International Telecommunication Union   ITU
 
 
Site Map Contact us Print Version
 Monday, May 04, 2009

Bangladesh Telecentre Network (BTN)  encourages telecentre networks to add their details to the BTN National Telecentre Database.

Telecentres are invited to visit the BTN website at http://www.mission2011.net.bd in order to view up to 2.068 telecentres which were collected during the past year.

Recently opened telecentres are asked to add their information as well as those telecentres not already listed. BTN are planning to launch a nationwide survey in order to capture other telecentre initiatives through their BTN Resource Centres.

The important links are:

  1. To visit the National Telecentre Database please click http://www.mission2011.net.bd/index.php?option=com_wrapper&view=wrapper&Itemid=58&lang=en
  2. To register your new telecentres please visit http://www.mission2011.net.bd/index.php?option=com_wrapper&view=wrapper&Itemid=166&lang=en
  3. To see Division wise telecentres please visit http://www.mission2011.net.bd/index.php?option=com_wrapper&view=wrapper&Itemid=171&lang=en
  4. To see district wise telecentre please visit http://www.mission2011.net.bd/index.php?option=com_wrapper&view=wrapper&Itemid=168&lang=en
  5. To see Upazilla/Thana wise telecentre please visit http://www.mission2011.net.bd/index.php?option=com_wrapper&view=wrapper&Itemid=172&lang=en
  6. You can search telecentres by Area (up to Union Level) or by Location or by Coordinating Institute or by Model Name or even by Typing a Key Word at http://www.mission2011.net.bd/index.php?option=com_wrapper&view=wrapper&Itemid=169&lang=en
  7. To see your telecentre in the Bangladesh Map please visit http://map.mission2011.net.bd/. The GIS part is still under process. We need to make some ammendments too.

While visiting your telecentre, if you find any incorrect information or you want to make some amendments, please let BTN know by e-mail to mahumd@mission2011.net.bd

Monday, May 04, 2009 1:25:06 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Friday, May 01, 2009

A UK man successfully delivered his baby boy by following instructions on a YouTube video. Marc Stephens had the foresight to watch the videos a few hours ahead of time, however his skills would be called upon as his wife went into labour before the ambulance arrived.

Mr Stephens told the BBC, "I Googled how to deliver a baby, watched a few videos and basically swotted up".

 

(Source: BBC)

Full story

BBC Website

CYB | Europe | e-health
Friday, May 01, 2009 8:23:19 AM (W. Europe Standard Time, UTC+01:00)  #     | 

Although the IWF 2008 Annual Report suggests that there has been a 10% decrease in the number of child abuse websites in the past year, it is important to note that there has been an increase in the serious nature of those abuse images which are still available.

The IWF report shows that among the remaining 1,536 child abuse sites, 74% were for profit while 26% allowed users to share or swap images, and states, "..1,536 domains remains a problem of a scale which can be seriously targeted and significantly disrupted through international efforts".

Peter Robbins, Chief Executive of the IWF said, "These websites, although reducing in number, represent an extremely serious problem."

The methods used by such sites to avoid detection were reported to be more and more sophisticated and include the scrambling of domain names and attempts to hide methods of payment in order to try to remain one step ahead of law enforcement.

(Source: BBC)

Full Story

BBC website

Friday, May 01, 2009 7:51:21 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, April 30, 2009

An American girl chatting on Facebook with a British teenage boy alerted her mother after he admitted that he planned to commit suicide. Without having his address, the girl's mother contacted local police which then led to a series of calls to the White House, the British Embassy in Washington and finally the police in the UK town where the boy was found alive.

(Source: BBC News)

Full Story

BBC Website

Thursday, April 30, 2009 10:43:52 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, April 29, 2009

The ITU Regional Cybersecurity Forum for Africa and Arab States, dedicated to “Connecting the World Responsibly”, aims to identify some of the main challenges faced by countries in Africa and Arab States in enhancing cybersecurity and securing critical information infrastructures.

It will consider best practices, information sharing mechanisms and concrete actions for cybersecurity development, taking into consideration the key principles of matching the borderless, transnational nature of cyber-threats with meeting specific national and regional requirements. The Forum will consider initiatives at the regional and international levels to increase cooperation and coordination amongst different stakeholders. The forum programme will include interactive sessions on the projects and related tools that ITU is working on to assist Member States in developing and implementing cybersecurity capabilities.

Capacity building activities will be undertaken in the following main areas:

  • Development of a legal framework;
  • Development of watch and warning and incident management capabilities, including the establishment of a national computer incident response team (CIRT); and,
  • Actions to be considered when developing a national cybersecurity strategy and harmonization within the key principles of international cooperation.

    The event is expected to bring together government representatives, industry actors, and other stakeholder groups from countries on the African continent and the Arab States to discuss, share information, and collaborate on the elaboration and implementation of national policy, regulatory and enforcement frameworks for cybersecurity. It will benefit information and communication policy makers from ministries and government departments; institutions and departments dealing with cybersecurity policies, legislation and enforcement; and representatives from operators, manufacturers, service providers, industry and consumer associations involved in promoting a culture of cybersecurity.

    The forum will be conducted in English, Arabic and French with simultaneous interpretation. Participation in the Forum is open to all ITU Member States, Sector Members, Associates, and other interested stakeholders, including representatives from regional and international organizations.

    More detailed information about the event (including the draft forum agenda, online pre-registration, fellowship requests (for eligible LDCs) can be found on the ITU Regional Cybersecurity Forum for Africa and Arab States website at www.itu.int/ITU-D/cyb/events/2009/tunis/.

    Register for the ITU Regional Cybersecurity Forum for Africa and Arab States here.

    We look forward to seeing you at the event!

  • Wednesday, April 29, 2009 10:03:35 AM (W. Europe Standard Time, UTC+01:00)  #     | 

    The Times reports that a young German man, David Heiss, became infatuated with Joanna Witton while playing on a cyber war website set up by Joanna and her boyfriend, Matthew Pyke, in the UK.

    After seeing her photo on Facebook, Mr Heiss made up his mind that she was the girl for him, sending her a stream of disturbing messages despite her protests that she was already in a relationship.

    Travelling to the UK from Germany, Mr Heiss tracked the couple down, committing the murder on his second visit. The killing of the victim was said by the prosecution to be driven by "...obsession for Joanna Witton, who was Matthew's girlfriend, and hatred for Matthew, because he was Joanna's boyfriend".

    (Source: The Times)

    Full Story

    Timesonline website

    Wednesday, April 29, 2009 6:46:26 AM (W. Europe Standard Time, UTC+01:00)  #     | 
     Tuesday, April 28, 2009

    "Digital technologies, or Information and Communications Technologies as they are commonly known, offer massive opportunities: Innovation and technology are "the backbone of the modern economy," says Senator the Hon Stephen Conroy, Minister for Broadband, Communications and the Digital Economy and the deputy leader of the Government in the Senate.

    As part of the Government of Australia's efforts at reducing carbon emissions by 2020, the energy sector providers plan to use broadband to improve the way they monitor and manage power distribution. Using broadband to connect power consumers with power generators will allow them to harness means of distribution in a more efficient and reliable manner. Smart grids connected by broadband will also raise the potential to not only monitor energy use but to allow remote adjustment of lights or temperature. This implies the very real possibility of significant carbon emission reductions for the country. 

    Full Report

    Tuesday, April 28, 2009 3:39:33 PM (W. Europe Standard Time, UTC+01:00)  #     | 
     Monday, April 27, 2009

    At the recent RSA Conference 2009 in San Francisco, United States, McAfee CEO DeWalt called for a global security architecture.

    "Security threats are on the rise as the economy declines, and the solution will likely come from collaborative partnerships that span all IT platforms and international boundaries." "DeWalt painted a grim picture of the security landscape. Consumer confidence has gone down while unemployment and has risen, he said. And as the economy has gone into a tailspin, cybercrime has seen a sharp upward spike, with more malware detected in 2008 than in the previous five years combined. Last year, 80 percent of cybercrimes were financially motivated, he added."

    "Many organizations are vastly underprotected or fail to regularly update patches and security software, which have opened up copious threat vectors for attackers, DeWalt said. In addition, the explosion of malicious threats in the last year can also be attributed to lack of user education and best security practices, as well as lack of comprehensive security." "One of the solutions, DeWalt proposed, would be to build comprehensive security architecture across numerous IT platforms that would be able to interoperate with companies' existing network infrastructure. That architecture would ultimately allow organizations to create correlating reports for every department and system, while allowing greater overall visibility into their organization's network, DeWalt said." "Cross-platform collaboration provides IT administrators a panoramic view into their network and allows communication across the threat vectors to shore up otherwise unseen security holes." "That same type of collaborative architecture will ultimately be required to extend across international borders and throughout global networks as the threats continue to become more sophisticated and the attacks more prevalent, DeWalt said. "The most depressing part of this is that we do not have a global architecture in place," he said. "We need to work together. Undoubtedly, (attacks) will continue to increase."

    Read the full story on ChannelWeb.

    Monday, April 27, 2009 7:25:07 AM (W. Europe Standard Time, UTC+01:00)  #     | 
     Friday, April 24, 2009

    Following earlier reports of users not being able to delete their personal information, Facebook has now allowed voters to decide on the best way to proceed. In reviewing their policies with users, the popular social networking site has agreed to allow its users greater control of their personal data.

    After a vote, 75% of responders were in favour of these proposed changes, which will allow users to own their own information and also have the right to remove it if they so choose.

    Founder, Mark Zuckerberg explained that the networking site was aiming for a more "...transparent and democratic approach"

    (Source: Telegraph)

    Full story

    Telegraph website

    Friday, April 24, 2009 12:48:17 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    Miguel Angel Mancera, the Attorney General of Mexico City, stated that seven suspects including a Roman Catholic priest, were accused of distributing over 100,000 child sex abuse images (including pictures and videos) of children worldwide. Among the material taken away by law enforcement were CDs, DVDs and computers.

    (Source: CNN)

    Full story

    CNN website

     

    Friday, April 24, 2009 11:23:41 AM (W. Europe Standard Time, UTC+01:00)  #     | 

    A new report of the mobile industry shows that some progress has been made by the 26 mobile operators signed up to the "European Framework for Safer Mobile Use by Younger Teenagers and Children” brokered by the Commission in February 2007 (IP/07/139). These operators serve around 580 million customers, 96% of all EU mobile customers. "The new report of the mobile phone industry association shows that mobile operators have started to take seriously their responsibilities to keep children safe when using phones," said EU Telecoms Commissioner Viviane Reding.

    50% of 10 year-old, 87% of 13 year-old and 95% of 16 year-old children in the EU have a mobile phone, but half of European parents worry mobile phone use might expose their children to sexually and violently explicit images (51%) or bullying by other children (49%), according to a survey. The European Commission today called on mobile operators to do more to keep children safe while using mobile phones by putting in place all the measures in the voluntary code of conduct, signed by 26 mobile operators in 2007. The report published by the GSM Association, the trade body of the mobile phone industry, showed that national self-regulatory codes based on the framework agreement brokered by the European Commission now exist in 22 Member States, 90% of them in line with the 2007 agreement, and 80% of operators have put in place measures to control child access to adult content.

    Read the full EC press release from 20 April 2009 here.

    More information on the GSMA report onimplementation of the framework agreement on "Safer Mobile Use by Younger Teenagers and Children" can be found here.

    Friday, April 24, 2009 8:03:08 AM (W. Europe Standard Time, UTC+01:00)  #     | 
     Thursday, April 23, 2009

    Chris De Wolfe, MySpace co-founder is reported by the Telegraph to be stepping down as chief executive.

    In 2008, Facebook was reported to be the number one social networking site, relegating MySpace, (with 130 million users globally), to second place.

    As well as tough competition from Facebook, a more recent social networking site, Twitter, appears to be holding its own against MySpace.

