la The Universal Declaration of Human Rights at 70 By feedproxy.google.com Published On :: Fri, 02 Nov 2018 14:05:01 +0000 Research Event 29 November 2018 - 6:00pm to 7:30pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Phil Bloomer, Executive Director, Business & Human Rights Resource CentreJulie Broome, Director, Ariadne NetworkAllison Corkery, Director of Rights Claiming and Accountability Program, Centre for Economic and Social Rights; Atlantic Fellow for Social and Economic Equity, London School of EconomicsChair: Sonya Sceats, Associate Fellow, International Law Programme The Universal Declaration of Human Rights celebrates its 70th anniversary against a backdrop of fractured global politics and the rise of nationalist forces that reject many of the values the Declaration espouses.What strategies, tools and networks are civil society and other actors developing to adapt to this complex environment for human rights work?And what role does the Declaration and the human rights treaties it has inspired play in shaping responses to current global challenges such as deepening inequality, new forms of technology and climate change? Department/project International Law Programme, Rights, Accountability and Justice Chanu Peiris Programme Manager, International Law +44 (0)20 7314 3686 Email Full Article
la London Launch: Protecting Civilians — When is ‘Incidental Harm’ Excessive? By feedproxy.google.com Published On :: Tue, 06 Nov 2018 18:25:01 +0000 Research Event 14 January 2019 - 5:30pm to 7:00pm Chatham House, London Event participants Emanuela-Chiara Gillard, Associate Fellow, International Law Programme, Chatham HouseEzequiel Heffes, Thematic Legal Adviser, Geneva CallSigrid Redse Johansen, Judge Advocate General, Norwegian Armed ForcesAndrew Murdoch, Legal Director, UK Foreign & Commonwealth OfficeChair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House There have been large numbers of civilian deaths in the armed conflicts in Yemen and Syria. Is international humanitarian law being ignored?This meeting marks the London launch of a Chatham House research paper on the incidental harm side of the proportionality assessment which belligerents are legally required to make. The panel at the meeting will consider the types of harm that fall within the scope of proportionality assessments, what constitutes ‘excessive’ harm and measures that belligerents can take to give effect to the rule on proportionality.This event will be followed by a reception. Department/project International Law Programme, Rights, Accountability and Justice Chanu Peiris Programme Manager, International Law +44 (0)20 7314 3686 Email Full Article
la How Human Rights Law Is Evolving to Address Inequality By feedproxy.google.com Published On :: Mon, 10 Dec 2018 13:15:42 +0000 10 December 2018 Chanu Peiris Programme Manager, International Law Programme @chanupeiris On the 70th anniversary of the Universal Declaration of Human Rights, Chanu Peiris examines how its principles apply to one of today’s burning political issues. 2018-12-10-UDHR.jpg Copies of the Universal Declaration of Human Rights in a variety of languages. Photo: Getty Images. There is growing attention to human rights in debates on economic inequality. In the UK, concerns about the disproportionate impact of economic policy on vulnerable groups have been raised recently by the UN special rapporteur on extreme poverty and human rights – who issued a statement criticizing the Conservative government’s austerity policies – as well as in a report from the UK government’s independent Equality and Human Rights Commission. These reports echo global concerns about fiscal policies, poverty and extreme economic inequality.The Universal Declaration of Human Rights – which celebrates its 70th anniversary today – and the human rights treaties it inspired do not expressly address income and wealth gaps. But international human rights law is playing an increasing role in addressing economic polarization. Those concerned about inequality should consider how, especially over the past 25 years, the principles of socioeconomic rights have been clarified by courts and other human rights mechanisms. While the focus in the Global North has historically been on civil and political rights, such as the prohibition on torture or the right to fair trial, international human rights law does set out economic and social rights. For example, Article 23(4) of the Declaration – which is replicated in the International Covenant on Economic, Social and Cultural Rights and other treaties – calls for the right to collective bargaining in employment. Weakening protection in this area has been raised as a partial cause of the current escalation in income inequality. Human rights law also guarantees rights, including to education, healthcare and social security, that have redistributive potential and so have the potential to mitigate inequality.Human rights law recognizes that fulfilment of economic and social rights, unlike civil and political rights, can be limited by the resources available to different states, and this conditionality – along with a lack of guidelines to assist with implementation and monitoring – has historically shielded fiscal policies from human rights scrutiny. However, attitudes have shifted.For example, international human rights law has come to embody a commitment to tackling substantive inequalities which impair human dignity. This requires the state regulate markets, and redistribute resources, in order to prevent discrimination against disadvantaged groups such as the poor. The UN Committee on Economic, Social and Cultural Rights and other human rights bodies assert that states have an immediate obligation, even during times of resource constraint, to ensure the fulfilment, without discrimination, of the minimum essential levels of socioeconomic rights, for example essential subsistence and basic shelter. Thus, austerity measures that scale back the enjoyment of rights may breach human rights standards. In order to justify such measures, governments need to first demonstrate they have considered ‘less restrictive’ avenues, including taxation options.Although the application of human rights standards to economic policy is an emerging area, human rights campaigners have been successfully leveraging these protections to address the causes and consequences of the inequality crisis. For example, in case No. 66/2011 the European Committee of Social Rights overturned austerity measures that would have brought wages under the poverty level, citing breaches of labour rights and protections against discrimination. In Brazil, a coalition of civil society actors successfully used human rights standards to legitimize their critiques of a 2008 tax reform bill that would have given additional tax breaks to the wealthy while withdrawing resources for social services.Beyond legal enforcement, framing concerns within the architecture of human rights can shift power to rights-bearers and move debates on tackling extreme inequality from the policy sphere into one where the state has a duty for which it is accountable. While the state bears primary responsibility for realizing human rights, non-state actors such as businesses have responsibilities to respect human rights. Thus, human rights can also help communities to recast the scope of the crisis to one of shared responsibility.While human rights have seen many normative developments and advocacy successes since the adoption of the Universal Declaration of Human Rights, the last 70 years also offer several lessons and strategies to adopt going forward. As highlighted at a recent Chatham House event, the continued emphasis on civil and political rights in the discussion about human rights is at odds with the lived experience of individuals and communities worldwide, who may not feel their economic and material concerns are reflected in campaigns for human rights.There will need to be a greater emphasis on adapting messaging to be more inclusive and to build alliances between disparate groups. Human rights analysis will also need to move beyond documenting the impact of systemic issues towards tackling root causes and creating a positive vision for economic inclusion and governance. Full Article
la Security and Prosperity in the Asia-Pacific: The Role of International Law By feedproxy.google.com Published On :: Thu, 17 Jan 2019 11:25:01 +0000 Research Event 27 March 2019 - 10:00am to 5:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Agendapdf | 119.32 KB Security and Prosperity in Asia: The Role of International Lawpdf | 881.12 KB Event participants Koji Tsuruoka, Ambassador of Japan to the United KingdomBen Saul, Associate Fellow, International Law Programme, Chatham House; Challis Chair of International Law, Australian National UniversityLee Chen Chen, Director, Singapore Institute of International AffairsAniruddha Rajput, Member, UN International Law Commission; Consultant, Withersworldwide The rapid growth in the Asia-Pacific’s economic and political power has significant implications for global governance. Asia-Pacific countries such as Japan, India and China – and regional bodies such as ASEAN – are increasingly informing, influencing and seeking to shape international standards and norms.This conference will bring together international law and policy experts to explore the political and legal dynamics affecting economic relations, security challenges and maritime governance in the region.Given security and prosperity challenges within the region as well as the increasingly complex environment for global governance, to what extent is international law operating as a tool of cooperation in the Asia-Pacific? In which areas is it a source of friction?And what are the broader implications for global governance including the development of international law? Department/project International Law Programme, Asia-Pacific Programme, Geopolitics and Governance Chanu Peiris Programme Manager, International Law +44 (0)20 7314 3686 Email Full Article
la Protection of the Wounded and Medical Care-Givers in Armed Conflict: Is the Law Up to the Job? By feedproxy.google.com Published On :: Wed, 27 Feb 2019 10:21:55 +0000 Research Event 16 May 2019 - 5:30pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Françoise Bouchet-Saulnier, Legal Director, Médecins Sans FrontièresEzequiel Heffes, Thematic Legal Adviser, Geneva CallRain Liivoja, Associate Professor, University of QueenslandMaciej Polkowski, Head, Health Care in Danger Initiative, International Committee of the Red CrossChair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House This meeting, supported by the British Red Cross, is the first in a series of three to commemorate the 70th anniversary of the 1949 Geneva Conventions. The meeting will focus on the protection of the wounded and sick in armed conflict and will also include discussion of challenges to the protection of medical care and of health providers.Attacks on health care personnel and facilities have increased in recent years, as have the instances in which proceedings have been brought against those providing medical care to wounded fighters, including under counter-terrorism measures.The Geneva Conventions and their Protocols give protection to the wounded and sick and to healthcare providers, but is the law adequate? Is the law sufficiently widely known? How can the law be more fully implemented? What particular challenges arise in non-international armed conflicts?This event will be followed by a drinks reception. Department/project International Law Programme, The Limits on War and Preserving the Peace Full Article
la State Cyber Interventions Below the Threshold of the Use of Force: Challenges in the Application of International Law By feedproxy.google.com Published On :: Wed, 17 Apr 2019 10:45:01 +0000 Invitation Only Research Event 30 April 2019 - 10:00am to 4:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Chair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House Under what circumstances will a state-sponsored cyberattack on another state that falls below the threshold of the use of force be a breach of international law – for example, hacking into another state’s electoral databases, usurping inherently governmental functions such as parliamentary processes or an attack on another state’s financial system? In the dynamic field of state cyber operations, persistent, low-level cyberattacks are increasing, as are multilateral attempts to attribute the attacks to the states responsible. There is general agreement that international law applies to cyberspace but the question is how it applies and with what consequences. This meeting will bring together a small group of academics and practitioners to explore the application of international law to states’ cyber operations that interfere in the internal affairs of another state and which fall below the threshold of the use of force. What is the law on non-intervention in international law and how does it apply to states’ cyber activities? Does the Nicaragua case represent the best expression of the law in this area including the requirement of coercion? And are there any other principles of international law that are relevant? The meeting will also consider processes and procedures for agreeing on the law and best practices. The purpose of the meeting will be to inform a research paper by Chatham House. Attendance at this event is by invitation only. Event attributes Chatham House Rule Department/project International Law Programme Full Article
