and

Security and Prosperity in the Asia-Pacific: The Role of International Law

Research Event

27 March 2019 - 10:00am to 5:00pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Koji Tsuruoka, Ambassador of Japan to the United Kingdom
Ben Saul, Associate Fellow, International Law Programme, Chatham House; Challis Chair of International Law, Australian National University
Lee Chen Chen, Director, Singapore Institute of International Affairs
Aniruddha​ Rajput, Member, UN International Law Commission; Consultant, Withersworldwide

 

The rapid growth in the Asia-Pacific’s economic and political power has significant implications for global governance. Asia-Pacific countries such as Japan, India and China – and regional bodies such as ASEAN – are increasingly informing, influencing and seeking to shape international standards and norms.

This conference will bring together international law and policy experts to explore the political and legal dynamics affecting economic relations, security challenges and maritime governance in the region.

Given security and prosperity challenges within the region as well as the increasingly complex environment for global governance, to what extent is international law operating as a tool of cooperation in the Asia-Pacific? In which areas is it a source of friction?

And what are the broader implications for global governance including the development of international law?

Chanu Peiris

Programme Manager, International Law
+44 (0)20 7314 3686




and

Protection of the Wounded and Medical Care-Givers in Armed Conflict: Is the Law Up to the Job?

Research Event

16 May 2019 - 5:30pm to 7:00pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Françoise Bouchet-Saulnier, Legal Director, Médecins Sans Frontières
Ezequiel Heffes, Thematic Legal Adviser, Geneva Call
Rain Liivoja, Associate Professor, University of Queensland
Maciej Polkowski, Head, Health Care in Danger Initiative, International Committee of the Red Cross
Chair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House

This meeting, supported by the British Red Cross, is the first in a series of three to commemorate the 70th anniversary of the 1949 Geneva Conventions. The meeting will focus on the protection of the wounded and sick in armed conflict and will also include discussion of challenges to the protection of medical care and of health providers.

Attacks on health care personnel and facilities have increased in recent years, as have the instances in which proceedings have been brought against those providing medical care to wounded fighters, including under counter-terrorism measures.

The Geneva Conventions and their Protocols give protection to the wounded and sick and to healthcare providers, but is the law adequate? Is the law sufficiently widely known? How can the law be more fully implemented? What particular challenges arise in non-international armed conflicts?

This event will be followed by a drinks reception.




and

Sieges, the Law and Protecting Civilians

27 June 2019

Siege warfare has been employed throughout the ages and remains dramatically relevant today. Questions of the compatibility of this practice with international humanitarian law (IHL) arise when besieged areas contain civilians as well as enemy forces. This briefing addresses those rules of IHL that are particularly relevant to sieges. 

Emanuela-Chiara Gillard

Associate Fellow, International Law Programme

2019-06-27-Syrian-Family.jpg

A Syrian family gather to eat a plate of corn and cabbage in Saqba, in the besieged rebel-held Eastern Ghouta area near Damascus on 6 November 2017. Photo: Getty Images

Summary

  • Although sieges may conjure up images of medieval warfare, they are still used by armed forces today, in international and non-international armed conflicts.
  • International law does not define sieges, but their essence is the isolation of enemy forces from reinforcements and supplies. Sieges typically combine two elements: ‘encirclement’ of an area for the purpose of isolating it, and bombardment.
  • Questions of the compatibility of sieges with modern rules of international humanitarian law (IHL) arise when besieged areas contain civilians as well as enemy forces.
  • Sieges are not prohibited as such by either IHL or other areas of public international law.
  • Three sets of rules of IHL are relevant to sieges. The first comprises the rules regulating the conduct of hostilities. The second is the prohibition of starvation of civilians as a method of warfare, along with the rules regulating humanitarian relief operations. The third comprises the rules on evacuation of civilians.
  • The application of IHL to sieges is unsettled in some respects. This briefing does not purport to resolve all the difficulties or address all the issues in detail.
  • While it may go too far to say that it is now impossible to conduct a siege that complies with IHL, the significant vulnerability of civilians caught up in sieges puts particular emphasis on the need for both besieging and besieged forces to comply scrupulously with the legal provisions for the protection of civilians and to conclude agreements for their evacuation.




and

Cyber, Sovereignty and Human Rights

Our work in this area explores how international law regulates cyber operations by states - such as electoral disinformation campaigns or attacks on critical infrastructure - and asks whether new rules are required. 

Rapid technological change raises urgent questions around equity, transparency, privacy and security. 

We are looking at the human rights dividend from new technologies as well as how international human rights law standards, for example on freedom of thought, expression and privacy, guide the use of digital technology in the electoral context.




and

Human Rights Priorities: An Agenda for Equality and Social Justice

Members Event

19 November 2019 - 6:00pm to 7:00pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Michelle Bachelet, United Nations High Commissioner for Human Rights

Chair: Ruma Mandal, Head, International Law Programme, Chatham House

Following just over one year in office, UN High Commissioner for Human Rights, Michelle Bachelet, outlines her ongoing priorities at a tumultuous time for fundamental rights protections worldwide.

She discusses the rights implications of climate change, gender inequality including the advancement of sexual and reproductive rights, the protection of vulnerable groups and the need to work closely with states, civil society and business to protect and advance human rights.

Department/project

Members Events Team




and

Sovereignty and Non-Intervention: The Application of International Law to State Cyberattacks

Research Event

4 December 2019 - 5:30pm to 7:00pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Douglas, Legal Director, GCHQ
Zhixiong Huang, Luojia Chair of International Law, Wuhan University
Nemanja Malisevic, Director of Digital Diplomacy, Microsoft
Harriet Moynihan, Associate Fellow, International Law Programme, Chatham House
Chair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House

International law applies to cyber operations – but views differ on exactly how. Does state-sponsored interference in another state's affairs using cyber means – for example,  disinformation campaigns in elections, disabling government websites, or disrupting transport systems – breach international law? If so, on what basis and how are the principles of sovereignty and non-intervention relevant? States are increasingly attributing cyber operations to other states and engaging in the debate on how international law applies, including circumstances that would justify countermeasures.

As states meet to debate these issues at the UN, the panel will explore how international law regulates cyberoperations by states, consider the prospects of progress at the UN, and assess the value of other initiatives.

This event coincides with the launch of a Chatham House research paper which analyses how the principles of sovereignty and intervention apply in the context of cyberoperations, and considers a way forward for agreeing a common understanding of cyber norms.

This event will bring together a broad group of actors, including policymakers, the private sector, legal experts and civil society, and will be followed by a drinks reception.

 

Jacqueline Rowe

Programme Assistant, International Law Programme
020 7389 3287




and

Security and Prosperity in Asia: The Role of International Law

1 November 2019

The 'Security and Prosperity in Asia' conference looked at the impact of international law in the Asia-Pacific with a focus on regional economic and security issues such as the South China Sea disputes.

Security and Prosperity in Asia Cover Image.jpg

Singapore skyline at sunset, 2016. Photo: Getty Images.

About the Conference

At a time of geopolitical uncertainty and with multilateralism under pressure, this conference brought together diverse actors to explore the evolving role of international law on critical security and economic issues in the Asia-Pacific. From trade agreements to deep-sea mining, cyberwarfare to territorial disputes, the breadth of the discussion illustrated the growing reach of international law in the region.

Hosted by the International Law Programme and the Asia-Pacific Programme at Chatham House on 27 March 2019, the conference focused on three themes: trade and investment, maritime security and governance, and emerging security challenges. What trends are emerging in terms of engagement with international law in the region, and how can international standards play a greater role in encouraging collaboration and reducing tensions? And, with the eastward shift in geopolitical power, how will Asia-Pacific states shape the future of international law?




and

Online Disinformation and Political Discourse: Applying a Human Rights Framework

6 November 2019

Although some digital platforms now have an impact on more people’s lives than does any one state authority, the international community has been slow to hold to account these platforms’ activities by reference to human rights law. This paper examines how human rights frameworks should guide digital technology.

Kate Jones

Associate Fellow, International Law Programme

2019-11-05-Disinformation.jpg

A man votes in Manhattan, New York City, during the US elections on 8 November 2016. Photo: Getty Images.

Summary

  • Online political campaigning techniques are distorting our democratic political processes. These techniques include the creation of disinformation and divisive content; exploiting digital platforms’ algorithms, and using bots, cyborgs and fake accounts to distribute this content; maximizing influence through harnessing emotional responses such as anger and disgust; and micro-targeting on the basis of collated personal data and sophisticated psychological profiling techniques. Some state authorities distort political debate by restricting, filtering, shutting down or censoring online networks.
  • Such techniques have outpaced regulatory initiatives and, save in egregious cases such as shutdown of networks, there is no international consensus on how they should be tackled. Digital platforms, driven by their commercial impetus to encourage users to spend as long as possible on them and to attract advertisers, may provide an environment conducive to manipulative techniques.
  • International human rights law, with its careful calibrations designed to protect individuals from abuse of power by authority, provides a normative framework that should underpin responses to online disinformation and distortion of political debate. Contrary to popular view, it does not entail that there should be no control of the online environment; rather, controls should balance the interests at stake appropriately.
  • The rights to freedom of thought and opinion are critical to delimiting the appropriate boundary between legitimate influence and illegitimate manipulation. When digital platforms exploit decision-making biases in prioritizing bad news and divisive, emotion-arousing information, they may be breaching these rights. States and digital platforms should consider structural changes to digital platforms to ensure that methods of online political discourse respect personal agency and prevent the use of sophisticated manipulative techniques.
  • The right to privacy includes a right to choose not to divulge your personal information, and a right to opt out of trading in and profiling on the basis of your personal data. Current practices in collecting, trading and using extensive personal data to ‘micro-target’ voters without their knowledge are not consistent with this right. Significant changes are needed.
  • Data protection laws should be implemented robustly, and should not legitimate extensive harvesting of personal data on the basis of either notional ‘consent’ or the data handler’s commercial interests. The right to privacy should be embedded in technological design (such as by allowing the user to access all information held on them at the click of a button); and political parties should be transparent in their collection and use of personal data, and in their targeting of messages. Arguably, the value of personal data should be shared with the individuals from whom it derives.
  • The rules on the boundaries of permissible content online should be set by states, and should be consistent with the right to freedom of expression. Digital platforms have had to rapidly develop policies on retention or removal of content, but those policies do not necessarily reflect the right to freedom of expression, and platforms are currently not well placed to take account of the public interest. Platforms should be far more transparent in their content regulation policies and decision-making, and should develop frameworks enabling efficient, fair, consistent internal complaints and content monitoring processes. Expertise on international human rights law should be integral to their systems.
  • The right to participate in public affairs and to vote includes the right to engage in public debate. States and digital platforms should ensure an environment in which all can participate in debate online and are not discouraged from standing for election, from participating or from voting by online threats or abuse.




and

The Application of International Law to State Cyberattacks: Sovereignty and Non-Intervention

2 December 2019

Hostile cyber operations by one state against another state are increasingly common. This paper analyzes the application of the sovereignty and non-intervention principles in relation to states’ cyber operations in another state below the threshold of the use of force. 

Harriet Moynihan

Senior Research Fellow, International Law Programme

2019-11-29-Intl-Law-Cyberattacks.jpg

A computer hacked by a virus known as Petya. The Petya ransomware cyberattack hit computers of Russian and Ukrainian companies on 27 June 2017. Photo: Getty Images.

Summary

  • The vast majority of state-to-state cyberattacks consist of persistent, low-level intrusions that take place below the threshold of use of force. International law, including the principle of non-intervention in another state’s internal affairs and the principle of sovereignty, applies to these cyber operations.
  • It is not clear whether any unauthorized cyber intrusion would violate the target state’s sovereignty, or whether there is a threshold in operation. While some would like to set limits by reference to effects of the cyber activity, at this time such limits are not reflected in customary international law. The assessment of whether sovereignty has been violated therefore has to be made on a case by case basis, if no other more specific rules of international law apply.
  • In due course, further state practice and opinio iuris may give rise to an emerging cyber-specific understanding of sovereignty, just as specific rules deriving from the sovereignty principle have crystallized in other areas of international law.
  • Before a principle of due diligence can be invoked in the cyber context, further work is needed by states to agree upon rules as to what might be expected of a state in this context.
  • The principle of non-intervention applies to a state’s cyber operations as it does to other state activities. It consists of coercive behaviour by one state that deprives the target state of its free will in relation to the exercise of its sovereign functions in order to compel an outcome in, or conduct with respect to, a matter reserved to the target state.
  • In practice, activities that contravene the non-intervention principle and activities that violates sovereignty will often overlap.
  • In order to reach agreement on how international law applies to states’ cyber operations below the level of use of force, states should put their views on record, where possible giving examples of when they consider that an obligation may be breached, as states such as the UK, Australia, France and the Netherlands have done.
  • Further discussion between states should focus on how the rules apply to practical examples of state-sponsored cyber operations. There is likely to be more commonality about specific applications of the law than there is about abstract principles.
  • The prospects of a general treaty in this area are still far off. In due course, there may be benefit in considering limited rules, for example on due diligence and a prohibition on attacking critical infrastructure, before tackling broad principles.




and

POSTPONED: Supporting Civic Space: The Role and Impact of the Private Sector

Invitation Only Research Event

16 March 2020 - 11:00am to 5:00pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

A healthy civic space is vital for an enabling business environment. In recognition of this, a growing number of private sector actors are challenging, publicly or otherwise, the deteriorating environment for civic freedoms.

However, this corporate activism is often limited and largely ad hoc. It remains confined to a small cluster of multinationals leaving potential routes for effective coordination and collaboration with other actors underexplored.

This roundtable will bring together a diverse and international group of business actors, civil society actors and foreign policy experts to exchange perspectives and experiences on how the private sector can be involved in issues around civic space. The meeting will provide an opportunity to explore the drivers of – and barriers to – corporate activism, develop a better understanding of existing initiatives, identify good practice and discuss practical strategies for the business community.

This meeting will be the first of a series of roundtables at Chatham House in support of initiatives to build broad alliances for the protection of civic space. 

Attendance at this event is by invitation only. 

PLEASE NOTE THIS EVENT IS POSTPONED UNTIL FURTHER NOTICE. 