    (Source:Telegraph)

    Full story

    Telegraph website

    Thursday, April 23, 2009 3:04:52 PM (W. Europe Standard Time, UTC+01:00)  #     | 

    The Guardian reports that, in one of the first cases of its kind, images of a UK man sexually abusing Thai girls were used to identify him despite the fact that he had taken steps to hide his face.

    Photographs were uncovered during a police search of Dean Hardy's home, where images were stored on memory cards from cameras and the hard drive of a computer.

    A forensic anthropologist examined the freckles and blemishes visible in the images and found them to be identical with those on Mr Hardy's left hand.

    Judge Stone, sentencing, referred to this case as "...sex tourism of the most offensive kind."

    (Source: Guardian)

     

    Full story

    Guardian website

    Thursday, April 23, 2009 1:46:48 PM (W. Europe Standard Time, UTC+01:00)  #     | 
     Friday, April 17, 2009

    The British Computer Society (BCS)'s website shares information and advice on how to stay safe while shopping online in a set of "Golden Rules" compiled by Global Secure Systems (GSS).

    The twelve golden rules to safely shopping online include the below (detailed information available on the BCS website):

    1. Most malware exploits are known problems with software and operating systems. The hacker, or code writer, is relying upon people being lazy and not keeping systems up to date. For this reason it is very important to keep your anti-virus product up to date with the latest signature files and operating system updates from Microsoft.
    2. Never go online without ensuring you have your personal firewall enabled.
    3. Don't ever select the remember my password option when registering online as your passwords are then stored on the PC, often in plain text, and are the first thing that a fraudster will target. Some
    4. Ensure that your credit cards are registered with your card provider's online security services such as Verified by Visa and MasterCard SecureCode.
    5. Use only one card for online shopping, maintaining a limit on the card as low as possible or even using a top-up card for your online purchasing.
    6. Be sure to use a credit card and not a debit card.
    7. Be sure to check your statements regularly, and if there is any sign of irregular activity, report it straight away.
    8. Always check for the little padlock at the bottom right hand corner of the browser (when using Internet Explorer) before entering your card details. 
    9. Make a habit of checking the site's privacy policy for details of how your personal information will be used and only provide the minimum of personal information, especially in online forms.
    10. Never shop from sites that you arrive at from clicking links in unsolicited marketing emails (spam). 
    11. It is important to remember that you could be doing everything right, but that the vendor may do something wrong. A vendor may well be storing all your credit card data on a single server.
    12. Finally, don't rely on previous customer's testimonials - they are part of the organisation's marketing and not necessarily factual. The golden rule of commerce is still the same as it ever was - if the offer looks too good to be true, it probably is!

    The full set of "Golden Rules to Safe Internet Shopping" can be found here.

    For more information see the British Computer Society (BCS) and Global Secure Systems (GSS) websites.

    Friday, April 17, 2009 2:03:05 PM (W. Europe Standard Time, UTC+01:00)  #     | 
     Wednesday, April 15, 2009

    The Government of Malta has officially announced the launch of three new eGovernment services and an eGovernment Services Directory. The three services are the eHealth portal, the online certificates website and the scholarships service.These initiatives are aimed at improving the service delivery channels available between the Government and citizens.

    "We have compiled this e-Government Services Directory to help users look for the e-services they require. The user may consider this directory as a manual and a complete list of the e-government services launched to date. We will continue to update it with every service launched and an updated version will always be available at www.mygov.mt." said Austin Gatt, the Maltese Minister for Information, Transport and Communications (MITC).

    The ongoing transformation on the Maltese Government's IT resources is merely part of a much larger restructuring programme in the Government's approach to offering public services.

    Source: epractice.eu

    See: Full Press Release

    Wednesday, April 15, 2009 10:32:55 AM (W. Europe Standard Time, UTC+01:00)  #     | 
     Friday, April 10, 2009

    ITU is pleased to announce the launch of its 2009 Cybersecurity and ICT Applications Essay Competition.

