9 Matching Annotations
  1. Aug 2022
    1. Figure 4. U.S. ADVERSARIES ARE SPONSORING CYBERATTACKS

      Interesting breakdown of main attacks against US, including types and attributed sources ||AndrijanaG|| ||teodoramATnetwork.diplomacy.edu|| ||Pavlina||

    2. These types of attacks were, however, the exceptions. Over the last decade, most cyber operations have been attacks that violate sovereignty but remain below the threshold for the use of force or armed attack

      This is very true: most cyber attacks are sophisticated, multi-months, covert, serving for disruption or espionage, not for causing physical damage. This is changing somewhat with the power of ransomware, which caused tangible (though not physical) damage in cases like Colonial pipeline, Costa Rica state of emergency, etc.

    3. balance more targeted diplomatic and economic pressure on adversaries, as well as more disruptive cyber operations, with clear statements about self-imposed restraint on specific types of targets

      when it comes to adversaries, a combination of economic pressure and 'disruptive' (read also: offensive?) cyber operations - while respecting the OEWG/GGE norms endorsed by partners

      Question is if partners (esp. beyond EU - eg. India, Brazil) would accept that offensive approach of the US against their adversaries - even if respecting the norms and int. law?

    4. Cybercrime is a national security risk

      This is an important recognition: cybercrime used to be discussed separately from national security and int. peace and security. This won't be possible any more, because tools, tactics and procedures are similar (eg. ransomware, exploits), and resources of perpetrators are similar (eg. organised criminal groups) or adversaries are linked or work together (eg. APT groups with states).

      In that sense, keeping global dialogue about cybercrime fully separated from peace and stability won't be possible any more; there will need to be links.

      ||AndrijanaG|| ||Pavlina|| ||bojanakATnetwork.diplomacy.edu|| ||teodoramATnetwork.diplomacy.edu||

    5. The United States can no longer treat cyber and information opera-tions as two separate domains

      Another merging area: information warfare and cyber conflict. For long, the US has been pushing back strongly not to bring discussions about content into cybersecurity discussions. It was the main difference between the US and Russia/China in understanding the scope. As content becomes weapon in full sense, this won't be possible any more. Likely, US will bring the two together in discussions with like-minded partners, but not (yet) in global negotiations where their 'adversaries' are present.

      ||AndrijanaG|| ||Pavlina|| ||asokemATdiplomacy.edu||

  2. Sep 2021
    1. The silencing of guns therefore goes beyond addressing conventional warfare but also in addressing new emerging threats of our century which includes challenges of extremism and international terrorism cyber crime asymmetric warfare prorification of non-conventional weapons and organized crime as an international community we need to continue to work towards or to work together to address the root cause of these global threat through various national regional and global mechanisms
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. But on the other hand, the world has felt the effects of the misuse of cyberspace, including breaching private domains of individuals and international piracy and the serious threat it poses to the security and stability of the international community. From this standpoint, we reiterate the call for the United Nations to lead the process of unifying the efforts to prevent the misuse of the scientific progress in cybersecurity and regularize these vital aspects according to the rules of international law.

      on the misuse of cyberspace; UN to lead the efforts to prevent the misuse of cyberspace

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Cyber securityis perhaps one of our fastest growing concerns. Trendsappear to indicatean increasingdiversification ofmalicious efforts, perhapsstate-sponsoredones being the most worrisome. Particularly upsetting incidents involvecyber-attacks targetingour critical health infrastructures,alreadyexhausted in the struggle with the COVID-19 pandemic.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Third, technological developmentsand digitalisation offer solutions to many of the challenges we collectively face. In Switzerland,there is close cooperationwith universitiesand the private sector to findinnovative technological approaches for developmentand poverty reduction projects. Yet there are risksinvolved.The virtual world is not a lawless zone. Inthe GeneralAssembly, Switzerland works to promoteresponsible state behaviour and the application of international law in cyberspace. It also participates in efforts to combat cybercrime. Geneva plays a role as a global centre for digital policy and networking forthe actors involved.

      Switzerland participates in the UN efforts on cyberconflict and cybercrime; Geneva as a hub for digital policy

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL