17 Matching Annotations
  1. Dec 2020
    1. “Policymakers love offensive cyber, for the same reason that they love special forces and intelligence operations,” says a former senior British official, who worked closely with two prime ministers. “They are largely covert, can be deployed flexibly and don’t have to be disclosed to or debated in Parliament or the press.”

      Why policymakers love offensive cyber capacities?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  2. Nov 2020
    1. Here is Non-paper with comments. You can also find Kat's summary of discussion during the presentation of the paper: https://docs.google.com/document/d/1WMBfziLV-reEk0ky7usbj8Iz6XRVkaDrkppaUFAmaX4/edit

      ||kat_hone||||VladaR||||AndrijanaG||

    2. The Council Conclusions on EU External Cyber Capacity Building Guideline

      ||VladaR||||TerezaHorejsova|| Do we know anything about these conclusions?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Overview of Selected International Organizations andNewInitiatives

      ||AndrijanaG|| Let us include these organisations/initiatives in our Actor's page

      ||VladaR||many of them are involved in cybersecurity

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Can we find voting patterns. It will be interesting to follow voting around UN GGE and OEWG.

      Let us also make update to our process page about thes changes.

      ||AndrijanaG||||VladaR||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. And although the technology lowers the potential security threat from China, it creates new openings for hackers.

      Basically, no change here. Alleged security risks by China will be replaced by other threat actors (be they state or individual).

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. INTERPOL report shows alarming rate of cyberattacks during COVID-19

      Here you can find an interesting graph showing the distribution of cyberthreats since the pandemic outbreak. It could be useful for the cybersecurity-related session you'll moderate. ||Jovan||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  3. Oct 2020
    1. ||VladaR|| It is clear that standards are picking-up. Let us prepare for follow-up on it.

    2. US National Security Agency (NSA) established the Center for Cybersecurity Standards in order to deal with increasing dependence on commercial products to secure National Security Systems.

      The NSA Center for Cybersecurity Standards will focus on:

      • 5G Security
      • Cybersecurity Automation
      • Platform Resilience
      • Cryptographic Algorithms
      • Security Protocols

      Cybersecurity standards will play increasing relevance in digital realm.

      ||VladaR||||AndrijanaG||

      Actors: 3GPP; ATIS; IEEE; IETF; ISO; IEC; OASIS; IETF; TCG; NIST; ANSI

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. National Strategy for Critical and Emerging Technologies, issued by the President of the USA in October 2020, addresses two main areas: 1) Promoting national security innovation base: incentivise science and technology develpoment, lead the development of worldwide standards and norms that reflect democratic values, develop multistakeholder National Security Innovation Base, build technology partnerships with like-minded partners

      2) Protect technology advantage: prevent IP theft and enhance research security, require security in design, strenthen export laws and regimes for technology, engage private sector to understand future strategic vulnerabilities, secure supply chain.

      The Strategy identifies two main S&T competitors: China and Russia and their activities that may undermine the USA's interests. One of the challenges for the USA is power of the whole-of-government approach to S&T developments in China and Russia.

      On international level, the Strategy argues for adopting rules and policies reflecting the US interests as well as cooperation among like-minded countries.

      The Strategy outlines 20 critical and emerging technologies. The major breakthroughs will be happening in intersections among these technologies. Thus, the Strategy argues for the holistic approach to development of critical and science technologies.

      Other concepts promoted in the Strategy are:

      • forecasting of tech developments,
      • technology risk management,
      • research security in academic and research institutions.
      • use of export law regulations

      ||VladaR||||Jovan||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Interesting text on the shift from a maturity-based to a risk-based cybersecurity. It discusses how this shift should translate into concrete measures within companies. Some elements could be interesting for course updates, including the security module on the AI course. Perhaps also interesting for cybersecurity ||VladaR||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. digital privacy and anonymity; web security; encryption; quantum computing; AI; advertising models; digital markets and subsidies; cyber warfare; IoT; (any kind of) security; ubiquitous crap software; monopolies; a corrupted political sector driven by lobby interests; and an eviscerated public sector.

      What are the Internet problems?

    2. "The problem isn't the folk who are driving all those trucks through these gaping holes. The problem is that it was the people like me who produced insanely shitty code in the first place that made all these holes,"

      What is the problem with cybersecurity?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  4. Sep 2020
    1. ||VladaR|| This statement by Russia has a few elements:

      • confidence-building on the working/expert level
      • practical solutions
      • borrowing experience and expertise from the USA-Russia cooperation in the nuclear disarmament field.
      • while moving bilaterally - also proposing global agreement.

      ||sorina|| ||StephanieBP|| ||AndrijanaG||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  5. Aug 2020
    1. Trading emerging technologies: Security and human rights perspectives

      Vlada this could be a possible link to Geneva Dialogue (next steps) since it lnks technology, security, and human rights. Andrijana, please see if somebody can follow on this from our team. ||VladaR||||AndrijanaG||||MariliaM||||NatasaPerucica||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL