7 Matching Annotations
  1. Jul 2022
    1. States are engaging in a range of cyber behaviors that undermine peace and stability, but these proposed prohibitive norms do not address those behaviors. There is no reported instance of states engaging in cyber operations against another state’s cyber emergency response teams or using their teams for malicious purposes. And, although states have targeted critical infrastructure in armed conflict and non-state actors have done so in peacetime, the proposed prohibitive norms are not framed in a manner addressing that context or those actors, respectively.

      Interesting observation: that current prohibitive norms of GGE/OEWG actually mis-shoot. Example on CERTs is a good one: while this norm is important - it doesn't reflect the reality (there were no documented cases. The one on CI, however, doesn't stay: this is the major issue between US and Russia - it is a valid norm.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  2. May 2022
    1. Undersea cables carry Internet traffic across continents. They are part of the critical information infrastructure of the modern world.

      Scientists started using these cables as a global network of sensors that monitor seismic and other changes at the seabed previously beyond the reach of the scientific community.

      As Wired indicated in the recent coverage Where there's cable, there's potential data.

      Geoscientist Philippe Jousset said 'You can interrogate any fibre under the sea, covering all of the Earth'.

      Undersea cables could be also used as early-earning tools for tsunami as they can detect any tectonic shifts on the seabed.

      Source: Undersea Cables are carrying scientific secrets.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  3. Apr 2022
    1. Chinese technology companies are comparable to U.S. companies in that they tend to occupy all layers of the “technology stack”: the physical layer, the network layer, and the application layer.

      Three layers structure

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  4. Jan 2022
    1. OneWeb is one such company, and it sees the remote island as an ideal place to build ground stations for its satellite network.

      ||VladaR|| Why they need this mix of cable and satellite? Is it about relying station to strenghten signals?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  5. Sep 2021
    1. Ilya3ansjelançaisleprogrammeExtendedMonaco,pourbâtirleMonacodedemain,plusécologiqueetmieuxconnecté.Jenem’attendaispasàêtreconfortédansmadécisionaussirapidement.Mieuxpréparée,laPrincipautéasumaintenirl’activitééconomique,sesservicessociaux,éducatifsetculturels,mêmeauplusfortdelacrise.Pouryparvenir,nousnoussommesdotésd’uncadrelégislatifadéquat,d’infrastructuresperformantesetd’unehauteprotectiondesdonnées.Maislecyberespaceappelleàlavigilancedetous.Aveclacrisesanitaire,lescyber-attaquescontredesinfrastructurescivilessesontmultipliées,portantatteinteauxprincipesfondamentauxdudroitinternationalhumanitaire.

      Three years ago, I launched the Extended Monaco program, to build the Monaco of tomorrow, which is greener and better connected. I didn't expect to be comforted in my decision so quickly. Better prepared, the Principality has been able to maintain economic activity, its social, educational and cultural services, even at the height of the crisis. To achieve this, we have equipped ourselves with an adequate legislative framework, efficient infrastructures and high data protection. But cyberspace calls for everyone's vigilance. With the health crisis, cyber-attacks against civilian infrastructure have multiplied, undermining the fundamental principles of international humanitarian law.

    1. To maximize our collective response, we must buildresilience. We have to enhance the security of our supply chains, the critical infrastructure, the energy networks, as well as our preparedness for pandemics and natural disasters.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  6. Mar 2021
    1. humanitarian consequences of malicious ICT activities

      The report references humanitarian impacts of malicious cyber activities in several instances, but does not recognise the applicability of international humanitarian law.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL