework for an equitable digital future was proposed in this new UNICEF report. This framework drew the needs of transformation from "digital inclusion" to "digital equality". For this framework to effectively respond to new trends and technologies, a wider range of stakeholders must be engaged.

      The framework can be used as a foundation for developing and evaluating digital inclusion policies, as a roadmap for structuring the involvement of pertinent stakeholders in achieving digital equality for children, and as a tool to assist in the design of policies and interventions by state authorities, civic groups, and the private sector.

      EXCERPT: A new child-centered digital framework proposed by UNICEF painted an equitable digital future, highlighting the need for a shift from "digital inclusion" to "digital equality," as well as increased participation from relevant stakeholders.

      LINK: https://www.unicef.org/globalinsight/reports/towards-child-centred-digital-equality-framework

      TOPIC: Children’s rights

      TREND: digital equity; child-centred; inequality

      DATE: October 2022

      COUNTRY: Global

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: WHO report recommends to strengthen the evidence base to monitor the digital health transformation

      CONTENT: Digital health refers to the use of information and communication technologies for delivering health care and service, managing health systems and facilities. Despite the positive role that digital health has played to improve health care access, safety, and quality, this WHO report pointed out that digital health programmes and interventions are often not monitored or evaluated. It found that existing metrics for measurement and evaluation tend to be left behind by the rapid evolution of digital health. This report made the case for the necessity of incorporating health data measurement and governance into health care systems. Making available information more accessible at the national and international levels, addressing the variability in digital health monitoring, paying closer attention to monitoring digital health inequalities, and addressing the potential risk of exacerbating inequalities among the most vulnerable, including young children, are all necessary steps to improve monitoring activities.

      EXCERPT: A WHO report noted that monitoring of digital health programmes is frequently lacking. It advised focusing attention on enhancing current measurement measures, reducing the variability in digital health monitoring, and addressing the disparities in digital health among the most vulnerable, especially young children.

      LINK: https://www.who.int/europe/publications/i/item/WHO-EURO-2022-5985-45750-65816

      TOPIC: Children’s rights

      TREND: digital health; monitoring and evaluation.

      DATE: 22 November 2022

      COUNTRY: Global

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Taiwan says it sees less Chinese interference ahead of elections

      TITLE: Taiwanese Foreign Minister attests decreased Chinese interference in upcoming elections

      CONTENT: Taiwan has repeatedly accused China of attempts to meddle in their elections with online disinformation campaigns. China, which claims the democratically governed island as its own territory, has always played a role in Taiwanese politics. However, Taiwanese Foreign Minister Joseph Wu said to the press ahead of the elections that this time around it seemed like there has been less interference from the Chinese government. Still, more recent news reports do find evidence of Chinese disinformation operations in Taiwan. China's Taiwan Affairs Office did not respond to requests for comment by Reuters.

      EXCERPT: Taiwanese Foreign Minister Joseph Wu said to the press ahead of the elections that this time around it seemed like there has been less interference from the Chinese government.

      LINK: https://www.reuters.com/world/asia-pacific/taiwan-says-it-sees-less-chinese-interference-ahead-elections-2022-11-23/

      TREND: Fake news

      DATE: 27/11/2022

      COUNTRY: Taiwan

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Emmanuel Macron has accused Russia of feeding disinformation to further its “predatory project” in Africa, where France has had military setbacks.

      TITLE: Macron accuses Russia of financing disinformation projects in Africa

      CONTENT: In an interview with TV5 Monde, Emmanuel Macron has accused Russia of spreading disinformation to further its “predatory project” in Africa. He explained that there are several different actors with the intention to spread disinformation in the continent in order to hurt France after its military setback in the Region. In particular, there is concern regarding the Kremlin-linked Wagner Group that built connections with Mali’s military after France pulled its troops out of the country. Russia has rejected the accusations and Yevgeny Prigozhin, the businessman believed by the EU to be behind the Wagner Group called the reports “fakes, outright lies and … falsification”.

      EXCERPT: In an interview with TV5 Monde, Emmanuel Macron has accused Russia of spreading disinformation to further its “predatory project” in Africa.

      LINK: https://www.theguardian.com/world/2022/nov/20/emmanuel-macron-accuses-russia-of-feeding-disinformation-in-africa

      TREND: Fake news

      DATE: 21/11/2022

      COUNTRY: Russia, France, Mali

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. How climate disinformation is spreading after Elon Musk’s Twitter takeover

      TITLE: Activists express concerns about climate disinformation on Twitter after Musk's takeover

      CONTENT: Activists have been expressing their concerns about climate disinformation on Twitter after Musk's takeover. Although there has not been an explicit policy change in Twitter’s approach to tackling climate disinformation on the platform, Musk fired Twitter’s sustainability team within a wider cull of staff two days before the start of COP27. Jennie King, head of civic action and education at the Institute for Strategic Dialogue (ISD) explained that Twitter was supposed to be the voice of COP27, according to a campaign planned in advance alongside climate advocates. However, she expressed that all the intermediaries on the company were laid off and since then there has been a spike in outright climate denial on the platform,

      EXCERPT: Activists have been expressing their concerns about climate disinformation on Twitter after Musk's takeover. Although there has not been an explicit policy change in Twitter’s approach to tackling climate disinformation on the platform, Musk fired Twitter’s sustainability team within a wider cull of staff two days before the start of COP27.

      LINK: https://www.euronews.com/green/2022/11/17/how-climate-disinformation-is-spreading-after-elon-musks-twitter-takeover

      TREND: Fake news

      DATE: 18/11/2022

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Russian Foreign Minister Sergei Lavrov was taken to hospital after arriving in Indonesia's Bali for the G20 summit, the Associated Press reported on Monday, a report that Moscow dismissed as "fake news".

      TITLE: Moscow claims that reports of their hospitalised foreign minister at G20 are 'fake news'

      CONTENT: Russian Foreign Minister Sergei Lavrov arrived in Bali to represent Russian President Vladimir Putin at the G20 Summit. Lavrov was taken to the hospital shortly after arriving in Bali and the Associated Press reported on Monday that Lavrov was being treated for a heart condition, citing several sources. Nevertheless, Russia's foreign ministry spokesperson claimed that the report was baseless and dismissed the situation by calling it "fake news".

      EXCERPT: Russia's foreign ministry spokesperson claims that reports of their hospitalised foreign minister at G20 are 'fake news'

      LINK: https://www.reuters.com/world/russian-foreign-minister-taken-hospital-after-arriving-g20-summit-ap-2022-11-14/

      TREND: fake news

      DATE: 14/11/2022

      COUNTRY: Russia

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. A California federal judge dismissed blockchain platform Dfinity's trademark suit over the infinity-symbol logo against Meta Platforms Inc. The judge ruled that the two logos were not similar enough to sustain the lawsuit.

      In a trademark infringement lawsuit, Swiss blockchain group Dfinity Foundation alleged that Mets copied its infinity-symbol logo, which was similar to the one used by the Swiss company.

      The court found that Meta's logo was not likely to cause consumer confusion with Dfinity's logo as Dfinity's rainbow infinity logo is not similar in shape or colour to Meta's log. Given the targeted audience, it is unlikely to create any confusion, the court concluded.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Is globalisation going back to localisation and centralisation?

      The US government announced the Chips and Science Act of 2022 to strengthen the chips supply chain and provide more STEM job opportunities to Americans.

      The UK Digital Strategy sets semiconductors and advanced computing as critical supply chains and builds partnerships with the US government.

      The European Commission proposed the Chips Act in Feb. 2022 to enhance productivity and technology leadership. Then, the Commission approved the Italian measure to improve the semiconductor supply chain. To achieve the goals of digital and green transition.

      Some advanced economies try to deindustrialization, keep the research and development in these developed countries and set manufacturing processes in less economically developed countries before 2022. The economic activity is called the "global division of labour."

      But these national and regional strategies or bills seem to make the whole manufacturing process in the local country or the region and try to decouple with some controversial countries.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. But more than any single post, the danger of manipulated media lies in the way it risks further damaging the ability of many social media users to depend on concepts like truth and proof. The existence of deepfakes, which are usually created by grafting a digital face onto someone else’s body, is being used as an accusation and an excuse by those hoping to discredit reality and dodge accountability — a phenomenon known as the liar’s dividend

      Title: Misinformation experts express concern about manipulated content on TikTok

      Content: Experts who study misinformation are expressing concerns about manipulated video and photo content on TikTok. Manipulated media is a key feature on the platform and is mostly used as an entertainment or humorous resource. However, fake news stories and deepfake images of politicians are starting to become a pervasive reality on the popular video platform. These techniques are being applied to posts that sow political division, advance conspiracy theories and threaten the core tenets of democracy ahead of the midterm elections. Henry Ajder, an expert on manipulated and synthetic media stated: “When this volume of content can be created so quickly and at such scale, it completely changes the landscape.” Experts also said it is especially difficult to detect and moderate this kind of content on TikTok, where an estimated 1.6 billion active users put their own stamp on someone else’s content, and where objective facts, satire and outright deceit sometimes blend together in the fast-moving feed. Regardless of single posts, the largest concern is about how these apps where manipulated media is a feature blurs the users ability to tell the difference between truth and fake.

      Excerpt: Experts who study misinformation are expressing concerns about manipulated video and photo content on TikTok. The largest concern is about how these apps where manipulated media is a key feature blurrs the users ability to tell the difference between truth and fake.

      Link: (https://www.nytimes.com/2022/11/04/technology/tiktok-deepfakes-disinformation.html)

      Trend: Fake news

      Date: November 4th

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: INTERPOL launches first INTERPOL Global Crime Trend Report 2022 (IGCTR)

      CONTENT: With a view to improving law enforcement's access to timely and accurate criminal intelligence analysis, INTERPOL has produced the first INTERPOL Global Crime Trend Report 2022 (IGCTR), which also includes a summary of key findings on global crime trends. The IGCTR is INTERPOL's first assessment to greatly rely upon the Organisation's data holdings and contributions from its global network of 195 member countries as well as private sector partners

      Among the top five global trends ranks cybercrimes, for which ransomware, phishing, online scams and computer intrusion are perceived as 'high' or 'very high' threats by INTERPOL member countries. Also among the top ten crime trends was Online Child Sexual Exploitation and Abuse (OCSEA), for which 62% of member countries expected these crimes to "increase" or "significantly increase" in the future.

      TOPIC: cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Title: The German Chancellor will visit Beijing to push human rights and an open market

      The German Chancellor, Olaf Scholz, will visit Beijing on Nov 4. The trip aims to discuss human rights and push an open market. The Chancellor will probably focus on establishing a mutually beneficial business relationship between Germany and China, especially for all European and enterprises. (link)

      The German government allowed the Chinese shipping company to set up a terminal in Hamburg. The government is still assessing a Sweden company's acquisition of a small-scale, German-based semiconductor company with €85 million. The Sweden company is owned by one of the Chinese microchip manufacturers. (link)

      The U.S. Government published the rule to restrict chips in advanced technology export to Chinese entities in Oct. To prevent the Chinese government uses advanced chips in military applications. Chinese enterprises begin to search for any opportunity to own the chip technology to prosper their technical development, i.e., supercomputer, artificial intelligence, autonomy technology and aerospace technology. Many related companies have stopped providing services or materials to Chinese companies.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: The White House to host the second Counter Ransomware Initiative Summit

      CONTENT: This week, the White House will host the Counter Ransowmare Initiative Summit with representatives from 13 international firms and representatives from 36 countries and the European Union to discuss the growing threat posed by ransomware and other cybercrime on critical infrastructure and individuals. The goal of the Summit is to “institute a set of cyber norms and rules of the road that are recognized across the globe to counter criminal ransomware threats and hold malicious actors accountable”. A joint statement by participants is expected at the end of the Summit.

      EXCERPT: The White House will host the second Counter Ransowmare Initiative Summit with representatives from 36 countries and the EU as well as private sector actors to discuss the threats posed by ransomware and other cybercrime on critical infrastructure.

      LINK: https://www.reuters.com/technology/cyber-officials-37-countries-13-companies-meet-ransomware-washington-2022-10-31/?&web_view=true

      TOPIC: Critical Infrastructure, Cybersecurity

      TREND: Protection of Critical Infrastructure

      PROCESS: -

      DATE: 31October 2022

      COUNTRY: United States

    2. TITLE: Australia releases a practical framework for cyber governance principles

      CONTENT: The Australian Institute of Company Directors (AICD) and the Cyber Security Cooperative Research Centre (CSCRC) have published the Cybersecurity Governance Principles, a set of governance principles and a “practical framework” for organizations to strengthen their cyber resilience. The principles cover five main areas: roles and responsibilities, cyber strategy, cyber risk management, cyber resilient culture, and cyber incident planning.

      These guidelines build on the recently published Cybersecurity Performance Goals for Critical Infrastructure by the US Department of Homeland Security as an example of best practice and are being considered by the Australian government as it reviews its cyber laws following a spate of recent high-profile hacks.

      EXCERPT: The Australian Institute of Company Directors (AICD) and the Cyber Security Cooperative Research Centre (CSCRC) have published the Cybersecurity Governance Principles, a set of governance principles and a “practical framework” for organizations to strengthen their cyber resilience.

      LINK: https://www.continuitycentral.com/index.php/news/technology/7847-new-cyber-security-governance-principles-for-australian-organizations

      TOPIC: Critical Infrastructure, Cybersecurity

      TREND: Protection of Critical Infrastructure

      PROCESS: -

      DATE: 27 October 2022

      COUNTRY: Australia

    3. TITLE: The US Department of Homeland Security releases New Cybersecurity Performance Goals for Critical Infrastructure (CPGs)

      CONTENT: On 27 October 2022, the United States Department of Homeland Security (DHS) released new Cybersecurity Performance Goals (CPGs). CPGs are voluntary and non-comprehensive “prioritized subset of IT and operational technology (OT) cybersecurity practices)” that identify the highest priorities and measures owners of critical infrastructures and supply chains should follow to protect against cyber attacks.

      As part of the White House efforts and new investments in cybersecurity, the CPGs were developed by the Cybersecurity and Infrastructure Security Agency (CISA) in collaboration with governmental and private sector actors. These procedures are meant to be implemented in the National Institute of Standards and Technology's (NIST) Cybersecurity Framework (CSF), covering the following issues: account security, device security, data security, governance and training, vulnerability management, supply chain and third parties security, and finally recovery and response.

      EXCERPT: The United States Department of Homeland Security released new New Cybersecurity Performance Goals for Critical Infrastructure (CPGs) to identify priorities and measures owners of critical infrastructures and supply chains should follow to protect against cyber attacks.

      LINK: https://www.msspalert.com/cybersecurity-news/dhs-releases-new-cybersecurity-performance-goals-for-critical-infrastructure-facilities/

      TOPIC: Critical Infrastructure, Cybersecurity

      TREND: Protection of Critical Infrastructure

      PROCESS: -

      DATE: 27 October 2022

      COUNTRY: United States

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  5. Oct 2022
    1. Dutch corporations have unknowingly supplied Russia with high tech.

      Dutch high-tech companies have unknowingly sold technology to firms founded by the Russian military intelligence service, the head of the Dutch military (MIVD) secret service revealed in an interview with Financieele Dagblad.

      As explained by MIVD head, Jan Swillens, the Russian secret service created dozens of businesses functioning in the Netherlands as 'front companies' to purchase technology in the Netherlands and smuggle it to Russia, thus evading sanctions. The products range from microchips to rubber for the tires of military vehicles.

      Such practices have existed since the Russian annexation of Crimea in 2014, 'but with the war in Ukraine, it is increasing significantly', Swillens said.

      Duch official has called on high-tech companies to conduct more thorough research into their customers and inquire about their products' actual end users and has informed defense minister Kajsa Ollongren about the smuggling routes.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. A Russian diplomat warned that commercial satellites used by the US and its allies to help Ukraine in the war could become legitimate targets for attacks.

      Speaking at the first special session of the UN General Assembly on Disarmament, Konstantin Vorontsov, deputy director of the Russian foreign ministry's department for non-proliferation and arms control, said that:

      'Quasi-civilian infrastructure may be a legitimate target for a retaliatory strike,' and noted that helping through civilian satellites constitutes indirect participation in military conflicts, calling it 'an extremely dangerous trend'.

      A senior official from the American administration quickly responded in reaction to threats made by a Russian diplomat.

      John Kirby, National Security Council Coordinator for Strategic Communications, said at a news conference that 'any attack on US infrastructure will be met with a response and that will be met with a response appropriate to the threat that's posed to our infrastructure.'

      Likewise, Kirby promised that the US would continue supporting Ukrainian war efforts.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Title: The U.S. BIS announced new Export Administration Regulations for national security and foreign policy concerned https://www.federalregister.gov/documents/2022/10/13/2022-21658/implementation-of-additional-export-controls-certain-advanced-computing-and-semiconductor

      The US Commerce Department's Bureau of Industry and Security (BIS) is concerned about its national security and foreign policy. The BIS made critical changes to the Export Administration Regulations (EAR).

      Based on the published document, advanced integrated circuits (ICs) used in supercomputing, semiconductor manufacturing in ICs, software, and technology in new advanced computing and military defense usage are in the EAR. They need to apply for export permission. The document also listed twenty-eight entities in China which were identified for the national security and foreign policy concerned.

      The US BIS knows the new rule will impact to the supply chain, they also set two changes to minimize the short term impact on the supply chains. The new rule gives some companies a one-year waiver to produce their products in China .

    1. Interpol says metaverse opens up new world of cybercrime

      Madan Oberoi, Interpol's executive director for technology and innovation warned about the potential of cybercrime in the metaverse and said the agency is preparing for dangers posed by the virtual world(s).

      Metaverse could potentially amplify the cybercrime challenges already present online while also introducing a host of new ones. Cybercrime might operate differently when augmented reality and virtual reality are involved. Oberoi cautioned

      "Some of the crimes may be new to this medium, some of the existing crimes will be enabled by the medium and taken to a new level," Oberoi said.

      He underlined other serious concerns, such as child safety and the possibility that virtual reality can make crime in the real world easier.

      ‘If terror group wants to attack a physical space they may use this space to plan and simulate and launch their exercises before attacking,’ he said.

      Law agencies are increasingly interested in the metaverse, with Interpol developing its own virtual environment that will allow police forces around the world to communicate with one another and even participate in immersive training courses. At the same time, Europol recently published its second report about the metaverse named ‘Policing in the metaverse: what law enforcement needs to know’.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Apple Inc lost an appeal in a London court over key technology patents that are used in Apple's devices. The Court of Appeal confirmed the lower court’s previous decision that Optis Cellular Technology LLC can restrict Apple from using the crucial patents for 3G and 4G telecommunications unless Apple commits to fair and reasonable terms of use.

      Judge Richard Arnold stated that Apple merely needed to agree to accept a global license over the standard essential patents on terms that a court considered to be fair and reasonable to avoid an injunction on using the patents in England and Wales.

      The ruling is the latest in a dispute that has been ongoing since 2019 when Optis accused Apple of infringing eight of its patents on key telecommunications technology through the sale of products, including iPhone and iPad. In contrast, Apple claimed that Optis has been abusing its dominant position.

      The legal battle between Apple viruses Optis has already prompted six separate trials and three appellate hearings in Uk alone, with two further Court of Appeal hearings due next year.

      Also, the mentioned companies led a legal dispute before a court in the US, where a judge fined Apple $300 million for infringing on Optis' patent rights related to wireless standards. Apple attempted to appeal the decision, but an East Texas court denied its bid for a third trial in May.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The bill is especially concerned with the protection of children, having been developed in response to the death of Molly Russell, a U.K. teen who took her own life after being exposed to suicide-related posts on Instagram

      UK's telecom regulator chief (Ofcom)said Meta and Microsoft will not be allowed to self-regulate their metaverses in the UK and will be subject to the country's proposed Online Safety Bill. Breach of the online safety legislation, which is yet to be approved, may result in heavy fines of up to 10% of annual global revenues. Furthermore, senior executives of those companies could even face criminal charges in case of extreme violations.

      Melanie Dawes, CEO of Ofcom, stated that businesses in the metaverse wouldn't be allowed to self-regulate their virtual worlds and would instead need to comply with the Online Safety Bill in the UK.

      The Online Safety Bill is a proposed legislation drafted to prevent the online sharing of harmful content. The law, which is yet to be approved, would require companies to create a set of strict measures to address harmful content. The legislation focuses particularly on protecting children.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Tata Power

      The Hive ransomware group has claimed responsibility for a cyberattack against India's largest power company Tata Power. As reported by bleepingcomputer, the threat actor began leaking data allegedly stolen from Tata Power on their leak site after failed ransom negotiations.

      According to details shared by security researcher Rakesh Krishnan, the leak contains personally identifiable information (PII), including Aadhaar identity numbers, permanent account numbers (PAN), drivers' license, salary specifics, and engineering drawings.

      The incident is said to have occurred on 3 October 2022 and was confirmed by Tata Power; however, the company refused to provide any additional details (about the incident).

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Apple filed a lawsuit against medical tech company Masimo Corp in federal court in Delaware, accusing the company of 'copying' its Apple Watch. According to the case, Masimo Corp, W1 smartwatches infringed several Apple Watch patents.

      An Apple spokesperson said in a statement that it hoped the suit would 'protect the innovations we advance on behalf of our customers.'

      On the other hand, Masimo spokesperson said Apple's suit was an effort to 'divert attention from the litigations brought by Masimo,' and accused Apple of intellectual property theft "instead of competing fairly."

      Previously, Masimo, which specializes in health-monitoring devices for medical patients, sued Apple in California federal court in 2020. The company claimed that Apple had stolen its trade secrets and infringed its patents, including measuring heart rate and blood-oxygen levels. Last year, it also asked the US government to halt imports of Apple Watches that violate its patents.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Tropical Scorpius

      The Computer Emergency Response Team of Ukraine (CERT-UA) reported the spread of phishing emails that target critical infrastructure with Cuba Ransomware.

      As explained by CERT-UA Team, phishing emails impersonated the Press Service of the General Staff of the Armed Forces of Ukraine, enticing recipients to click a link. The victims are lured to a third-party website to update the PDF Reader software to read the embedded document. Upon clicking the 'DOWNLOAD' button, victims are infected with malware known as 'ROMCOM RAT.' The operations are linked to the threat actor 'Tropical Scorpius'.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Iran's atomic energy organization says e-mail was hacked

      TITLE: Iran’s nuclear energy agency’s email got hacked from a foreign country

      CONTENT: Iran's atomic energy organization announced on Sunday that an e-mail server belonging to one of its subsidiaries had been hacked from a foreign country and material had been published online.

      Black Reward, an Iranian hacker collective, claimed in a statement posted on Twitter that it has made leaked information about Iranian nuclear programs, calling the move a gesture of support for Iranian protesters.

      According to Black Reward, the documents released included atomic development contracts and agreements with domestic and foreign partners, management and operational schedules of different parts of the Bushehr power plant, and passports and visas of Iranian and Russian specialists working there.

      In a statement made on October 21, Black Reward threatened to reveal hacked data within 24 hours if the government did not free political prisoners and those detained during the uprising.

      EXCERPT: An e-mail server belonging to Iran's atomic energy organization was hacked from a foreign country. Black Reward, an Iranian hacker collective, claims it has made leaked information about Iran's nuclear programs public. Documents include atomic development contracts, management and operational schedules of different parts of Bushehr power plant.

      TOPIC: Cybercrime, Cyberconflict and warfare

      DATE: 23.10.

      LINK: https://www.reuters.com/world/middle-east/irans-atomic-energy-organization-says-e-mail-was-hacked-state-media-says-2022-10-23/

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. New Phishing Campaign Targets Saudi Government Service Portal

      TITLE: Saudi government’s service site becomes a target of a new phishing campaign

      CONTENT: Multiple phishing domains imitating Absher, the Saudi government service site, have been set up to supply citizens with fake services and steal their passwords.

      CloudSEK cybersecurity researchers made the finding and published an advisory about the threat on Thursday.

      Government services in the Saudi region have reportedly recently been a top target for cybercriminals looking to steal user credentials and exploit them in other cyberattacks, according to CloudSEK.

      In order to lessen the effects of these assaults, CloudSEK urged government agencies to keep an eye on phishing attempts that target citizens and warn and educate them about the risks, such as by advising them not to click on questionable links.

      EXCERPT: Saudi citizens are being targeted by phishing websites that mimic Absher, the Saudi government service site. Cybercriminals are looking to steal user credentials and exploit them in other cyberattacks, researchers say. Government services in the Saudi region have reportedly been a top target for cybercriminals.

      LINK: https://www.infosecurity-magazine.com/news/phishing-campaign-saudi-government/

      DATE: 21.10.

      TOPIC: Cybercrime, Cybersecurity, Cyberconflict and warfare

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The Europol Innovation Lab has published its second report under its Observatory function, ‘Policing in the metaverse: what law enforcement needs to know’. The reports are intended to aid in the understanding, adaptation, and planning of law enforcement agencies for policing in the metaverse.

      Based on in-depth consultations with law enforcement experts, industry and academia, the report provides a detailed overview of the potential for criminal activities within the metaverse, recommendations for tackling crime (within the metaverse) alongside the opportunities and best practices for building a police presence online.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Zscaler

      Internet connectivity was on 19 October impacted after a major cable cut in the south of France, affecting subsea cable connectivity to Europe, Asia, the United States and potentially other parts of the world. As a result, customers may see packet loss or latency for websites and applications which cross these impacted routes. Cloud security company Zscaler reports that they made routing adjustments to reduce the impact.

      According to Zscaler, three French links - from Marseille-Lyon, Marseille-Milano, and Marseille-Barcelona- were cut.

      While the repair crews reached the spots quickly, they had to wait for the police to collect evidence. As of now, the issue has been resolved, and all internet connectivity should resume usually.

      Coincidently, the undersea cable that connects the Shetland Islands to the Scottish mainland has reportedly also suffered damage, according to the BBC. Since cables between the Faroe Islands and Shetland were also recently damaged, this is the second incidence involving marine cables in that area in a short period.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Ransomware is Being Used As a Precursor to Physical War: Ivanti

      TITLE: Ivanti’s Ransomware Index Report Q2–Q3 2022: Ransomware leads to physical war

      CONTENT: Since 2019, ransomware has expanded by 466%, and it is increasingly being utilized as a precursor to actual combat.

      The findings came from Ivanti's Ransomware Index Report Q2-Q3 2022, which the company released earlier today to Infosecurity.

      The data also suggests that ransomware groups are becoming more sophisticated and widespread, with 35 vulnerabilities becoming related with ransomware in the first three quarters of 2022 and 159 trending active exploits. Based on the report, 47.4% of ransomware vulnerabilities threaten healthcare systems, 31.6% damage energy systems, and 21.1% affect key manufacturing.

      The Ivanti research claims that hostile nations are increasingly using state-sponsored threat groups to infiltrate, destabilize, and disrupt operations in their target countries. As shown in the recent Russia-Ukraine war, ransomware is being utilized as a precursor to physical warfare in many of these operations.

      Ivanti executive also noted that IT and security teams need to work on employing automation technology that can not only correlate data from disparate sources, but also quantify risk, provide early warning of weaponization, predict assaults, and prioritize remedial actions.

      TOPIC: Cyberconflict and warfare, Cybercrime, Critical infrastructure

      DATE: 20.10.

      LINK: https://www.infosecurity-magazine.com/news/ransomware-precursor-to-physical/

      EXCERPT: Ivanti's Ransomware Index Report Q2-Q3 2022 states that ransomware is being utilized as a precursor to physical warfare. The report shows percentage of ransomware expansion since 2019, as well as ransomware vulnerabilities that threaten some of the most critical infrastructure. It is suggested that IT and security teams work on quantifying risk, providing early warning of weaponization, predicting assaults, and prioritizing remedial actions.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Interpol unveiled the first-ever 'metaverse' designed for law enforcement worldwide at its ongoing 90th General Assembly in Delhi. The metaverse platform is envisioned to aid police forces worldwide to interact with other officers and even take 'immersive training courses in forensic investigation and other policing capabilities'. Likewise, the platform allows users to visit virtual Interpol headquarters in Lyon, France.

      'The metaverse has the potential to transform every aspect of our daily lives with enormous implications for law enforcement,' Madan Oberoi, Interpol's Executive Director of Technology and Innovation, said in a statement.

      'But in order for police to understand the metaverse, we need to experience it'., added Oberoi

      In addition, Interpol announced the formation of a metaverse expert group to voice law enforcement's concerns worldwide and guaranteed that the new virtual world was safe by design.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Ajman Police General Command said its metaverse project is the first such police service in the UAE and the development makes it the first government body in the emirate of Ajman to take the digital leap.

      The Ajman Police in Dubai has become the first law enforcement organization in the world to provide metaverse services. The Ajman Police stated that its metaverse initiative is the first of its kind for the United Arab Emirates and marks the Ajman government's entry into the metaverse.

      According to the Police force, citizens will be able to interact with police officials in the metaverse by wearing Virtual Reality (VR) headsets, smartphones, tablets, laptops or desktop computers.

      Lieutenant Colonel Mohammed bin Abdullah Abu Shehab, head of the Services Development Team, stated, 'the project came within Ajman Police's efforts to strengthen cooperation with its customers and involve them in the design and development of services. Metaverse comes within the framework of facilitating the meeting between customers through VR, which brings them together with police officers without the need for a personal presence at the police station.'

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Russia's ministry of industry and trade recommended that industrial enterprises stop using Zoom, Skype, and WhatsApp for official purposes and choose Russian systems as an alternative.

      As Kommersant reports, the ministry explained its decision 'as the requirement to comply with the government's requirements and strengthen information security measures.'

      Another high-ranking Russian official had made a similar request. A 'full ban on WhatsApp use for official purposes by the Russian state and municipal employees' employees' was demanded by Anton Gorelkin, deputy chairman of the information policy committee of the Russian parliament.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. “There could be — in time, if it grows — financial stability problems. There also are investor issues around a lack of certainty.”

      The head of the EU's financial services has called US lawmakers to create new regulations to control the cryptocurrency market, stressing that if digital assets remain unregulated, it might threaten financial stability.

      Mairead McGuinness, the European Commission's financial services commissioner, told the Financial Times in a recent interview that they need to look at global regulation of cryptocurrencies.

      'We do need to see other players also legislating … perhaps differently, but with the same objective. … We need to look at the global regulation of crypto. There would be a lot of concern at a European level as to [what would happen] if crypto were not to be regulated.' warning digital assets could pose a threat to financial stability if left to grow unregulated. Stated McGuinness

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The United Kingdom's Competition and Markets Authority (CMA) rejected Meta's (formerly known as Facebook) appeal and ordered the company to sell the animated-images platform Giphy. CMA's decision cited that taking over Giphy was harmful to the competition.

      The decision came after CMA found that Meta's purchase of Giphy could allow Meta to limit other social media platforms' access to GIFs, making those sites less attractive to users and less competitive. CMA also ruled that such a deal removed Giphy' as a potential challenger in the UK display advertising market, preventing UK businesses from benefiting from innovation in this market.'

      Previously, in November, the CMA ordered Meta to sell Giphy after finding it would raise competition concerns. Meta tried to appeal the decision. However, in June, a court ruled against the company's appeal, promoting the final decision to the CMA.

      The final decision by CMA ruled the deal would enable Meta to further increase its market power.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The US International Trade Commission (USITC) revealed it would open investigations into divisions of Taiwan Semiconductor Manufacturing Company (TSMC), Samsung Electronics and Qualcomm on allegations of patent infringement. USITC stated that it would look into allegations made by the complainant that parts and mobile devices imported into the US violated its semiconductors and integrated circuits patents.

      According to the USITC's investigation, the patent infringement claims cover chips manufactured by Samsung using its 14nm and smaller process nodes and by TSMC using its 16nm and smaller process nodes. The investigation will also include the aforementioned processors as well as mobile devices like smartphones, tablets, and smartwatches. In contrast, Qualcomm has been named in a separate patent infringement filed by the same company.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. However, the organization came under fire after Russia launched its war in Ukraine over the connection of one of its members to the Kremlin.

      German cybersecurity chief Arne Schönbohm was fired over alleged ties with Russian security services. According to media reports, German Interior Minister Nancy Faeser sacked the head of the Federal Office for Information Security (BSI) due to recent media reports of his ties with Russia and due to the damaged public trust in Schönbohm's leadership.

      According to reports in German media, Schönbohm was tied to Russia through his role in the Cyber Security Council of Germany. In 2012, Schönbohm co-founded the organization, which advises the private and public sectors on cybersecurity issues. However, the organization came under fire over the connection of one of its members to the Kremlin.

      The layoff was initially reported by the German news publication Spiegel, and was later confirmed by a representative for the Interior Ministry.

      'The background to this is not least the allegations, which are well known and widely discussed in the media, and which have permanently damaged the necessary public confidence in the neutrality and impartiality of the conduct of his office as president of Germany's most important cybersecurity authority,' the spokesperson said.

      The departure of Schoenbohm will be followed by an investigation from Germany's Interior Ministry over the allegations in question.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Hackers compromised Hong Kong govt org's network for a year

      TITLE: Hong Kong’s government org’s network compromised by hackers for a year

      CONTENT: Cyberattacks on government institutions in Hong Kong by the China-linked espionage actor APT41 (also known as Winnti), which compromised them, went unnoticed for up to a year in certain cases, have been discovered by Symantec researchers.

      The threat actor has been employing a piece of customized malware known as Spyder Loader that has previously been linked to the organization.

      The newly detected Hong Kong activity appears to be a component of the same operation, according to Symantec's research, and the targets of Winnti are local governments in the special administrative area.

      Although Symantec was unable to recover the full malware, it appears that the objective of APT41's most recent effort was to gather intelligence from significant Hong Kong institutions.

      EXCERPT: Symantec has discovered a year long China-linked cyberattacks, coming from espionage actor known as Winnti. They have been compromising government institutions in Hong Kong. The full malware was not yet found, but their most recent object is local governments special administrative area.

      LINK: https://www.bleepingcomputer.com/news/security/hackers-compromised-hong-kong-govt-orgs-network-for-a-year/

      DATE: 18.10.

      TOPIC: Cybercrime, Cyberconflict and warfare

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Pro-Russia Hackers DDoS Bulgarian Government

      TITLE: Bulgarian government attacked with DDoS by pro-Russian hackers

      CONTENT: Over the weekend, the Bulgarian government was subject to a wave of DDoS attacks, with Russia being the main suspect, according to sources.

      According to various local reports, traffic flooded the websites of the Bulgarian President, the National Revenue Agency, and the departments of internal affairs, defense, and justice.

      The campaign on October 15 also targeted telecom businesses, airports, banks, and a few media outlets, Sofia Globe reported.

      The suspects were recognized as being from the Russian city of Magnitogorsk by the authorities, according to Borislav Sarafov, the director of Bulgaria's National Investigation Service.

      However, according to some reports, the notorious Russian cybercrime group Killnet had already taken responsibility for the said DDoS attack.

      LINK: https://www.infosecurity-magazine.com/news/prorussia-hackers-ddos-bulgarian/

      DATE: 18.10.

      TOPIC: Cyberconflict and warfare, cybercrime

      EXCERPT: The Bulgarian government was subject to a wave of DDoS attacks, with Russia being the main suspect. Traffic flooded the websites of the Bulgarian President, National Revenue Agency, and departments of internal affairs, defense, and justice. Some reports claim Russian cybercrime group Killnet had already taken responsibility for the attack.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. 1 million roubles ($16,150)

      A Moscow court on Tuesday fined US giant Amazon.com Inc a total of 41 million roubles ($16,150), Interfax reported.

      Interfax said the court ruled that Amazon had failed to delete material that 'propagandises suicide', which is illegal under Russian law.

      It is the first such fine imposed on Amazon, although other US-based giants have come under pressure in Russia in recent months, with Meta being labelled as an 'extremist' organization and Google and Apple receiving fines.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Horizon Worlds, Meta’s flagship metaverse for consumers, is failing to meet internal performance expectations, according to The Wall Street Journal, which reviewed internal company documents.

      Horizon Worlds, Meta’s flagship metaverse platform, is failing to meet internal performance expectations, The Wall Street Journal reported, which reviewed internal company documents. The Journal said the records showed the user base had been progressively falling since the spring, and many Horizon users have left after the first month on the platform.

      Meta had set a target of 500,000 monthly active users but recently reduced it to 280,000; at this time, there are fewer than 200,000.

      Horizon’s services include several interactive virtual spaces or worlds letting users socialize, play and have fun. Internal statistics have shown that only 9% of developed worlds have more than 50 visitors, while many are never visited.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Australian police secret agents exposed in Colombian data leak

      TITLE: Colombian data leak exposes personal information of Australian Federal Police

      CONTENT: Following the release of data taken from the Colombian government by hackers, the identities of covert agents for the Australian Federal Police (AFP) have been made public.

      More than five terabytes of sensitive information, including emails, documents, and strategies AFP agents were employing to prevent drug cartels from conducting business in Australia, were leaked by the hacktivist collective Guacamaya.

      Details exposed this way come from 35 AFP operations, some of them still active, and also contain surveillance reports from agents, phone tap recordings, and salary data for Colombian personnel.

      LINK: https://www.bleepingcomputer.com/news/security/australian-police-secret-agents-exposed-in-colombian-data-leak/

      DATE: 14.10.

      TOPIC: Cyberconflict and warfare, Cybercrime

      EXCERPT: The identities of covert agents for the Australian Federal Police (AFP) have been made public. This follows the release of data taken from the Colombian government by hackers. More than five terabytes of sensitive information were leaked by the hacktivist collective Guacamaya.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The Microsoft Threat Intelligence Center (MSTIC) reports that it has tracked new ransomware dubbed Prestige that is being used to target transportation and logistics organizations in Ukraine and Poland. The latest ransomware campaign has not been attributed to any known threat actor.

      However, MSTIC added that 'the activity shares victimology with recent Russian state-aligned activity, specifically on affected geographies and countries, and overlaps with previous victims of the FoxBlade malware (also known as HermeticWiper)'.

      According to MSTIC, deployment of Prestige ransomware has not been previously recorded, and its activity was not connected to any of the 94 currently active ransomware activity groups that Microsoft tracks.

      The method of initial access remains unknown, with Microsoft noting that the threat actor had already obtained privileged access to the compromised environment to deploy the ransomware using three different methods.

      Microsoft reported observing three different methods for deploying the ransomware. Two involved attackers uploaded the payload to an admin-shared folder and then activated it on network systems using remote code tools to trigger them on victim systems. A third involved the payload being added to the Active Directory Domain Controller and deployed across networks.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Education Sector Experienced 44% Increase in Cyber-Attacks Over Last Year

      TITLE: Education sector recorded a 44% increase in cyberattacks since last year

      CONTENT: According to Check Point's 2022 Mid-Year Report, the education sector saw a 44% increase in cyberattacks from 2021 to 2022, with an average of 2297 attacks against organizations every week.

      The research illustrates that a factor in the attraction is the enormous amount of personal information that threat actors can amass by picking on businesses in this industry.

      According to the monthly threat index produced by the research team, the education sector will be most negatively affected in 2022. It is obvious that cybercriminals are finding success with these operations, and schools and colleges should be planning for a rise in the frequency of these attacks.

      In contrast to most businesses, which only have employees, academic institutions also have students. This makes the sector's networks much larger, more accessible, and harder to secure.

      TOPIC: Cyberconflict and warfare, Cybercrime, Cybersecurity

      LINK: https://www.infosecurity-magazine.com/news/education-experienced-44-increase/

      DATE: 14.10.

      EXCERPT: The education sector saw a 44% increase in cyberattacks from 2021 to 2022, with an average of 2297 attacks against organizations every week. Cybercriminals are finding success with these operations, and schools and colleges should be planning for a rise in the frequency of these attacks.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Microsoft says Ukraine, Poland targetted with novel ransomware attack

      TITLE: Microsoft discovers new novel ransomware attack on Ukraine and Poland

      CONTENT: According to a blog post by Microsoft on Friday, a recently identified hacker group has used a novel kind of ransomware to assault logistics and transportation firms in Poland and Ukraine.

      In less than an hour on Tuesday, the attackers targeted a variety of computers, according to Microsoft, which added that it had not yet been able to connect the attacks to any known group.

      Researchers discovered that the cyberattacks, however, closely resembled past assaults by a cyber team connected to the Russian government that had affected Ukrainian government services.

      LINK: https://www.reuters.com/technology/microsoft-says-ukraine-poland-targetted-with-novel-ransomware-attack-2022-10-14/

      TOPIC: Cyberconflict and warfare, Cybercrime

      EXCERPT: A hacker group has used a novel kind of ransomware to attack logistics and transportation firms in Poland and Ukraine. In less than an hour on Tuesday, the attackers targeted a variety of computers. Microsoft has not yet been able to connect the attacks to any known group.

      DATE: 15.10.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: NATO establishes review board to govern responsible use of AI

      CONTENT: NATO has established a Review Board to govern the responsible development and use of artificial intelligence (AI) and data across the organisation. The decision was taken at the meeting of NATO Ministers of Defence which took place in Brussels on 12–13 October 2022. The Data and Artificial Intelligence Review Board (DARB) will work on developing a user-friendly responsible AI certification standard to help align new AI and data projects with NATO's Principles of Responsible Use. The board is also expected to act as a platform allowing the exchange of views and best practices to help create quality controls, mitigate risks, and adopt trustworthy and interoperable AI systems. NATO member states will designate one national nominee to serve on the DARB. Nominees could come from governmental entities, academia, the private sector, or civil society.

      TECHNOLOGY: AI

      DATE: 13 October 2022

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Turkey: new ‘disinformation’ law could jail journalists for three years

      TITLE: Turkey’s new disinformation law imposes threats to domestic journalism and social media

      CONTENT: A comprehensive new rule that could result in up to three years in prison for people suspected of disinformation spreading has been approved by the Turkish parliament.

      Wide-ranging clauses of the contentious bill, put out by the government's Justice and Development party (AKP), are designed to control domestic journalism as well as social media.

      The bill provides a framework for extensive censorship of online information and the criminalization of journalism, which will enable the government to further subdue and control public debate in the run-up to Turkey's general elections in 2023, according to a coalition of 22 press freedom organizations.

      Additionally, the new law mandates that messaging services like WhatsApp, which is also owned by Meta, submit user information to the government upon request from the nation's Information and Communication Technologies Authority.

      EXCERPT: Turkey's parliament has approved a bill that could result in up to three years in prison for people suspected of spreading disinformation online. The bill, put out by the government's Justice and Development party (AKP), is designed to control domestic journalism as well as social media.

      LINK: https://www.theguardian.com/world/2022/oct/13/turkey-new-disinformation-law-could-jail-journalists-for-3-years

      DATE: 13.10.

      TOPIC: Freedom of the press, Freedom of expression, Content policy

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Report Shows How China Has Been Using Cyberattacks Over the Past Decade

      TITLE: Report documents China's use of cyberattacks over the past ten years

      CONTENT: According to a report released on October 12, by consultancy firm Booz Allen Hamilton, Chinese state-sponsored cyberattacks pose a growing threat to US national security.

      ‘Same Cloak, More Dagger: Decoding How the People's Republic of China (PRC) Uses Cyber Attacks’ is a report aimed at CISOs of American companies and their allies, as well as threat analysts. It provides a thorough examination of more than 13 case studies of Chinese-sponsored cyberattacks over the last decade.

      According to their results, China is creating and using cyberattack capabilities to further its 'core interests' at home. These cyberattacks are a supplement to China's more well-known and varied efforts to use legal, financial, cultural, political, and technical tools to further its objectives online.

      Booz Allen did clarify that the report's main source of research was open-source. It is likely impossible to properly determine the exact extent of China's cyberattack capabilities from open sources. It's probable that China decided not to use all of its resources or that it did so secretly, based on the study.

      LINK: https://www.infosecurity-magazine.com/news/report-china-cyberattacks-past/

      DATE: 14.10.

      TOPIC: Cyberconflict and warfare

      EXCERPT: 'Same Cloak, More Dagger: Decoding How the People's Republic of China Uses Cyber Attacks' is a report aimed at CISOs of American companies and their allies. It provides a thorough examination of more than 13 case studies of Chinese-sponsored cyberattacks over the last decade. It is shown that Chinese state-sponsored cyberattacks pose a growing threat to US national security.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Kazakh outlet Orda, staff subjected to months of threats, online harassment, cyberattacks

      TITLE: Kazakh media outlet Orda’s staff suffer from months of cyberattacks and online harassment

      CONTENT: The Committee to Protect Journalists said on Wednesday that Kazakhstani authorities should fully examine recent threats against independent news website Orda and its head editor Gulnara Bazhkenova and safeguard the safety of the publication and its personnel.

      Following the publishing by the outlet of an investigation into suspected lobbying methods by a corporation apparently related to Kazakhstan's former president, Nursultan Nazarbayev, there have been several internet harassments and cyberattacks against Bazhkenova, her family, and Orda.

      While Orda has improved its cybersecurity, Bazhkenova claims that DDoS and other types of cyberattacks have been ongoing since July, with perpetrators constantly looking for ‘weak spots’ that cause the site to go offline for brief periods.

      In addition to the website cyberattacks, she claims that unidentified users have flooded Orda's Telegram chat with derogatory images and insults aimed at Bazhkenova and Orda staff. However, most recently, the online insults have been replaced by threats against her and her 7-year-old son. LINK: https://cpj.org/2022/10/kazakh-outlet-orda-staff-subjected-to-months-of-threats-online-harassme nt-cyberattacks/

      EXCERPT: Cyberattacks against independent news outlet Orda have been ongoing since July, with perpetrators constantly looking for 'weak spots' that cause the site to go offline for brief periods. The Committee to Protect Journalists said on Wednesday that Kazakhstani authorities should fully examine recent online threats.

      DATE: 12.10.2022.

      TOPIC: Freedom of the press, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Greece: At a meeting with RSF, the government commits to ban the use of spyware

      TITLE: Greek government promises ban on spyware of journalists at the meeting with RSF

      CONTENT: At their meeting on October 10th, the representative of RSF requested that the Deputy Minister to the Prime Minister and Government Spokesperson, Ioannis Oikonomou, initiate discussions for a complete reform of the legal safeguards against the arbitrary surveillance of journalists.

      The recent revelations of the intelligence agency's surveillance of reporters using spyware have increased the gap of mistrust between Greek journalists and the authorities, according to Pavol Szalai, head of RSF's European Union and Balkans desk. He further stated that the new legal framework the government promised must be both ambitious and properly consult with the main stakeholders: journalists.

      The government ‘will soon submit a bill to make the use of spyware illegal,’ according to Ioannis Oikonomou, who also reiterated that the Greek authorities did not acquire or use Predator, in response to Pavol Szalai's call for legislation on spywares.

      LINK: https://rsf.org/en/greece-meeting-rsf-government-commits-ban-use-spyware

      EXCERPT: Reporters Without Borders (RSF) has called for a complete reform of the legal safeguards against the arbitrary surveillance of journalists in Greece. The government 'will soon submit a bill to make the use of spyware illegal,' according to Ioannis Oikonomou, who also reiterated that the Greek authorities did not acquire or use Predator.

      TOPIC: Freedom of the press

      DATE: 12.10.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Ukraine Enhances Cooperation With EU Cybersecurity Agencies

      TITLE: Ukraine tightens collaboration with EU cybersecurity agencies

      CONTENT: Recently, representatives from the European Union Agency for Cybersecurity (ENISA) and the State Service of Special Communications and Information Protection of Ukraine (SSSCIP) met to explore enhancing networking and collaboration.

      The working meeting took place as part of the Cybersecurity East Project trip to the ENISA headquarters in Athens.

      After the conference, Viktor Zhora, the deputy head of the SSSCIP, stated: ‘Cooperation with the European partners includes two key vectors for our country. On the one hand, Ukrainian experience in cyber-war, confronting cyber-threats from Russia would definitely be beneficial for other democracies.’

      The SSSCIP claimed that the meeting was essential for European integration as well, with ENISA special partner status being a key step in that direction since the Ukrainian conflict has pushed the country even further toward its Western peers.

      According to SSSCIP, achieving this accreditation is a crucial step in the process of aligning national cybersecurity laws with EU law.

      DATE: 10.10.

      TOPIC: Cybersecurity, Cyberconflict and warfare

      EXCERPT: Ukraine and the European Union have met to discuss enhancing networking and collaboration. The meeting took place as part of the Cybersecurity East Project trip to the ENISA headquarters in Athens. SSSCIP claimed that the meeting was essential for European integration as well, with ENISA special partner status being a key step in that direction. This will also push the country's aligning of national cybersecurity laws with EU law.

      LINK: https://www.infosecurity-magazine.com/news/ukraine-cooperation-with-eu/

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. US airports' sites taken down in DDoS attacks by pro-Russian hackers

      TITLE: US airports’ hit with DDoS by pro-Russian hackers

      CONTENT: The websites of numerous major airports in the United States have allegedly been subjected to widespread distributed denial-of-service (DDoS) attacks, according to the pro-Russian hacktivist organization 'KillNet.'

      Travelers are unable to login and receive information about their booked flights or make reservations for airport services because the servers hosting these sites are being overloaded by trash requests as a result of the DDoS attacks.

      The Hartsfield-Jackson Atlanta International Airport (ATL), one of the nation's major air traffic hubs, and the Los Angeles International Airport (LAX), which is occasionally offline or very slow to reply, are notable examples of airport websites that are now inaccessible.

      DATE: 10.10.

      LINK: https://www.bleepingcomputer.com/news/security/us-airports-sites-taken-down-in-ddos-attacks-by-pro-russian-hackers/

      TOPIC: Cyberconflict and warfare, Cybercrime

      EXCERPT: The websites of numerous major airports in the U.S. have allegedly been subjected to widespread distributed denial-of-service attacks caused by pro-Russian hackers. The Hartsfield-Jackson Atlanta International Airport (ATL), and the Los Angeles International Airport are notable examples of airport websites that are now inaccessible.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. How Cyberfeminism Is Helping Women Forge Solidarities In Conservative Societies

      TITLE: Expansion of cyberfeminism in the Middle East and South Asia

      CONTENT: Feminist activists in Iraq started a social media campaign in September last week to call for the Ministry of Education to issue a formal resolution that will forbid ‘the imposition of the veil as a condition for academic enrollment.’

      The online campaign, which emphasized the value of women's personal freedom, provided another illustration of how cyberfeminism is taking a dynamic shape in the Middle East and South Asian countries through the hashtag #No_for_forced_veiling on Iraqi social media networks.

      LINK: https://www.outlookindia.com/national/how-cyberfeminism-is-helping-women-forge-solidarities-in-conservative-societies-news-228660

      DATE: 09.10.

      TOPIC: Gender rights online

      EXCERPT: Feminist activists in Iraq started a social media campaign to call for the Ministry of Education to issue a formal resolution that will forbid 'the imposition of the veil as a condition for academic enrollment'. The online campaign, which emphasized the value of women's personal freedom, generated #No_for_forced_veiling on Iraqi social media networks.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Germany's cybersecurity chief faces dismissal, reports say

      TITLE: Germany's cybersecurity chief may be dismissed

      CONTENT: Due to potential interactions with individuals associated with Russian security services, German Interior Minister Nancy Faeser wants to fire the nation's cybersecurity director, according to late-Sunday reports in German media that cited official sources.

      According to numerous sites, Arne Schoenbohm, the head of the federal information security organization BSI, may have had these contacts through the German Cyber Security Council.

      Schoenbohm founded the organization, which includes a German firm that is a subsidiary of a Russian cybersecurity firm founded by a former KGB employee.

      EXCERPT: Germany's interior minister reportedly wants to fire the nation's cybersecurity director. Arne Schoenbohm may have had contacts with individuals associated with Russian security services. His organization, BSI, is a subsidiary of a Russian cybersecurity firm founded by a former KGB employee.

      LINK: https://www.reuters.com/world/europe/germanys-cybersecurity-chief-faces-dismissal-reports-2022-10-09/

      TOPIC: Cybersecurity

      DATE: 10.10.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Six countries selected to host future European quantum computers

      CONTENT: The European High Performance Computing Joint Undertaking (EuroHPC JC) had announced the the selection of six sites across the EU to host and operate the first EuroHPC quantum computers: Czechia, France, Germany, Italy, Poland, and Spain. The quantum computing systems to be developed within these sites are to be made available to European users (scientific communities, industry, the public sector, etc.) mainly for research and development purposes.

      For background, the EuroHPC JU is a legal and funding entity launched in 2018 to enable the EU and countries participating in the EuroHPC to coordinate efforts and resources towards developing supercomputing facilities in the EU.

      TECHNOLOGY: Emerging technologies

      TREND: Quantum computing

      Date: 4 October 2022

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: US White House publishes Blueprint for an AI Bill or Rights

      CONTENT: The US White House, through the Office of Science and Technology Policy, has issued a Blueprint for an AI Bill of Rights to guide the development, deployment, and use of automated systems. The blueprint outlines five key principles and is accompanied by a framework to help incorporate the protections into policy and practice.

      The five principles are:

      • Safe and effective systems: Users should be protected from unsafe and ineffective systems.
      • Algorithmic discrimination protection: Users should not face discrimination by algorithms and systems should be used and designed in an equitable way.
      • Data privacy. Users should be protected from abusive data practices via built-in protections and should have agency over how data about them is used.
      • Notice and explanation: Users should know that an automated system is being used and understand how and why it contributes to outcomes that impact them.
      • Human alternatives, consideration, and fallback: Users should be able to opt out, where appropriate, and have access to a person who can quickly consider and remedy problems they encounter.

      Within the scope of the blueprint are automated systems that have the potential to meaningfully impact the public's rights, opportunities, or access to critical resources or services.

      It is important to note that the blueprint does not have a regulatory character, and is meant to serve as a guide.

      TOPICS: AI

      TRENDS: AI governmental initiatives

      DATE: 4 October

      COUNTRY: USA

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The Kyiv Post reports that "tough" Russian threat actors target within their own country as reprisal for the Ukrainian war and the overall situation in Russia. The organization, known as the National Republican Army (NRA), apparently launched several attacks, including one on Unisoftware, a Russian software company that purportedly collaborates closely with government clients.

      NRA claimed to have stolen all data held by the firm, such as banking and personal account credentials, employee information, phone numbers, addresses, contracts, and proprietary code for Unisoftware clients and software.

      The group has also been linked to the attack on Russian IT retail chain DNS, which confirmed earlier this week that it had been breached without providing additional information

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Fumio Kishida, Prime Minister of Japan, has stated in a policy speech that the country's plans for investing in digital transformation include the Metaverse and non-fungible tokens (NFTs) services. In his address to Japan's parliament, Kishida stated Japan will continue to focus on 'supporting the social implementation of digital technology' and will 'promote efforts to expand the use of Web3 services that utilize the metaverse and NFTs.' Previously, Japan had recently established a Web3 policy office under the Ministry of Economy, Trade and Industry (METI), which is focused on improving the business environment related to Web 3.0. Furthermore, METI is reportedly looking into a proposal to offer tax exemptions to Japanese crypto companies to entice them to keep their business in the country and further fuel the nation's evolving Web3 sector.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Taliban shuts down two news websites in Afghanistan 

      TITLE: Taliban deactivate two news websites due to ‘false propaganda’ in Afghanistan

      CONTENT: According to a tweet from the ministry's spokesperson Anayatullah Alokozay and a report by the London-based independent Afghanistan International TV station, the Taliban's Ministry of Telecommunications and Information Technology shut down the websites of Hasht-e Subh Daily and Zawia News on Monday, October 3, due to 'false propaganda' against the Taliban.

      In separate statements on Monday, the Hasht-e Subh daily and Zawia News sites, which are run by Afghan journalists who have been reporting from exile since the August 2021 Taliban takeover, said the Taliban had deactivated their website domain names.

      Since then, Hasht-e Subh Daily has resumed its online presence under a new domain. According to Zawia News, it will keep publishing news on the website of Zawia Media, its parent firm.

      LINK: https://cpj.org/2022/10/taliban-shuts-down-two-news-websites-in-afghanistan/

      EXCERPT: Afghanistan's Ministry of Telecommunications and Information Technology shut down the websites of Hasht-e Subh Daily and Zawia News on Monday, October 3. The sites are run by Afghan journalists who have been reporting from exile since the August 2021 Taliban takeover.

      DATE: 04.10.

      TOPIC: Freedom of the press

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. FBI and CISA Publish Advisory on Malicious Cyber Activity Against Election Infrastructure

      TITLE: FBI and CISA joined in a public announcement on malicious cyber activities against election infrastructure

      CONTENT: An official public service announcement about hostile cyber activity intended to compromise election infrastructure has been released by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA).

      The agencies stated in the letter made public on Tuesday that it is unlikely that attempts to breach election infrastructure will result in widespread disruptions or stop voting.

      The notice also made clear that authorities employ a range of safeguards to lessen the possibility of hostile cyber activity compromising the security, reliability, or accessibility of election infrastructure systems.

      The Election Security Group (ESG), a body created at the end of August by the US Cyber Command (USCYBERCOM) and the National Security Agency (NSA), was created to safeguard electoral processes from hacking and disinformation before and during the November elections.

      EXCERPT: An official public service announcement about hostile cyber activity intended to compromise election infrastructure has been released by the FBI and CISA. The agencies stated that it is unlikely that attempts to breach election infrastructure will result in widespread disruptions or stop voting. Election Security Group (ESG) was created to safeguard electoral processes from hacking and disinformation.

      LINK: https://www.infosecurity-magazine.com/news/fbi-cisa-advisory-cyber-activity/

      DATE: 06.10.

      TOPIC: Cyberconflict and warfare, Cybersecurity, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. US govt shares top flaws exploited by Chinese hackers since 2020

      TITLE: US government agencies reveal top weak points exploited by Chinese hackers since 2020

      CONTENT: In order to attack government and critical infrastructure networks, hackers supported by the People's Republic of China (PRC) most frequently use certain security flaws, according to information released today by the NSA, CISA, and the FBI.

      In a combined alert, the three government agencies claimed that Chinese-sponsored hackers are targeting tech businesses and networks in the United States and its allies in order to enter private networks and steal intellectual property.

      The report also includes suggestions for addressing each of the security holes that Chinese threat actors use the most, as well as detecting techniques and weak technologies to aid defenses in identifying and thwarting incoming attacks.

      TOPIC: Cyberconflict and warfare, Cybercrime

      LINK: https://www.bleepingcomputer.com/news/security/us-govt-shares-top-flaws-exploited-by-chinese-hackers-since-2020/

      DATE: 06.10.

      EXCERPT: NSA, CISA, and FBI warn that Chinese-sponsored hackers are targeting tech businesses and networks in the U.S. and its allies to steal intellectual property. Report also includes suggestions for addressing each of the security holes that Chinese threat actors use the most.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Mexico continued to use spyware against activists

      TITLE: Spyware still used by Mexico against activists

      CONTENT: Despite a commitment by President Andrés Manuel López Obrador to halt such activities, it is reported that the Mexican government or army has continued to utilize spyware meant to hack into the cellphones of activists.

      Press freedom advocacy organizations reported on Monday that they had discovered proof of recent attempts to target activists looking into Mexican army human rights violations using the Israeli spyware tool Pegasus. The University of Toronto group Citizen Lab conducted a forensic study to confirm the Pegasus virus.

      The targets included rights campaigner Raymundo Ramos, according to a report by the press freedom organization Article 19, The Network for the Defense of Digital Rights, and Mexican media outlets.

      TOPIC: Cybercrime, Freedom of expression

      LINK: https://apnews.com/article/technology-mexico-caribbean-hacking-cd4e4a0bcf13705072af19b2d97bbf63

      EXCERPT: Despite a commitment by President Andrés Manuel López Obrador to halt such activities, it is reported that the Mexican government or army has continued to utilize spyware. Targets included rights campaigner Raymundo Ramos, according to a report by the press freedom organization Article 19.

      DATE: 03.10.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. A Bolsonaro reelection poses biggest threat to Brazilian press freedom, says RSF

      TITLE: Election campaign and online attacks pose threat to Brazilian press freedom

      CONTENT: The image of the media by President Bolsonaro as an enemy of the state that must be stopped has always resonated strongly with his support base, which is well-organized on social media, but especially during this election campaign.

      Since the campaign's launch on August 16th, RSF has carefully tracked (put this link on ‘carefully tracked’: https://rsf.org/en/press-under-pressure-brazil-rsf-analyzes-online-attacks-against-journalists-during-presidential ) these online attacks and has recorded no less than 2.8 million posts that target and degrade journalists.

      In terms of direct assaults, 86% of victims were female journalists. The president's family and government officials, who have millions of followers on social media, have shared the vast majority of this offensive material.

      LINK: https://rsf.org/en/bolsonaro-reelection-poses-biggest-threat-brazilian-press-freedom-says-rsf

      EXCERPT: RSF has recorded more than 2.8 million posts that target and degrade journalists in Brazil since the beginning of election campaign.

      TOPIC: Freedom of the press

      DATE: 30.09.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Lazarus-Associated Hackers Weaponize Open-Source Tools Against Several Countries

      TITLE: Lazarus hacker group weaponize open-source software against several countries

      CONTENT: Legitimate open-source software has been weaponized by threat actors connected to North Korea and is now being used to target personnel in businesses from a variety of industries.

      The information was obtained by the Microsoft Threat Intelligence Center (MSTIC), which on Thursday released a warning about the threat.

      The Lazarus Group, also known as the actor Microsoft tracks as Zinc, is said to have carried out the attacks, the technical write-up stated.

      According to the advisory, Zinc has successfully compromised numerous organizations in the media, defense and aerospace, and information technology sectors in the United States, United Kingdom, India, and Russia.

      EXCERPT: Open-source software has been weaponized by threat actors connected to North Korea. The Lazarus Group, also known as the actor Microsoft tracks as Zinc, is said to have carried out the attacks. Targets include media, defense and aerospace, and information technology sectors in the United States, UK, India, and Russia.

      LINK: https://www.infosecurity-magazine.com/news/lazarus-group-weaponize-open/

      TOPIC: Cyberconflict and warfare, Cybercrime

      DATE: 30.09.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  6. Sep 2022
    1. TITLE: 54 countries outline support for human-centric approach at the core of standardisation and connectivity

      CONTENT: In a joint statement delivered during the International Telecommunication Union (ITU) Plenipotentiary Conference, 54 countries endeavoured to promote 'a human rights-based approach to the whole life cycle of telecommunication/ICT technologies – including design, development, deployment, use and disposal - as part of a human-centric vision of the digital transformation, including in international standard-setting processes'. The countries encouraged the ITU to work with other standard development organisations to develop international technical standards are consistent with exiting international frameworks on human rights and fundamental freedoms. It also called on the organisation to intensify efforts to make its procedures more transparent and accessible, including to organisations active on human rights aspects of telecommunications/ICTs. Among the signatory countries were the 27 EU member states, Australia, Canada, Ghana, Chile, Japan, Rwanda, Switzerland, the UK, and others.

      TOPICS: digital standards, human rights principles

      DATE: 26 September 2022

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: GSMA, IBM, and Vodafone launch Post-Quantum Telco Network Taskforce

      CONTENT: GSMA, IBM, and Vodafone have launched a Post-Quantum Telco Network Taskforce to contribute to the definition of policies, regulations, and business processes for the protection of telecommunication in the context of advanced quantum computing. According to GSMA, the taskforce will help define requirements, identify dependencies, and create the roadmap to implement quantum-safe networking, mitigating the risks associated with future, more-powerful quantum computers. Activities to be undertaken by the taskforce will focus on three areas: (a) strategy: integrating quantum-safe capabilities into telecom network operators’ technology, business processes; and security; (b) standardisation: identifying the needs and common alignments for the integration of quantum-safe capabilities into existing telecom networks; and (c) policy: advising on public policy, regulation, and compliance matters.

      TOPICS: Telecom infra, emerging tech

      TRENDS: Quantum

      DATE: 28 September 2022

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Vietnam preparing rules to limit news posts on social media accounts - sources

      TITLE: Vietnam is working on a new set of rules to restrict news posts on social media accounts

      CONTENT: According to Reuters, Vietnam is preparing new rules that will restrict which social media accounts can post news-related content, as authorities tighten their grip on the country's news and information sources.

      The regulations would create a legal foundation for regulating news distribution on platforms such as Facebook and YouTube.

      The sources confirmed that government officials have been holding confidential meetings with popular social media and internet firms to brief them on which types of accounts will be allowed to post news content under the new rules. According to them, authorities will be able to order social media companies to ban accounts that violate the rules.

      The rules are anticipated to be announced before the end of the year, with specifics still being worked out.

      TOPIC: Freedom of expression

      LINK: https://www.reuters.com/technology/exclusive-vietnam-preparing-rules-limit-news-posts-social-media-accounts-sources-2022-09-28/

      DATE: 29.09.

      EXCERPT: Vietnam is preparing new rules that will restrict which social media accounts can post news-related content, as authorities tighten their grip on the country's news and information sources. If the rules are announced, authorities will be able to order social media companies to ban accounts that violate the rules.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Human Rights Council Holds Annual Discussion on the Integration of the Gender Perspective, Focusing on Overcoming Gender-Based Barriers to Freedom of Opinion and Expression

      TITLE: HR Council’s annual debate on gender-based barriers to freedom of opinion and expression: online aspects

      CONTENT: The Human Rights Council held its annual debate on the incorporation of a gender perspective, with the focus on overcoming gender-based barriers to freedom of opinion and expression.

      Gender-based online violence against journalists, according to Julie Posetti of the International Centre for Journalists, is one of the most serious contemporary threats to press freedom and the safety of women journalists worldwide. Individual political actors and parties have been identified as perpetrators, instigators, and amplifiers of online violence against female journalists in many countries.

      Irene Khan, Special Rapporteur on freedom of opinion and expression said that states must not use efforts to eradicate online violence, gendered hate speech, and disinformation as an excuse to limit free expression.

      During the discussion that followed, speakers stated that online discrimination plays a role in censoring and silencing the voices of women and girls.

      TOPIC: Gender rights online, Freedom of expression, Freedom of the press

      LINK: https://www.ohchr.org/en/press-releases/2022/09/human-rights-council-holds-annual-discussion-integration-gender-perspective

      EXCERPT: Human Rights Council held its annual debate on the incorporation of a gender perspective. The focus was on overcoming gender-based barriers to freedom of opinion and expression. Gender-based online violence against journalists is one of the most serious contemporary threats to press freedom, and states must not use efforts to eradicate online violence, gendered hate speech, and disinformation as an excuse to limit free expression.

      DATE: 28.09.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Women more vulnerable on cyber space: FWRM

      TITLE: Fiji Women’s Rights Movement claims that women are more vulnerable to online violence

      CONTENT: Nalini Singh, Executive Director of the Fiji Women's Rights Movement, made remarks on gender rights in cyberspace, while praising the government's intention to join the Convention on Cyber Crime.

      According to Singh, cybercrime should not be approached from a gender-neutral standpoint.

      She claims that women who have regular access to online spaces are more vulnerable to online violence. Singh also states that dissecting how cybercrime occurs can help the state respond more effectively.

      LINK: https://www.fbcnews.com.fj/news/women-more-vulnerable-on-cyber-space-fwrm/

      DATE: 28.09.

      EXCERPT: Nalini Singh, Executive Director of the Fiji Women's Rights Movement made remarks on gender rights in cyberspace. She claims that women who have regular access to online spaces are more vulnerable to online violence.

      TOPIC: Gender rights online

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Indonesian activists deplore latest cyberattack as ‘assault on press freedom’

      TITLE: Indonesian advocates condemn latest cyberattack on press freedom

      CONTENT: Indonesian advocates have condemned a series of widespread and coordinated cyberattacks on journalists and employees of the state’s media company Narasi and urged police to act immediately. This media company is known for its criticism of the government.

      The attacks aimed to take control of its employees' Telegram, Instagram, Facebook, and Twitter accounts, states the head of newsroom, Laban Laisila.

