- Jul 2022
-
curator.diplomacy.edu curator.diplomacy.edu
-
States are engaging in a range of cyber behaviors that undermine peace and stability, but these proposed prohibitive norms do not address those behaviors. There is no reported instance of states engaging in cyber operations against another state’s cyber emergency response teams or using their teams for malicious purposes. And, although states have targeted critical infrastructure in armed conflict and non-state actors have done so in peacetime, the proposed prohibitive norms are not framed in a manner addressing that context or those actors, respectively.
Interesting observation: that current prohibitive norms of GGE/OEWG actually mis-shoot. Example on CERTs is a good one: while this norm is important - it doesn't reflect the reality (there were no documented cases. The one on CI, however, doesn't stay: this is the major issue between US and Russia - it is a valid norm.
Tags
Annotators
URL
-
- May 2022
-
-
Undersea cables carry Internet traffic across continents. They are part of the critical information infrastructure of the modern world.
Scientists started using these cables as a global network of sensors that monitor seismic and other changes at the seabed previously beyond the reach of the scientific community.
As Wired indicated in the recent coverage Where there's cable, there's potential data.
Geoscientist Philippe Jousset said 'You can interrogate any fibre under the sea, covering all of the Earth'.
Undersea cables could be also used as early-earning tools for tsunami as they can detect any tectonic shifts on the seabed.
-
- Apr 2022
-
www.nbr.org www.nbr.org
-
Chinese technology companies are comparable to U.S. companies in that they tend to occupy all layers of the “technology stack”: the physical layer, the network layer, and the application layer.
Three layers structure
-
- Jan 2022
-
spectrum.ieee.org spectrum.ieee.org
-
OneWeb is one such company, and it sees the remote island as an ideal place to build ground stations for its satellite network.
||VladaR|| Why they need this mix of cable and satellite? Is it about relying station to strenghten signals?
-
- Sep 2021
-
estatements.unmeetings.org estatements.unmeetings.org
-
Ilya3ansjelançaisleprogrammeExtendedMonaco,pourbâtirleMonacodedemain,plusécologiqueetmieuxconnecté.Jenem’attendaispasàêtreconfortédansmadécisionaussirapidement.Mieuxpréparée,laPrincipautéasumaintenirl’activitééconomique,sesservicessociaux,éducatifsetculturels,mêmeauplusfortdelacrise.Pouryparvenir,nousnoussommesdotésd’uncadrelégislatifadéquat,d’infrastructuresperformantesetd’unehauteprotectiondesdonnées.Maislecyberespaceappelleàlavigilancedetous.Aveclacrisesanitaire,lescyber-attaquescontredesinfrastructurescivilessesontmultipliées,portantatteinteauxprincipesfondamentauxdudroitinternationalhumanitaire.
Three years ago, I launched the Extended Monaco program, to build the Monaco of tomorrow, which is greener and better connected. I didn't expect to be comforted in my decision so quickly. Better prepared, the Principality has been able to maintain economic activity, its social, educational and cultural services, even at the height of the crisis. To achieve this, we have equipped ourselves with an adequate legislative framework, efficient infrastructures and high data protection. But cyberspace calls for everyone's vigilance. With the health crisis, cyber-attacks against civilian infrastructure have multiplied, undermining the fundamental principles of international humanitarian law.
-
-
estatements.unmeetings.org estatements.unmeetings.org
-
To maximize our collective response, we must buildresilience. We have to enhance the security of our supply chains, the critical infrastructure, the energy networks, as well as our preparedness for pandemics and natural disasters.
-
- Mar 2021
-
www.diplomacy.edu www.diplomacy.edu
-
humanitarian consequences of malicious ICT activities
The report references humanitarian impacts of malicious cyber activities in several instances, but does not recognise the applicability of international humanitarian law.
-