Broadband Commission calls on world leaders to prioritize universal connectivity as fundamental to sustainable development & global recovery

Universal broadband access is the vital catalyst needed to drive global economic recovery and accelerate lacklustre progress towards the UN Sustainable Development Goals, according to a new report released by the UN Broadband Commission for Sustainable Development.

The COVID-19 pandemic has significantly underscored humanity's growing reliance on digital networks for business continuity, employment, education, commerce, banking, healthcare, and a whole host of other essential services. Yet today, almost half the global population has still never accessed the internet, and hundreds of millions more struggle with slow, costly and unreliable connections, often through remote locations like internet cafés.

The Broadband Commission for Sustainable Development's 2020 State of Broadband report, released at the Commission's 10th anniversary meeting earlier today, includes a rallying call to world leaders and heads of industry to place universal broadband connectivity at the very forefront of global recovery and sustainable development efforts.

The ​State of Broadband 2020: Tackling Digital Inequalities, A Decade for Action, highlights stark disparities in access to high-speed connectivity that have prevented billions of adults and children from benefiting from remote working, learning and communication. The report also takes stock of progress made in expanding access to and adoption of broadband infrastructure and services, and achieving the Commission's seven 2025 advocacy targets.

Paul Kagame, Co-Chair of the Broadband Commission and President of Rwanda said: ​​"​The first decade of the Broadband Commission has made a real impact by highlighting the transformational power of universal access to high-speed internet connectivity and smartphones. Ideas that seemed futuristic ten years ago, are now mainstream. The next decade will be about using digital tools to speed up the recovery from the Covid pandemic and make up some of the lost ground on the SDGs." ​

Carlos Slim Helú, President of the Carlos Slim Foundation and Co-Chair of the Broadband Commission, said: “Digital technologies are offering services that are creating big changes. Regulators and governments should be aware of the vital importance for society and development that telecom networks play, and that high taxes, spectrum charges and regulation are barriers to digital inclusion. Today our challenge is to look for universal connectivity and to make it available for countries and people. Broadband Connectivity is the bridge to move to economic development and welfare." ​

“Leaving no one behind means leaving no one offline, now more than ever before," said Houlin Zhao, Secretary-General of the International Telecommunication Union (ITU), the United Nations' specialized agency for information and communication technology (ICT), and Co-Vice Chair of the Commission. “Increasing and coordinating ICT infrastructure investments will be instrumental, not only in connecting the 3.6 billion people still offline, but also in driving the development of new technologies central to the digital economy."

“Digital technology could be the tool we need for human-centred emancipation. But to play this role, it needs our expertise and cooperation because we need to pool all of our resources if we are to rise to the challenge of connectivity and competencies," said UNESCO Director-General Audrey Azoulay. “In my view, this is the significance of the two Working Groups co-chaired by UNESCO. These documents published today focus on two crucial questions: school connectivity and the promotion of reliable, quality information."

According to latest ITU data, overall global Internet user penetration stands at 53.6%. That figure drops to 47% in developing countries, and to just 19.1% in the world's Least Developed Countries (LDCs), falling well below the Broadband Commission's advocacy Target 3 of broadband Internet user penetration of 75% worldwide, 65% in developing countries and 35% in LDCs by 2025.

UN maritime agency hit by cyber attack

The International Maritime Organization, the United Nations arm that regulates global shipping, said its London headquarters has been hit by a cyberattack that brought down its website and internal web-based services.

The incident disclosed a security breach that the agency categorized as a 'sophisticated cyber-attack' against its IT systems, was discovered and impacted the IMO public website and other web-based services, the UN agency said in a press release.

The hack was the latest in what appear to be a increasing number of cyberattacks on companies and organizations around the world this year. It follows a malware attack that hit containership company CMA CGM SA last weekend, crippling the French carrier’s booking and electronic communications network.

“The interruption of web-based services was caused by a sophisticated cyber-attack against the Organization’s IT systems that overcame robust security measures in place.” continues the statement.

IMO did not share technical details about the attack, the Secretariat is working with international security experts to identify the source of the attack, and further enhance the security of its infrastructure.

It is unclear if the IMO was hit by ransomware, a website defacement, or its website was used for a watering hole attack, a type of attack where hackers host malicious code on the IMO website in an attempt to trick IMO members and visitors into downloading and infecting themselves with malware.

Study for the creation of a national capabilities assessment framework

ENISA, the EU Agency for cybersecurity, held a workshop to validate the results of the study for the creation of a national capabilities assessment framework together with the EU Member States and related stakeholders. By assessing their National Cybersecurity Strategy objectives both at strategic and at operational level, Member States will be able to possibly enhance existing and build new cybersecurity capabilities. The purpose of the framework is to help Member States perform a self-assessment of their level of maturity. Other benefits include:

  • Identification of elements missing within the strategy;
  • Establish a history of lessons learned;
  • Referencing best practices;
  • Generate credibility and showing transparency for the public, National and international stakeholders and partners.

Sixty participants coming from academia, EU institutions, National Authorities, Ministries, and CSIRTs attended the online workshop. They were all actively engaged in the assessment and validation of the proposed report, which will be published later.

Members of the Hellenic Ministry of Digital Governance and of the Ministry of Justice and Security in the Netherlands also intervened. Each of them gave a short presentation on the recent NCSS efforts conducted in Greece and in the Netherlands respectively. They also shared the main challenges they face as well as good practices and lessons learned.

The representatives identified the following challenges and lessons learned:

  • Most resources tend to be dedicated to the planning and implementation phase. While obviously important, this may lead to a lack of coordination and organisation in the monitoring and evaluation phase of the strategy.
  • The strategy should provide explicit ownership and accountability for the measures identified to reach the objectives. This is not currently the case.
  • Clarifying relations between objectives, measures, resources and expected outputs of the next national strategy will be essential in order to re-structure the policy theory.
  • Cybersecurity is a domain where information is highly confidential and not easily distributed. This is why it is crucial for EU Member States to have common tools and processes based on the shared experience.

Background on National Cybersecurity Strategies

In line with its strategic objectives, the European Agency for Cybersecurity, (ENISA) supports the efforts of Member States in the area of NCSS by:

  • Supporting cybersecurity as an integral part of national policies through the development of guidelines on the NCSS lifecycle and through analysis of existing strategies to outline good practices. The Good Practice Guide on NCSS published in 2016 is one of them.
  • Supports cutting-edge competencies and capabilities through performing deep dives on specific national strategic objectives, such as the publication on the Good practices in Innovation. This can also be done by developing online tools to support the uptake of lessons learned and good practices. Examples of such tools are the NCSS evaluation tool and the NCSS Interactive Map.
  • Empowering and engaging Member States through community building by maintaining an experts group on NCSS and by fostering cooperation and exchange of good practices between MS. Publications on effective collaborative models for PPPs and ISACs are good examples of such effort.

Covid-19 Sparks Upward Trend in Cybercrime

Europol’s 2020 cybercrime report updates on the latest trends and the current impact of cybercrime within the EU and beyond.

So much has changed since Europol published last year’s Internet Organised Crime Threat Assessment (IOCTA). The global COVID-19 pandemic that hit every corner of the world forced us to reimagine our societies and reinvent the way we work and live. During the lockdown, we turned to the internet for a sense of normality: shopping, working and learning online at a scale never seen before. It is in this new normal that Europol publishes its 7th annual IOCTA. The IOCTA seeks to map the cybercrime threat landscape and understand how law enforcement responds to it. Although the COVID-19 crisis showed us how criminals actively take advantage of society at its most vulnerable, this opportunistic behaviour of criminals should not overshadow the overall threat landscape. In many cases, COVID-19 has enhanced existing problems.