la Engage China to Uphold Multilateralism – But Not at Any Cost By feedproxy.google.com Published On :: Thu, 23 May 2019 11:14:05 +0000 12 June 2019 Harriet Moynihan Senior Research Fellow, International Law Programme @HarrietMoyniha9 Where China’s interests align with those of the international community, there are opportunities for the country’s influence and economic power to strengthen the rules-based international order. Where they do not, states that traditionally support that order should join together to push back. 2019-02-01-China.jpg Students holding Chinese national flags watch the live broadcast of the 40th anniversary celebration of China's reform and opening-up at Huaibei Normal University on 18 December. Photo: Getty Images. China’s adherence to the rules-based international system is selective, prioritizing certain rules in favour of others. States supportive of that ‘system’ – or, as some argue, systems[1] – should identify areas of mutual strategic interest so that they can draw China further into the global rules-based order and leverage China as a constructive player that potentially also contributes to improvements in such areas. This is particularly apposite at a time when the US is in retreat from multilateralism and Russia seems bent on disrupting the rules-based international order.Supportive playerThere are many reasons for actively engaging with China on mutual areas of interest. China is a committed multilateralist in many areas, recognizing that often international cooperation and frameworks hold the key to its domestic problems, for example in the fields of environmental sustainability and financial regulation.China’s economic power is valuable in upholding international institutions: China is the UN’s third-largest donor (after the US and Japan) at a time when the UN is facing budgetary shortfalls. China is also the second-highest contributor to the UN peacekeeping budget, and the largest contributor of peacekeeping forces among the five permanent members of the UN Security Council.China also has a valuable role to play in the settlement of international disputes over trade and investment. China is a big supporter of the World Trade Organization (WTO)’s dispute settlement mechanism, and one of its most active participants;[2] China is currently playing an active role in negotiations to save the WTO’s appellate mechanism from folding in the wake of the US’s refusal to nominate new judges.The last 15 years have also seen a major shift in Chinese attitudes to investment arbitration, from a general suspicion and limitation of arbitration rights to broad acceptance and incorporation of such rights in China’s trade and investment treaties. China is actively engaged in multilateral negotiations through the UN Commission on International Trade Law (UNCITRAL) on reforms to investor–state dispute settlement.China has shown leadership on global climate change diplomacy, urging nations to remain committed to the Paris Agreement in the wake of the US decision to pull out, and has been an important interlocutor with the UK and the EU on these issues. As a strong supporter of the Paris Agreement, but also as the world’s top emitter of carbon dioxide, China has a crucial role to play in pushing forward implementation of the Paris targets. Despite its high emissions, China remains one of the few major economies on track to meet its targets,[3] giving it greater leverage to peer review other parties’ efforts.A recent report by the UK parliament’s Foreign Affairs Committee (FAC), on China and the rules-based international order, noted that where a body of trust and goodwill is developed with China, there is the possibility of discovering interests that coincide and the ability to work together on issues mutually regarded as of global importance. The report refers to a number of success stories from UK partnership with China in multilateral forums, including in counterproliferation and global health.[4]Developing areas of global governanceAs well as working with the current system, China is increasingly involved in the shaping of newer areas of international law – whether it be submissions to the International Tribunal for the Law of the Sea (ITLOS) on procedural rules for the emerging deep-sea mining regime or pitching for a greater role in Arctic governance.[5]This enthusiasm should be harnessed to promote the international rule of law, but at the same time there needs to be recognition of the strategic goals that drive China’s engagement. China’s interest in the Arctic, while including the desire to protect its ecology and environment, is also about access to marine resources, as well as about the Arctic’s strategic potential for China’s military.China’s submissions to ITLOS on the rules of procedure for deep-sea mining are constructive, but also reflect an ambition to secure first-mover advantage when commercial mining eventually takes place. Like other major powers working in this policy area, China’s actions are guided by self-interest, but that doesn’t mean its goals can’t be pursued through multilateral rules.China is also interested in creating new international structures and instruments that further its strategic aims. For example, with Russia (through the Shanghai Cooperation Organisation) it has proposed an International Code of Conduct for Information Security in the UN.[6]China is also pondering an array of options for dispute-resolution mechanisms for its Belt and Road projects, including the possibility of an Asian version of the international Convention on the Settlement of Investment Disputes, which might sit under the auspices of the Asian Infrastructure Investment Bank (AIIB).[7]The creation of new instruments and institutions need not be a threat to the rules-based international order in itself. We have already seen a combination of the creation of parallel complementary regimes alongside the reform of existing institutions, for example in development financing through the AIIB or the New Development Bank (often referred to as the ‘BRICS Bank’); these two banks are relatively conventionally structured along the lines of Western-dominated institutions, albeit with greater Chinese control. Based on these examples, selective adaptation seems more likely than a hostile ‘Eastphalian’ takeover.[8]RisksThere is, however, a real risk that in certain areas China may promote a rival authoritarian model of governance, assisted by an opportunistic convergence with Russia on issues such as human rights, development and internet governance. In areas where China’s core interests clash with those of the rules-based international order, China has shown itself to be unbending, as in its refusal to abide by the July 2016 decision of the Permanent Court of Arbitration in its dispute with the Philippines over the South China Sea.[9]China is becoming more assertive at the UN, but while it seeks to project itself there as a responsible emerging global leader, it is promoting a vision that weakens international norms of human rights, transparency and accountability,[10] while also carrying out practices domestically that raise serious human rights concerns (not least the detention of hundreds of thousands of Uighurs in re-education camps in Xinjiang).[11]China’s increased dominance geographically and geopolitically through its Belt and Road infrastructure projects carries with it a number of social and economic risks, including smaller states becoming trapped in unsustainable financial debts to China.But at a recent Chatham House conference on Asia and international law, participants highlighted the limitations on how far China can shape an alternative governance model.[12] China currently lacks soft power, cultural power and language power, all of which are needed in order to embed an alternative model abroad. China also currently lacks capacity and confidence to build coalitions with other states in the UN.Where it has tried to get buy-in from the international community for its new institutions, such as the China International Commercial Court (CICC) announced in July 2018, there has been scepticism about the standards to be applied.[13] Unless the court can demonstrate sufficient due process, international parties are likely to prefer other centres with a strong reputation for upholding the rule of law, such as those in London, Dubai and Singapore.Where China does promote its own governance model at the expense of the rules-based international order, states are starting to push back, often in concert. EU member states so far have adopted a joined-up approach to the Belt and Road Initiative. With the exception of Italy, they have refused to sign a Memorandum of Understanding on participation unless China provides much greater transparency on its compliance with international standards.The EU also recently presented a coordinated response to China on the situation in Xinjiang.[14] Similarly, members of the so-called ‘Five Eyes’ intelligence-sharing alliance (comprising Australia, Canada, New Zealand, the UK and the US) have acted together in relation to certain incidents of cyber interference attributed to China.[15]There are also signs of pushback from smaller states closer to home in relation to challenges to national sovereignty, debt diplomacy and financial viability arising from Belt and Road projects. The Sri Lankan government recently reversed the award of a $300 million housing deal to China, instead opting for a joint venture with an Indian company.China has been downscaling its investments as a way to counter some of the backlash it has received: the most recent Belt and Road summit put forward a more modest set of aspirations. This suggests that there is some scope for states to stand up to China and use leverage to secure better deals.Many international institutions have been Western-dominated for years;[16] China, together with many emerging and middle powers, has felt for some time that the international architecture does not reflect the world we live in. Given that context, states that champion the rules-based international order should acknowledge China’s desire to update the international order to reflect greater multipolarity, globalization and technological change, while being clear-eyed about their engagement with China. This involves investing in a proper understanding of China and how it works.[17]Where possible, cooperation with China should lead to outcomes that are backed up by international standards and transparency. The above-mentioned FAC report cites evidence that the UK’s support, and that of other developed countries, had a positive impact in shaping the governance and standards of the AIIB.[18] China has brought in international experts to advise on disputes before the CIIC, which may reassure would-be litigants.China’s relationship with the rules-based international order needs to be assessed pragmatically and dynamically. China can be a valuable partner in many areas where its objectives are closely aligned with those of the international community – from trade to climate change to peacekeeping.But where the country’s core interests are at odds with those of the wider international community, an increasingly confident China will strongly resist pressure, including on the South China Sea and human rights. In these areas, states supportive of international law can most powerfully push back through alliances and by ensuring that their own core values are not compromised in the interests of economic benefits.What needs to happenChina’s rising power and selective commitment to multilateralism make it a potentially influential ally in modernizing international governance.China is increasingly involved in shaping newer areas of international law. This enthusiasm could be harnessed in the service of institutional development and reform.Other states should identify areas of mutual strategic interest where China may offer a constructive role, including dispute settlement, health and climate change.However, engagement must not ignore the strategic calculations that drive China’s agenda, or its poor record on civil and political rights, transparency and accountability.Cooperation with China should lead to outcomes that are backed up by international standards and transparency.Where China’s actions undermine the rules-based international order, coordinated action by states supportive of that order is likely to be more effective than acting individually.Notes[1] Chalmers, M. (2019), Which Rules? Why There is No Single ‘Rules-Based International System’, RUSI Occasional Paper, April 2019, London: Royal United Services Institute, https://rusi.org/occasional-papers/Which-Rules-Why-There-Is-No-Single-Rules-Based-International-System.[2] See, for example, Moynihan, H. (2017), China’s Evolving Approach to International Dispute Settlement, Briefing, London: Royal Institute of International Affairs, https://www.chathamhouse.org/publication/chinas-evolving-approach-international-dispute-settlement.[3] UN Environment (2018), Emissions Gap Report 2018, p. XVII, https://www.unenvironment.org/resources/emissions-gap-report-2018.[4] House of Commons Foreign Affairs Committee (2019), China and the Rules-Based International System: Sixteenth Report of Session 2017–19, p. 32, https://publications.parliament.uk/pa/cm201719/cmselect/cmfaff/612/612.pdf.[5] Moynihan, H. (2018), ‘China Expands Its Global Governance Ambitions in the Arctic’, Expert Comment, 15 October 2018, https://www.chathamhouse.org/expert/comment/china-expands-its-global-governance-ambitions-arctic.[6] Updated version proposed 9 January 2015.[7] Moynihan, H. (2018), ‘Exploring Public International Law Issues with Chinese Scholars – Part Four’, Meeting Summary, 3 June 2018, https://www.chathamhouse.org/publication/exploring-public-international-law-issues-chinese-scholars-part-four.[8] Chatham House (2019, forthcoming, ‘Security and Prosperity in the Asia-Pacific: The Role of International Law’, conference summary, https://www.chathamhouse.org/event/security-and-prosperity-asia-pacific-role-international-law.[9] Permanent Court of Arbitration Case No. 2013-19 (Philippines v China), Award of 12 July 2016, https://pca-cpa.org/wp-content/uploads/sites/6/2016/07/PH-CN-20160712-Award.pdf.[10] Piccone, T. (2018), China’s Long Game on Human Rights at the United Nations, Washington, DC: Brookings Institution, https://www.brookings.edu/wp-content/uploads/2018/09/FP_20181009_china_human_rights.pdf.[11] Wye, R. (2018), ‘‘The entire Uyghur population is seemingly being treated as suspect’: China’s persecution of its Muslim minority’, LSE Religion and Global Society blog, 18 September 2018, https://blogs.lse.ac.uk/religionglobalsociety/2018/09/the-entire-uyghur-population-is-seemingly-being-treated-as-suspect-chinas-persecution-of-its-muslim-minority/.[12] Chatham House (2019, forthcoming, ‘Security and Prosperity in the Asia-Pacific: The Role of International Law’.[13] Walters, M. (2018), ‘Jury is out over China’s new commercial court, say lawyers’, Law Society Gazette, 1 November 2018, https://www.lawgazette.co.uk/law/jury-is-out-over-chinas-new-commercial-court-say-lawyers/5068125.article.[14] The Economist (2019), ‘Hope remains for Western solidarity. Look at embassies in Beijing’, 17 April 2019, https://www.economist.com/china/2019/04/20/hope-remains-for-western-solidarity-look-at-embassies-in-beijing.[15] In December 2018, the Five Eyes attributed the activities of a Chinese cyber espionage group targeting intellectual property and sensitive commercial property to China’s Ministry of State Security.[16] Roberts, A. (2017), Is International Law International?, Oxford: Oxford University Press.[17] Parton, C. (2019), China–UK Relations: Where to Draw the Border Between Influence and Interference?, RUSI Occasional Paper, February 2019, London: Royal United Services Institute, p. 30, https://rusi.org/publication/occasional-papers/china-uk-relations-where-draw-border-between-influence-and.[18] House of Commons Foreign Affairs Committee (2019), China and the Rules-Based International System, p. 15.This essay was produced for the 2019 edition of Chatham House Expert Perspectives – our annual survey of risks and opportunities in global affairs – in which our researchers identify areas where the current sets of rules, institutions and mechanisms for peaceful international cooperation are falling short, and present ideas for reform and modernization. Full Article
la Sieges, the Law and Protecting Civilians By feedproxy.google.com Published On :: Thu, 27 Jun 2019 10:35:30 +0000 27 June 2019 Siege warfare has been employed throughout the ages and remains dramatically relevant today. Questions of the compatibility of this practice with international humanitarian law (IHL) arise when besieged areas contain civilians as well as enemy forces. This briefing addresses those rules of IHL that are particularly relevant to sieges. Read online Download PDF Emanuela-Chiara Gillard Associate Fellow, International Law Programme 2019-06-27-Syrian-Family.jpg A Syrian family gather to eat a plate of corn and cabbage in Saqba, in the besieged rebel-held Eastern Ghouta area near Damascus on 6 November 2017. Photo: Getty Images SummaryAlthough sieges may conjure up images of medieval warfare, they are still used by armed forces today, in international and non-international armed conflicts.International law does not define sieges, but their essence is the isolation of enemy forces from reinforcements and supplies. Sieges typically combine two elements: ‘encirclement’ of an area for the purpose of isolating it, and bombardment.Questions of the compatibility of sieges with modern rules of international humanitarian law (IHL) arise when besieged areas contain civilians as well as enemy forces.Sieges are not prohibited as such by either IHL or other areas of public international law.Three sets of rules of IHL are relevant to sieges. The first comprises the rules regulating the conduct of hostilities. The second is the prohibition of starvation of civilians as a method of warfare, along with the rules regulating humanitarian relief operations. The third comprises the rules on evacuation of civilians.The application of IHL to sieges is unsettled in some respects. This briefing does not purport to resolve all the difficulties or address all the issues in detail.While it may go too far to say that it is now impossible to conduct a siege that complies with IHL, the significant vulnerability of civilians caught up in sieges puts particular emphasis on the need for both besieging and besieged forces to comply scrupulously with the legal provisions for the protection of civilians and to conclude agreements for their evacuation. Department/project International Law Programme, The Limits on War and Preserving the Peace Full Article
la Tackling Cyber Disinformation in Elections: Applying International Human Rights Law By feedproxy.google.com Published On :: Wed, 18 Sep 2019 10:30:02 +0000 Research Event Tackling Cyber Disinformation in Elections: Applying International Human Rights Law 6 November 2019 - 5:30pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Susie Alegre, Barrister and Associate Tenant, Doughty Street ChambersEvelyn Aswad, Professor of Law and the Herman G. Kaiser Chair in International Law, University of OklahomaBarbora Bukovská, Senior Director for Law and Policy, Article 19Kate Jones, Director, Diplomatic Studies Programme, University of OxfordChair: Harriet Moynihan, Associate Fellow, International Law Programme, Chatham House Register Interest Cyber operations are increasingly used by political parties, their supporters and foreign states to influence electorates – from algorithms promoting specific messages to micro-targeting based on personal data and the creation of filter bubbles. The risks of digital tools spreading disinformation and polarizing debate, as opposed to deepening democratic engagement, have been highlighted by concerns over cyber interference in the UK’s Brexit referendum, the 2016 US presidential elections and in Ukraine. While some governments are adopting legislation in an attempt to address some of these issues, for example Germany’s ‘NetzDG’ law and France’s ‘Law against the manipulation of information’, other countries have proposed an independent regulator as in the case of the UK’s Online Harms white paper. Meanwhile, the digital platforms, as the curators of content, are under increasing pressure to take their own measures to address data mining and manipulation in the context of elections. How do international human rights standards, for example on freedom of thought, expression and privacy, guide the use of digital technology in the electoral context? What practical steps can governments and technology actors take to ensure policies, laws and practices are in line with these fundamental standards? And with a general election looming in the UK, will these steps come soon enough? This event brings together a wide range of stakeholders including civil society, the tech sector, legal experts and government, coincides with the publication of a Chatham House research paper on disinformation, elections and the human rights framework. Jacqueline Rowe Programme Assistant, International Law Programme 020 7389 3287 Email Department/project International Law Programme, Cyber, Sovereignty and Human Rights, Rights, Accountability and Justice Full Article