Jacqueline Rowe

Programme Assistant, International Law Programme
020 7389 3287




and

War Crimes and Their Prosecution

Invitation Only Research Event

5 March 2020 - 9:00am to 10:30am

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Michelle Butler, Barrister, Matrix Chambers
Charles Garraway, Visiting Fellow, Human Rights Centre, University of Essex
Chair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House

 

The International Criminal Court cannot act when crimes are being genuinely prosecuted in a state. The meeting will discuss whether the ICC complementarity rules apply when a state puts restrictions on the prosecution of war crimes committed in particular circumstances or within a particular time period. In this context, the discussion will also cover the extent to which such restrictions are precluded by international obligations such as those in the Geneva Conventions with regard to the investigation and prosecution of war crimes.

Event attributes

Chatham House Rule

Jacqueline Rowe

Programme Assistant, International Law Programme
020 7389 3287




and

Glucocerebrosidases catalyze a transgalactosylation reaction that yields a newly-identified brain sterol metabolite, galactosylated cholesterol [Glycobiology and Extracellular Matrices]

β-Glucocerebrosidase (GBA) hydrolyzes glucosylceramide (GlcCer) to generate ceramide. Previously, we demonstrated that lysosomal GBA1 and nonlysosomal GBA2 possess not only GlcCer hydrolase activity, but also transglucosylation activity to transfer the glucose residue from GlcCer to cholesterol to form β-cholesterylglucoside (β-GlcChol) in vitro. β-GlcChol is a member of sterylglycosides present in diverse species. How GBA1 and GBA2 mediate β-GlcChol metabolism in the brain is unknown. Here, we purified and characterized sterylglycosides from rodent and fish brains. Although glucose is thought to be the sole carbohydrate component of sterylglycosides in vertebrates, structural analysis of rat brain sterylglycosides revealed the presence of galactosylated cholesterol (β-GalChol), in addition to β-GlcChol. Analyses of brain tissues from GBA2-deficient mice and GBA1- and/or GBA2-deficient Japanese rice fish (Oryzias latipes) revealed that GBA1 and GBA2 are responsible for β-GlcChol degradation and formation, respectively, and that both GBA1 and GBA2 are responsible for β-GalChol formation. Liquid chromatography–tandem MS revealed that β-GlcChol and β-GalChol are present throughout development from embryo to adult in the mouse brain. We found that β-GalChol expression depends on galactosylceramide (GalCer), and developmental onset of β-GalChol biosynthesis appeared to be during myelination. We also found that β-GlcChol and β-GalChol are secreted from neurons and glial cells in association with exosomes. In vitro enzyme assays confirmed that GBA1 and GBA2 have transgalactosylation activity to transfer the galactose residue from GalCer to cholesterol to form β-GalChol. This is the first report of the existence of β-GalChol in vertebrates and how β-GlcChol and β-GalChol are formed in the brain.




and

Deletion of fatty acid transport protein 2 (FATP2) in the mouse liver changes the metabolic landscape by increasing the expression of PPAR{alpha}-regulated genes [Lipids]

Fatty acid transport protein 2 (FATP2) is highly expressed in the liver, small intestine, and kidney, where it functions in both the transport of exogenous long-chain fatty acids and the activation of very-long-chain fatty acids. Here, using a murine model, we investigated the phenotypic impacts of deleting FATP2, followed by a transcriptomic analysis using unbiased RNA-Seq to identify concomitant changes in the liver transcriptome. WT and FATP2-null (Fatp2−/−) mice (5 weeks) were maintained on a standard chow diet for 6 weeks. The Fatp2−/− mice had reduced weight gain, lowered serum triglyceride, and increased serum cholesterol levels and attenuated dietary fatty acid absorption. Transcriptomic analysis of the liver revealed 258 differentially expressed genes in male Fatp2−/− mice and a total of 91 in female Fatp2−/− mice. These genes mapped to the following gene ontology categories: fatty acid degradation, peroxisome biogenesis, fatty acid synthesis, and retinol and arachidonic acid metabolism. Targeted RT-quantitative PCR verified the altered expression of selected genes. Of note, most of the genes with increased expression were known to be regulated by peroxisome proliferator–activated receptor α (PPARα), suggesting that FATP2 activity is linked to a PPARα-specific proximal ligand. Targeted metabolomic experiments in the Fatp2−/− liver revealed increases of total C16:0, C16:1, and C18:1 fatty acids; increases in lipoxin A4 and prostaglandin J2; and a decrease in 20-hydroxyeicosatetraenoic acid. We conclude that the expression of FATP2 in the liver broadly affects the metabolic landscape through PPARα, indicating that FATP2 provides an important role in liver lipid metabolism through its transport or activation activities.




and

AIG1 and ADTRP are endogenous hydrolases of fatty acid esters of hydroxy fatty acids (FAHFAs) in mice [Metabolism]

Fatty acid esters of hydroxy fatty acids (FAHFAs) are a newly discovered class of signaling lipids with anti-inflammatory and anti-diabetic properties. However, the endogenous regulation of FAHFAs remains a pressing but unanswered question. Here, using MS-based FAHFA hydrolysis assays, LC-MS–based lipidomics analyses, and activity-based protein profiling, we found that androgen-induced gene 1 (AIG1) and androgen-dependent TFPI-regulating protein (ADTRP), two threonine hydrolases, control FAHFA levels in vivo in both genetic and pharmacologic mouse models. Tissues from mice lacking ADTRP (Adtrp-KO), or both AIG1 and ADTRP (DKO) had higher concentrations of FAHFAs particularly isomers with the ester bond at the 9th carbon due to decreased FAHFA hydrolysis activity. The levels of other lipid classes were unaltered indicating that AIG1 and ADTRP specifically hydrolyze FAHFAs. Complementing these genetic studies, we also identified a dual AIG1/ADTRP inhibitor, ABD-110207, which is active in vivo. Acute treatment of WT mice with ABD-110207 resulted in elevated FAHFA levels, further supporting the notion that AIG1 and ADTRP activity control endogenous FAHFA levels. However, loss of AIG1/ADTRP did not mimic the changes associated with pharmacologically administered FAHFAs on extent of upregulation of FAHFA levels, glucose tolerance, or insulin sensitivity in mice, indicating that therapeutic strategies should weigh more on FAHFA administration. Together, these findings identify AIG1 and ADTRP as the first endogenous FAHFA hydrolases identified and provide critical genetic and chemical tools for further characterization of these enzymes and endogenous FAHFAs to unravel their physiological functions and roles in health and disease.




and

Certain ortho-hydroxylated brominated ethers are promiscuous kinase inhibitors that impair neuronal signaling and neurodevelopmental processes [Cell Biology]

The developing nervous system is remarkably sensitive to environmental signals, including disruptive toxins, such as polybrominated diphenyl ethers (PBDEs). PBDEs are an environmentally pervasive class of brominated flame retardants whose neurodevelopmental toxicity mechanisms remain largely unclear. Using dissociated cortical neurons from embryonic Rattus norvegicus, we found here that chronic exposure to 6-OH–BDE-47, one of the most prevalent hydroxylated PBDE metabolites, suppresses both spontaneous and evoked neuronal electrical activity. On the basis of our previous work on mitogen-activated protein kinase (MAPK)/extracellular signal-related kinase (ERK) (MEK) biology and our observation that 6-OH–BDE-47 is structurally similar to kinase inhibitors, we hypothesized that certain hydroxylated PBDEs mediate neurotoxicity, at least in part, by impairing the MEK–ERK axis of MAPK signal transduction. We tested this hypothesis on three experimental platforms: 1) in silico, where modeling ligand–protein docking suggested that 6-OH–BDE-47 is a promiscuous ATP-competitive kinase inhibitor; 2) in vitro in dissociated neurons, where 6-OH–BDE-47 and another specific hydroxylated BDE metabolite similarly impaired phosphorylation of MEK/ERK1/2 and activity-induced transcription of a neuronal immediate early gene; and 3) in vivo in Drosophila melanogaster, where developmental exposures to 6-OH–BDE-47 and a MAPK inhibitor resulted in offspring displaying similarly increased frequency of mushroom-body β–lobe midline crossing, a metric of axonal guidance. Taken together, our results support that certain ortho-hydroxylated PBDE metabolites are promiscuous kinase inhibitors and can cause disruptions of critical neurodevelopmental processes, including neuronal electrical activity, pre-synaptic functions, MEK–ERK signaling, and axonal guidance.




and

Genetic Profile and Functional Proteomics of Anal Squamous Cell Carcinoma: Proposal for a Molecular Classification

Lucía Trilla-Fuertes
Apr 1, 2020; 19:690-700
Research




and

Tandem Mass Tag Approach Utilizing Pervanadate BOOST Channels Delivers Deeper Quantitative Characterization of the Tyrosine Phosphoproteome

Xien Yu Chua
Apr 1, 2020; 19:730-743
Technological Innovation and Resources




and

The DNA sensor cGAS is decorated by acetylation and phosphorylation modifications in the context of immune signaling

Bokai Song
Apr 28, 2020; 0:RA120.001981v1-mcp.RA120.001981
Research




and

Modulation of natural HLA-B*27:05 ligandome by ankylosing spondylitis-associated endoplasmic reticulum aminopeptidase 2 (ERAP2)

Elena Lorente
Apr 7, 2020; 0:RA120.002014v1-mcp.RA120.002014
Research




and

Chemical Genetics of AGC-kinases Reveals Shared Targets of Ypk1, Protein Kinase A and Sch9

Michael Plank
Apr 1, 2020; 19:655-671
Research




and

Characterization of Prenylated C-terminal Peptides Using a Thiopropyl-based Capture Technique and LC-MS/MS

James A. Wilkins
Apr 13, 2020; 0:RA120.001944v1-mcp.RA120.001944
Research




and

Seminal Plasma Proteome as an Indicator of Sperm Dysfunction and Low Sperm Motility

Yunlei Li
Apr 20, 2020; 0:RA120.002017v1-mcp.RA120.002017
Research




and

Cell Cycle Profiling Reveals Protein Oscillation, Phosphorylation, and Localization Dynamics

Patrick Herr
Apr 1, 2020; 19:608-623
Research




and

Robust summarization and inference in proteome-wide label-free quantification

Adriaan Sticker
Apr 22, 2020; 0:RA119.001624v1-mcp.RA119.001624
Research




and

Investigation of inter- and intra-tumoral heterogeneity of glioblastoma using TOF-SIMS

Samvel K Gularyan
Apr 6, 2020; 0:RA120.001986v1-mcp.RA120.001986
Research




and

Developments and Applications of Functional Protein Microarrays

Guan-Da Syu
Apr 17, 2020; 0:R120.001936v1-mcp.R120.001936
Review




and

Quantitative proteomics of human heart samples collected in vivo reveal the remodeled protein landscape of dilated left atrium without atrial fibrillation

Nora Linscheid
Apr 14, 2020; 0:RA119.001878v1-mcp.RA119.001878
Research




and

Arginine in C9ORF72 Dipolypeptides Mediates Promiscuous Proteome Binding and Multiple Modes of Toxicity

Mona Radwan
Apr 1, 2020; 19:640-654
Research




and

Proteome and phosphoproteome analysis of brown adipocytes reveals that RICTOR loss dampens global insulin/AKT signaling

Samuel W Entwisle
Apr 6, 2020; 0:RA120.001946v2-mcp.RA120.001946
Research




and

Large-scale Identification of N-linked Intact Glycopeptides in Human Serum using HILIC Enrichment and Spectral Library Search

Qingbo Shu
Apr 1, 2020; 19:672-689
Research




and

Improving Identification of In-organello Protein-Protein Interactions Using an Affinity-enrichable, Isotopically Coded, and Mass Spectrometry-cleavable Chemical Crosslinker

Karl A. T. Makepeace
Apr 1, 2020; 19:624-639
Research




and

Acquiring and Analyzing Data Independent Acquisition Proteomics Experiments without Spectrum Libraries

Lindsay K Pino
Apr 20, 2020; 0:P119.001913v1-mcp.P119.001913
Perspective




and

Proximity Dependent Biotinylation: Key Enzymes and Adaptation to Proteomics Approaches

Payman Samavarchi-Tehrani
May 1, 2020; 19:757-773
Review





and

Learning During the Pandemic: What we wish our professors and mentors knew

Student Authors: Mayleen Cortez, Brooke Keene-Gomez, Lucy Martinez, Amaury V. Miniño, Jenna Race, Kelemua Tesfaye, and Stephanie. Blog post compiled by Melissa Gutiérrez González, Pamela E. Harris, and Alicia Prieto Langarica. In this blog we center the voices of mathematics students as … Continue reading




and

Strengthening Urban Preparedness and Resilience Against Biological Threats in Accra

Invitation Only Research Event

1 March 2019 - 10:30am to 2 March 2019 - 3:00pm

Chatham House, London

Capacity to contain and respond to biological threats varies considerably across the world. Yet such preparedness is vital for prevention, impact-reduction and resilience in the face of biological events, whether they be natural or deliberate outbreaks.

Chatham House is conducting a series of meetings to strengthen urban preparedness for, and resilience against, biological threats in African countries. This meeting will examine the preparedness and prevention mechanisms in Accra, reviewing the comprehensiveness of city-level preparedness.  

This meeting will focus on the formation and implementation of city-level action plans in the context of preparedness for managing biological threats. It will also explore how local authorities are contributing to this effort with their knowledge and expertise.

Attendance at this event is by invitation only.

Nilza Amaral

Project Manager, International Security Programme




and

Transparency and Accountability for Drone Use: European Approaches

Invitation Only Research Event

11 March 2019 - 9:30am to 12 March 2019 - 12:30pm

Chatham House

With increased use of military drones in recent years there have also been many calls for greater transparency and accountability with regards to drone operations.

This would allow for greater public understanding, particularly as the complex nature of military operations today intensifies difficulties in sustaining perceptions of the legitimate use of force.

For example, in Europe, leading states rely on the US for drone platforms and for the infrastructure - such as military communication networks - that enable those operations, while the US also relies on airbases in European states to operate its drone programme.

In addition, with reports that the US is loosening the rules on the use of drones, it is important to understand how European approaches to transparency and accountability may be affected by these developments.

This workshop focuses on how European states can facilitate transparency to ensure accountability for drone use, as well as what the limits might be, considering both the complexity of military operations today and the need for achieving operational goals.

With the US easing restrictions on export controls, the discussion also considers the role of regulation in ensuring accountability and prospects for developing common standards.

Attendance at this event is by invitation only.

Nilza Amaral

Project Manager, International Security Programme




and

How Regulation Could Break the Internet: In Conversation with Andrew Sullivan

Research Event

19 June 2019 - 6:00pm to 7:00pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Andrew Sullivan, President and CEO Internet Society
Chair: Emily Taylor, Associate Fellow, International Security Department, Chatham House; Editor, Journal of Cyber Policy

Internet regulation is increasing around the world creating positive obligations on internet providers and exerting negative unintended consequences on the internet infrastructure. In some ways, most of this regulatory activity is justifiable. Governments are concerned about the increased risk that the use of the internet brings to societies. As a response, many governments have been enacting regulations as their main approach to dealing with these concerns. The main challenge is that most of the current regulations are either ill-defined or unworkable.  

On the one hand, several governments have established procedures that seek to analyze the impacts of new regulatory proposals before they were adopted. However, there hasn’t been enough attention aimed at analyzing regulations after they have been adopted and only a few have measures in place to evaluate the impacts of the procedures and practices that govern the regulatory process itself.

On the other hand, much of the regulation creates unintended consequences to the internet itself. It undermines many of its fundamental properties and challenges the integrity and resiliency of its infrastructure.  

This event discusses current practices in internet-related regulation and the related challenges. Panellists will discuss how governments can enforce regulations that achieve their intended purpose while at the same time protecting the internet’s core infrastructure and its properties, including its openness, interoperability and global reach.

Calum Inverarity

Research Analyst and Coordinator, International Security Department
+44 (0) 207 957 5751




and

Cyber Insurance for Civil Nuclear Facilities: Risks and Opportunities

8 May 2019

This paper sets out a roadmap for how organizations in the civil nuclear sector can explore their options and review their cyber risk exposure.

Éireann Leverett

Senior Risk Researcher, University of Cambridge

GettyImages-667179424.jpg

The control room inside the Paks nuclear power plant in Hungary, 10 April 2017. Photo: Getty Images
  • Civil nuclear facilities and organizations hold sensitive information on security clearances, national security, health and safety, nuclear regulatory issues and international inspection obligations. The sensitivity and variety of such data mean that products tailored for insuring the civil nuclear industry have evolved independently and are likely to continue to do so.
  • ‘Air-gaps’ – measures designed to isolate computer systems from the internet – need to be continually maintained for industrial systems. Yet years of evidence indicate that proper maintenance of such protections is often lacking (mainly because very real economic drivers exist that push users towards keeping infrastructure connected). Indeed, even when air-gaps are maintained, security breaches can still occur.
  • Even if a particular organization has staff that are highly trained, ready and capable of handling a technological accident, hacking attack or incidence of insider sabotage, it still has to do business and/or communicate with other organizations that may not have the essentials of cybersecurity in place.
  • Regardless of whether the choice is made to buy external insurance or put aside revenues in preparation for costly incidents, the approach to cyber risk calculation should be the same. Prevention is one part of the equation, but an organization will also need to consider the resources and contingency measures available to it should prevention strategies fail. Can it balance the likelihood of a hacker’s success against the maximum cost to the organization, and put aside enough capital and manpower to get it through a crisis?
  • All civil nuclear facilities should consider the establishment of computer security incident response (CSIR) teams as a relevant concern, if such arrangements are not already in place. The existence of a CSIR team will be a prerequisite for any facility seeking to obtain civil nuclear cyber insurance.
  • Preventing attacks such as those involving phishing and ransomware requires good cyber hygiene practices throughout the workforce. Reducing an organization’s ‘time to recovery’ takes training and dedication. Practising the necessary tasks in crisis simulations greatly reduces the likelihood of friction and the potential for error in a crisis.




and

Understanding Cybercrime for Better Policing: Regional and Global Challenges

Research Event

18 June 2019 - 9:00am to 5:30pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

In recent years, cybercrime has evolved from a niche technological concern into a prominent global issue with substantial preventative and remedial costs for businesses and governments alike. Despite heavy investment in sophisticated cybersecurity measures and the adoption of several legal, organizational and capacity-building measures, cybercrime remains a major threat which is evolving on a daily basis. Today’s cybercrime is more aggressive, more complex, more organized and – importantly – more unpredictable than ever before.

The challenges posed by cybercrime are experienced acutely by countries undergoing digital transformations: as the level of connectivity rises, so too does the potential for online theft, fraud and abuse. Cybercrime is pervasive but governments can work to limit its impact by creating a resilient overall economy and robust institution, and appropriately equipping law enforcement and the justice system to navigate its novel challenges.

To advance the discourse surrounding these issues, this workshop will assess the current cyber threat landscape and how it is evolving. It will identify the main obstacles encountered by law enforcement, the judiciary and prosecutors in their fight against cybercrime. It will also compare national, regional and global approaches that countries can use to effectively curb cybercrime and tackle its emerging challenges.

Calum Inverarity

Research Analyst and Coordinator, International Security Department
+44 (0) 207 957 5751




and

Cyber Governance in the Commonwealth: Towards Stability and Responsible State Behaviour in Cyberspace

Invitation Only Research Event

7 October 2019 - 10:30am to 5:30pm

Addis Ababa, Ethiopia

This roundtable is part of a series under the project, 'Implementing the Commonwealth Cybersecurity Agenda', funded by the UK Foreign and Commonwealth Office (FCO). The roundtable aims to provide a multi-stakeholder, pan-Commonwealth platform to discuss how to implement the Commonwealth Cyber Declaration with a focus on its third pillar 'To promote stability in cyberspace through international cooperation'.

In particular, the roundtable focuses on points 3 and 4 of the third pillar which revolve around the commitment to promote frameworks for stability in cyberspace including the applicability of international law, agreed voluntary norms of responsible state behaviour and the development and implementation of confidence-building measures consistent with the 2015 report of the UNGGE. 

The workshop also focuses on the commitment to advance discussions on how existing international law, including the Charter of the United Nations and applicable international humanitarian law, applies in cyberspace.

The roundtable addresses the issue of global cyber governance from a Commonwealth perspective and will also include a discussion around the way forward, the needed capacity of the different Commonwealth countries and the cooperation between its members for better cyber governance.

Participants include UNGGE members from Commonwealth countries in addition to representatives to the UN Open-Ended Working Group from African countries as well as members from academia, civil society and industry.

Calum Inverarity

Research Analyst and Coordinator, International Security Department
+44 (0) 207 957 5751




and

Artificial Intelligence Prediction and Counterterrorism

9 August 2019

The use of AI in counterterrorism is not inherently wrong, and this paper suggests some necessary conditions for legitimate use of AI as part of a predictive approach to counterterrorism on the part of liberal democratic states.

Kathleen McKendrick

British Army Officer, Former Visiting Research Fellow at Chatham House

2019-08-06-AICounterterrorism.jpg

Surveillance cameras manufactured by Hangzhou Hikvision Digital Technology Co. at a testing station near the company’s headquarters in Hangzhou, China. Photo: Getty Images

Summary

  • The use of predictive artificial intelligence (AI) in countering terrorism is often assumed to have a deleterious effect on human rights, generating spectres of ‘pre-crime’ punishment and surveillance states. However, the well-regulated use of new capabilities may enhance states’ abilities to protect citizens’ right to life, while at the same time improving adherence to principles intended to protect other human rights, such as transparency, proportionality and freedom from unfair discrimination. The same regulatory framework could also contribute to safeguarding against broader misuse of related technologies.
  • Most states focus on preventing terrorist attacks, rather than reacting to them. As such, prediction is already central to effective counterterrorism. AI allows higher volumes of data to be analysed, and may perceive patterns in those data that would, for reasons of both volume and dimensionality, otherwise be beyond the capacity of human interpretation. The impact of this is that traditional methods of investigation that work outwards from known suspects may be supplemented by methods that analyse the activity of a broad section of an entire population to identify previously unknown threats.
  • Developments in AI have amplified the ability to conduct surveillance without being constrained by resources. Facial recognition technology, for instance, may enable the complete automation of surveillance using CCTV in public places in the near future.
  • The current way predictive AI capabilities are used presents a number of interrelated problems from both a human rights and a practical perspective. Where limitations and regulations do exist, they may have the effect of curtailing the utility of approaches that apply AI, while not necessarily safeguarding human rights to an adequate extent.
  • The infringement of privacy associated with the automated analysis of certain types of public data is not wrong in principle, but the analysis must be conducted within a robust legal and policy framework that places sensible limitations on interventions based on its results.
  • In future, broader access to less intrusive aspects of public data, direct regulation of how those data are used – including oversight of activities by private-sector actors – and the imposition of technical as well as regulatory safeguards may improve both operational performance and compliance with human rights legislation. It is important that any such measures proceed in a manner that is sensitive to the impact on other rights such as freedom of expression, and freedom of association and assembly.




and

The Future of EU–US Cooperation in Space Traffic Management and Space Situational Awareness

29 August 2019

As more space activities develop, there is an increasing requirement for comprehensive space situational awareness (SSA). This paper provides an overview of the current landscape in SSA and space traffic management as well as possible scenarios for EU–US cooperation in this area. 

Alexandra Stickings

Research Fellow for Space Policy and Security, RUSI

2019-08-19-SpaceTrafficManagement.jpg

Deployment of the NanoRacks-Remove Debris Satellite from the International Space Station. Photo: Getty Images.

Summary

  • Space situational awareness (SSA) and space traffic management (STM) are essential for sustainable near-Earth orbit. International cooperation in SSA and STM is vital with the growing number of satellite operators and the increasingly complex space environment.
  • The various definitions of SSA and STM are ambiguous. Understanding the activities that fall under each term can better assist in finding areas for cooperation and collaboration.
  • SSA has historically been a military activity, leading to an incomplete public catalogue of its use and barriers to sharing information with other states and the commercial sector. The rise in private space actors has increased the number of commercial STM providers and, with plans in the US to move responsibility for STM to civilian control, there will likely be more opportunities for international collaboration, particularly through the EU Space Surveillance and Tracking (SST) programme.
  • Individual EU member states possess developed STM capabilities, but overall these are still some way behind those of allies such as the US. Further investment in STM infrastructure and programmes is required for the EU and individual European states to be an essential partner to the US and add value to the global effort.
  • There are worldwide challenges, both political and technical, to providing STM coverage, which may lead to a lack of collaboration and gaps in understanding of activities in orbit. Existing sensors have limitations in terms of the size of objects that can be detected and the precision with which their movements can be predicted. These capability gaps represent opportunities for the EU to contribute.
  • The EU can build on its tradition of support for openness and civil society by creating a system that fosters an environment of cooperation and collaboration involving industry, commercial STM providers and the wider international community.
  • Although collaboration in STM is vital, the EU should also aim to tackle issues within the wider definition of SSA including space weather, intelligence and the security of ground stations.
  • The EU is well placed to become a global leader in SSA and STM. However, it needs to take into consideration the current political and technical landscape when making decisions regarding investment in capabilities and the pursuit of international partnerships.




and

Who’s Afraid of Huawei? Understanding the 5G Security Concerns

9 September 2019

Emily Taylor

Associate Fellow, International Security Programme
Emily Taylor examines the controversy around the Chinese tech giant’s mobile broadband equipment and the different approaches taken by Western countries.

2019-09-06-Huawei.jpg

Huawei's Ox Horn campus in Dongguan, China. Photo: Getty Images.

As countries move towards the fifth generation of mobile broadband, 5G, the United States has been loudly calling out Huawei as a security threat. It has employed alarmist rhetoric and threatened to limit trade and intelligence sharing with close allies that use Huawei in their 5G infrastructure.

While some countries such as Australia have adopted a hard line against Huawei, others like the UK have been more circumspect, arguing that the risks of using the firm’s technology can be mitigated without forgoing the benefits.

So, who is right, and why have these close allies taken such different approaches?

The risks

Long-standing concerns relating to Huawei are plausible. There are credible allegations that it has benefitted from stolen intellectual property, and that it could not thrive without a close relationship with the Chinese state.

Huawei hotly denies allegations that users are at risk of its technology being used for state espionage, and says it would resist any order to share information with the Chinese government. But there are questions over whether it could really resist China’s stringent domestic legislation, which compels companies to share data with the government. And given China’s track record of using cyberattacks to conduct intellectual property theft, there may be added risks of embedding a Chinese provider into critical communications infrastructure.

In addition, China’s rise as a global technological superpower has been boosted by the flow of financial capital through government subsidies, venture and private equity, which reveal murky boundaries between the state and private sector for domestic darlings. Meanwhile, the Belt and Road initiative has seen generous investment by China in technology infrastructure across Africa, South America and Asia.

There’s no such thing as a free lunch or a free network – as Sri Lanka discovered when China assumed shares in a strategic port in return for debt forgiveness; or Mexico when a 1% interest loan for its 4G network came on the condition that 80% of the funding was spent with Huawei.

Aside from intelligence and geopolitical concerns, the quality of Huawei’s products represents a significant cyber risk, one that has received less attention than it deserves.

On top of that, 5G by itself will significantly increase the threat landscape from a cybersecurity perspective. The network layer will be more intelligent and adaptable through the use of software and cloud services. The number of network antennae will increase by a factor of 20, and many will be poorly secured ‘things’; there is no need for a backdoor if you have any number of ‘bug doors’.

Finally, the US is threatening to limit intelligence sharing with its closest allies if they adopt Huawei. So why would any country even consider using Huawei in their 5G infrastructure?

Different situations

The truth is that not every country is free to manoeuvre; 5G technology will sit on top of existing mobile infrastructure.

Australia and the US can afford to take a hard line: their national infrastructure has been largely Huawei-free since 2012. However, the Chinese firm is deeply embedded in other countries’ existing structures – for example, in the UK, Huawei has provided telecommunications infrastructure since 2005. Even if the UK decided tomorrow to ditch Huawei, it cannot just rip up existing 4G infrastructure. To do so would cost a fortune, risk years of delay in the adoption of 5G and limit competition in 5G provisioning.

As a result, the UK has adopted a pragmatic approach resulting from years of oversight and analysis of Huawei equipment, during which it has never found evidence of malicious Chinese state cyber activity through Huawei.