CROSS-CUTTING CRIME
Social engineering and phishing remain an effective threat to enable other types of cybercrime. Criminals use innovative methods to increase the volume and sophistication of their attacks, and inexperienced cybercriminals can carry out phishing campaigns more easily through crime as-a-service. Criminals quickly exploited the pandemic to attack vulnerable people; phishing, online scams and the spread of fake news became an ideal strategy for cybercriminals seeking to sell items they claim will prevent or cure COVID-19.

Encryption continues to be a clear feature of an increasing number of services and tools. One of the principal challenges for law enforcement is how to access and gather relevant data for criminal investigations. The value of being able to access data of criminal communication on an encrypted network is perhaps the most effective illustration of how encrypted data can provide law enforcement with crucial leads beyond the area of cybercrime.

MALWARE REIGNS SUPREME
Ransomware attacks have become more sophisticated, targeting specific organisations in the public and private sector through victim reconnaissance. While the COVID-19 pandemic has triggered an increase in cybercrime, ransomware attacks were targeting the healthcare industry long before the crisis. Moreover, criminals have included another layer to their ransomware attacks by threatening to auction off the comprised data, increasing the pressure on the victims to pay the ransom. Advanced forms of malware are a top threat in the EU: criminals have transformed some traditional banking Trojans into modular malware to cover more PC digital fingerprints, which are later sold for different needs.

CHILD SEXUAL ABUSE MATERIAL CONTINUES TO INCREASE
The main threats related to online child abuse exploitation have remained stable in recent years, however detection of online child sexual abuse material saw a sharp spike at the peak of the COVID-19 crisis. Offenders keep using a number of ways to hide this horrifying crime, such as P2P networks, social networking platforms and using encrypted communications applications. Dark web communities and forums are meeting places where participation is structured with affiliation rules to promote individuals based on their contribution to the community, which they do by recording and posting their abuse of children, encouraging others to do the same. Livestream of child abuse continues to increase, becoming even more popular than usual during the COVID-19 crisis when travel restrictions prevented offenders from physically abusing children. In some cases, video chat applications in payment systems are used which becomes one of the key challenges for law enforcement as this material is not recorded.

PAYMENT FRAUD: SIM SWAPPING A NEW TREND
SIM swapping, which allows perpetrators to take over accounts, is one of the new trends in this year’s IOCTA. As a type of account takeover, SIM swapping provides criminals access to sensitive user accounts. Criminals fraudulently swap or port victims’ SIMs to one in the criminals’ possession in order to intercept the one-time password step of the authentication process.

CRIMINAL ABUSE OF THE DARK WEB
In 2019 and early 2020 there was a high level of volatility on the dark web. The lifecycle of dark web market places has shortened and there is no clear dominant market that has risen over the past year. Tor remains the preferred infrastructure, however criminals have started to use other privacy-focused, decentralised marketplace platforms to sell their illegal goods. Although this is not a new phenomenon, these sorts of platforms have started to increase over the last year. OpenBazaar is noteworthy, as certain threats have emerged on the platform over the past year such as COVID-19-related items during the pandemic.

CISA and MS-ISAC Release Joint Ransomware Guide

The Cybersecurity and Infrastructure Security Agency (CISA) and Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing a joint Ransomware Guide meant to be a one-stop resource for stakeholders on how to be proactive and prevent these attacks from happening and also a detailed approach on how to respond to an attack and best resolve the cyber incident. CISA and MS-ISAC observed there are vast products and resources available, but very few that have them all in one place.

This one-stop guide is divided into two parts:

First, the guide focuses on best practices for ransomware prevention, detailing practices that organizations should continuously do to help manage the risk posed by ransomware and other cyber threats. It is intended to enable forward-leaning actions to successfully thwart and confront malicious cyber activity associated with ransomware. Some of the several CISA and MS-ISAC preventive services that are listed are Malicious Domain Blocking and Reporting, regional CISA Cybersecurity Advisors, Phishing Campaign Assessment, and MS-ISAC Security Primers on ransomware variants such as Ryuk.

The second part of this guide, response best practices and services, is divided up into three sections: (1) Detection and Analysis, (2) Containment and Eradication, and (3) Recovery and Post-Incident Activity. One of the unique aspects that will significantly help an organization’s leadership as well as IT professional with response is a comprehensive, step-by-step checklist. With many technical details on response actions and lists of CISA and MS-ISAC services available to the incident response team, this part of the guide can enable a methodical, measured and properly managed approach.

“It is a CISA priority to help our partners defend against ransomware, advise them on appropriate risk-management actions and provide best practices for a resilient, responsible incident response plan in the event of an cyberattack,” said Bryan Ware, Assistant Director for Cybersecurity, CISA. “The collaborative and consistent engagement with our industry and government partners support our concerted efforts to offer trusted, proactive and timely resources and services. This guide is based on operational insight from CISA and MS-ISAC and our engagements with varied sector partners.”

Recent events stress the important reminder that ransomware can happen at any time to any organizations, so we encourage all organizations with sensitive or important data stored on their network to take steps now to protect it, including backing up data, training employees, and patching systems to blunt the potential impact of ransomware. Malicious actors have adjusted their ransomware tactics over time to include pressuring victims for payment by threatening to release stolen data if they refuse to pay and publicly naming and shaming victims as secondary forms of extortion.

One of the ways this guide can help is with identifying their critical data. It’s hard to have an organization determine after-the-fact what critical data was impacted by a ransomware incident if they did not have that understanding of what critical data they had ahead of time. And, it is hard to revert to backups if an organization does not have or has not properly maintained and tested their backups.

This joint ransomware guide is written primarily for the IT professional, but every level of an organization can benefit from reviewing it. CISA and MS-ISAC are proud to provide this guide that can help them plan for a ransomware incident and understand the risk management, analytical, and response services available to them.

October is European Cyber Security Month

The European Cybersecurity Month (ECSM) is the European Union’s annual campaign dedicated to promoting cybersecurity among EU citizens and organisations, and to providing up-to-date online security information through awareness raising and sharing of good practices.

The ECSM campaign is coordinated by the European Union Agency for Cybersecurity (ENISA) and the European Commission, and supported by EU Member States and hundreds of partners (governments, universities, think tanks, NGOs, professional associations, private sector business) from Europe, and beyond.

The EU Agency for Cybersecurity coordinates the organisation of the ECSM campaign by acting as a “hub” for all participating Member States and EU Institutions, and by providing expert suggestions, generating synergies and promoting common messaging among EU citizens, businesses and public administration. The Agency also publishes new materials and provides expert advice on different cybersecurity topics for Member States’ audiences.

Since the first event in 2012, the European Cybersecurity Month has been reaching its key priorities by bringing together parties from across Europe under the slogan ‘Cybersecurity is a Shared Responsibility’ to unite against cyber threats.

Each year, for the entire month of October, hundreds of activities take place across Europe, including conferences, workshops, training sessions, webinars, presentations and more, to promote digital security and cyber hygiene.

Sustainable and resilient supply chains crucial to COVID-19 recovery

Through a joint statement on the crucial importance of resilient and sustainable integrated supply chains to the global recovery from COVID-19, ICAO and seven other UN bodies have encouraged States to realize more effective coordination and cooperation between the transport modes, and across borders.

“We are calling on all Governments to maximize the contribution of international trade and supply chains to a sustainable socio-economic recovery in post-COVID-19 times, through greater use of international legal instruments and standards, as well as strengthened regional and sectoral cooperation,” declared ICAO Secretary General Dr. Fang Liu.

The statement was signed by Dr. Liu and the heads of the United Nations Conference on Trade and Development (UNCTAD), the International Maritime Organization (IMO), the United Nations Economic Commission for Africa (UNECA), the United Nations Economic Commission for Europe (UNECE), the United Nations Economic Commission for Latin America and Caribbean (UNECLAC), the United Nations Economic and Social Commission for Asia and the Pacific (UNESCAP), and the United Nations Economic and Social Commission for Western Asia (UNESCWA).

It points to a number of specific mechanisms, such as the United Nations TIR Convention and its eTIR International System, the CMR Convention and its eCMR Protocol and the Automated System for Customs Data (ASYCUDA), and international standards for data exchange, such as those developed by UN/CEFACT, noting that “these instruments allow for moving cargo across borders without requiring physical checks and for reducing contact between people.”

For air transport specifically, States have been invited to follow the key principles presented in the ICAO Council Aviation Recovery Task Force (CART) Report and implement its recommendations and guidelines.

“We are encouraging States to take a risk-based approach to restoring connectivity with minimal restrictions while preventing the spread of COVID-19, protecting the health and safety of drivers, crew and border agency personnel,” Dr. Liu recalled.

Here, the implementation of Public Health Corridors (PHC) will be of special importance to ensuring “COVID-19 free” flight operations.

The joint statement builds on the momentum launched by ICAO in the very earliest days of the pandemic to ensure the safe, secure, and sustainable restoration of air connectivity. This momentum includes the development and then universal and cost-free provision of key technical guidance, and continuous advocacy for the pivotal importance of air transport to both recovery from the pandemic and the achievement of the UN Sustainable Development Goals.

ICAO is also providing States with assistance in regard to the implementation of its COVID-19 recovery materials, including through the organization of webinars. A webinar series on air cargo digitalization, which is scheduled to kick off on 29 September 2020, will directly support the achievement of the objectives of this joint statement.

OSCE and UNECE join forces in enhancing cyber resilience of intelligent transport systems

The OSCE and the UN Economic Commission for Europe (UNECE) held a roundtable discussion on enhancing cyber resilience of intelligent transport systems for both private and public sectors on 8 September 2020 in Geneva.

Discussions focused on the various types of cyber threats posed to intelligent transport systems, and methodologies available to governments to address critical security risks.

“Given the complexity and vulnerability of intelligent transport systems to cyberattacks, it is important to develop a coherent security approach involving co-operative efforts of the international community as well as both the public and private sectors,” said Eni Gjergji, Economic Advisor in the Office of the Co-ordinator of OSCE Economic and Environmental Activities.

Over 100 representatives of ministries of transport and other relevant agencies, cyber security experts from the automotive, IT and telecommunication sectors from the Euro-Asian region participated.  Participants took stock of the various types of emerging risks and threats to intelligent transport systems in view of digitalization processes, enhanced inter-connectivity of vehicle and transport infrastructure IT systems and automation.

François E. Guichard, Secretary of the Working Party on Automated/Autonomous and Connected Vehicles, UNECE Sustainable Transport Division, said that the security of intelligent transport systems would benefit from the recently adopted UN Regulation on cyber security, which introduces stringent requirements that manufacturers of different types of vehicles (cars, vans, trucks, buses, trailers, etc.) will have to comply.

“We are pleased to observe that the adoption of this Regulation is already stimulating the development of the cyber security ecosystem that is needed to address those risks, given the increased connectivity and complexity of vehicles and of the technologies delivering ITS,” said Guichard.

Ways of capturing the benefits of new technologies without compromising the safety and other progresses achieved during the last decade in the inland transport systems were also discussed.

Increasing resilience of the cyber/ICT environment requires fostering international co-operation, say participants at OSCE high-level conference

International co-operation and multilateral approaches are needed to maintain resilience and stability of the cyber-ICT environment, concluded participants of the high-level conference of the OSCE Albanian Chairmanship that ended today in Vienna.

Agron Tare, Deputy Minister for Europe and Foreign Affairs of Albania said that securing the cyber ecosystem requires “engagement, collaboration and co-ordination amongst all relevant stakeholders to preserve a functioning and stable ICT environment.”

Deputy Minister Tare also stressed the role the OSCE plays in regional efforts to develop new ideas on establishing a stable cyber/ICT environment and putting those ideas into practice, thus contributing to global efforts.

“The OSCE – through its sixteen existing confidence-building measures - has provided us with a platform to build trust and capacities, enhance co-operation and reduce tensions that may stem from the use of ICTs,” Tare said, noting that it is important to make them work for all OSCE participating States.

Referring to the OSCE Informal Working Group, which set an example for how to drive co-operation forward in the field of cyber/ICT security, the Deputy Minister noted its flagship “Adopt-a-CBM” initiative, inaugurated in 2018 by the Hungarian Chair of the Informal Working Group established by Permanent Council Decision 1039. He noted that the initiative is “the most promising way ahead regarding the implementation of the confidence-building measures.”

Péter Sztáray, Minister of State for Security Policy, Ministry of Foreign Affairs and Trade of Hungary, said that the pandemic added a new threat to existing global challenges and, more than anything showed that all countries rely heavily on cyber/ICT technologies to maintain daily business, enable most critical infrastructure systems and drive economic and social growth. “In the future there will be an even heavier reliance on digital infrastructure. That is why international co-operation, a multilateral approach on both global and regional level is needed more than ever,” Sztáray said.

EMSA participates in EU secure governmental satellite communications

Growing demand for reliable and secure governmental communication Effectively functioning public administration requires reliable and secure communication systems. In the era of satellite communications, access to communication services for governmental stakeholders should no longer be restrained, for example by unavailability of terrestrial communication infrastructure.

Exchanging confidential information, prevention of communication jamming and disruption due to external interference, together with the need for wider accessibility and cost-effectiveness represent vital factors driving the development of secure satellite communication services. Secure SATCOM solutions need to match service demand from eligible governmental users with supply provided by EU contracts for satellite capacities and services.

In 2013, the European Council defined the Governmental Satellite Communications (GOVSATCOM) as one of the four capability development programmes. Implementing a user-driven approach while developing operational GOVSATCOM interface is key.

Hence, a team of 18 organisations from across the European Union has embarked on a new research undertaking. It will address pending issues related to secure GOVSATCOM user expectations, as well as institutional and market responsiveness.
International cooperation will progress within the framework of the EU-funded project under Horizon 2020 programme, entitled European Networking for satellite Telecommunication Roadmap for the governmental Users requiring Secure, inTeroperable, innovativE and standardiseD services – ENTRUSTED.

Networking secure GOVSATCOM users Members of the ENTRUSTED consortium have set-up of a Network of governmental Users (NoU) of the secure SATCOM. The NoU will be expanded, as ENTRUSTED proceeds, to associate other interested governmental and institutional users representing EU member states and EU agencies.

Due to its institutional representatives, the NoU is expected to serve as a platform enabling the exchange of information, experience and expertise in a competent, trustful and secure way. ENTRUSTED will offer the possibility to participate in dedicated training, workshops, live demonstration activities and conferences.

Paving the way forward

Identification of key governmental user needs and requirements will be conducted in parallel with the assessment of relevant secure SATCOM user technologies and future development prospects. These activities will support the indication and prioritisation of necessary actions that will fill gaps between existing secure SATCOM capabilities and governmental user requirements, taking into consideration aspects of interoperability and standardisation.

ENTRUSTED seeks to develop recommendations for the European Commission in terms of considerations that could affect user experience of secure SATCOM services. These may relate to necessary investments, user equipment and, if relevant, technological aspects important for the design of future services. Recommendations will be presented in the form of a consolidated set of institutional user requirements for secure GOVSATCOM services and a long-term Research and Innovation Roadmap and Coordination plan (RIROC). ENTRUSTED will provide guidelines for user-related activities and pave the way for the future EU GOVSATCOM programme.

1 41 42 43 44 45 48