The critical Internet infrastructure is no longer a dry tech-geek topic. It has drawn attention from the wider Internet community through discussions on Internet names and numbers (domain names such as .amazon, .wine), the Internet of Things (sel...Register
Today’s headlines often feature the word ‘cyber’, reporting on threats related to the virtual world: online child abuse, stolen credit cards and virtual identities, malware and viruses, botnets and denial-of-service attacks on corporate or government...
Start date: 5 Oct 2020Register
Diplomatic privileges and immunities usually receive attention only when exceptions or abuses are reported in the news. Starting with the evolution of diplomatic privileges and immunities and ending with the question of whether the Vienna Conventi...
Start date: 20 Jul 2020Register
The International Film Festival and Forum on Human Rights (FIFDH) was inaugurated in 2003. The inspiration and impetus behind the International Film Festival and Forum on Human Rights came from human rights defenders active in NGO's, filmmakers, ...
14 Mar 2014
What shook the Internet governance (IG) realm more than the 2012 World Conference on International Telecommunications (WCIT-12) was the Snowden mass electronic surveillance revelation of mid-2013 and its spill-overs. Both are likely to trigger a rede...
12 Feb 2014
This webinar tackled the question of information gathering on the Internet, and the impact of Edward Snowden’s revelations on same. Bearing in mind the most common tools in gathering information for diplomats, such as public press conf...
9 Dec 2013
Webinar Announcement Information gathering has been a core diplomatic activity throughout history. While in the past the main challenge was to gather information, today, the main challenge is to manage, validate, and analyse that information. The ab...
29 Nov 2013
In my previous blog, I highlighted the ironies – or as one Chinese general put it, the ‘hypocritical behavior’ – that the Chinese press has identified in relation to US cyber espionage in the wake of the Snowden revelations.[1...
30 Jun 2013
GUEST BLOG: The Snowden Affair (Part 1): ‘Differences’ on the issue of cybersecurity reading more like similarities
The timing of Edward Snowden’s whistle blowing in relation to the US National Security Agency’s (NSA) cyber surveillance activities couldn’t have been more ironic or – for the USA – inconvenient. Coming on the eve of scheduled summit talks betw...
30 Jun 2013
Blurred Lines and Lost Trust?… Diplomacy and Intelligence Gathering. Eavesdropping on G20 Delegates in 2009
The Guardian reports that during the London G20 summit in 2009, British intelligence services read delegates’ e-mail exchanges, hacked delegates’ smart phones and even set up an internet café for G20 participants with the purpose of extracting passwo...
18 Jun 2013