At the heart of this process is the Huawei Cyber Security Evaluation Centre, which was founded in 2010 as a confidence-building measure. Originally criticized for ‘effectively policing itself’, as it was run and staffed entirely by Huawei, the governance has now been strengthened, with the National Cyber Security Centre chairing its oversight board.

The board’s 2019 report makes grim reading, highlighting ‘serious and system defects in Huawei’s software engineering and cyber security competence’. But it does not accuse the company of serving as a platform for state-sponsored surveillance.

Similar evidence-based policy approaches are emerging in other countries like Norway and Italy. They offer flexibility for governments, for example by limiting access to some contract competition through legitimate and transparent means, such as security reviews during procurement. The approaches also raise security concerns (both national and cyber) to a primary issue when awarding contracts – something that was not always done in the past, when price was the key driver.

The UK is also stressing the need to manage risk and increase vendor diversity in the ecosystem to avoid single points of failure. A further approach that is beginning to emerge is to draw a line between network ‘core’ and ‘periphery’ components, excluding some providers from the more sensitive ‘core’. The limited rollouts of 5G in the UK so far have adopted multi-provider strategies, and only one has reportedly not included Huawei kit.

Managing the risks to cyber security and national security will become more complex in a 5G environment. In global supply chains, bans based on the nationality of the provider offer little assurance. For countries that have already committed to Huawei in the past, and who may not wish to be drawn into an outright trade war with China, these moderate approaches offer a potential way forward.




and

Who Runs the Internet: Internet Consolidation and Control

Research Event

10 December 2019 - 6:00pm to 7:15pm

Chatham House, London

Event participants

Andrew Sullivan, President and CEO, Internet Society
Jennifer Cobbe, Research Associate, Department of Computer Science and Technology, University of Cambridge
Jesse Sowell, Assistant Professor, Department of International Affairs, Bush School of Government and Public Service, Texas A&M University
Chair: Emily Taylor, Associate Fellow, International Security, Chatham House, Editor, Journal of Cyber Policy

In recent years, there has been a growing debate around the influence of a few large internet technology companies on the internet’s infrastructure and over the popular applications and social media platforms that we use every day.

The internet which was once widely viewed as a collective platform for limitless, permissionless innovation, competition and growth, is now increasingly viewed as a consolidated environment dominated by a few. Such market dominance threatens to undermine the internet’s fundamental benefits as a distributed network in which no single entity has control.  

The panel examines the risks of consolidation throughout the internet’s technology stack such as the impact on complex supply chains that support applications, including cloud provisions, ‘as a service’.

It also explores the potential benefits, for example, when building out essential infrastructure to support faster and cheaper internet services in developing economies, consolidation can create economies of scale that bring the resource-intensive building blocks of the internet economy within the reach of new start-ups and innovators.

The panel provides an interdisciplinary perspective exploring the relationship between consolidation and evolutions in the internet infrastructure as well as unpacking its policy implications.

This event supports a special issue of the Journal of Cyber Policy as part of a collaboration between Chatham House and the Internet Society which explores the impact of the consolidation on the internet’s fundamental architecture.

Nilza Amaral

Project Manager, International Security Programme




and

AI-driven Personalization in Digital Media: Political and Societal Implications

2 December 2019

The fallout from disinformation and online manipulation strategies have alerted Western democracies to the novel, nuanced vulnerabilities of our information society. This paper outlines the implications of the adoption of AI by the the legacy media, as well as by the new media, focusing on personalization.

Sophia Ignatidou

Academy Associate, International Security Programme

2019-12-02-AI-Driven-Personalization-small.jpg

The Reuters and other news apps seen on an iPhone, 29 January 2019. Photo: Getty Images.

Summary

  • Machine learning (ML)-driven personalization is fast expanding from social media to the wider information space, encompassing legacy media, multinational conglomerates and digital-native publishers: however, this is happening within a regulatory and oversight vacuum that needs to be addressed as a matter of urgency.
  • Mass-scale adoption of personalization in communication has serious implications for human rights, societal resilience and political security. Data protection, privacy and wrongful discrimination, as well as freedom of opinion and of expression, are some of the areas impacted by this technological transformation.
  • Artificial intelligence (AI) and its ML subset are novel technologies that demand novel ways of approaching oversight, monitoring and analysis. Policymakers, regulators, media professionals and engineers need to be able to conceptualize issues in an interdisciplinary way that is appropriate for sociotechnical systems.
  • Funding needs to be allocated to research into human–computer interaction in information environments, data infrastructure, technology market trends, and the broader impact of ML systems within the communication sector.
  • Although global, high-level ethical frameworks for AI are welcome, they are no substitute for domain- and context-specific codes of ethics. Legacy media and digital-native publishers need to overhaul their editorial codes to make them fit for purpose in a digital ecosystem transformed by ML. Journalistic principles need to be reformulated and refined in the current informational context in order to efficiently inform the ML models built for personalized communication.
  • Codes of ethics will not by themselves be enough, so current regulatory and legislative frameworks as they relate to media need to be reassessed. Media regulators need to develop their in-house capacity for thorough research and monitoring into ML systems, and – when appropriate –proportionate sanctions for actors found to be employing such systems towards malign ends. Collaboration with data protection authorities, competition authorities and national electoral commissions is paramount for preserving the integrity of elections and of a political discourse grounded on democratic principles.
  • Upskilling senior managers and editorial teams is fundamental if media professionals are to be able to engage meaningfully and effectively with data scientists and AI engineers.




and

Trump’s Threat to Target Iran’s Cultural Heritage Is Illegal and Wrong

7 January 2020

Héloïse Goodley

Army Chief of General Staff Research Fellow (2018–19), International Security
Targeting cultural property is rightly prohibited under the 1954 Hague Convention.

2020-01-07-Trump.jpg

Donald Trump at Mar-a-Lago in December. Photo: Getty Images

As tensions escalate in the Middle East, US President Donald Trump has threatened to strike targets in Iran should they seek to retaliate over the killing of Qassem Soleimani. According to the president’s tweet, these sites includes those that are ‘important to Iran and Iranian culture’.

Defense Secretary Mark Esper was quick on Monday to rule out any such action and acknowledged that the US would ‘follow the laws of armed conflict’. But Trump has not since commented further on the matter.

Any move to target Iranian cultural heritage could constitute a breach of the international laws protecting cultural property. Attacks on cultural sites are deemed unlawful under two United Nations conventions; the 1954 Hague Convention for the Protection of Cultural Property during Armed Conflict, and the 1972 UNESCO World Heritage Convention for the Protection of the World Cultural and Natural Heritage.

These have established deliberate attacks on cultural heritage (when not militarily necessary) as a war crime under the Rome Statute of the International Criminal Court in recognition of the irreparable damage that the loss of cultural heritage can have locally, regionally and globally.

These conventions were established in the aftermath of the Second World War, in reaction to the legacy of the massive destruction of cultural property that took place, including the intense bombing of cities, and systematic plunder of artworks across Europe. The conventions recognize that damage to the cultural property of any people means ‘damage to the cultural heritage of all mankind’. The intention of these is to establish a new norm whereby protecting culture and history – that includes cultural and historical property – is as important as safeguarding people.

Such historical sites are important not simply as a matter of buildings and statues, but rather for their symbolic significance in a people’s history and identity. Destroying cultural artefacts is a direct attack on the identity of the population that values them, erasing their memories and historical legacy. Following the heavy bombing of Dresden during the Second World War, one resident summed up the psychological impact of such destruction in observing that ‘you expect people to die, but you don’t expect the buildings to die’.

Targeting sites of cultural significance isn’t just an act of intimidation during conflict. It can also have a lasting effect far beyond the cessation of violence, hampering post-conflict reconciliation and reconstruction, where ruins or the absence of previously significant cultural monuments act as a lasting physical reminder of hostilities.

For example, during the Bosnian War in the 1990s, the Old Bridge in Mostar represented a symbol of centuries of shared cultural heritage and peaceful co-existence between the Serbian and Croat communities. The bridge’s destruction in 1993 at the height of the civil war and the temporary cable bridge which took its place acted as a lasting reminder of the bitter hostilities, prompting its reconstruction a decade later as a mark of the reunification of the ethnically divided town.

More recently, the destruction of cultural property has been a feature of terrorist organizations, such as the Taliban’s demolition of the 1,700-year-old Buddhas of Bamiyan in 2001, eliciting international condemnation. Similarly, in Iraq in 2014 following ISIS’s seizure of the city of Mosul, the terrorist group set about systematically destroying a number of cultural sites, including the Great Mosque of al-Nuri with its leaning minaret, which had stood since 1172. And in Syria, the ancient city of Palmyra was destroyed by ISIS in 2015, who attacked its archaeological sites with bulldozers and explosives.

Such violations go beyond destruction: they include the looting of archaeological sites and trafficking of cultural objects, which are used to finance terrorist activities, which are also prohibited under the 1954 Hague Convention.

As a war crime, the destruction of cultural property has been successfully prosecuted in the International Criminal Court, which sentenced Ahmad Al-Faqi Al-Mahdi to nine years in jail in 2016 for his part in the destruction of the Timbuktu mausoleums in Mali. Mahdi led members of Al-Qaeda in the Islamic Maghreb to destroy mausoleums and monuments of cultural and religious importance in Timbuktu, irreversibly erasing what the chief prosecutor described as ‘the embodiment of Malian history captured in tangible form from an era long gone’.

Targeting cultural property is prohibited under customary international humanitarian law, not only by the Hague Convention. But the Convention sets out detailed regulations for protection of such property, and it has taken some states a lot of time to provide for these.

Although the UK was an original signatory to the 1954 Hague Convention, it did not ratify it until 2017, introducing into law the Cultural Property (Armed Conflicts) Act 2017, and setting up the Cultural Protection Fund to safeguard heritage of international importance threatened by conflict in countries across the Middle East and North Africa.

Ostensibly, the UK’s delay in ratifying the convention lay in concerns over the definition of key terms and adequate criminal sanctions, which were addressed in the Second Protocol in 1999. However, changing social attitudes towards the plunder of antiquities, and an alarming increase in the use of cultural destruction as a weapon of war by extremist groups to eliminate cultures that do not align with their own ideology, eventually compelled the UK to act.

In the US, it is notoriously difficult to get the necessary majority for the approval of any treaty in the Senate; for the Hague Convention, approval was achieved in 2008, following which the US ratified the Convention in 2009.

Destroying the buildings and monuments which form the common heritage of humanity is to wipe out the physical record of who we are. People are people within a place, and they draw meaning about who they are from their surroundings. Religious buildings, historical sites, works of art, monuments and historic artefacts all tell the story of who we are and how we got here. We have a responsibility to protect them.




and

The Commonwealth Cyber Declaration: Achievements and Way Forward

Invitation Only Research Event

4 February 2020 - 9:15am to 5:30pm

Chatham House, London

In April 2018, the Commonwealth Heads of Government Meeting (CHOGM), held in London, saw the creation and the adoption of the Commonwealth Cyber Declaration. The declaration outlines the framework for a concerted effort to advance cybersecurity practices to promote a safe and prosperous cyberspace for Commonwealth citizens, businesses and societies. 

The conference will aim to provide an overview on the progress made on cybersecurity in the Commonwealth since the declaration was announced in 2018. In addition, it will examine future challenges and potential solutions going forward.

This conference is part of the International Security Programme's project on Implementing the Commonwealth Cybersecurity Agenda and will convene a range of senior Commonwealth representatives as well as a selection of civil society and industry stakeholders. This project aims to develop a pan-Commonwealth platform to take the Commonwealth Cyber Declaration forward by means of a holistic, inclusive and representative approach.

Please see below meeting summaries from previous events on Cybersecurity in the Commonwealth:  

Attendance at this event is by invitation only. 

Esther Naylor

Research Assistant, International Security Programme
+44 (0)20 7314 3628




and

Ana Alecsandru

Research Assistant, International Security Programme

Biography

Ana Alecsandru is a research assistant for the International Security programme, covering projects related to nuclear weapons policy and emerging technologies. She is also a PhD candidate at the University of Birmingham (awaiting Viva examination).

Her doctoral research examined the relationship between trust and verification in nuclear arms control negotiations between the United States and Russia.

Prior to joining Chatham House, she worked at the University of Birmingham on various projects concerning nuclear weapons policy while doing her PhD.

Ana completed an internship in the Arms Control, Disarmament, and WMD Non-Proliferation Centre at NATO HQ in Brussels in 2014. She was also a research intern at the United Nations Office for Disarmament Affairs (UNODA) in New York in 2016.

During her doctoral studies, she received full grants to participate in the 2017 IGCC’s Public Policy and Nuclear Threats Boot Camp hosted at UC San Diego and the 2017 Nuclear Safeguards and Non-Proliferation Training Course hosted by the European Commission’s Research Centre in Ispra.

Ana holds an MA in Security Studies and an MA in Research Methods from the University of Birmingham. She completed her BSc (hons) in International Relations at the University of Bath. For her doctoral research, she was awarded a studentship by the UK Economic and Social Research Council. 

Areas of expertise

  • Nuclear weapons policy
  • Nuclear arms control and strategic stability
  • Emerging military technologies
  • Emotions in strategic decision-making




and

The Smart Peace Initiative: An Integrated and Adaptive Approach to Building Peace

Invitation Only Research Event

12 May 2020 - 10:00am to 11:30am
Add to Calendar

Smart Peace brings together global expertise in conflict analysis and research, peacebuilding and mediation programming, and behavioural science and evaluation. Together, Smart Peace partners are developing integrated and adaptive peace initiatives, working with local partners to prevent and resolve complex and intractable conflicts in Central African Republic, Myanmar and northern Nigeria.
 
This roundtable is an opportunity for Smart Peace partners to share the Smart Peace concept, approach and objectives, and experiences of the first phases of programme implementation. Roundtable discussions among participants from policy, practice and research communities will inform future priorities and planning for Smart Peace learning, advocacy and communication.
 
Smart Peace partners include Conciliation Resources, Behavioural Insights Team, The Centre for Humanitarian Dialogue, Chatham House, ETH Zurich, International Crisis Group and The Asia Foundation.

Nilza Amaral

Project Manager, International Security Programme