This article was published on the GCSC website, 23 May 2019
The Global Commission on the Stability of Cyberspace held its third meeting of 2019 in The Hague, the Netherlands, on 16-17 June. The Commission meeting took place prior to EuroDIG, which was held at the World Forum in the Hague from 19-20 June 2019.
More information will follow soon on the GCSC website.
Sign up to the weekly newsletter!
This Cyberstability Update is an overview of all articles included in our Weekly Newsletters for the month. Want to receive these updates on a weekly basis? Sign up here to receive our weekly newsletter on the work of the Global Commission on the Stability of Cyberspace (GCSC), its members and developments in the field of international cyber policy.
Russia and Iran Plan to Fundamentally Isolate the Internet, WIRED.
Online piracy slows in Russia, Broadband TV News.
China’s PLA seeks to bring cyberwarfare units under one roof, South China Morning Post.
Kim Jong Un’s cyber army raises cash for North Korea, The Irish Times.
Estonia Speaks Out on Key Rules for Cyberspace, Just Security.
The GCHQ’s Vulnerabilities Equities Process, Lawfare.
Bolton Says U.S. Is Expanding Offensive Cyber Operations, The Wall Street Journal.
House’s defense bill looks to protect Pentagon’s tech supply chain, CyberScoop.
Tags: GCSC Norm to Avoid Tampering.
State Department proposes new $20.8 million cybersecurity bureau, CyberScoop.
House Democrat places hold on State Department’s move to establish cyber bureau, The Hill.
Congress to take another stab at ‘hack back’ legislation, CyberScoop.
The EU’s Embassy In Russia Was Hacked But The EU Kept It A Secret, Buzzfeed News.
Digital Brief: The power of online platforms, Euractiv.
GLOBSEC Forum: ‘No reason to protest, people have a great life’, Babis says, Euractiv.
Cyber Governance: More Spam Than Substance?, Council on Foreign Relations.
Panel Launches Report & Recommendations For Building an Inclusive Digital Future, UN Secretary-General’s High-Level Panel on Digital Cooperation.
The UN Panel on Digital Cooperation: An Agenda for the 2020s, CircleID.
Threats and Risk Mitigation
Entering the Third Decade of Cyber Threats: Toward Greater Clarity in Cyberspace, Lawfare.
Threat from technology should not be underestimated, security officials say, The National.
How Deception Technology Can Defend Networks and Disrupt Attackers, SecurityWeek.
Cyber of the fittest: Researchers develop first cyber agility framework to measure attacks, Phys.org.
Innovative Solutions to Enhance Cybersecurity, The Times of Israel.
The Economic Value of DNS Security, Global Cyber Alliance.
DNS hijacking grabs headlines, but it’s just the tip of the iceberg, CSO.
Digital risks for populations in armed conflict: Five key gaps the humanitarian sector should address, ICRC Humanitarian Law & Policy blog.
Conflict in Cyberspace
Battlefield Internet, Foreign Affairs.
Battle lines drawn in coming cyber war, DefenceWeb.
What is the Cyber Equivalent of Physical Displays of Military Strength, Gula Tech Adventures Blog.
Know your enemy and know yourself: Attribution in the cyber domain, ICRC Humanitarian Law & Policy Blog.
Public Attribution of Cyber Incidents, CSS ETH Zurich.
Deterrence in Cyberspace, Project Syndicate.
U.S. Cyber Infiltration of the Russian Electric Grid: Implications for Deterrence, Lawfare.
U.S. Cyber Command, Russia and Critical Infrastructure: What Norms and Laws Apply?, Just Security.
What a U.S. Operation in Russia Shows About the Limits of Coercion in Cyber Space, War on the Rocks.
How Not to Prevent a Cyberwar with Russia, WIRED.
Iran says it dismantled a U.S. cyber espionage network, Reuters.
Iranian Hackers Launch a New US-Targeted Campaign as Tensions Mount, WIRED.
Industry and Civil Society Developments
Should private companies be drafted in the cyber war?, The Hill.
Electric Grid Security Unites Public and Private Sectors, Government Technology.
Waterbug: Espionage Group Rolls Out Brand-New Toolset in Attacks Against Governments, Symantec.
Tags: GCSC Norm to Avoid Tampering.
The Politician Fighting The Spyware Industry, Motherboard.
Tech Giants Told To Up Their Game, As Faith In Institutions Erodes, Forbes.
Facebook announces Libra cryptocurrency: All you need to know, TechCrunch.
Russian cyber titan Group-IB makes Singapore home, Channel Asia.
Only one in 20 vulnerabilities are exploited in the wild, claim researchers, Computing.
Report: No ‘Eternal Blue’ Exploit Found in Baltimore City Ransomware, KrebsonSecurity.
Encroachment on encryption and statutory backdoors thwart IT security, ECO.
Google confirms that advanced backdoor came preinstalled on Android devices, ARS Technica.
A bug in Wi-Fi ‘extenders’ could give a hacker full control over the devices, CyberScoop.
The Highly Dangerous ‘Triton’ Hackers Have Probed the US Grid, WIRED.
CORRECTED-UPDATE 2-Messaging service Telegram CEO points to China as likely origin of cyber attack, Reuters.
It’s alive: Threat actors cobble together open-source pieces into monstrous Frankenstein campaign, Cisco Talos.
DEF CON: From Failed Party and Movie Inspiration to Global Dominance, Exabeam.
Tags: GCSC Commissioner Jeff Moss.
A Florida city paid a $600,000 bitcoin ransom to hackers who took over its computers — and it’s a massive alarm bell for the rest of the US, Greenwich Time.
Quest Diagnostics says 11.9 million patients affected by data breach, TechCrunch.
Elections and Electoral Infrastructure
Democracy & Disconnect, GLOBSEC 2019.
Election Security is Still Hurting at Every Level, WIRED.
Canada should regulate social media firms to protect election, says international group, Yahoo! News.
Voting machine giant lobbies for paper ballots over election security concerns, CNN.
Top voting machine maker reverses position on election security, promises paper ballots, TechCrunch.
Group sues for records on US election hacking vulnerability, The Washington Post.
Mitch McConnell is Making the 2020 Election Open Season for Hackers, The New Yorker.
The Cybersecurity 202: FEC poised to limit who can give political campaigns free cybersecurity help, The Washington Post.
How Our Digital Spaces Came To Be Unequal and Unsafe For Women, The Swaddle.
RightsCon 2019: UNESCO’s Internet Universality Indicators showcased as a tool for evidence-based policy making, Mirage News.
Ask the experts: Should the US have a data privacy law similar to GDPR?, Security Boulevard.
America Needs to Be More Like Europe and Regulate Information Technology, New America Panelists Agree, BroadBandBreakfast.
Former DHS Chief Sees U.S. Policy Swinging Toward GDPR, MeriTalk.
3-5 June 2019: 3rd Global Conference of the Internet & Jurisdiction Policy Network, I&J Policy Network.
4 June 2019: Data & Great Power Competition, New America.
6 June 2019: Cyber Stability Conference, United Nations Institute for Disarmament Research.
6 June 2019: Securing Our Cyber Future: Innovative Approaches to Digital Threats, Stanford Cyber Policy Center.
7-9 June 2019: CyFy Africa, ORF.
11-14 June 2019: RightsCon Tunis 2019, Access Now.
16-17 June 2019: Global Commission Meeting in The Hague, GCSC.
16-21 June 2019: Consolidated Programme 2019, EuroDIG.
16-21 June 2019: 31st Annual FIRST Conference, FIRST.Org.
17-18 June 2019: Offzone, BI.ZONE.
19 June 2019: Cyber Polygon, Sberbank and BI.ZONE.
19 June 2019: Tech Talk Series: How DevOps and Automation Can Accelerate Warfighting Readiness, DreamPort.
20-21 June 2019: Cyber 2019, Chatham House.
20-21 June 2019: The International Cybersecurity Congress, Sberbank.
23-27 June 2019: Cyber Week, Tel Aviv University.
3-8 August 2019: Black Hat USA, Black Hat.
8 August 2019: Cyber Games, Wicked6.
8-11 August 2019: DEF CON 27, DEF CON.
2-3 October 2019: CyberCrimeCon/19, Group-IB.
21-25 October 2019: Cyberweek, CyberScoop.