      Advocates condemned the attack on press freedom and urged law enforcement not to take sides when dealing with cyberattacks.

      Discrepancy between the way law treated cyberattacks involving state or government institutions and those involving the press is noticeable.

      EXCERPT: Indonesian advocates have condemned a series of widespread and coordinated cyberattacks on journalists and employees of the state's media company Narasi. This media company is known for its criticism of the government. Press freedom is at stake as the country deals with cyberattacks differently depending on whether they occurred against the government than against the press.

      LINK: https://asianews.network/indonesian-activists-deplore-latest-cyberattack-as-assault-on-press-freedom/

      DATE: 28.09.

      TOPIC: Freedom of the press, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Meta dismantles massive Russian network spoofing Western news sites

      TITLE: Meta takes down Russian network spoofing Western news sites

      CONTENT: According to Meta, it took down a vast network of Facebook and Instagram profiles spreading misinformation that had been spoofed on more than 60 websites across Europe.

      The primarily targeted countries were Germany, France, Italy, Ukraine, and the U.K. Original articles were attacking Ukraine and Ukrainian refugees and suggesting that Western sanctions on Russia will backfire.

      Meta said it succeeded to take down around thousands of Facebook and Instagram accounts, while stating that this is ‘the largest and most complex Russian-origin operation that we've disrupted since the beginning of the war in Ukraine.’

      EXCERPT: Social media company Meta says it has disrupted 'the largest and most complex Russian-origin operation that we've disrupted since the beginning of the war in Ukraine'. The primarily targeted countries were Germany, France, Italy, Ukraine, and the U.K. Original articles were attacking Ukrainian refugees and suggesting that Western sanctions on Russia will backfire.

      LINK: https://www.bleepingcomputer.com/news/security/meta-dismantles-massive-russian-network-spoofing-western-news-sites/

      DATE: 27.09.

      TOPIC: Cybersecurity, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Ukraine warns allies of Russian plans to escalate cyberattacks

      TITLE: Ukrainian military intelligence warns allies of major upcoming Russian cyber-attacks

      CONTENT: The key infrastructure of Ukraine and its allies will be the target of ‘major cyber-attacks,’ according to a warning issued today by the Ukrainian military intelligence service.

      According to the Main Directorate of Intelligence of the Ukrainian Ministry of Defence (HUR MO), this upcoming ‘massive’ wave of strikes will likely target disrupting and destroying institutions and facilities related to the energy sector.

      The Russian cyberattacks' most likely objective would also be to disrupt the Ukrainian Army's on-going advance and heighten the destruction caused by missile strikes against the country's eastern and southern energy supply facilities.

      EXCERPT: 'Major cyber-attacks' will target key infrastructure of Ukraine and its allies, warns Ukrainian military intelligence service. Main objective would be to disrupt the Ukrainian Army's advance and heighten destruction caused by missile strikes against the country's eastern and southern energy supply facilities.

      DATE: 26.09.2022.

      TREND: Ukraine

      TOPIC: Cyberconflict and warfare

      LINK: https://www.bleepingcomputer.com/news/security/ukraine-warns-allies-of-russian-plans-to-escalate-cyberattacks/

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. RSF calls on Azerbaijan to end online harassment of Swedish journalist

      TITLE: RSF urges Azerbaijan to stop harassing Swedish journalist online

      CONTENT: Reporters Without Borders (RSF) demands that supporters of Azerbaijani President Ilham Aliyev stop smearing Swedish freelance journalist Rasmus Canbäck, particularly on Twitter.

      Canbäck has been called a ‘Islamophobe,’ a ‘terrorist,’ a ‘spy,’ and ‘funded by the Armenian lobby’ on Twitter as a result of his articles about Azerbaijan, particularly for the online magazine Blankspot. He has been writing about Nagorno-Karabakh, a region with an Armenian majority where a long-running conflict has recently resurfaced, as well as Azerbaijan's alleged use of bribes in its ‘caviar diplomacy’ and lobbying.

      According to RSF, Canbäck's account was mentioned in nearly 900 tweets between September 1 and September 21. Therefore, RSF also requests that Swedish Foreign Minister Ann Linde remind Azerbaijan's Ambassador Ahmadov to maintain press freedom and journalistic independence. Nevertheless, Ambassador himself participated in the online harassment.

      TOPIC: Freedom of the press

      LINK: https://rsf.org/en/rsf-calls-azerbaijan-end-online-harassment-swedish-journalist

      DATE: 23.09.2022.

      EXCERPT: Reporters Without Borders (RSF) demands that supporters of Azerbaijani President Ilham Aliyev stop smearing Swedish freelance journalist Rasmus Canbäck, highlighting the one on Twitter. His account was mentioned in nearly 900 tweets between September 1 and September 21, and he suffers from online harassment in all of them. RSF also urges Swedish Foreign Minister Ann Linde to remind Azerbaijan's Ambassador Ahmadov to maintain press freedom and journalistic independence.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Ukraine dismantles hacker gang that stole 30 million accounts

      TITLE: The Security Service of Ukraine dismantles hacker group which stole around 30 mil. accounts

      CONTENT: The Security Service of Ukraine (SSU) has dismantled a group of hackers who stole the accounts of nearly 30 million people and sold them on the dark web.

      On victim systems in the European Union and Ukraine, the hackers deployed malware to steal login information and other sensitive data. Several hard drives containing stolen personal data, as well as computers, SIM cards, mobile phones, and flash drives, were discovered and confiscated during raids on the perpetrators' homes in Lviv, Ukraine.

      Although the number of people detained is still unknown, they are all being prosecuted on criminal accusations related to the illegal sale or dissemination of information with restricted access kept in computers and networks. Sentences for these offenses carry long prison terms.

      Since the first days of the Russian invasion, spreading false information about the conflict has become common throughout Ukraine. Misinformation and deception are still flooding the internet.

      EXCERPT: The Security Service of Ukraine (SSU) has dismantled a group of hackers. They stole the accounts of nearly 30 million people and sold them on the dark web. Hard drives containing stolen personal data, as well as computers, SIM cards, mobile phones, and flash drives were all discovered and confiscated during raids in Lviv. The number of detained people remains unknown, but sentences for the offenses in question will be quite long.

      DATE: 23.09.2022.

      LINK: https://www.bleepingcomputer.com/news/security/ukraine-dismantles-hacker-gang-that-stole-30-million-accounts/

      TOPIC: Cybercrime, Cyberconflict and warfare

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Iran reins in access to Instagram and WhatsApp, last platforms available to Iranians

      TITLE: Iranians lose access to Instagram and WhatsApp: RSF sees it as an attack on the right to news and information

      CONTENT: According to Reporters Without Borders, the Iranian government's decision to restrict access to Instagram and WhatsApp, which had been circulating information about a wave of protests triggered by the death of Mahsa Amini in police custody following her arrest by the morality police on September 16, is an unprecedented attack on the right to news and information in Iran.

      Since the beginning of the protests, the Islamic Republic has imposed numerous Internet shutdowns, and the shutdown is now complete in western Iran's Kurdistan province, where Amini was born and where the first protests began. Other major cities, including Tehran, have reported partial Internet restrictions.

      The government has made contradictory statements about Internet censorship. ICT Minister Issa Zarepour insisted he had been misquoted after initially saying on September 21 that Internet restrictions could be imposed for security reasons.

      However, since 2011, the government has invested in a ‘national Iranian Internet’ project that attempts to force Iranians to connect through a network controlled by the authorities before accessing content located elsewhere.

      LINK: https://rsf.org/en/iran-reins-access-instagram-and-whatsapp-last-platforms-available-iranians

      EXCERPT: According to Reporters Without Borders, the Iranian government's decision to restrict access to Instagram and WhatsApp is an unprecedented attack on the right to news and information in Iran. Internet shutdowns are complete in some regions - such as Western Iran’s Kurdistan province. These shutdowns follow the beginning of a wave of protests triggered by the death of Mahsa Amini. The Iranian government has started a ‘national Iranian Internet’ project that attempts to force Iranians to connect through a network controlled by the authorities before accessing content located elsewhere. This may seriously affect some basic human rights of the Iranian people.

      TOPIC: Freedom of expression

      DATE: 22.09.2022.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Optus Hit By Cyber-Attack, Breach Affects Nearly 10 Million Customers

      TITLE: Optus hit by cyberattack which affected around 10 million customers

      CONTENT: Optus, the Australian subsidiary of Singapore Telecommunications, announced earlier today that it was investigating unauthorized access to customer data following a cyber-attack.

      The company confirmed that the attack was instantly stopped, preventing customers' payment information and account passwords from being compromised. However, Optus confirmed that the attacker may have obtained some home addresses, driver's license numbers, and passport numbers.

      Optus, which has 9.7 million subscribers according to publicly available data, said it also notified key financial institutions about the attack and subsequent breach.

      Optus customers are now more vulnerable to phishing, with their credentials potentially already on the dark web, according to the executive.

      EXCERPT: Optus, the Australian subsidiary of Singapore Telecommunications, was hit by a cyber-attack. Customers' payment information and account passwords were not compromised, but personal details may have been accessed. Optus customers are now more vulnerable to phishing, with their credentials potentially already on the dark web.

      LINK: https://www.infosecurity-magazine.com/news/optus-hit-by-cyberattack/

      DATE: 22.09.2022.

      TOPIC: Cyberconflict and warfare, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Expanding broadband safely and inclusively to reach digital gender equality

      TITLE: Insight by UN Women Executive Director on reaching digital gender equality

      CONTENT: Ms. Sima Bahous, Broadband Commissioner, UN Under-Secretary-General and UN Women Executive Director has shared her ‘Insight’ regarding digital gender equality.

      Sexual harassment, stalking, and zoom bombing are all examples of online and ICT-facilitated violence against women and girls that are expanding. Misogyny and sexual violence are finding new digital homes in virtual reality and the metaverse. Women journalists, politicians, and activists who rely on an online presence for their work are therefore especially impacted. A concerning fact is that more than half of girls and young women surveyed globally have already experienced some form of online violence.

      She firstly recommends that governments should establish strong and clear codes of conduct for law enforcement officials dealing with online violence against women and girls, as well as to invest in specialized justice officers to deal with such violence in a human rights and gender-sensitive manner. Secondly, she suggested that internet intermediaries make high-level, clear commitments to ensure the safety of women and girls in online spaces.

      You can read more about her recommendations on the topic here (please insert link on ‘here’).

      DATE: 18.09.2022.

      LINK: https://www.unwomen.org/en/news-stories/op-ed/2022/09/expanding-broadband-safely-and-inclusively-to-reach-digital-gender-equality

      TOPIC: Gender rights online

      EXCERPT: Sima Bahous, Broadband Commissioner, UN Under-Secretary-General and UN Women Executive Director has shared her 'Insight' regarding digital gender equality. One of her recommendations for achieving online gender equality is that governments establish strong and clear codes of conduct for law enforcement officials dealing with online violence against women and girls.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. ‘Anonymous’ hacks Iran state websites after Mahsa Amini’s death

      TITLE: Iranian websites hacked after Mahsa Amini’s death

      CONTENT: After a Twitter account connected to the ‘Anonymous’ hacking collective claimed to have conducted cyberattacks on them in support of protests following the tragic death of 22-year-old Mahsa Amini, multiple government and state-affiliated media websites in Iran were taken down.

      The attacks appear to have targeted the Iranian government's two main websites. One is the government's ‘smart services’ website, which provides a variety of online services, and another is dedicated to publishing government news and interviews with officials.

      ‘All databases have been deleted,’ a social media linked to Anonymous claimed. claimed a social media account linked to Anonymous. The Iranian government has yet to issue an official response to the attacks.

      LINK: https://www.aljazeera.com/news/2022/9/21/anonymous-hacks-iran-state-websites-after-mahsa-aminis-death

      EXCERPT: ‘Anonymous’ hackers have taken down government and state-affiliated media websites in Iran. ‘All databases have been deleted,’ a social media account linked to ‘Anonymous’ claimed. The Iranian government has yet to issue an official response to the attacks.

      DATE: 21.09.2022.

      TOPIC: Cyberconflict and warfare

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Microsoft 365 phishing attacks impersonate U.S. govt agencies

      TITLE: Microsoft 365 phishing attacks pose as US government agencies

      CONTENT: There is an ongoing phishing campaign aimed at the US government contractors that has grown to include higher-quality lures and better-crafted documents. Phishing emails show a request for bids on lucrative government projects, which leads them to phishing pages that look exactly like legitimate federal agency portals.

      This appears to be the same operation that INKY reported on in January this year, with the threat actors attaching PDFs with instructions on how to bid on US Department of Labor projects.

      This campaign's operatives don't appear to be stopping anytime soon, since they are now expanding their targeting scope while refining their lures.

      Given that the emails, PDFs, and websites used in the phishing operation are primarily copies of the actual state’s content, detecting signs of fraud may be difficult.

      TOPIC: Cyberconflict and warfare, Cybercrime

      DATE: 19.09.2022.

      EXCERPT: US government contractors are being targeted by an ongoing phishing campaign that has grown to include higher-quality lures and better-crafted documents. Given that the emails, PDFs, and websites used in the phishing operation are primarily copies of the actual state's content, detecting signs of fraud may be difficult.

      LINK: https://www.bleepingcomputer.com/news/security/microsoft-365-phishing-attacks-impersonate-us-govt-agencies/

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Russian authorities revoke Novaya Gazeta’s online media license

      TITLE: Novaya Gazeta’s online media license revoked

      CONTENT: Only 10 days after a Moscow Court revoked Novaya Gazeta’s print license, the Russian Supreme Court has revoked its online media license. This media outlet has been working independently for nearly 30 years, and now it lost its right to exist.

      ‘You are depriving hundreds of people of jobs. You are depriving readers–there were 27 million in March–of the right to information,’ Novaya Gazeta chief editor Dmitry Muratov stated in court on September 15. He referred to the verdict as ‘media genocide’ outside of court, claiming that it would prevent Novaya Gazeta reporters from contacting authorities, remove their accreditation status, and impose several restrictions on their operations.

      LINK: https://cpj.org/2022/09/russian-authorities-revoke-novaya-gazetas-online-media-license/

      TOPIC: Freedom of the press

      EXCERPT: Only 10 days after a Moscow Court revoked Novaya Gazeta's print license, the Russian Supreme Court has revoked its online media license. This media outlet has been working independently for 30 years. Novaya Gazeta’s chief editor Dmitry Muratov referred to this action as ‘media genocide.’

      DATE: 15.09.2022.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The second Summit for Information and Democracy to be held in New York on 22 September 2022

      TITLE: The second Summit for Information and Democracy will be held on the sidelines of the UNGA

      CONTENT: The Second Summit of the Partnership for Information and Democracy will be held on September 22, 2022 on the sidelines of the UN General Assembly. The Partnership is currently supported by 45 countries, and serves as a framework for multilateral reflection on the implementation of democratic guarantees in the global communication and information space.

      The Summit's second edition will bring together Foreign Ministers from the Partnership's member countries as well as representatives from civil society. Among other initiatives, the recommendations of the Forum's working group on accountability regimes (please insert this link for ‘accountability regimes’: https://informationdemocracy.org/working-groups/accountability-regimes/) for social networks and their users will be published.

      In its 4 years of work, launched by Reporters Without Borders in 2018, one of the International Initiative on Information and Democracy key results is an international coalition of 43 civil society and research organizations formed to promote democratic principles in the digital space. Therefore, the Summit will allow for better coordination of efforts to create a democratic digital space.

      EXCERPT: The Second Summit of the Partnership for Information and Democracy will be held on September 22, 2022 on the sidelines of the UN General Assembly. It is currently supported by 45 countries, and serves as a framework for multilateral reflection on the implementation of democratic guarantees in the global communication and information space. The Summit aims for better coordination in creating a safe democratic digital space.

      TOPIC: Freedom of expression, Freedom of the press

      LINK: https://rsf.org/en/second-summit-information-and-democracy-be-held-new-york-22-september-2022 & https://informationdemocracy.org/working-groups/accountability-regimes/

      DATE: 19.09.2022.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Bridging the Digital Literacy Gender Gap in Developing Countries

      TITLE: New Policy Brief: Bridging the Digital Literacy Gender Gap in Developing Countries

      CONTENT: An international team worked on a Policy Brief, Bridging the Digital Literacy Gender Gap in Developing Countries to urge the G20 and other countries to address the digital literacy challenges women face.

      According to the data, when it comes to women being included in the digital sector, it is clear they are left behind. The gender gap in digital literacy in some economies, cultures, and locations inhibits women from taking advantage of improved educational possibilities and career prospects.

      This policy brief assesses the correlation between sociocultural and digital literacy gaps. The article goes on to explain why gaps in digital literacy start developing in young age and how most programs for developing digital skills miss the challenges that women confront in integrating into the digital world. In its conclusion, it identifies solutions to these problems and implores the G20 and other nations to deal with the particular difficulties associated with women's digital literacy.

      The main issue with women's access to digital resources is not the technology itself, but rather where women are situated in society. The gender digital gap is widened by elements including lack of autonomy, unequal access to education, and the perception of women as dangerous and unsafe in digital areas. You can read the full policy brief here (please insert this link on ‘here’: https://www.fenews.co.uk/wp-content/uploads/2022/09/Bridging-the-digital-literacy-gender-gap-in-developing-countries-2.pdf).

      EXCERPT: An international team worked on a Policy Brief, Bridging the Digital Literacy Gender Gap in Developing Countries. It urges the G20 and other countries to address the digital literacy challenges women face. The main issue with women's access to digital resources is not the technology itself, but rather where women are situated in society.

      DATE: 15.09.2022.

      LINK: https://www.fenews.co.uk/exclusive/bridging-the-digital-literacy-gender-gap-in-developing-countries/ & https://www.fenews.co.uk/wp-content/uploads/2022/09/Bridging-the-digital-literacy-gender-gap-in-developing-countries-2.pdf

      TOPIC: Gender rights online

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Meta-owned apps most vulnerable to cyberattacks, research suggests

      TITLE: Research shows that Meta-owned apps are the most vulnerable to cyberattacks

      CONTENT: TechShielder conducted a review of ten popular apps in the social, entertainment, and communication categories to determine which are the most likely to be hacked and what types of user data they store are at risk of being compromised.

      According to the study, the average number of Google searches each app receives about being hacked indicates its vulnerability to cybercrime. Facebook ranks first with an average of 550,000 monthly searches for ‘Facebook hacked.’ Following that, there are 246,000 searches for ‘Instagram hacked’ and 135,000 for ‘WhatsApp hacked.’

      With 49,500 and 27,100 searches, respectively, Snapchat and Twitch round out the top five. Netflix, YouTube, Telegram, Twitter, and Facebook's Messenger app were also included in the study. All of the apps reviewed by TechShielder store user email addresses and phone numbers, according to the company. Most collect names, credit card information, and cookies, which can provide a "in-depth" look into users' online lives.

      The survey also showed that Meta-owned products have the most information on their users when compared to other popular apps, and Telegram has the least.

      EXCERPT: TechShielder conducted a review of ten popular apps in the social, entertainment, and communication categories to determine which are most likely to be hacked. The average number of Google searches each app receives about being hacked indicates its vulnerability to cybercrime. Facebook ranks first with an average of 550,000 monthly searches for 'Facebook hacked'.

      LINK: https://cybernews.com/security/meta-owned-apps-vulnerable-cyberattacks/

      DATE: 14.09.2022.

      TOPIC: Cybersecurity, Cybercrime, Network security

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. DDoS Attacks on UK Firms Surge During Ukraine War

      TITLE: Increased DDoS attacks on UK companies during Ukraine war

      CONTENT: According to new Freedom of Information (FoI) data obtained from the industry regulator, the volume of DDoS attacks against UK financial institutions increased during the first few months of the Ukraine war.

      The Financial Conduct Authority (FCA) has given information that 14 DDoS attacks have occurred in 2022, compared to only five in all of 2021.

      Picus Security co-founder, Suleyman Ozarslan has explained: ‘UK financial institutions are in the crossfire of the ongoing war between Russia and Ukraine and have become a direct target for nation-state attackers and hacktivists seeking to disrupt Ukraine’s allies.’ With the importance of the finance sector as critical national infrastructure, Picus Security understands these attacks were carried out by state-sponsored and hacktivist operations.

      LINK: https://www.infosecurity-magazine.com/news/ddos-attacks-uk-firms-surge-during/

      EXCERPT: DDoS attacks against UK financial institutions increased during the Ukraine war. 14 DDoS attacks have occurred in 2022, compared to only five in all of 2021. Picus Security believes these attacks were carried out by state-sponsored and hacktivist operations

      DATE: 14.09.2022.

      TOPIC: Cyberconflict and warfare, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Iranian Hackers Launch Renewed Attack on Albania

      TITLE: Albania is yet again the target of new Iranian hacker attacks

      CONTENT: The office of Albanian Prime Minister Edi Rama tweeted over the weekend that the attacks targeted the Total Information Management System (TIMS), which assists in tracking individuals entering and exiting the country. Following a July 15 ransomware attack that knocked out multiple government services, Tirana decided last week to cut all diplomatic ties with Iran.

      The NATO member nation has long been Iran's adversary, providing refuge to tens of thousands of members of the Iranian opposition movement Mujahedeen-e-Khalq (MEK). The attack in July occurred just before the Free Iran World Summit that was scheduled to take place in Albania.

      Albania had joined forces with Microsoft and the FBI on attribution in order to ensure that the act was the result of state aggression.

      EXCERPT: The office of Albanian Prime Minister Edi Rama tweeted over the weekend that the attacks targeted the Total Information Management System (TIMS), which assists in tracking individuals entering and exiting the country. The FBI and Microsoft worked with the Albanian government to ensure that the act was the result of state aggression.

      LINK: https://www.infosecurity-magazine.com/news/iranian-hackers-launch-renewed/

      DATE: 13.09.2022.

      TOPIC: Cyberconflict and warfare, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Cyberspies drop new infostealer malware on govt networks in Asia

      TITLE: New infostealer malware dropped on Asian government networks by cyberspies

      CONTENT: Security researchers have discovered new cyber-espionage action targeting Asian governments, along with state-owned aerospace and defense companies, telecom companies, and IT organizations.

      This activity is being carried out by a distinct threat group previously associated with the "ShadowPad" RAT (remote access trojan). Recently, the threat actor used a much broader set of tools.The most current campaign appears to be almost entirely focused on Asian governments or public entities, such as some of the following: head of government/Prime Minister's office, government-owned aerospace and defense companies, state-owned media companies etc.

      Chinese hackers are most likely behind these espionage campaigns, but the evidence isn't credible enough to make a certain conclusion.

      EXCERPT: This cyber-espionage activity is being carried out by a distinct threat group previously associated with the "ShadowPad" RAT. The most current campaign appears to be almost entirely focused on Asian governments. Chinese hackers are most likely behind these espionage campaigns, but the evidence isn't credible enough to make a certain conclusion.

      DATE: 13.09.2022.

      LINK: https://www.bleepingcomputer.com/news/security/cyberspies-drop-new-infostealer-malware-on-govt-networks-in-asia/

      TOPIC: Cyberconflict and warfare, Cybercrime, Cybersecurity

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Vietnamese journalist gets five years in prison for “abusing democratic freedoms”

      TITLE: Vietnamese journalist gets five years of prison for his online criticism

      CONTENT: Le Anh Hung, a 49 year old journalist, was given a five-year prison sentence by a Hanoi court on August 30 for "abusing democratic freedoms" and "infringing upon the interests of the state." Hung frequently contributed to the Voice of America website and wrote on politics. He also frequently attacked Hoang Trung Hai, a former deputy prime minister and industry minister, whom he accused of corruption, abuse of authority, and espionage for China in his posts that criticized the ruling party's corruption and dominance.

      He published an open letter on his Facebook page that went viral three days prior to his arrest. The letter criticized government actions and demanded that a draft law designating "special economic zones" in three different regions of Vietnam be changed. The planned law had received harsh public criticism and had ignited demonstrations that were ruthlessly put down. Despite Hung's repeated claims that his mental health was excellent, he was detained in a mental institution in Hanoi for the first three years and ten months following his detention.

      This five-year prison sentence that Vietnam's authorities secretly handed down to independent journalist Le Anh Hung after imprisoning him for four years in appalling conditions apalls Reporters Without Borders (RSF). According to RSF, the authorities continue to abuse the legal system to impose draconian punishments in an effort to silence any criticism of media.

      EXCERPT: Journalist Le Anh Hung was sentenced to five years in a Hanoi court for "abusing democratic freedoms" and "infringing upon the interests of the state". Reporters Without Borders (RSF) says the authorities continue to abuse the legal system to impose draconian punishments in an effort to silence any criticism of media. Despite claims that his mental health was excellent, he was detained in a mental institution for the first three years and ten months following his detention.

      LINK: https://rsf.org/en/vietnamese-journalist-gets-five-years-prison-abusing-democratic-freedoms

      DATE: 12.09.2022.

      TOPIC: Freedom of the press, Freedom of expression

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. US Treasury Sanctions Iranian Minister Over Hacking of Govt and Allies

      TITLE: Iranian Minister Sanctioned by US Treasury for Hacking Government and Allies

      CONTENT: The Office of Foreign Assets Control (OFAC) of the US Department of the Treasury has sanctioned Iran's Ministry of Intelligence and Security (MOIS) and its Minister of Intelligence for allegations in engaging in cyber-enabled activities against the United States and its allies.

      "We will not tolerate Iran's increasingly aggressive cyber activities targeting the United States or our allies and partners," stated Brian E. Nelson, Treasury Undersecretary for Terrorism and Financial Intelligence.

      The MOIS would have guided several network connections of cyber threat actors engaged in cyber-espionage and ransomware attacks in assistance of Iran's political goals under Esmail Khatib's leadership.

      The MuddyWater ransomware operations against Turkish government entities in November 2021, the APT39 wide - spread theft of personally identifiable information (PII) in 2020, and, most recently, the cyber activity that directly impacted Albanian government websites are examples of these. These sanctions come just weeks after Microsoft revealed details of alleged hacking campaigns linked to MuddyWater that targeted Israeli organizations by exploiting Log4j 2 vulnerabilities in SysAid applications.

      EXCERPT: United States Office of Foreign Assets Control has sanctioned Iran's Ministry of Intelligence and Security (MOIS) and its Minister of Intelligence for cyber-enabled activities against the U.S. and its allies. "We will not tolerate Iran's increasingly aggressive cyber activities targeting the United States, …" said Brian E. Nelson, Treasury Undersecretary for Terrorism and Financial Intelligence.

      LINK: https://www.infosecurity-magazine.com/news/us-sanctions-iranian-ministry/

      DATE: 12.09.2022.

      TOPIC: Cyberconflict and warfare

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. North Korean Lazarus Group Hacked Energy Providers Worldwide

      TITLE: Energy providers hacked globally by North Korean Lazarus Group

      CONTENT: Between February and July 2022, the North Korean threat actor Lazarus Group ran a malicious campaign against energy providers all over the world. The campaign was previously revealed in part by Symantec and AhnLab in April and May, and Cisco Talos is now providing additional details.

      The security researchers stated in an advisory on Thursday that the Lazarus campaign involved the exploitation of vulnerabilities in VMWare Horizon to gain initial access to targeted organizations. Cisco Talos states that the recent Lazarus attacks targeted energy providers from various countries, including the United States, Canada, and Japan.

      The new Cisco Talos advisory is just the latest in a long line of documents detailing the Lazarus Group's hacking operations this summer. Elliptic, a blockchain analytics company, suggested in June that the threat actor was responsible for the $100 million theft from cryptocurrency firm Harmony. The Block recently linked the group to Axie Infinity's $600 million hack.

      LINK: https://www.infosecurity-magazine.com/news/lazarus-group-hacked-energy/

      DATE: 12.09.2022.

      TOPIC: Cyberconflict and warfare, Cybercrime

      EXCERPT: Between February and July 2022, the Lazarus Group ran a malicious campaign against energy providers all over the world. The campaign was previously revealed in part by Symantec and AhnLab in April and May. Cisco Talos is now providing additional details on the North Korean threat actor's operations.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Freedom House report on Beijing’s Global Media Influence: cyber aspects

      CONTENT: (For the next two paragraphs please use this link: https://www.voanews.com/a/china-s-global-media-influence-campaign-growing-says-freedom-house-/6736696.html) Freedom House report: Beijing's Global Media Influence: Authoritarian Expansion and the Power of Democratic Resilience, showed Beijing’s efforts to influence media in democracies, and their response. According to Freedom House, the Chinese Communist Party (CCP) employs a variety of tactics, including mass distribution of state-produced content, harassment and intimidation of local media outlets, targeted disinformation, and the use of cyberbullying and fake social media accounts.

      Sarah Cook, Freedom House's research director for China, Hong Kong, and Taiwan, and one of the report's authors said: ‘The Chinese government is using more sophisticated, more covert and more coercive tactics, like cyberbullying, or cyberattacks, or just phone calls to journalists, to try to pressure and influence coverage in countries around the world.’

      (From here on, please use this link: https://freedomhouse.org/report/beijing-global-media-influence/2022/authoritarian-expansion-power-democratic-resilience) Since 2019, more aggressive activities such as targeted harassment of individual reporters, cyberbullying, and cyberattacks against stigmatized media organizations have spread to 24 of the 30 countries under investigation in some form. Also, from 2019, news outlets or journalists from 7 countries have been targeted by cyberattacks that could be traced back to China. These cyberattacks increase the financial burden on media outlets to improve their defenses, and data theft hacking could endanger journalists and their sources.

      Nigeria has been identified as the country most vulnerable to Beijing's media influence campaigns.

      LINK: https://freedomhouse.org/report/beijing-global-media-influence/2022/authoritarian-expansion-power-democratic-resilience & https://www.voanews.com/a/china-s-global-media-influence-campaign-growing-says-freedom-house-/6736696.html

      TOPIC: Freedom of the press, Cybercrime

      DATE: 08.09.2022.

      EXCERPT: Freedom House report: Beijing's Global Media Influence: Authoritarian Expansion and the Power of Democratic Resilience, showed Beijing's efforts to influence media in democracies. Since 2019, news outlets or journalists from 7 countries have been targeted by cyberattacks that could be traced back to China. More aggressive activities such as targeted harassment of individual reporters, cyberbullying, and cyberattacks against stigmatized media organizations have spread to 24 of the 30 countries under investigation in some form. According to Freedom House, the Chinese Communist Party (CCP) employs a variety of tactics, including mass distribution of state-produced content, harassment and intimidation of local media outlets, targeted disinformation, and the use of cyberbullying and fake social media accounts.

    2. Beijing's Global Media Influence 2022

      TITLE: Freedom House report on Beijing’s Global Media Influence: cyber aspects

      CONTENT: (For the next two paragraphs please use this link: https://www.voanews.com/a/china-s-global-media-influence-campaign-growing-says-freedom-house-/6736696.html) Freedom House report: Beijing's Global Media Influence: Authoritarian Expansion and the Power of Democratic Resilience, showed Beijing’s efforts to influence media in democracies, and their response. According to Freedom House, the Chinese Communist Party (CCP) employs a variety of tactics, including mass distribution of state-produced content, harassment and intimidation of local media outlets, targeted disinformation, and the use of cyberbullying and fake social media accounts.

      (From here on, please use this link: https://www.voanews.com/a/china-s-global-media-influence-campaign-growing-says-freedom-house-/6736696.html) Sarah Cook, Freedom House's research director for China, Hong Kong, and Taiwan, and one of the report's authors said: ‘The Chinese government is using more sophisticated, more covert and more coercive tactics, like cyberbullying, or cyberattacks, or just phone calls to journalists, to try to pressure and influence coverage in countries around the world.’

      Since 2019, more aggressive activities such as targeted harassment of individual reporters, cyberbullying, and cyberattacks against stigmatized media organizations have spread to 24 of the 30 countries under investigation in some form. Since 2019, news outlets or journalists from 7 countries have been targeted by cyberattacks that could be traced back to China. These cyberattacks increase the financial burden on media outlets to improve their defenses, and data theft hacking could endanger journalists and their sources.

      Nigeria has been identified as the country most vulnerable to Beijing's media influence campaigns.

      LINK: https://freedomhouse.org/report/beijing-global-media-influence/2022/authoritarian-expansion-power-democratic-resilience & https://www.voanews.com/a/china-s-global-media-influence-campaign-growing-says-freedom-house-/6736696.html

      TOPIC: Freedom of the press, Cybercrime

      DATE: 08.09.2022.

      EXCERPT: Freedom House report: Beijing's Global Media Influence: Authoritarian Expansion and the Power of Democratic Resilience, showed Beijing's efforts to influence media in democracies. Since 2019, news outlets or journalists from 7 countries have been targeted by cyberattacks that could be traced back to China. More aggressive activities such as targeted harassment of individual reporters, cyberbullying, and cyberattacks against stigmatized media organizations have spread to 24 of the 30 countries under investigation in some form. According to Freedom House, the Chinese Communist Party (CCP) employs a variety of tactics, including mass distribution of state-produced content, harassment and intimidation of local media outlets, targeted disinformation, and the use of cyberbullying and fake social media accounts.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Increased Mortality Rates Linked to Cyber-Attacks Against Healthcare Organizations

      TITLE: Increased Mortality Rates as a Result of Cyber-Attacks on Healthcare Organizations

      CONTENT: According to new research from Proofpoint's Ponemon Institute, cyber-attacks on healthcare organizations increase mortality rates by more than 20%. The report surveyed 641 healthcare IT and security practitioners, and found out that 89% of them experienced an average of 43 attacks in the previous 12 months, with more than 20% experiencing one of these types of attacks: cloud compromise, ransomware, supply chain, and phishing.

      The most common consequences of these attacks, according to Proofpoint, were delayed procedures, which resulted in poor patient outcomes for 57% of healthcare providers and increased complications from medical interventions for approximately half of them.

      Ransomware was the most likely type of attack to have a negative impact on patient care, causing procedure or test postponements in 64% of cases and longer patient stays (59%).

      LINK: https://www.infosecurity-magazine.com/news/mortality-rates-linked-cyber/

      DATE: 11.09.2022.

      TOPIC: Cyberconflict and warfare, Cybercrime, Cybersecurity

      EXCERPT: Cyber-attacks on healthcare organizations increase mortality rates by more than 20%. 89% of healthcare IT and security practitioners experienced an average of 43 attacks in the previous 12 months. Cloud compromise, ransomware, supply chain, and phishing were the most common types of attacks.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Draft EU rules target smart devices with cybersecurity risks

      TITLE: Draft EU regulations direct smart devices that pose cybersecurity risks

      CONTENT: According to a European Commission document obtained by Reuters on Thursday, smart devices connected to the internet, such as refrigerators and televisions, will have to comply with strict European Union cybersecurity rules or risk being fined or banned from the bloc.

      On September 13, the EU executive will unveil its Cyber Resilience Act proposal. Following input from EU countries, it is likely to become law. Companies will be required to notify the EU cybersecurity agency ENISA of incidents within 24 hours of becoming aware of them, and to take corrective action.

      The paper states that if companies fail to comply, national surveillance authorities have the authority to ‘prohibit or restrict that product being made available on its national market, to withdraw it from that market or recall it.’

      EXCERPT: On September 13, the EU executive will unveil its Cyber Resilience Act proposal. Following input from EU countries, it is likely to become law. Smart devices connected to the internet, such as refrigerators and televisions, will have to comply with strict European Union cybersecurity rules.

      LINK: https://www.reuters.com/technology/draft-eu-rules-target-smart-devices-with-cybersecurity-risks-2022-09-08/

      DATE: 08.09.2022.

      TOPIC: Cybersecurity, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Battling Violence and Censors, Women in China Become ‘Invisible and Absent’

      TITLE: Women in China are being silenced online as a result of violence and censorship

      CONTENT: When an influential woman in China's #MeToo movement, Ms. Zhou Xiaoxuan, went to court against a famous TV anchor, Mr. Zhu Jun, the justice was not on her side. What happened was not the accuser, but the accused - was portrayed as the victim. Other cases of gender violence and gender related incidents also rapidly went viral. In each case, however, the conversation was quickly censored in order to reduce the ways in which the women had been assaulted. China’s Communist Party has used social media censorship to silence critics while amplifying comments that support the government's chosen narrative of social harmony. After carefully analysing the content, censors then remove popular comments or accounts which express views that deviate too far from the party line. Government censors used Weibo, a popular Chinese social media platform to boost the comments supporting the court’s decision against one of the victims of sexual assault mentioned above, while reducing and deleting messages in her support.

      TOPIC: Freedom of expression, Gender rights online

      LINK: https://www.nytimes.com/2022/09/06/business/china-women-metoo.html

      DATE: 06.09.2022.

      EXCERPT: Chinese women are not allowed to post freely about their experiences of gender-related violence. #MeToo movement in China was restricted and censored by the ruling China’s Communist Party. Social media censorship is one of the main tools the government use in order to prevent women to express themselves and point out the unjust situation in the country regarding their mistreatment.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. UK condemns Iran for reckless cyber attack against Albania

      TITLE: Iran is condemned by the United Kingdom for its cyber attack on Albania

      CONTENT: On September 7, the United Kingdom officially condemned the Iranian state for a cyber attack against Albania's government which destroyed data and interrupted crucial government services such as paying utilities, booking medical appointments, and enrolling schoolchildren. According to the National Cyber Security Centre (NCSC), Iranian state-linked cyber actors are almost definitely accountable for a number of cyber attacks against Albanian government infrastructure beginning on July 15, 2022.

      UK Foreign Secretary James Cleverly declared that ‘The UK is supporting our valuable partner and NATO ally. We join Albania and other allies in exposing Iran’s unacceptable actions.’ The UK has already identified and provided advice on several cyberattacks by Iranian actors, starting with 2018.

      TOPIC: Cyberconflict and warfare

      LINK: https://www.gov.uk/government/news/uk-condemns-iran-for-reckless-cyber-attack-against-albania

      DATE: 07.09.2022.

      EXCERPT: This Wednesday, the United Kingdom condemned the Iranian state for a cyber attack against Albania's government which destroyed data and interrupted crucial government services such as paying utilities. The UK has already identified and provided advice on several cyberattacks by Iranian actors, starting with 2018.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Ransomware gang's Cobalt Strike servers DDoSed with anti-Russia messages

      TITLE: Ransomware gang’s Cobalt Strike servers receive anti-Russia messages in a series of DDoS

      CONTENT: There has been a flood of anti-Russian messages to Cobalt Strike servers run by former Conti ransomware gang members in order to disrupt their operations. Although the operators of Conti ransomware turned off their infrastructure this year in May, its members are now a part of other ransomware groups, including Quantum, Hive, and BlackCat. At the time, TeamServers (C2) used by ransomware actors to control the Cobalt Strike (CS) Beacon payloads on compromised hosts are being tracked by someone, allowing for lateral network movement. When they go inside the CS servers, the usernames they use are ‘Stop Putin!’, or they change their computer name to messages like ‘Be a Russian patriot!’, and ‘Stop the war!’ It is unknown who is sending these messages, as it could be anyone from a security researcher to law enforcement or even a cybercriminal with a grudge for siding with Russia, BleepingComputer reports. In the end, the disruption was only temporary, and the ransomware actor returned to the scene with a more robust infrastructure, allowing them to keep the stolen data accessible even in the face of distributed denial-of-service (DDoS) attacks. LINK: https://www.bleepingcomputer.com/news/security/ransomware-gangs-cobalt-strike-servers-ddosed-with-anti-russia-messages/ EXCERPT: There has been a flood of anti-Russian messages to Cobalt Strike servers run by former Conti ransomware gang members in order to disrupt their operations. At the time, TeamServers (C2) used by ransomware actors to control the Cobalt Strike (CS) Beacon payloads on compromised hosts are being tracked by someone, allowing for lateral network movement. TOPIC: Cybercrime, Cyberconflict and warfare DATE: 07.09.2022.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Albania blames Iran for the July cyberattack and suspends diplomatic relations

      CONTENT: Albanian Prime Minister, Edi Rama, declared on Wednesday that the entire staff of the Islamic Republic of Iran Embassy in Albania had been asked to leave within 24 hours.

      This decision follows the termination of diplomatic relations with Iran following the identification of an Albanian government infrastructure cyberattack to Iranian threat actors in July. Rama said that: ‘The in-depth investigation provided us with indisputable evidence that the cyberattack against our country was orchestrated and sponsored by the Islamic Republic of Iran through the engagement of four groups that enacted the aggression.’

      The U.S. government also officially blamed Iran for the July attack on Albania. The U.S. official said that they condemn this attack and that the Islamic Republic of Iran would be held responsible for endangering the security of a NATO ally. Further actions will be taken to held Iran accountable if another attack towards any of their NATO ally happens in the future. EXCERPT: Albanian Prime Minister, Edi Rama, declared on Wednesday that the entire staff of the Islamic Republic of Iran Embassy in Albania had been asked to leave within 24 hours. The U.S. government also officially blamed Iran for the July attack on Albania. The U.S. official said that they condemn this attack and that the Islamic Republic of Iran would be held responsible for endangering the security of a NATO ally. LINK: https://www.bleepingcomputer.com/news/security/albania-blames-iran-for-july-cyberattack-severs-diplomatic-ties/ TOPIC: Cyberconflict and warfare DATE: 07.09.2022.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Japan investigates the potential involvement of a pro-Russian group in cyberattacks

      CONTENT: Japan announced on Wednesday that it is looking into the possible role in cyberattacks of a pro-Russian group after numerous government websites were disrupted the day before. The ransomware group in question is ‘Killnet’, which is considered to be responsible for attacks on the government websites, as media quotes.

      According to Chief Cabinet Secretary Hirokazu Matsuno, the Japanese government is investigating whether problems accessing more than 20 websites across four government ministries were caused by a denial-of-service (DDoS) attack. Matsuno also explained that the government websites could not be reached on Tuesday evening.

      However, services were recovered the same day. He is aware this pro-Russian group is suggesting that they were behind the attack, but the case is still being investigated at the moment.

      EXCERPT: Japan announced on Wednesday that it is looking into the possible role in cyberattacks of a pro-Russian group named Killnet after numerous government websites were disrupted the day before. According to Chief Cabinet Secretary Hirokazu Matsuno, the Japanese government is investigating whether problems accessing more than 20 websites across four government ministries were caused by a denial-of-service (DDoS) attack.

      LINK: https://www.reuters.com/technology/japan-investigating-possible-involvement-pro-russian-group-cyberattack-nhk-2022-09-06/

      DATE: 07.09.2022.

      TOPIC: Cyberconflict and warfare, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The new Worok cyber-espionage group is targeting governments and high-profile corporations

      Worok, a newly discovered cyber-espionage group, has been using a combination of custom and existing malicious tools to hack governments and high-profile companies in Asia since 2020. ESET security researchers were the first to spot it, and they found out that the group also attacked targets from Middle East and Africa.

      Worok has so far been linked to attacks on telecommunications, banking, maritime, and energy companies, along with military, government, and public sector organizations. Although there have been no sightings since February 2022, ESET has linked the group to new attacks against a Central Asian energy company and a public sector institution in Southeast Asia.

      TOPIC: Cyberconflict and warfare, Cybercrime

      LINK: https://www.bleepingcomputer.com/news/security/new-worok-cyber-espionage-group-targets-governments-high-profile-firms/

      DATE: 06.09.2022.

      EXCERPT: Worok, a newly discovered cyber-espionage group, has been using a combination of custom and existing malicious tools to hack governments and high-profile companies in Asia since 2020. Although there have been no sightings since February 2022, ESET has linked the group to new attacks against a Central Asian energy company and a public sector institution in Southeast Asia.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: The JX Fund and Voronezh Mass Media Defence Center launched the information platform Shpargalka | Exile

      CONTENT: The JX Fund - European Fund for Journalism in Exile, in collaboration with the Voronezh Mass Media Defense Center, has launched the information platform Shpargalka | Exile (‘cheat sheet’ in Russian) to assist threatened media professionals in Russia in selecting a country of exile that is appropriate for them and their needs. Since the increase in anti-press legislation in Russia starting from 4 March, even the use of the word "war" can result in a 15-year prison sentence, so this type of platform is useful for media workers.

      Shpargalka | Exile has now compiled answers to 21 of the most pressing questions, like ‘How do I get a work permit?’, or ‘What do I need to do to register a media company in exile?’ All questions are being answered by lawyers from 12 countries, which currently include: Armenia, Azerbaijan, Bulgaria, Germany, Georgia, Israel, Kazakhstan, Latvia, Montenegro, Poland, Serbia, and Turkey.

      The information is regularly updated, as many countries' entry requirements and legal systems constantly change in light of the tense geopolitical situation. In recent months, the JX Fund has helped 14 media outlets rebuild, as well as five start-ups and the creation of a media hub in Tbilisi, Georgia. Since the increase in anti-press legislation in Russia starting from 4 March, even the use of the word "war" can result in a 15-year prison sentence.

      EXCERPT: The JX Fund - European Fund for Journalism in Exile, in collaboration with the Voronezh Mass Media Defense Center, has launched the information platform Shpargalka | Exile (‘cheat sheet’ in Russian) to assist threatened media professionals in Russia in selecting a country of exile that is appropriate for them and their needs. The platform gives answers to 21 of the most pressing questions, which are given by lawyers from 12 countries.

      LINK: https://rsf.org/en/cheat-sheet-media-workers-under-threat Sharpgalka | Exile: https://shpargalka-exile.web.app/

      TOPIC: Freedom of the press

      DATE: 05.09.2022.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. China accuses Washington of cyberspying on university

      TITLE: China accused Washington of breaking into computers and spying on university

      CONTENT: China accused Washington on Monday of breaking into computers at Northwestern Polytechnical University that US officials say conducts military research. Both governments complained about worrying online spying against one another.

      The National Computer Virus Emergency Response Center reported computer break-ins at Northwestern Polytechnical University in June. It stated that the center, in collaboration with a commercial security provider, Qihoo 360 Technology Co., identified the attacks back to the National Security Agency, but did not specify how.

      China accuses the US of spying on universities, energy companies, and internet service providers, among other targets. Washington accuses Beijing of stealing commercial secrets and has charged Chinese military officers with crimes.

      According to Foreign Ministry spokeswoman Mao Ning, the US actions "seriously endanger China's national security." She also accused Washington of using spyware to eavesdrop on Chinese phone calls and stealing text messages.

      As per the security experts, the ruling Communist Party's military wing, the People's Liberation Army, and the Ministry of State Security also fund outside hackers. Alongside with Russia, China and the United States are widely acknowledged as global leaders in cyberwarfare research.

      TOPIC: Cyberconflict and warfare, Cybercrime

      EXCERPT: Chinese government accused Washington of cyberspying on Monday. Northwestern Polytechnical University in June has suffered computer break-ins, according to The National Computer Virus Emergency Response Center. China also accuses the US of spying on universities, energy companies, and internet service providers, among other targets. It stated that the center, in collaboration with a commercial security provider, Qihoo 360 Technology Co., identified the attacks back to the National Security Agency, but did not specify how.

      DATE: 05.09.2022.

      LINK: https://abcnews.go.com/Technology/wireStory/china-accuses-washington-cyber-spying-university-89343366

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. U.S. reporters wary of online, legal threats in the wake of the overturn of Roe v. Wade

      TITLE: In the aftermath of the Roe v. Wade decision, US journalists are wary of online legal threats

      CONTENT: The editors of the pro-abortion rights news website Rewire unusually removed reporter biographies from the site in May.

      The move was made as a precaution after a draft of a majority Supreme Court opinion in Dobbs v. Jackson Women's Health Organization, which sought to overturn the constitutional right to abortion, was leaked. Rewire reporters were concerned about an increase in online harassment.

      Editor-in-chief Galina Espinoza said that: ‘The newsroom has for years kept a repository of harassing messages to track patterns, just in case.’ The current abortion situation in America has some abortion reporters on edge.

      In addition to their fears about online harassment, reporters notified Committee to Protect Journalists (CPJ) that they are concerned about real-world violence and how changing laws may expose them and their sources to legal threats in the aftermath of the Supreme Court's decision to overturn Roe v. Wade in June.

      EXCERPT: U.S. reporters shared their concerns with Committe to Protect Journalists (CPJ) about online harassment they face. However, it does not ned there. They are now even concerned about real-world violence in the aftermath of the Supreme Court’s decision to overturn Roe v. Wade in June. The current abortion situation in America has some abortion reporters on edge. The Rewire newsroom is keeping a repository of harassing messaged to track patterns.

      LINK: https://cpj.org/2022/09/u-s-reporters-wary-of-online-legal-threats-in-the-wake-of-the-overturn-of-roe-v-wade/

      DATE: 01.09.2022.

      TOPIC: Freedom of the Press, Freedom of expression

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. New ransomware hits Windows, Linux servers of Chile govt agency

      TITLE: Ransomware attack hits Windows, Linux servers of Chilean government agency

      CONTENT: Chile's national computer security and incident response team (CSIRT) has confirmed that a ransomware attack has affected the country's government agency's operations and online services.

      The attack began on Thursday, August 25, and targeted the agency's Microsoft and VMware ESXi servers. The hackers offered Chile’s CSIRT a communication channel through which they could negotiate the payment of a ransom that would prevent the files from being leaked. The malware used in this attack, according to CSIRT, also had functions for stealing credentials from web browsers, listing removable devices for encryption, and evading antivirus detection via execution timeouts.

      In their announcement, Chile's CSIRT does not title the ransomware group responsible for the attack, nor does it offer enough information to identify the malware. Because it has been used by multiple threat actors, the extension appended to the encrypted files provides no clue. Very limited information provided by Chile's CSIRT on the malware's behavior points to the 'RedAlert' ransomware (aka "N13V"). Nevertheless, indicators of compromise (IoCs) in the announcement could be associated with Conti.

      According to what Chilean threat analyst Germán Fernández told BleepingComputer, the strain appears to be entirely new, and the researchers he spoke with were unable to associate the malware with known families. Based on what BleepingComputer has learned so far about this ransomware, it is a new operation that began in early August.

      EXCERPT: BleepingComputer learned about a brand new ransomware operation that started in August, targeting Chile's national computer security and incident response team (CSIRT). The hackers have affected the agency's Microsoft and VMware ESXi servers with their operations. According to CSIRT, the malware used in this operations had functions for stealing credentials from web browsers, listing removable devices for encryption, and evading antivirus detection via execution timeouts.

      LINK: https://www.bleepingcomputer.com/news/security/new-ransomware-hits-windows-linux-servers-of-chile-govt-agency/

      DATE: 01.09.2022.

      TOPIC: Cyberconflict and warfare

      COUNTRY: Chile

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. China-Taiwan military tension fuels an active cyberwar

      TITLE: Military tensions between China and Taiwan fuel an active cyberwar

      CONTENT: The world was relieved when tensions between China and Taiwan did not escalate into a larger military engagement in August. Nevertheless, both countries are influenced by an active cyberwarfare.

      According to researchers at threat intelligence firm Cyberint, cyber activity between China and Taiwan is defined by multi-vector attacks, similar to what experts have observed happening between Russia and Ukraine. Based on a recent report, cyber tensions are high, and the number of national-level cyberattacks targeting China and Taiwan has recently significantly increased. Cyberint Research Team states that the growing number of cyberattacks will encourage more competing hackers organizations, raising the risk of an escalating cyber conflict.

      One obvious sign of increased activity, according to the researchers, is the increasing number of comments on Chinese and Taiwanese breaches in cybercriminal leak forums, with the number of comments on Chinese data leaks increasing four times in July compared to June. When it comes to Taiwan, the number of comments under data leaks from its companies also increased during July.

      The new tactic may eventually lead to a gradual increase from minor cyberattacks on government websites to more serious crimes involving hacking of critical infrastructure. If the cyber conflict between Taiwan and China resembles what happened in Ukraine, China should prepare its infrastructure to withstand a series of new of distributed denial-of-service (DDoS) attacks.

      EXCERPT: Even though military tensions between China and Taiwan have not escalated, there is an ongoing cyber war between them. The engagement in these attacks is similar to the ones in Ukraine and Russia, and there are clear signs that there is an increasing number of comments on Chinese and Taiwanese breaches in cybercriminal leak forums. The new tactic may include a gradual increase from minor cyberattacks on government websites to more serious crimes involving the hacking of critical infrastructure.

      DATE: 01.09.2022.

      LINK: https://cybernews.com/news/china-taiwan-military-tension-fuels-an-active-cyberwar/

      TOPIC: Cyberconflict and warfare

      COUNTRY: China, Taiwan

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Military tensions between China and Taiwan fuel an active cyberwar

      CONTENT: The world was relieved when tensions between China and Taiwan did not escalate into a larger military engagement in August. Nevertheless, both countries are influenced by an active cyberwarfare.

      According to researchers at threat intelligence firm Cyberint, cyber activity between China and Taiwan is defined by multi-vector attacks, similar to what experts have observed happening between Russia and Ukraine. Based on a recent report, cyber tensions are high, and the number of national-level cyberattacks targeting China and Taiwan has recently significantly increased. Cyberint Research Team states that the growing number of cyberattacks will encourage more competing hackers organizations, raising the risk of an escalating cyber conflict.

      One obvious sign of increased activity, according to the researchers, is the increasing number of comments on Chinese and Taiwanese breaches in cybercriminal leak forums, with the number of comments on Chinese data leaks increasing four times in July compared to June. When it comes to Taiwan, the number of comments under data leaks from its companies also increased during July.

      The new tactic may eventually lead to a gradual increase from minor cyberattacks on government websites to more serious crimes involving hacking of critical infrastructure. If the cyber conflict between Taiwan and China resembles what happened in Ukraine, China should prepare its infrastructure to withstand a series of new of distributed denial-of-service (DDoS) attacks.

      EXCERPT: Even though military tensions between China and Taiwan have not escalated, there is an ongoing cyber war between them. The engagement in these attacks is similar to the ones in Ukraine and Russia, and there are clear signs that there is an increasing number of comments on Chinese and Taiwanese breaches in cybercriminal leak forums. The new tactic may include a gradual increase from minor cyberattacks on government websites to more serious crimes involving the hacking of critical infrastructure.

      DATE: 01.09.2022.

      LINK: https://cybernews.com/news/china-taiwan-military-tension-fuels-an-active-cyberwar/

      TOPIC: Cyberconflict and warfare

      COUNTRY: China, Taiwan

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Ragnar Locker ransomware claims attack on Portugal's flag airline

      TITLE: TAP Air Portugal hit by ransomware: Ragnar Locker claims responsibility

      CONTENT: The Ragnar Locker ransomware gang has claimed responsibility for an attack on Portugal's flag carrier, TAP Air Portugal, which was revealed by the airline after its systems were compromised on Thursday night.

      The company stated that the attack was stopped and that no evidence suggested that the attackers gained access to the customer data stored on the affected servers. The airline also issued an alert on Monday, stating that its website and app are unavailable due to the Thursday ransomware attack.

      TAP has yet to confirm whether this was a ransomware attack. However, the Ragnar Locker ransomware gang posted a new entry on their data leak website today, claiming responsibility for last week's cyberattack on TAP's network.

      The ransomware group believes to have "reasons" to assume that hundreds of Gigabytes of data were compromised in the incident and has threatened to provide "irrefutable evidence" to negate TAP's claim that its customers' data was not accessed. Ragnar Locker also shared a screenshot of a spreadsheet that appears to contain customer data stolen from TAP's servers, such as names, dates of birth, emails, and addresses.

      DATE: 31.08.2022.

      EXCERPT: The Ragnar Locker ransomware gang claims responsibility for the ransomware attack on Portugal’s flag carrier, TAP Air Portugal. The company itself says that the attack was prevented, and customers’ information has been untouched. On the other hand, the ransomware gang states that they can easily provide evidence that the data has been compromised.

      LINK: https://www.bleepingcomputer.com/news/security/ragnar-locker-ransomware-claims-attack-on-portugals-flag-airline/

      TOPIC: Cyberconflict and warfare, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  7. Aug 2022
    1. TITLE: Saudi woman sentenced to 45 years in prison for social media posts

      CONTENT: A Saudi Arabian court convicted Nourah bint Saeed al-Qahtani to 45 years of prison time for posts on social media, according to a rights group. According to a Washington-based DAWN organization, she was convicted by the Saudi Specialized Criminal Court on charges of ‘using the internet to tear the (Saudi) social fabric’ and for ‘violating public order by using social media.’

      DAWN stated that almost nothing is known about Qahtani or even what her social media posts stated and that the investigation into her case was ongoing. Salma al-Shehab, a mother of two and doctoral candidate at the University of Leeds in the United Kingdom, was sentenced to 35 years in prison for following and retweeting dissidents and activists on Twitter just a few weeks before Qahtani's conviction.

      According to Abdullah al-Aoudh, Director of Research for the Gulf Region at DAWN, Saudi authorities used "abusive" laws in both the Shebab and Qahtani cases to target and sanction Saudi citizens for opposing the government on Twitter.

      According to what Saudi officials told Reuters last month, the kingdom has no political prisoners, and the thought of it is ridiculous. On the other hand, a request for comment was not responded to by the Saudi government's media office.

      LINK: https://www.reuters.com/world/middle-east/saudi-woman-gets-45-year-prison-term-social-media-posts-rights-group-2022-08-30/

      DATE: 30.08.2022.

      EXCERPT: Saudi Arabian woman, Nourah bint Saeed al-Qahtani, has been sentenced to 45 years in prison for her posts on social media platforms. A few weeks before that, another woman, Salma al-Shehab was sentenced to 35 years in prison for following and retweeting dissidents and activists on Twitter. A Washington-based DAWN organization is still investigating into al-Quahtani’s case, as it is not clearly known what her posts contained. Presumably, she criticized the government. Saudi authorities are using abusive laws to punish citizens who dare to oppose the rulers.

      TOPIC: Freedom of expression

      COUNTRY: Saudi Arabia

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. UK Spies Fund New Course for Female Coders

      TITLE: UK Spies are funding a new course for female coders

      CONTENT: With a new bootcamp course, the UK's main intelligence agency for dealing with cyber-threats hopes to attract more female coders to its workforce. GCHQ is sponsoring one of Code First Girls' 14-week 'nanodegree' courses, which are designed to appeal to women considering a career switch.

      According to Jo Cavan, the security agency's director of strategy, policy, and engagement, teams such as counter-terrorism have performed better since becoming more diversified. Cavan claims that one key area where GCHQ needs more diversity is in countering threats from the east. She also added: ‘We have been working hard to increase that number so we have more diverse teams and better get across the threats we need to today.’

      According to the certification organization ISC2, women still make up only 25% of cybersecurity roles global level. When it comes to its 2021 industry report, fewer women (38%) than men (50%) came from an IT background, while women have higher rates of entry through self-learning than men (20% vs. 14%). These figures suggest that there may be a sizable group of female job seekers looking to change careers to one that involves cyber.

      LINK: https://www.infosecurity-magazine.com/news/uk-spies-fund-new-course-for/

      DATE: 30.08.2022.

      TOPIC: Gender rights online

      EXCERPT: The UK’s main intelligence agency for dealing with cyber-threats is aiming to attract more female workers, in order to increase diversity. Studies have shown that teams such as counter-terrorism have performed better since becoming more diversified. In this article, you can also see the percentage of women in cybersecurity roles and the level of their entry through self-learning compared to men. The information is provided by the certification organization, ISC2.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Chinese hackers use ScanBox malware to target the Australian government

      CONTENT: Threat actors based in China have been targeting Australian government agencies and wind turbine fleets in the South China Sea by directing select individuals to a fake news media outlet impersonating an Australian news outlet. The sender pretended to be an employee of the hoax media outlet "Australian Morning News," with a link leading to the malicious website. The site included plagiarized content from legitimate news websites.

      Victims started arriving at the fraudulent site after receiving phishing emails with appealing lures, and the ScanBox reconnaissance framework delivered a malware payload. From April to June of this year, the campaign targeted individuals at local and federal Australian Government agencies, Australian news media organizations, and global heavy industry manufacturers which provide maintenance to wind turbines in the South Chinese Sea.

      Proofpoint and PwC (PricewaterhouseCoopers) security researchers who observed the campaign concluded that the goal was cyberespionage. They attribute the activity with moderate confidence to a Chinese-based threat group known as APT40 (a.k.a. TA423, Leviathan, Red Ladon).

      LINK: https://www.bleepingcomputer.com/news/security/chinese-hackers-target-australian-govt-with-scanbox-malware/

      EXCERPT: China-based actors have been targeting Australian government agencies and wind turbine fleets by directing individuals to a fake media outlet, pretending to be an Australian media outlet. The site they were led on, contained plagiarized information from legitimate news websites. From April to June 2022, the campaign targeted individuals at local and federal Australian Government agencies, Australian news media organizations, and global heavy industry manufacturers working to maintain wind turbines in the South Chinese Sea.

      TOPIC: Cyberconflict and warfare, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Acronis’ Mid-year Cyberthreat Report warns that global ransomware damage will exceed $30bn by 2023

      CONTENT: Switzerland-based cybersecurity company Acronis reported in its Mid-Year Cyberthreat Report, published on August 24, that almost half of breaches during the first six months of 2022 involved stolen credentials. The primary goal of cybercriminals using these credentials is to launch ransomware attacks, which remain the number one threat to large and medium-sized businesses, including government organizations, the report says.

      Acronis found that out of 600 malicious email campaigns in the first half of 2022, 58% were phishing attempts, and 28% featured malware. Unpatched or software vulnerabilities are now also being targeted by cybercriminals in order to extract data, with a recent increase in Linux operating systems and managed service providers (MSPs) and their network of SMB customers.

      The Swiss firm is highlighting: ‘Ransomware is worsening, even more so than we predicted.’ They also mentioned Conti and Lapsus gangs as the prime targets for international security services. It is expected that global ransomware damage will exceed up to $30bn by next year.

      EXCERPT: Swiss-based cybersecurity company Acronis reports in their Mid-Year Cyberthreat that the first six months of this year involved stolen credentials. With hacking methods in development, like targeting unpatched or software vulnerabilities, and malicious email campaigns, ransomware is worsening. It is excepted that global ransomware will exceed up to $30bn by 2023.

      LINK: https://www.infosecurity-magazine.com/news/ransomware-exceed-30bn-dollars-2023/

      TOPIC: Cybercrime, Cyberconflict and warfare

      DATE: 29.08.2022.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Montenegro says Russian cyberattacks threaten key state functions

      TITLE: Montenegro suspects the cyberattacks are coming from Russia

      CONTENT: Cyberattacks are persistent in Montenegro and targets are the main infrastructure objects, such as electricity and water supply systems, transportation services, and online portals citizens use. At the time of writing, Bleeping Computer states that the official website of the government of Montenegro is unreachable.

      The country's Defense Minister has blamed Russian actors for the attacks, telling local media on Saturday that there is enough evidence to suspect the attack was "directed by several Russian services."

      The country's currently battling polarization which has been impacted by the current government's decision to support sanctions against Russia. This has sparked outrage from certain demographic groups and, in some cases like now, even external attacks.

      Montenegro is currently receiving assistance from NATO allies to block the attacks. Most notable efforts come from France. The country has deployed an ANSSI (French Agency for Information Systems Security) team to assist in the defense of critical systems and the restoration of compromised networks.

      DATE: 29.08.2022.

      TOPIC: Cyberconflict and warfare

      LINK: https://www.bleepingcomputer.com/news/security/montenegro-says-russian-cyberattacks-threaten-key-state-functions/

      EXCERPT: Montenegro suffers a series of cyberattacks directed toward their vital infrastructure. The country’s Defense Minister is attributing these attacks to Russia, as Montenegro decided to support sanctions against them. Currently, Montenegro receives help from NATO allies, but mainly from France.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. This could include a commitment to negotiate an international instrument on the prevention of an arms race in outer space; common principles for the governance of outer space activities; and measures to accelerate agreement on the removal of space debris, and to coordinate space traffic.

      In the Pact for the Future which should be adopted during the UN Summit for the Future to be held in September 2023, one of seven pillars is outer space.

      The UN SG aims to achieve a high-level political agreement on the peaceful, secure and sustainable use of outer space with commitment 'to negotiate an international instrument on the prevention of an arms race in outer space; common principles for the governance of outer space activities; and measures to accelerate agreement on the removal of space debris, and to coordinate space traffic.'

      You can more information in the UN SG remarks to the UN GA Consultation on 'Our Common Agenda'.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Montenegro’s digital infrastructure hit by a unprecedented cyberattack

      CONTENT: Montenegro's government digital infrastructure has been hit by a ‘unprecedented’ cyber attack, and swift measures have been taken to minimize the impact, officials said on Friday. ‘A persistent and ongoing cyber-attack is in process in Montenegro,’ The U.S. Embassy in Podgorica posted a warning on its website.

      ‘Certain services were switched off temporarily for security reasons but the security of accounts belonging to citizens and companies and their data have not been jeopardised,’ said Public Administration Minister Maras Dukaj on Twitter.

      According to Reuters, in 2016, cyber criminals also targeted Montenegro's state digital infrastructure on election day, and again several months later in 2017, as this small Balkan state prepared to join NATO.

      The Western military alliance is aware of reports of cyber attacks in Montenegro and is prepared to assist its authorities if needed, according to an unidentified NATO official quoted by Voice of America.

      EXCERPT: Montenegro’s government digital infrastructure has been hit with an unprecedented cyber attack. The hacker’s origin is still not officially known, but it woke concerns among NATO members. This is not the first time the cyber attack of this range happened in Montenegro, but it is considered to be a persistent and ongoing according to the U.S. Embassy in Podgorica.

      DATE: 26.08.2022.

      LINK: https://www.reuters.com/world/europe/montenegros-state-infrastructure-hit-by-cyber-attack-officials-2022-08-26/

      TOPIC: Cyberconflict and warfare, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: CPJ joins letters urging the U.S. government to hold the NSO Group accountable for spyware that surveilled journalists

      CONTENT: In August, the Committee to Protect Journalists joined human rights and press freedom organizations in separate actions demanding the US government to hold NSO Group accountable for providing Pegasus spyware to governments that have secretly surveilled journalists around the world. The Israeli-owned NSO Group claims that it only licenses its Pegasus spyware to government agencies investigating crime and terrorism and that it should be immune from prosecution in US courts because it acted as an agent of foreign governments under the doctrine of sovereign immunity.

      Nevertheless, according to the CPJ’s letter it is clear their actions are malicious: ‘The evidence of the use of Pegasus spyware against human rights defenders, journalists, opposition parties, and state officials by repressive regimes continues to mount, contrary to NSO Group’s claim that their spyware is used as a tool for investigating criminal activity and terrorism.’

      EXCERPT: Committee to Protect journalists (CPJ) joins the letters of human rights and press freedom organizations in their separate actions urging the U.S. government to hold the Israeli-owned NSO Group accountable for providing Pegasus spyware to governments that have secretly surveilled journalists.

      LINK: https://cpj.org/2022/08/cpj-joins-letters-urging-u-s-government-to-hold-nso-group-accountable-on-spyware/

      DATE: 25.08.2022.

      TOPIC: Freedom of expression, Freedom of the press, Cybercrime

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Ambassador Theodor H. Winkler asks, "Has The West been Sleeping?" in his article for Stratos Digital journal. His answer is positive. The West is falling behind China and Russia in many military and strategic areas.

      One reason was the West's acceptance of the "end of history" view after the Cold War. The Ukraine war serves as a wake up call.

      Ambassador Winkler shared his thoughts on both the changes in thinking about war, security, politics, and practical steps to be taken to avoid strategic sleepwalking in Western societies.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Arrest of suspected developer of Tornado Cash

      TITTLE: The Netherland's financial crime agency arrested the Tornado Cash developer.

      On August 10, the Dutch Fiscal Information and Investigation Service (FIOD) arrested Alexey Pertsev (29) as a suspect to be a developer behind the Tornado Cash online service.

      A couple of days earlier, on August 8, the US Treasury sanctioned the Tornado Cash online service and froze all of their property in hand of the US regulators. The Treasury also issued a list of cryptocurrency wallet addresses that are affected by this sanctions.

      The FIOD mentioned in the statement that 'advanced technologies, such as decentralised organisations (DAO) that may facilitate money laundering are receiving extra attention' from the financial watchdog.

      'Investigations showed that at least one billion dollars' worth of cryptocurrencies of criminal origin passed through the mixer. It is suspected that persons behind this organisation have made large-scale profits from these transactions'

      This is a rare case in which the open source developer is charged for the illicit activities that are performed on the platform he created.

      The investigation is led by the Public Prosecutor’s Office for serious fraud, environmental crime and asset confiscation.

      LINK: https://www.fiod.nl/arrest-of-suspected-developer-of-tornado-cash/

      TOPIC: Cryptocurrency, Blockchain, Legal, cybercrime,

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. U.S. Treasury Sanctions Notorious Virtual Currency Mixer Tornado Cash

      The US Treasury sanctions the cryptocurrency mixer Tornado Cash

      TITLE: The US Treasury sanctions the cryptocurrency mixer Tornado Cash

      CONTENT: On August 8th 2022, The US Treasury's Office of Foreign Assets Control (OFAC) sanctioned the online service Tornado Cash that served as a mixer for the Ether cryptocurrency since 2019. The cryptocurrency mixers are online places where users could obfuscate the origin of cryptocurrency. Mixers use utility of decentralised exchanges and peer-to-peer trading, to create massive amount of transactions in short period of time - mixing tinted coins with the rest of the online supply. Mixers don't collect any user data related to people behind the cryptocurrency funds, therefore they are in a violation of the US federal regulations, and the global AML/CFT regulation. The Treasury stated an issues of national security to be one of the reasons for such action. The FBI and the OFAC are arguing that Tornado Cash facilitated a money laundry operation for the ransomware group Lazarus attributed to the DPRK. The OFAC is calming that cryptocurrency mixer was mostly used for illicit founds. and issued a list of Ether wallet addresses that are sanctioned in this case. It is not an usual practice for OFAC to sanction online service as they main targets are individuals. The OFAC called for the cryptocurrency industry to address challenges that anonymising features can present to AML/CFT obligations.

      The Tornado Cash was decentralized entity that run on an open source code.

      EXCERPT: The US Treasury, Office of Foreign Assets Control (OFAC) sanctioned the cryptocurrency mixer Tornado Cash and

      LINK: https://home.treasury.gov/news/press-releases/jy0916

      https://home.treasury.gov/policy-issues/financial-sanctions/recent-actions/20220808 - LIST OF CRYPTOCURRENCY WALLETS

      TOPIC: Cryptocurrency, Blockchain, Legal,

      TREND:

      PROCESS:

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: RSF’s new investigation on online media attacks throughout the Brazilian election campaign

      CONTENT: Throughout Brazil's election campaign, Reporters Without Borders (RSF) will track and analyze internet threats, violence, and attacks against the media as a part of their ongoing project. The election campaign was launched on 16 August and it will end with the election of a new president, members of both houses of the national congress, governors and members of the legislative assemblies in Brazil’s states on 2 or 30 October.

      During the campaign, RSF's Latin America bureau will monitor, analyze, and denounce online attacks on journalists in collaboration with the Laboratory for Image and Cyberculture Studies (LABIC), a leading research center specializing in social media analysis and digital trends affiliated with the Federal State University of Espirito Santo.

      The results of this research will be collected and posted on the RSF website on a regular basis. Following the elections, a detailed report analyzing the main trends and attacks observed during the project will be published. The project's goal is to better understand the origin, structure, and spread of these online attacks, to expose the main perpetrators, and to find effective and long-term solutions to combat this phenomenon.

      RSF published the findings of a survey of Twitter users' behavior in 2021, the platform used for the majority of attacks against the media and journalists in Brazil. Bolsonaro supporters were the primary perpetrators of these attacks, with the main targets being female journalists and media outlets critical of the government.

      EXCERPT: RSF is planning to investigate the online attacks on Brazilian media during the ongoing election in their new project. The results will be posted on a regular basis, and after the elections end, a detailed report on main trends and attacks during the project will also be published. The main goals of this analysis are to better understand what caused the spread of these online attacks, as well to expose the main perpetrators whilst finding a solution to combat this phenomenon.

      DATE: 23.08.2022.

      LINK: https://rsf.org/en/rsf-will-analyse-online-attacks-against-media-during-brazilian-election-campaign

      TOPIC: Freedom of the press, Freedom of expression

      COUNTRY: Brazil

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. blockchain investments these top corporations made from September 2021 to mid-June 2022.

      TITLE: Research on the corporate investments in the blockchain technology for the 2021-2022 period.

      CONTENT: According to the latest research from the Blockdata company, 40 corporations invested in companies in the blockchain/crypto space during the September 2021 till June 2022.

      Korean tech giant Samsung is the most active, having an invested share in 13 companies.

      Research look at the total funding amounts of the rounds companies participated in.

      Based on this, the investors active in the biggest funding rounds are Alphabet ($1,506M in 4 rounds), Blackrock ($1,171M in 3 rounds), Morgan Stanley ($1,10M in 2 rounds), Samsung ($979M in 13 rounds), Goldman Sachs ( $698M in 5 rounds, BNY Mellon ($690M in 3 rounds), and PayPal ($650M in 4 rounds).

      EXCERPT: Approximately $6 billions invested in the blockchain based startups in 2021. Samsung and Alphabet are leading the pack followed by the financial industry corporations

      LINK: https://www.blockdata.tech/blog/general/top-100-public-companies-investing-in-blockchain-and-crypto-companies

      TOPIC: Blockchain, Cryptocurrency,

      TREND: -

      PROCESS: -

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Dominican Republic government agency was disrupted by a quantum ransomware attack

      CONTENT: The Quantum ransomware assault that affected the Instituto Agrario Dominicano in the Dominican Republic and encrypted numerous services and workstations, occurred on August 18, local media reports. ‘They ask for more than 600 thousand dollars. We were affected by four physical servers and eight virtual servers; virtually all servers,’ Walixson Amaury Núñez, the IAD's director of technology, told the local press.

      As IAD does not have enough money to pay the ransom and with only basic security software systems - the company’s data was completely compromised.

      According to the National Cybersecurity Center (CNCS), who has been helping the agency recover from the attack, the attackers' IP addresses came from the United States and Russia.

      BleepingComputer investigated the case and found out that the Quantum ransomware operation was the attacker. If IAD did not pay the ransom publicly, the threat actor, who claimed having stolen over 1TB of data, threatened to release it. This ransomware actor is supposedly an offshoot of the Conti ransomware operation which adopted the earlier name of the MountLocker ransomware operation.

      EXCERPT: Instituto Agrario Dominicano, Dominican Republic’s government agency, suffered a ransomware attack by the Quantum ransomware operation. They are threatening them with a ransom of around 650.000 dollars. As the agency is not able to afford the ransom, and with only basic software security, their data is at stake. As the National Cybersecurity Center reports, the IP addresses of the attackers come from the U.S. and Russia.

      LINK: https://www.bleepingcomputer.com/news/security/quantum-ransomware-attack-disrupts-govt-agency-in-dominican-republic/

      TOPIC: Cyberconflict and warfare, Cybercrime

      COUNTRY: Dominican Republic

      DATE: 24.08.2022.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Patrick Hillmann, chief communications officer at the world’s largest crypto exchange, Binance, claims scammers made a deepfake of him to trick contacts into taking meetings.

      The CCO of the world biggest cryptocurrency exchange, wrote about this case in his blog published on a company website. In his words: 'this deep fake was refined enough to fool several highly intelligent crypto community members”

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Russia’s Yandex to sell off news service as state tightens grip on online media

      TITLE: Russia's Yandex sells news and blogging services as state tightens control over online media

      CONTENT: In a transaction that would expand direct state control over the news that many Russians view online, the largest internet firm in Russia will sell off its news and blogging services to the state-controlled social media site VK.

      Yandex.ru's main page, which was sold together with the news aggregator and blogging platform Zen, is expected to turn into a social media-style news feed managed by Gazprom-owned VK as a result of the transaction, with its chief executive being the son of a Kremlin official tasked with integrating the occupied territories of Ukraine.

      News articles on Yandex were already perceived as having been deliberately selected to abstain from controversial subjects in Russia, particularly criticism of the war in Ukraine. By reducing Yandex's exposure to politics, the sale of the company's media holdings is reportedly an effort to protect it from the threat of western sanctions.

      LINK: https://www.theguardian.com/world/2022/aug/23/russia-yandex-sell-news-service-state-tightens-grip-online-media

      DATE: 23.08.2022.

      TOPIC: Freedom of the press

      COUNTRY: Russia

      EXCERPT: Russia’s Yandex sells its news and blogging services to the state-controlled social media site VK. Yandex.ru’s main page is expected to turn into a social media-style news feed managed by Gazprom-owned VK, as a result of this transaction. The goal was reportedly an effort to loosen up the threats from western sanctions.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Greece’s largest natural gas distributor DESFA suffered ransomware-related data breach

      CONTENT: Greece’s largest natural gas distributor (DESFA) suffered a limited scope data breach and IT system outage which were followed by a cyberattack, this Saturday.

      DESFA shared in a public statement that hackers tried to infiltrate its network, but were faced with a quick response from their IT team. Nevertheless, the attack possibly caused the leakage of some files and data and a network intrusion was definitely made, although limited. DESFA is working on returning to normal operations and is ensuring the customers this incident would not impact the gas supplies.

      The attack was confirmed on Friday by Ragnar Locker ransomware operation, a threat actor. It is said in a recent FBI report that Ragnar Locker made 52 intrusions in critical U.S. infrastructure entities since January this year.

      This ransomware actor is threatening to publish all files that would victimize DESFA, if they do not answer their demands. The timeline of this attack is tough for European gas suppliers after being cut from Russia’s natural gas.

      The upcoming period is believed to be full of shortages, power cuts, and growing energy prices, leaving everyone involved even more vulnerable to ransomware attacks against gas distributors.

      EXCERPT: DESFA, Greece’s largest gas distributor was targeted with an ransomware attack. This attack was confirmed to be made by Ragnar Locker - a ransomware operation, familiar to FBI for their previous intrusions. This attack comes at a vulnerable time for European gas suppliers after being cut from Russian gas, and it is believed that the situation will get worse if similar attack should happen in this region again.

      LINK: https://www.bleepingcomputer.com/news/security/greek-natural-gas-operator-suffers-ransomware-related-data-breach/

      COUNTRY: Greece

      TOPIC: Cyberconflict and warfare, Cybercrime

      DATE: 22.08.2022.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Jordanian journalist arrested for allegedly violating Jordan’s cybercrime law by writing posts on Facebook

      CONTENT: On August 15, Adnan Al-Rousan, a Jordanian journalist, has been arrested by seven unidentified men, with two of them being in military uniform. The reasons behind this arrest are Al-Rousan’s posts on his Facebook profile, which were considered to be ‘insulting to Jordan.’ His most recent one, on August 14, was directed towards the ruler of Jordan, King Abdullah II bin Al-Hussein, saying ‘Jordan isn’t your property, it’s for us Jordanians.’

      He is believed to be violating Jordan’s cybercrime law with these posts on social media, while regularly publishing political commentary of similar content as above mentioned. Committee to Protect Journalist asks for an immediate release of the reporter, while trying to get any contact information for the Jordanian public prosecutor.

      EXCERPT: Adnan Al-Rousan, a Jordanian journalist has been arrested for allegedly violating the country’s cybercrime law. He regularly posts on his Facebook profile, criticizing the regime. Recently he wrote a post directed towards the King Abdullah II bin Al-Hussein, which caused his arrest. Committee to Protect Journalists condemns this arrest and asks for his immediate release.

      LINK: https://cpj.org/2022/08/jordanian-journalist-adnan-al-rousan-arrested-over-critical-columns-posted-on-facebook/

      TOPIC: Freedom of the press

      DATE: 18 August 2022

      COUNTRY: Jordan

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Estonia's Battle Against a Deluge of DDoS Attacks

      TITLE: Estonia battles a series of DDoS attacks during August

      CONTENT: According to Infosecurity magazine, Estonian public authorities and businesses have been the subject of increased large-scale distributed denial-of-service (DDoS) attacks in August. The Head of the incident response (CERT-EE) department, Tõnu Tammer, said that these attacks are a daily occurrence in Estonian cyberspace. Nevertheless, the Estonian Information System Authority (RIA) is highlighting that data confidentiality is not at risk, as attackers are not able to access or change the data. On August 18, Estonia faced the most extensive cyber-attack since 2007.

      Since the start of the invasion of Ukraine, Russian stated-backed cybercriminals are believed to be the main suspect for numerous cyberattacks on neighboring countries. This is why it is advised to Governments in Eastern Europe to heighten their alerts and ensure their cyber-defenses are as robust as they can be.

      EXCERPT: Estonian public authorities and businesses are facing a large number of DDoS attacks during the month of August 2022. Infosecurity magazine has talked about this issue with Tõnu Tammer, the Head of the CERT-EE department. Estonia is not the only Eastern European country at risk of potential cyber attacks since the start of the Russian invasion on Ukraine in February this year. Strengthening cyber-defenses of these actors is highly recommended.

      LINK: https://www.infosecurity-magazine.com/news-features/estonias-battle-against-a-deluge/

      TOPIC: Cyberconflict and warfare, Cybercrime

      TREND:

      PROCESS:

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. On 5 July, the USA National Institute for Standardisation and Technology (NIST) selected candidate to become standard for Post-Quantum Cryptography (PQC)

      The new PQC standards should prevent risk that powerful quantum computing will pose to existing cryptography and encryption of digital traffic.

      It is anticipatory standard that should prevent risk that will come with deployment of quantum computing for cracking encrypted communication.

      See more here: https://csrc.nist.gov/projects/post-quantum-cryptography

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. We will now allow singular use of data alongside the plural. Specifically, when considered as a concept—as in data is the new oil—the singular will be acceptable, as well as when the data in question is considered as a mass (the data on this mobile-phone plan is insufficient). However, when data points are considered as a group of pieces of information, the plural should still be used: data from the National Oceanic and Atmospheric Administration indicate the hottest summer of all time.

      The Economist allows use of data as both singular and plural. For example, data is the new oil. But, as it was indicated 'data from the National Oceanic and Atmospheric Administration indicate the hottest summer of all time.'

      The Economist explains plural and singular use of 'data' here.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Tencent is Chinese company behind WeChat, one of the most used Internet applications. Tencent is also major gaming company globally. It has investment in hundreds of tech start-ups.

      While Tencent is strong in China, its global activiteis could be endangered by Splinternet building around Sino-American digital tensions.

      More at the Economist article.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. This is rare, optimistic, article on EU and Brussels. Author returns after 10 years to Brussels. EU survived 'decennium horribilis'.

      EU has not moved into direction of more democarcy. National governments make deals in the late night negotiations. But, while they criticise Brussels, they often pass difficult political issues to the EU.

      New mantra is 'a Europe that protects'. But the real question is if EU will manage to protect from problems that are beyond EU's power to shape.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Something for Sorina and her work on standardisation. It is a very interesting story on the way how the U.S. National Institute of Standards and Technology (NIST) works. NIST's work is explained on examples of peanut butter and marijuna/hemp.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. China is more complex politically and socially than it is portrayed in most of the Western media. The Economist brings an interesting article on neo-Maoist group 'Red song society'.

      The ruling elite walks delicate line of tolerating neo-Maoist to the point that may (in)directly criticise, especially, social policy of the Communist party.

      In this case, government-controlled media is trying to stop Red song society through economic fines for misuse of copyright-materials. This court case cannot happen without approval of the Communist Party.

      it is interesting that 'economist censorship' is becoming favourite approach in countries worldwide. Instead of closing media outliet, they are forced to close via high fines for breach of copyright law or libel.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The future of the United States will determine future of the world. In the center of America's future is future of Donalnd Trump.

      This article shows how the raid on Mar-a-Lago compound may shake the very foundation of the United States (and the world).

      Mishandling of classified document could be legally sufficient but, politically, most likely not sufficient to stop Trump's return to political leadership.

      Fasten seat belts!

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Trust your instinct. Do not overthink. Avoid 'paralysis by analysis'.

      These are some advises from the Economist. Big organisations are designed to stamp our instinct, which helped us to survive for centuries as much as our rationality. Should we rethink organisations of modern era? Could a bit of survival instinct help us to save us from crazy decision that may end humanity?

      This text opens many questions. Answers could be discovered by intuition. The first step is to decide faster, move on, reflect, adjust, and move on.

      We advanced a lot in this direction over the last few years especially on adjusting Diplo's tech and creative activities. Now, we should move to content and courses.

      Trust your guts more! There is a lot of intelligence in guts!

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Nathaniel Fick was appointed U.S. Ambassador at-large to Cyberspace Policy and Digital Policy. His new title tries to balance tensions between cyber and digital. Will he become a digital or cyber ambassador?

      It's also interesting to see that he frames digital foreign policy's approach around the traditional multilateral "trinity" architecture of security, economy and human rights.

      SECURITY: he reiterates traditional U.S. approach to cybersecurity. A new element is that it brings cybercrime in proximity to cybersecurity which the U.S. has keeping separate in international relations.

      ECONOMY: the focus is on the free flow of data, open/transparent standards, multistakeholder Internet governance, and Open RAN.

      HUMAN RIGHTS: he calls for digital freedom and inclusion.

      He also plans to develop institutional capacity in the U.S. diplomacy to follow digital/cyber topics.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Russian journalist gets a new fine for ‘discrediting’ the state’s military

      Maria Ovsyannikova, a Russian journalist, has been convicted by a Moscow court for ‘discrediting’ the Russian military. This is not her first fine, as she is well known for her famous protest against the invasion of Ukraine on live television, according to Euronews. In her Facebook posts, she often calls out the Russian authorities, saying ‘I go to the courts like I go to work.’ Ovsyannikova is just one among Russian citizens who pay fines or even serve prison time of up to 15 years if it is found out they spread the news about the Russian army or entities across borders that are considered to be ‘false.’

      You can watch the video of Ovsyannikova’s interruption of state TV news broadcast here.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. In official papers filed with Sri Lankan authorities, the investors say that in early 2020 Shamal Bandara, a Sri Lankan, and Zhang Kai, introduced to the investors as Chinese, had set up “Sports Chain”, which they said was a cryptocurrency investment platform. They are alleged to have run their operations as a Ponzi scheme, a fraudulent venture in which existing investors were paid with funds collected from new investors.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Role of Telegram and other emerging platforms in the Ukraine war

      CONTENT: There is growing concern in the Western countries that Russian propaganda in the Ukraine war is using intensively Telegram and other new social media platforms. While mainstream platforms including Twitter and Facebook/Meta exercised intensive content moderation around the Ukraine war, new platforms have more relaxed approach.

      You can consult this article for more details about the challenge of what they call 'unmoderated platform' (not currect description because all platforms are moderated to some extend).

      Topic: Content policy, Tag: Ukraine crisis Source: Lawfare

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. RSF is concerned by the appointment of Eddie Cheung as the head of Radio Television Hong Kong

      RSF dissaproves the decision Eddie Cheung’s appointment as the head of Radio Televison Hong Kong (RTHK). He was a former territory’s representative to the European Union, known for his involvement in a smear campaign against international media. He is filling the role of another political commissar, Patrick Li, who was also a bureaucrat without previous media experience, with a strong pro-Beijing commitment.

      While serving as the Special Representative for Hong Kong Economic and Trade Affairs to the EU, he signed about 58 public letters in which he accused some of major European media of ‘unfounded allegations’ on Hong Kong’s policies.

      RSF revealed the systematic censorship and information control by the Chinese regime in Mainland China and Hong Kong in their report titled The Great Leap Backwards of Journalism in China. The analysis showed that these actions pose a great threat to press freedom and democracy on a global level.

      While once being an example of well implemented press freedom, Hong Kong had a downfall from 80th in 2021 to 148th this year according to the RSF World Press Freedom Index.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Finland parliament’s website hit by DDoS launched by Russian hackers

      Yesterday, the external websites of the Finnish parliament were inaccessible for a couple of hours due to a distributed denial-of-service (DDoS) attack launched by pro-Russian hackers. They explained the reason for this attack as a response to Finland’s aspiration towards joining NATO. This hacker group called NoName057(16) took the responsibility for the attack on their Telegram channel.

      In the post, the hackers said that ‘We decided to pay a ‘friendly’ visit to neighboring Finland, whose authorities are so eager to join NATO.’ The DDoS attack happened on the same day US president Joe Biden signed ratification documents regarding Washington’s support for Finland and Sweden joining NATO.

      The Finnish parliament replied to this event with this statement: ‘A denial-of-service attack is directed against the Parliament’s external websites. […] The Parliament takes steps to limit the attack together with service providers and the Cybersecurity Center.’

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Since the fall of Kabul Afghanistan suffers from a serious lack of press freedom and women journalists are impacted the most

      Since the fall of Kabul and the creation of the Islamic Emirate of Afghanistan, the impact on media is unquestionable. During the past year, journalism in Afghanistan has been decimated. RSF secretary-general Christophe Deloire emphasizes: ‘Media and journalists are being subjected to iniquitous regulations that restrict media freedom and open the way to repression and persecution. The authorities must undertake to end the violence and harassment inflicted on media workers, and must allow them to do their job unmolested.’

      When it comes to the slaughtering of press freedom in Afghanistan, women journalists are subjected to it the most. According to RSF’s survey, in the past year, they disappeared in 11 of Afghanistan’s 34 provinces. Out of 2,756 women journalists and media workers who were employed in 2021, only 656 are working today. This downfall resulted in the percentage of 76.19% of women journalists who are no longer working in their homeland. Statistically, 84.6% of female media workers are working in the Kabul region, while recently women TV presenters were being made to cover their faces while presenting on camera. The excuses for harassing female workers are primarily accusations of ‘immorality or conduct contrary to society’s values.’

      The overall statistical report on press freedom in Afghanistan shows that both men and women have lost their jobs since the regime change. 7098 journalists are no longer employed which includes 54.52% of men. The number of media outlets also dropped, with 39.59% of them lost.

      This media situation is a reflection of Taliban governance, with the impact of the draconian regulations and the inability to respect Afghanistan’s press freedom law.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. RSF warns of violence against Iraqi reporters during protests

      Reporters Without Borders (RSF) is warning of and condemning the harassing of opposition media in Iraqi Kurdistan. RSF’s Middle East desk said that the brutality against journalists shows a complete refusal for toleration of political pluralism and a desire to suppress this popular protest.

      The violence is used as a tool for dispersing not only protesters, but also the journalists who cover it. RSF has gained the information from Metro Center, an NGO that defends journalists’ rights in Iraqi Kurdistan, that there are a total of 78 violations against 60 journalists, including searching, detaintment, prevention from covering protests, and equipment confiscation.

      These protests are called by the New Generation leader, Shaswar Abdalwahid in order to demand elections and to denounce “corruption, poverty and unemployment.” Consequently, out of the 26 journalists who were detained shortly, at least ten work for NRT, a TV channel owned by Abdalwahid.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Diplomats are also managers but they are rarely trained in management skills.

      Junior diplomats have often to manage local staff. Heads of missions have to manage complete mission from human resources to financial issues.

      This article reflects on unique role of Deputy Chief of Mission (DCM) which has to manage diplomatic mission. This role becomes particularly complex and, often, difficult is the head of mission is political appointee as it is often the case in the US diplomacy.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. A new U.S. Strategy Towards Sub-Saharan Africa outlines the US priorities in the growing competition for Africa with, in particular, China.

      Digitalisation plays an important role as an 'accelerator' of sustainable development.

      The U.S. strategy focuses on a few issues on digital ecosystem aimed at building open, reliable, Interoperable, and secure Internet.

      • digitalisation of financial services and records;
      • building infrastructure: undersea cables, expanding of a number of data centres.
      • investing in digital business in Africa
      • cole for Open RAN technology for telecom infrastructure relates to Huawei monopoly and proprietary technology
      • digital democracy and fight against digital authoritarianism
      • fight against disinformation and gender-based online harassment
      • establish standards for responsible conduct in cyberspace.
      • building skills and knowledge through training and courses in science, technology, engineering, and math.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Belarusian journalists face threats in a repressive regime

      Since Alexander Lukashenko’s controversial reelection in August 2020, Belarusian journalists have faced various threats, which forced them to adapt in order not to be silenced.

      RSF’s partner, the Belarusian Association of Journalists (BAJ), noted that around 400 journalists have fled to neighboring countries, such as Poland, Ukraine, and Lithuania. The ones who stayed in their homeland, face difficulties on a regular basis, using the encrypting messaging app Telegram as a main tool.

      Starting from 2020 the Belarusian authorities have changed certain laws to the extent of legally infringing freedom of the press. Living in this atmosphere, Belarusian journalists have been the subjects of around 500 arrests, fines, censorship, threats, searches, prison sentences, mistreatment, torture, and reprisals against loved ones, as RSF states. Even exiled journalists live in fear of being kidnapped, thus deciding to work anonymously.

      RSF is giving Belarus 153rd place out of 180 countries in their 2022 World Press Freedom Index.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. RSF welcomes a series of presidential pardons in Egypt with the warning about more than 20 journalists are still detained

      RSF is praising the release of seven prisoners in Egypt at the end of last month. Nevertheless, these releases come as a government’s part of a five-year ‘National Strategy for Human Rights’ started in September 2021. Its aim is to promote reforms that should result in an increase of freedoms for Egyptians, including press freedom. The United States is donating Egypt $1.3 billion in military aid each year and another $130 million is conditioned on respect and implementation of human rights, thus encouraging the Egyptian government to give presidential pardons.

      RSF notes that despite these releases, around 20 journalists are still in jail. Some of them are the bloggers “Mohamed Oxygen” and Alaa Abdel Fattah, a freelance photographer Alia Awad, and four Al Jazeera journalists – Rabie El-Sheikh, Ahmed El-Nagdy, Bahaa Ed-Din Ibrahim, and Hesham Abdel Aziz. Fattah and several of his fellow detainees were even considering ‘group suicide’ as they were not on the list of pardoned prisoners.

      Al-Manassa, an independent Egyptian news website, has been inaccessible in Egypt since last month, while more than 500 other websites have been blocked from online access since 2017, which includes the RSF.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Five years since the launching of the U.S. Press Freedom Tracker

      Five years ago, on this day, the United States have launched the U.S. Press Freedom Tracker, a joint project of the Press Foundation and the Committee to Protect Journalists.

      In six years of documentation, this database for press freedom violations in the United States has documented nearly 1000 assaults of journalists and 300 arrests od detainments, above 50 border stops and 250 reports of damaged equipment. More than 100 analyses regarding press freedom issues were published.

      This year, the site went through a major redesign. It has new data visualization capabilities and increased speeds for downloading data. The Traker gives both live view of aggression against the media while capturing trends over time. That is how the Tracker can give information that by the time the former president Trump was banned from Twitter, he posted 2520 tweets degrading journalists and the media.

      With Tracker as a press freedom watchdog, state of press freedom in the U.S. will be monitored and served more easily in the future.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Iraqi journalists were attacked by security while covering Baghdad protests

      On July 30, three journalists who work for the privately owned Al-Mayadeen news broadcaster were attacked and injured during protests in Baghdad’sn Green Zone by supporters of Iraqi Shiite cleric Muqtada al-Sadr, according to Committee to Protect Journalists (CPJ) information.

      Flash-bang grenades were thrown by the security forces and they hit Al-Mayadeen’s videographer Zaid Khaled Jomaa and Baghdad bureau chief and reporter Abdulah Badran. The third victim of the attacks was videographer Abdullah Saad who was shoved to the ground by riot police officers, being left with injured leg and ankle.

      CPJ’s Middle East and North Africa senior researcher, Justin Shilad, alarms that Iraqi authorities must protect journalists that are covering protest and allow them to report about political situation in Iraq freely and safely. He also noted that Iraqi journalists are doing essential work in life threatening circumstances in order to inform the public, thus authorities need to provide them work without fear.

      CPJ has received information that the three journalists often face risks when they report and Iraqi security forces regularly fail to differentiate protesters from journalists. The Iraqi Ministry of Interior had no comment on CPJ’s email.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Several Taiwanese government websites hit with cyberattack on the eve of Pelosi’s visit

      A couple of hours before U.S. House Speaker, Nancy Pelosi was expected to visit Taiwan, several Taiwanese government websites were down.

      This cyberattack was reported shortly before Pelosi’s plan to visit Taiwan, with its controversial relations with China, claiming it as its own. Therefore, the Chinese government threatened to act if the visit happens.

      On Tuesday evening, the official websites of Taiwan’s government and its presidential office were blocked from use. It was confirmed by the office spokesperson that the president’s site was hit by an overseas malware attack. It was restored after 20 minutes.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Man with rifle arrested near Iranian-American journalist’s home

      An Iranian-American journalist and women's rights activist, Masih Alinejad, was a potential target to a man who was found near her home in New York with a loaded rifle. Fortunately, he was arrested and Alinejad expressed her shock to learn what happened.

      She is known for promoting videos of women violating Iran’s head covering law to her millions of social media followers. It was said that the same journalist was a target of a Tehran-backed kidnapping plot last year. What she had to say about this to Reuters was: ‘What the Iranian regime did, first trying to kidnap me and now sending someone here trying to kill me, it's a pattern. It's a continuation of their way of oppressing dissidents inside and outside Iran...I'm not scared of them and I'm going to continue my fight against gender apartheid. Because I didn't do anything wrong, I'm not a criminal, my crime is just giving voice to voiceless people.’

      Tehran has dismissed all allegations of involvement in the kidnapping.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. UNICEF’s new analysis: ‘Protecting Children in Cyberconflicts’

      In this rapid analysis, UNICEF made 5 important questions: How are AI technologies and the use of cyber operations changing the nature of conflict? Who are the actors in cyberconflict? What types of risks do offensive cyber operations pose to children? What legal and other provisions exist to protect children from harm caused by cyberconflict and where are the gaps? What should organizations working for and with children do to strengthen protections in cyberconflict? The ones we will focus on in this update are the last three questions. Firstly, it is important to focus on question number 3 - What types of risks do offensive cyber operations pose to children? As UNICEF experts highlighted the most important ones are:

      Behavioral surveillance, profiling, and targeting of children during conflict operations. Behavioral engineering as a potential pathway to child recruitment into and use by armed forces and non-state armed groups. Information operations and their impact on children. Health and biotech sectors. Education sector (‘Large-scale, multi-vector attacks could increasingly infect myriad layers of schools’ digital systems…’). Critical industrial control systems in urban environments. Cyber threats to humanitarian datasets and services critical to child well-being and protection.

      Question number 4 focuses on - What legal and other provisions exist to protect children from harm caused by cyberconflict and where are the gaps? UNICEF notes that attributing responsibility for child rights violations while protecting sensitive information from digital manipulation and theft is crucial. ‘Many analysts would argue that the combination of IHL, international criminal law, human rights law, and child rights law are adequate to address the emerging issues posed by cyberconflict and the technology it involves. Nevertheless, several key challenges persist.’

      Question number 5 - What should organizations working for and with children do to strengthen protection in cyberconflict? It is necessary to engage with normative policy development processes. UNICEF sees OEWG (Open-Ended Working Group) as an important platform for dialogue for States to develop norms to strengthen children's rights protection from cyber attacks. It is important to further strengthen understanding of the potential risks to children of cyberconflict as well. What also is an obligation of States is the reinforcement of normative and legal frameworks to strengthen child protection during cyberconflict and translating them into action. The last two that were mentioned were the strengthening of monitoring and investigation mechanisms and defining corporate responsibility in cyberconflict.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Australian reporter left Afghanistan after Taliban forced her to withdraw reports on forced marriages

      Lynne O’Donnell, an Australian journalist for Foreign Policy Magazine, said this week that the Taliban threatened to put her in jail if she did not withdraw stories criticizing the organization.

      She spent several years in Afghanistan as a resident correspondent before the U.S. retreated her from the country last year. She then returned within the last week to report on the Taliban practices of forced marriages with teenage girls.

      After writing some tweets and articles about the topic, Taliban officials started to pressure O’Donnell, influencing what she wrote. She stated that the tweets written on Tuesday were made by the Taliban: ‘l apologize for 3 or 4 reports written by me accusing the present authorities of forcefully marrying teenage girls and using teenage girls as sexual slaves by Taliban commanders. This was a premeditated attempt at character assassination and an affront to Afghan culture.’

      The concerned journalist left Afghanistan after these happenings, claiming it was inevitable: “If I did not, they said, they’d send me to jail. At one point, they surrounded me and demanded I accompany them to prison. Throughout, a man with a gun was never far away.”

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Title: Data centres need more space in Frankfurt

      Frankfurt is the major European data hub, with more than 60 data centres covering 64 hectares.

      One of the main reasons for this high concentration of data centres is the proximity of the main Internet exchange hub in Frankfurt, which processes most of the European internet traffic.

      Fast expansion of data hubs triggered reaction of local authorities. In the new urbanist plan, they would like to restrict space for data centres. As you can see from the enclosed article, this proposal triggered a reaction from the German Datacenter Association arguing, among others, that the restriction for the growth of data centres could endanger digitalisation processes in Germany.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  8. Jul 2022
    1. Internet business model based on advertising is under the strain after 'golden' time during the shift to online at pandemics time. In 2021, online advertising growth was 38% compared to average growth of 21%.

      There are the following reasons why online advertising growth won't continue:

      • online advertising is becoming mature industry with saturated offer.
      • growing pressure on privacy and data protection reduces use of tools for targeted advergising.
      • Apple's change to the privacy setting on Iphones that prevents tracing of effect of advertising compaign affected many companies. For example it reduced Meta/Facebook annual revenue for $20 billion (8%).

      Meta/Facebook and smaller companies are most affected by slow down in online advartising. Google is doing well as it builds advertising around search engine, more traditional approach to online advertising.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The enormous economic power of tech companies that threatens market competition triggered the US Congress initaitive on the American Innovation and Choice Online Act. This act is proposed in bi-partisan mode, but it does not enjoy, yet, overwhelming support.

      The Act is championed by Senator Amy Kobuchar from the Democratic Party.

      The main provision of the proposed act is that online platforms with more than 50 million monthly active users or 100,000 U.S.-based monthly active users would be blocked from putting their products and services ahead of a different business if it materially harms competition.

      In this respect, the Act aims to 'mimic' approach from the EU's Digital Market Act.

      The voting on this Act will be also test of the power of tech companies to block the US Congres legislation that may harm their interests.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Title: DeepMind uses AI to predict the structure of almost all proteins. Text: DeepMind, in partnership with the European Molecular Biology Laboratory's European Bioinformatics Institute, has released predicted structures for nearly all catalogued proteins known to science. The announcement comes a year after the two partners released and open-sourced AlphaFold – an artificial intelligence (AI) system used to predict the 3D structure of a protein – and created the AlphaFold Protein Structure Database to share this scientific knowledge with the researchers. The database now contains over 200 million predicted protein structures, covering plants, bacteria, animals, and other organisms. It is expected to help researchers advance work on issues such as neglected diseases, food insecurity, and sustainability.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Saudi prince’s meeting with Macron despite Khashoggi murder and imprisonment of 27 journalists

      The meeting between the French president Emmanuel Macron and Saudi Crown Prince Mohammed bin Salman is supposed to be held tomorrow in Paris on 28 July. What seems to be the concern of RSF (Reporters Without Borders) is that 4 years passed since journalist Jamal Khashoggi was murdered. 27 journalists and bloggers are currently detained in Saudi Arabia, thus RSF asks Macron to negotiate with Mohammed bin Salman to release them.

      It is worrying that the prince of Saudi Arabia is engaging in international relations promoting truth and justice. The involvement of Mohammed bin Salman in Khashoggi’s murder has been confirmed by the UN special rapporteur Agnès Callamard and a CIA report in 2021.

      RSF put the Saudi Arabian prince on their list of predators of press freedom, due to waves of arrests of journalists starting from his appointment in 2017 and his brutal response to the freedom of speech.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Frequent violence against media in Greece

      In the past three years, there were 11 attacks against Greek journalists and media accused of spreading government propaganda. The latest attack was on a building in Athens that houses Real FM news radio and the weekly RealNews on 13 July. An anarchist group calling themselves ‘Thousands of Night Suns’ confirmed the involvement on 20 July, dedicating this attack to two anarchist activists, and blaming Real for supporting political propaganda.

      It is crucial that the Greek government speeds up the implementation of the interministerial memo on journalists’ safety and the European Commission’s September 2021 recommendations. Despite what Greek Prime Minister Kyriakos Mitsotakis says about the need for conviction of perpetrators, most attacks on press freedom remain unpunished.

      Journalists in Greece are not exposed only to violent attacks of this kind, being a target of organised crime. That is why Greece is placed the lowest in RSF’s 2022 World Press Freedom Index out of all EU countries, being 108th out of 180.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Intensification of cyberwar between Iran and Israel

      Three of Iran's state-owned biggest steel companies stopped working after facing cyberattacks in late June. These biggest steel companies were attacked by a hacking group who admitted it on social media as a response to ‘the aggression of the Islamic Republic.’

      After that, Israel’s defense secretary ordered an investigation into the leaked video which showed the damage to the steel plants. This incident was soon followed by the Israeli Security Agency’s statement (Shin Bet) that a May cyber operation by Iran was set to be out of the cyber domain . With these two incidents, it is clear that the cyber conflict between these two countries has become more public in the previous 2 years.

      Israel and Iran shifted to a public forum and their objective has changed from defense targets to violating critical infrastructure and civilian lives. With larger public exposure, the greater the risks of extending beyond cyberspace with the influence of other areas of this conflict as well.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Yurii Shchyhol warns of a new ongoing World Cyber War

      Yurii Shchyhol, the head of the Ukrainian State Service of Special Communications and Information Protection, warns there might be an ongoing World Cyber War since the start of Russia’s invasion. Russian cyberespionage and cyberattacks since 24 February weren’t targeted only at Ukraine. Their intervention has been recorded in 42 countries across six continents, mostly from NATO and countries which supported Ukraine during this period.

      Shchyhol has stated for Politico that the world has been awakened and that countries are more willing to intensely cooperate with each other on these issues. He also advised: ‘But what we need are not further sanctions and further efforts to curb cyberattacks, we also need for global security companies to leave the market of the Russian Federation. Only then can we ensure the victory will be ours, especially in cyberspace.’

      In this interview, it was said that there is strong assistance from the U.S. Cyber Command and the National Security Agency as all of Russia's attacks are ‘an ongoing, continuous war, including the war in cyberspace.’ What Shchyhol also warns us is that despite the two-month stagnation of Russian cyber attacks, what they’re doing is just a part of their tactic in order to collect resources for another attack - which will likely be on a global level.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Russian journalists’ union close to being disbanded

      The Russian prosecutor’s office brought on a 350-page complaint against the independent Journalists’ and Media Workers’ Union (JMWU), to disband it. The union learned about the complaint on 13 July. The complaint proposes that some of the employees are foreign agents while some were accused of systematically harming the state and society with their actions.

      The reasons behind the complaint are mainly due to the fact that the JMWU publicly opposed the war in Ukraine, defended Russian journalists who were prosecuted, and criticized media censorship in their country. They also signed the ‘Perugia Declaration for Ukraine’, which confirmed their support for Ukrainian journalists.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. India's Supreme court ordered releasing of a journalist over a controversial tweet

      An Indian journalist, Mohammed Zubair, has been given the release on bail over the accusations of a “highly provocative” tweet in 2018, by India's Supreme Court. The tweet was supposedly aimed at straining ties between Hindus and Muslims. Regardless of the accusations, the tweet itself had no evidence of causing harm to the religious sentiment of Hindus.

      When he was granted bail, the court said that keeping Zubair in custody had no legal power. As a vocal critic of Indian Prime Minister Narendra Modi, Zubair and his colleagues accused the federal government of giving the police orders in silencing journalists and critics undermining the freedom of the press and speech.

      In this atmosphere, it is important to note that India is ranked 150th on the 180-country World Press Freedom Index.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Myanmar freelancer sentenced to three-years of jail by the state military court

      Nyein Nyein Aye, a Myanmar freelancer and journalist, was sentenced to a three-year prison sentence for the spread of ‘false news.’ She was also accused of causing fear and agitating crimes against a government employee. While Nyein worked for various media outlets, one of them: Mizzima News, was banned by the junta.

      Daniel Bastard, the head of RSF’s Asia-Pacific desk implied that this arrest is followed by the big wave of arrests of journalists after the February 2021 coup. He also noted that these sentences behind closed doors by military courts are similar to a factory production line. RSF’s press freedom barometer shows that she is the 24th journalist to receive a prison sentence out of the 67 media workers currently held in Myanmar’s prisons.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Biden’s message at the Arab summit on freedom of the press and democratic rights

      U.S. president Joe Biden said in his speech at the Arab summit in Saudi Arabia that the United States will keep its close partnership with the Middle East while urging leaders who attended the summit to advance human rights as a powerful source of economic and social changes. With that being said, freedom of the press and democratic rights are highlighted. He urged the necessity of releasing journalists.

      Biden sent a message to the leaders saying: ‘Accountable, accountable institutions that are free from corruption and act transparently and respect the rule of law are the best way to deliver growth, respond to people's needs, and I believe ensure justice.’

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Pakistani reporters are being harassed by the government army

      Since Shehbaz Sharif took over as a Pakistani prime minister in April, there have been a dozen reports of army-related agencies harassing the media, as RSF cautioned. Critical journalists have been a target of a major army campaign to intimidate their work, parallelly destabilizing Pakistan’s democracy.

      This serious decline in press freedom was bolstered with the latest case on 9 July when BOL news anchor, Sami Ibrahim, got attacked by three people. The next day, he posted a YouTube video, saying that the attack was planned to prevent him from filming the scene, and the attackers later left in a vehicle with clear signs of being state-owned.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Cyberwar games: Cyber Europe 2022

      One of the largest cyber crisis simulations organised by The European Union Agency for Cybersecurity (ENISA) has just been completed. With over 800 cybersecurity experts from 29 European countries and the European Free Trade Area (EFTA), it involved specialists from EU agencies and institutions as well.

      This year, the exercises involved a scenario of a simulated attack on European healthcare infrastructure and they tested how participants’ respond to incidents in coordination with EU institutions. They involve the ability of close work with CERT-EU and ENISA in order to reinforce the resilience of the healthcare sector against cyber attacks in the EU with complex business continuity and crisis management situations.

      These lessons will be published in ENISA’s ‘after-action report.’

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Costa Rica's public health system hit by Hive ransomware

      The Costa Rican Social Security Fund (CCSS), i.e. Costa Rica’s public health service was hit by Hive ransomware and forced to shut its systems down. The ransomware was deployed on at least 30 out of 1,500 government servers, CCSS told local media.

      Cybersecurity experts suggested that Hive might be working with Conti to help Conti rebrand.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Italian police thwart Eurovision cyberattack by pro-Russian hacker groups

      Italian police thwarted hacker attacks by pro-Russian hacker groups Killnet and Legion during the 10 May semi-final and 14 May final of the Eurovision Song Contest (ESC) in Turin, Italy. Russia was excluded from the competition due to what it calls its special military operation in Ukraine, while Ukraine went on to win the contest.

      Killnet denied the attack on ESC, but then declared cyberwar on 10 countries in the same Telegram post. In a separate video, the group stated that these 10 countries are ‘the US, the UK, Germany, Italy, Latvia, Romania, Lithuania, Estonia, Poland, and Ukraine.’

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. HEADLINE How future of TikTok can determine the future of the integrated Internet?

      EXCERPTS TIKTok saga will shape the future of the Internet. If TikTok is banned in the USA as a security risk, it could lead towards further disintegration of the Internet. In the same time, Chinese side has to be ready to accept higher scrutiny of TikTok algorithms and business models. By monitoring this policy issue we will monitor the future of integrated Internet.

      SUMMARY

      TikTok controversy, as the Economist put it, s a test of whether global business and the global internet can remain intact as us-China relations deteriorate.

      Context for pressure on TikTok is geopolitics and forthcoming elections in the USA. There is a concern that TikTok could be used to influence eletions.

      Is privacy protection real risk since most of TikTok data can be scraped as public data.

      The real risk that concers US is a possibility of manipuating domestic audience by company which is in Chinese ownership. For examplea quarter of American users consider TikTok to be a news source.

      TikTok algorithms that could be used for manipulation are developed mainly in Beijing.

      TikTok can address the risk of shutting down by having data held by Oracle, as already happened during Trump administration, letting third parties inspect its algorithms, including showing the source code and allowing ongoing inspection.

      According to the Economist: 'TikTok should be ultimately responsible to an independent board of its own, with members from outside China.'

      China is likely to oppose this request for supervision of TikTok's algorithms. However, by doing so, China may make this companies shut down by Western authorities. It will be one of the key decisions and trade-offs with far-reaching consequences for global Internet that China will have to make.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. OEWG agrees on modalities of stakeholder participation

      The OEWG reached agreement to apply modalities for the participation of stakeholders as proposed by the Chair on 20 April, through a silent procedure. NGOs both with and without ECOSOC status should inform the OEWG Secretariat of their interest to participate. If no state raises an objection to the Chair, NGOs will be invited to participate as observers in the formal sessions, make oral statements during a dedicated stakeholder session, and submit written inputs to be posted on the OEWG’s website. The modalities will be read out at the OEWG’s third substantive session for the formal record.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL