Munich 2024: Protecting Elections in the Age of AI
WATCH
Scroll to the top

{{ subpage.title }}

Smartphone with a displayed Russian flag with the word "Cyberattack" and binary codes over it is placed on a computer motherboard in this illustration.

REUTERS/Dado Ruvic

NATO’s virtual battlefield misses AI

The world’s most powerful military bloc held cyber defense exercises last week, simulating cyberattacks against power grids and critical infrastructure. NATO rightly insists these exercises are crucial because cyberattacks are standard tools of modern warfare. Russia regularly engages in such attacks, for example, to threaten Ukraine’s power supply, and the US and Israel recently issued a joint warning of Iranian-linked cyberattacks on US-based water systems.

Read moreShow less

Podcast: Can governments protect us from dangerous software bugs?


Transcript

Listen: We've probably all felt the slight annoyance at prompts we receive to update our devices. But these updates deliver vital patches to our software, protecting us from bad actors. Governments around the world are increasingly interested in monitoring when dangerous bugs are discovered as a means to protect citizens. But would such regulation have the intended effect?

In season 2, episode 5 of Patching the System, we focus on the international system of bringing peace and security online. In this episode, we look at how software vulnerabilities are discovered and reported, what government regulators can and can't do, and the strength of a coordinated disclosure process, among other solutions.

Our participants are:

  • Dustin Childs, Head of Threat Awareness at the Zero Day Initiative at Trend Micro
  • Serge Droz from the Forum of Incident Response and Security Teams (FIRST)
  • Ali Wyne, Eurasia Group Senior Analyst (moderator)
Read moreShow less

Podcast: Would the proposed UN Cybercrime Treaty hurt more than it helps?

Transcript

Listen: As the world of cybercrime continues to expand, it follows suit that more international legal standards should follow. But while many governments around the globe see a need for a cybercrime treaty to set a standard, a current proposal on the table at the United Nations is raising concerns among private companies and nonprofit organizations alike. There are fears it covers too broad a scope of crime and could fail to protect free speech and other human rights across borders while not actually having the intended effect of combatting cybercrime.

In season 2, episode 4 of Patching the System, we focus on the international system of online peace and security. In this episode, we hear about provisions currently included in the proposed Russia-sponsored UN cybercrime treaty as deliberations continue - and why they might cause more problems than they solve.

Read moreShow less
Why privacy is priceless
Why privacy is priceless | Global Stage | GZERO Media

Why privacy is priceless

If someone were to get a few pictures off your phone without your permission, what's the big deal, right? Don't be so blasé, says human rights attorney David Haigh, who was prominently targeted with the powerful Pegasus spyware in 2021.

"If someone breaches your private life, that is a gateway to very, very serious breaches of other human rights, like your right to life and right to all sorts of other things," he said. "That's why I think a lot of governments and public sector don't take things as seriously as they should."

Right now, he says, dictators can buy your privacy, "and with it, your life."

Read moreShow less
How cyberattacks hurt people in war zones
How cyberattack immiserate people in war zones | Global Stage | GZERO Media

How cyberattacks hurt people in war zones

They may not be bombs or tanks, but hacks and cyberattacks can still make life miserable for people caught in the crosshairs of conflicts. By targeting key infrastructure and humanitarian organizations, warring governments can deny crucial services to civilians on the other side of no-man's-land.

And just like with conventional weapons, there can be collateral damage, said Stéphane Duguin, CEO of the Cyber Peace Institute. "We have 53 countries in the world targeted by these attacks across 23 sectors of critical infrastructure or essential services," he said. "At the end of the day, you end up having civilians who cannot benefit from essential services because of what has been escalated into another part of the world."

Read moreShow less
Why snooping in your private life is big business
Why snooping in your private life is big business | Caught in the Digital Crosshairs | GZERO Media

Why snooping in your private life is big business

Kaja Ciglic, senior director of digital diplomacy at Microsoft, said, "cybersecurity is the defining challenge of our time" amid a spike in misinformation campaigns thanks to wars in Ukraine and Gaza, growing interest from governments in building cyberweapons, and plain old profit-motivated thieves.

"We are seeing private sector enterprises that, effectively, are selling services, products that allow their customers to break into, whether it's a personal account, whether it's into an organization's account," she said. "The cyber mercenary market that is also emerging is also a very strong concern for Microsoft."

Read moreShow less
How rogue states use cyberattacks to undermine stability
How rogue states use cyberattacks to undermine stability | Global Stage | GZERO Media

How rogue states use cyberattacks to undermine stability

Cyberattacks are about a lot more than just money these days. Both unscrupulous governments and extremist groups are increasingly using hacking to advance political aims, says Kaja Ciglic, senior director of digital diplomacy at Microsoft.

When the International Committee for the Red Cross or International Court of Justice experiences cyberattacks, she said, "These are all organizations that are trying to defend peace and stability, they're trying to advocate for all of our human rights." The fact that unscrupulous governments are spending taxpayer money to purchase tools that interrupt their work, she noted, is worth taking a stand against.

Read moreShow less
The devastating impact of cyberattacks and how to protect against them
The devastating impact of cyberattacks and how to protect against them | Global Stage | GZERO Media

The devastating impact of cyberattacks and how to protect against them

Imagine one day you found out someone had hacked your phone. What would that mean for your life? With the right software, the bad guys might be able to get into your bank account, surveil your messages, or even steal your fingerprints and facial scans.

That's what happened to human rights attorney David Haigh, who became the first-known British victim of the powerful Pegasus spyware in 2021 while trying to help women of Emirati and Jordanian royalty escape alleged abuse. He learned that his phone was under surveillance – so his communications and the information stored on the device were compromised.

Two years on, he still lives in fear for the privacy of his loved ones and clients. "The police have done nothing,” he says. “There's no support from the government. There's no real information.”

Read moreShow less

Subscribe to our free newsletter, GZERO Daily

Latest