    The 2009 ITU Cybersecurity and ICT Applications Essay Competition is open to current students and recent graduates in economics, political science, law, literature, telecommunications, computer science, information systems and related fields between the ages of 20 and 30 years old. The winners of the 2009 Essay Competition will be offered the opportunity of a consultancy contract within the ITU Development Sector's ICT Applications and Cybersecurity Division for three months. The winners will be given a contribution towards the cost of an economy class flight from their place of residence. In addition, they will be paid the sum of CHF 6000 towards living expenses for the duration of the contract.

    To enter the competition you need to submit an essay on one of the following essay topics:

    • Mobiles for Development: Enabling Low-Cost e-Applications for Rural and Remote Areas (e-Health, e-Government, e-Environment)
    • Protecting Children and Youth in the Internet and Mobile Age: Innovative Technical and Social Solutions
    • Connecting the World Responsibly: Empowering Women and Girls Through Creative Uses of ICTs
    • Personal Information Online (internet/mobiles): Responding to User Safety Concerns

    All applications should be submitted online through the competition website.

    The deadline for applications is 14 June 2009.

    We look forward to reviewing your applications and wish you the best of luck in the competition!

     

    Friday, April 10, 2009 7:17:37 AM (W. Europe Standard Time, UTC+01:00)  #     | 
     Friday, April 03, 2009

    The EU's Commissioner in charge of Information and Communication Technology Viviane Reding, has called on the European ICT sector, which accounts of 2% of carbon emissions, to become the engine in the drive against carbon emissions, by setting trends that can be followed in the wider economy to affect the other 98% of emissions.

    "Personally, I would recommend the ICT sector to lead the way for the rest of the economy by reducing its own carbon footprint by 20 percent as early as 2015", said Reding. "I see from the response of European ICT companies to the Commission's ongoing work that Europe is already well ahead in using ICT to green the economy, with some ICT companies already voluntarily working to reduce CO2 emission by 50 to 80 percent."

    Commissioner Reding cited buildings and transport as other sectors where ICTenabled energy efficiency could have an impact. Recent studies suggest that better use of ICT could reduce energy consumption of buildings in the EU by up to 17% and to reduce carbon emissions in transport logistics by up to 27%.

    Read Full Report

    Source:European Union

    Friday, April 03, 2009 9:06:34 AM (W. Europe Standard Time, UTC+01:00)  #     | 

    1 April 2009 was the start of a new anti-piracy law in Sweden where, according to traffic data, an immediate and significant drop (over 30 per cent) occurred in the nation's overall Internet traffic.

    "The combined traffic passing through Sweden's Internet Exchange Points usually peaks around 160 Gbit/s, but on Wednesday it peaked at around 110 Gbit/s. That's a huge drop in traffic, and is presumably a direct result of less file sharing taking place. ... Another interesting observation is that there was more traffic than usual during the last days before the law took effect. Were people hoarding films and music? On Tuesday (the day before the law went live) traffic peaked at nearly 200 GBit/s, roughly 25% above normal levels."

    Read the full story and view the related statistics at CircleID

    Friday, April 03, 2009 6:27:53 AM (W. Europe Standard Time, UTC+01:00)  #     | 
     Friday, March 27, 2009

    The European Commission has unveiled new laws aimed at protecting children from online sexual abuse. As a result, individuals who are found to be guilty of abuses such as online grooming or viewing online pornography, may face criminal prosecution.

    (Source: BBC)

    Full Story

    BBC Website

    Friday, March 27, 2009 12:58:31 PM (W. Europe Standard Time, UTC+01:00)  #     | 
     Thursday, March 26, 2009

    An advertising campaign by Beatbullying for its new website CyberMentors was helped by the testimony from boxing champion Joe Calzaghe.

    Joe Calzaghe, a spokesperson for Beatbullying, spoke about the misery he suffered during his school years from bullying and how it affected him and changed his personality.

    Adding, "For two years I was bullied, called names and ignored by former friends which turned me from a happy, out-going kid who enjoyed school and schoolwork, into an introverted wreck, detached from his studies and scared of his own shadow during school hours".

     

    (Source: BBC)

    Full story

    BBC Website

    Thursday, March 26, 2009 11:44:11 AM (W. Europe Standard Time, UTC+01:00)  #     |