la In Judging Prorogation, UK Supreme Court Marks Evolution, Not Revolution, in Law By feedproxy.google.com Published On :: Thu, 03 Oct 2019 07:49:48 +0000 3 October 2019 Ruma Mandal Director, International Law Programme @RumaCHLaw Despite the political significance, last week’s judgment does not signal a newly activist court. 2019-10-03-UKSC.jpg The Supreme Court building in Westminster. Photo: Getty Images. The UK Supreme Court’s ruling last Wednesday has, at least temporarily, scuppered the prime minister’s plans to limit parliamentary debate before the looming Brexit deadline. Some of the prime minister’s allies have attacked the ruling as a ‘constitutional coup’. But a close reading reveals that the court has stayed within its remit to interpret, rather than make, the law.In a carefully reasoned judgment, the court emphasized that the case was not about Brexit. But the judges certainly did not shy away from the extraordinary nature of the matters before it, noting that such factual situations have ‘never arisen before and are unlikely ever to arise again… But our law is used to rising to such challenges and supplies us with the legal tools to enable us to reason to a solution.’The key question before the court was whether the prime minister’s decision to seek prorogation was ‘justiciable’ – i.e. amenable to being reviewed by a court. The English and Scottish courts earlier on in these proceedings had come, dramatically, to opposing views on this.The Supreme Court was not dissuaded by the inherently political considerations involved in the prime minister’s decision, stating that while ‘courts cannot decide political questions, the fact that a legal dispute concerns the conduct of politicians, or arises from a matter of political controversy, has never been sufficient reason for the courts to refuse to consider it’.The court went on to emphasize that the Crown’s remaining prerogative powers (exercised on the advice of the government or directly by ministers) have long been subject to judicial scrutiny; such oversight is essential to guarding the separation of powers underpinning the UK’s constitution.So far, so conventional. The full bench of the Supreme Court was required to grapple, though, with a prerogative power that had never been tested before in the courts. And so they delved back to the 1611 Case of Proclamations: ‘the King hath no prerogative, but that which the law of the land allow him’. In the court’s view, the legal issue to be resolved was the scope of the power to prorogue (the existence of this particular prerogative not being in dispute).With no case law available to provide direct guidance on this question, the court, instead, relied on two fundamental principles of the UK’s constitution – parliamentary sovereignty and parliamentary accountability. What would be the logical consequence of an unlimited power to prorogue? The ability to shut parliament permanently.The conclusion: this particular prerogative power had limits. The court held that:‘A decision to prorogue Parliament (or to advise the monarch to prorogue Parliament) will be unlawful if the prorogation has the effect of frustrating or preventing, without reasonable justification, the ability of Parliament to carry out its constitutional functions as a legislature and as the body responsible for the supervision of the executive. In such a situation, the court will intervene if the effect is sufficiently serious to justify such an exceptional course.’Having come to this conclusion, the court was left to examine what justification had in fact been given, noting that the prime minister’s motives were irrelevant. It noted that no clear reason had been given – the relevant documents were all concerned with preparing for the Queen’s speech.Noting evidence on normal practice for such preparations, including from a former prime minister, the court found it ‘impossible… to conclude…that there was any reason – let alone a good reason – to advise Her Majesty to prorogue Parliament for five weeks’.The court’s decision was neither inevitable nor a radical departure from legal tradition. It represents the gradual evolution of the long-established legal principle that the crown’s powers are set by the law and supervised by the courts.Courts have traditionally been reticent to rule on prerogative powers which are ‘high politics’ by nature – classic examples include declaring war and negotiating treaties. In recent years, though, the judiciary has shown a growing confidence to grapple with the contours of those prerogative powers that remain. Deference is still shown when looking at how those powers have been used as opposed to the limits of the prerogative in question.The Supreme Court ruling won’t reassure those who worry about the emergence of an activist court willing to wade (improperly) into the political arena. Nor will it necessarily bring comfort to those anxious about an unwritten constitution in an era where political conventions are fast unravelling.But divisive court rulings are nothing new, nor are ministerial outbursts about inconvenient judgments. In the current environment, politicians should take particular care not to send mixed messages which undermine the independence of the UK’s judiciary. Public trust in British institutions is dangerously low and the UK can ill-afford further damage to its reputation as a country steeped in democracy and the rule of law. Full Article
la Sovereignty and Non-Intervention: The Application of International Law to State Cyberattacks By feedproxy.google.com Published On :: Fri, 01 Nov 2019 10:55:01 +0000 Research Event 4 December 2019 - 5:30pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Douglas, Legal Director, GCHQZhixiong Huang, Luojia Chair of International Law, Wuhan UniversityNemanja Malisevic, Director of Digital Diplomacy, MicrosoftHarriet Moynihan, Associate Fellow, International Law Programme, Chatham HouseChair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House International law applies to cyber operations – but views differ on exactly how. Does state-sponsored interference in another state's affairs using cyber means – for example, disinformation campaigns in elections, disabling government websites, or disrupting transport systems – breach international law? If so, on what basis and how are the principles of sovereignty and non-intervention relevant? States are increasingly attributing cyber operations to other states and engaging in the debate on how international law applies, including circumstances that would justify countermeasures.As states meet to debate these issues at the UN, the panel will explore how international law regulates cyberoperations by states, consider the prospects of progress at the UN, and assess the value of other initiatives.This event coincides with the launch of a Chatham House research paper which analyses how the principles of sovereignty and intervention apply in the context of cyberoperations, and considers a way forward for agreeing a common understanding of cyber norms.This event will bring together a broad group of actors, including policymakers, the private sector, legal experts and civil society, and will be followed by a drinks reception. Department/project International Law Programme, Cyber, Sovereignty and Human Rights Jacqueline Rowe Programme Assistant, International Law Programme 020 7389 3287 Email Full Article
la Security and Prosperity in Asia: The Role of International Law By feedproxy.google.com Published On :: Fri, 01 Nov 2019 11:38:35 +0000 1 November 2019 The 'Security and Prosperity in Asia' conference looked at the impact of international law in the Asia-Pacific with a focus on regional economic and security issues such as the South China Sea disputes. Read online Download PDF Security and Prosperity in Asia Cover Image.jpg Singapore skyline at sunset, 2016. Photo: Getty Images. About the ConferenceAt a time of geopolitical uncertainty and with multilateralism under pressure, this conference brought together diverse actors to explore the evolving role of international law on critical security and economic issues in the Asia-Pacific. From trade agreements to deep-sea mining, cyberwarfare to territorial disputes, the breadth of the discussion illustrated the growing reach of international law in the region.Hosted by the International Law Programme and the Asia-Pacific Programme at Chatham House on 27 March 2019, the conference focused on three themes: trade and investment, maritime security and governance, and emerging security challenges. What trends are emerging in terms of engagement with international law in the region, and how can international standards play a greater role in encouraging collaboration and reducing tensions? And, with the eastward shift in geopolitical power, how will Asia-Pacific states shape the future of international law? Department/project International Law Programme, Global Governance and the Rule of Law, Asia-Pacific Programme, Geopolitics and Governance, Trade, Investment and Economics Full Article
la Investigating Violations of International Humanitarian Law By feedproxy.google.com Published On :: Wed, 13 Nov 2019 13:25:01 +0000 Research Event 21 January 2020 - 5:30pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Andrew Cayley, Director, Service Prosecuting Authority, UK Ministry of DefenceLarry Lewis, Vice President and Director, Center for Autonomy and Artificial Intelligence, CNAJelena Pejic, Senior Legal Adviser, International Committee of the Red CrossChair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House Countries should have adequate systems in place for investigating violations of international humanitarian law, for launching criminal prosecutions for war crimes and for inquiring into responsibility for unlawful actions of national armed forces. There also needs to be proper counting and recording of the civilian casualties of military operations. This event, which will be introduced by the director of the UK Service Prosecuting Authority, Andrew Cayley, will discuss the new report by the International Committee of the Red Cross and the Geneva Academy of International Humanitarian Law, Guidelines on Investigating Violations of International Humanitarian Law: Law, Policy and Good Practice, as well as the problems and challenges associated with recording civilian casualties of armed conflict. This meeting is the third in a series of three commemorating the 70th anniversary of the 1949 Geneva Conventions supported by the British Red Cross. It will be followed by a drinks reception. Department/project International Law Programme, The Limits on War and Preserving the Peace Jacqueline Rowe Programme Assistant, International Law Programme 020 7389 3287 Email Full Article
la The Application of International Law to State Cyberattacks: Sovereignty and Non-Intervention By feedproxy.google.com Published On :: Fri, 29 Nov 2019 16:56:12 +0000 2 December 2019 Hostile cyber operations by one state against another state are increasingly common. This paper analyzes the application of the sovereignty and non-intervention principles in relation to states’ cyber operations in another state below the threshold of the use of force. Read online Download PDF Harriet Moynihan Senior Research Fellow, International Law Programme @HarrietMoyniha9 2019-11-29-Intl-Law-Cyberattacks.jpg A computer hacked by a virus known as Petya. The Petya ransomware cyberattack hit computers of Russian and Ukrainian companies on 27 June 2017. Photo: Getty Images. SummaryThe vast majority of state-to-state cyberattacks consist of persistent, low-level intrusions that take place below the threshold of use of force. International law, including the principle of non-intervention in another state’s internal affairs and the principle of sovereignty, applies to these cyber operations.It is not clear whether any unauthorized cyber intrusion would violate the target state’s sovereignty, or whether there is a threshold in operation. While some would like to set limits by reference to effects of the cyber activity, at this time such limits are not reflected in customary international law. The assessment of whether sovereignty has been violated therefore has to be made on a case by case basis, if no other more specific rules of international law apply.In due course, further state practice and opinio iuris may give rise to an emerging cyber-specific understanding of sovereignty, just as specific rules deriving from the sovereignty principle have crystallized in other areas of international law.Before a principle of due diligence can be invoked in the cyber context, further work is needed by states to agree upon rules as to what might be expected of a state in this context.The principle of non-intervention applies to a state’s cyber operations as it does to other state activities. It consists of coercive behaviour by one state that deprives the target state of its free will in relation to the exercise of its sovereign functions in order to compel an outcome in, or conduct with respect to, a matter reserved to the target state.In practice, activities that contravene the non-intervention principle and activities that violates sovereignty will often overlap.In order to reach agreement on how international law applies to states’ cyber operations below the level of use of force, states should put their views on record, where possible giving examples of when they consider that an obligation may be breached, as states such as the UK, Australia, France and the Netherlands have done.Further discussion between states should focus on how the rules apply to practical examples of state-sponsored cyber operations. There is likely to be more commonality about specific applications of the law than there is about abstract principles.The prospects of a general treaty in this area are still far off. In due course, there may be benefit in considering limited rules, for example on due diligence and a prohibition on attacking critical infrastructure, before tackling broad principles. Department/project International Law Programme, Cyber, Sovereignty and Human Rights Full Article
la Power Politics Could Impede Progress on Responsible Regulation of Cyberspace By feedproxy.google.com Published On :: Tue, 03 Dec 2019 14:34:13 +0000 3 December 2019 Harriet Moynihan Senior Research Fellow, International Law Programme @HarrietMoyniha9 A new Chatham House paper examines the prospects of countries reaching agreement on issues of sovereignty and non-intervention in cyberspace in the face of persistent, low-level, state-to-state cyber attacks. 2019-11-29-Intl-Law-Cyberattacks.jpg A computer hacked by a virus known as Petya. The Petya ransomware cyberattack hit computers of Russian and Ukrainian companies on 27 June 2017. Photo: Getty Images. In discussions to date about how international law applies in cyberspace, commentators have tended to focus their attention on how the rules on the use of force, or the law of armed conflict, apply to cyber activities conducted by states that give rise to physical damage, injury or death.But in practice, the vast majority of state cyberattacks fall below this threshold. Far more common are persistent, low-level attacks that may leave no physical trace but that are capable of doing significant damage to a state’s ability to control its systems, often at serious economic cost.Such cyber incursions might include network disruptions in the operation of another government’s websites; tampering with electoral infrastructure to change or undermine the result; or using cyber means to destabilize another state’s financial sector.For these kinds of cyber operation, the principle of sovereignty, and the principle of non-intervention in another state’s internal affairs, are the starting point.A UN Group of Government Experts (GGE) agreed in 2013 and 2015 that the principles in the UN Charter, including sovereignty and the prohibition on intervention in another state’s affairs, apply to states’ activities in cyberspace. The 2015 GGE also recommended eleven (non-binding) norms of responsible state behaviour in cyberspace.However, states have not yet reached agreement on how to apply these principles. Until recently, there has also been very little knowledge of what states actually do in cyberspace, as they usually conduct cyber operations covertly and have been reluctant to put their views on record.A new Chatham House research paper analyses the application of the principles of sovereignty and non-intervention to state cyberattacks that fall below the principle of use of force. As well as analysing the application of the law in this area, the paper also makes recommendations to governments on how they might best make progress in reaching agreement in this area.Existing rules or new rules?As the research paper makes clear, there is currently some debate, principally between countries in the West, about the extent to which sovereignty is a legally binding rule in the context of cyberspace and, if so, how it and the principle of non-intervention might apply in practice.In the last few years, certain states have put on record how they consider international law to apply to states’ activities in cyberspace, namely the UK, Australia, France and the Netherlands. While there may be some differences in their approaches, which are discussed in the paper, there also remains important common ground: namely, that existing international law already provides a solid framework for regulating states’ cyber activities, as it regulates every other domain of state-to-state activity.There is also an emerging trend for states to work together when attributing cyberattacks to hostile states, enabling them to call out malign cyber activity when it violates international law. (See, for example, the joint statements made in relation to the NotPetya cyber attack and malicious cyber activity attributed to the Russian government).However, other countries have questioned whether existing international law as it stands is capable of regulating states’ cyber interactions and have called for ‘new legal instruments’ in this area.This includes a proposal by the Shanghai Cooperation Organization (led by Russia and China) for an International Code of Conduct on Information Security, a draft of which was submitted to the UN in 2011 and 2015, without success. The UN has also formed a new Open-Ended Working Group (OEWG) under a resolution proposed by Russia to consider how international law applies to states’ activities in cyberspace.The resolution establishing the OEWG, which began work earlier this year, includes the possibility of the group ‘introducing changes to the rules, norms and principles of responsible behaviour of States’ agreed in the 2013 and 2015 GGE reports. In the OEWG discussions at the UN in September, several countries claimed that a new legal instrument was needed to fill the ‘legal vacuum’ (Cuba) or ‘the gap of ungoverned areas’ (Indonesia).It would be concerning if the hard-won consensus on the application of international law to cyberspace that has been reached at past GGEs started to unravel. In contrast to 2013 and 2015, the 2017 meeting failed to reach an agreement.On 9 December, a renewed GGE will meet in New York, but the existence of the OEWG exploring the same issues in a separate process reflects the fact that cyber norms have become an area of geopolitical rivalry.Aside from the application of international law, states are also adopting divergent approaches to the domestic regulation of cyberspace within their own territory. The emerging trend towards a ‘splinternet’ – i.e. between states that believe the internet should be global and open on the hand, and those that favour a ‘sovereignty and control’ model on the other – is also likely to make discussions at the GGE more challenging.Distinct from the international law concept of sovereignty is the notion of ‘cybersovereignty’, a term coined by China to describe the wide-ranging powers it assumes under domestic law to regulate its citizens’ access to the internet and personal data within its territory. This approach is catching on (as reflected in Russia’s recently enacted ‘Sovereign Internet Law’), with other authoritarian states likely to follow suit.The importance of non-state actorsIn parallel with regional and UN discussions on how international law applies, a number of initiatives by non-state actors have also sought to establish voluntary principles about responsible state behaviour in cyberspace.The Global Commission on the Stability of Cyberspace, a multi-stakeholder body that has proposed principles, norms and recommendations to guide responsible behaviour by all parties in cyberspace, recently published its final report. The Cybersecurity Tech Accord aims to promote collaboration between tech companies on stability and resilience in cyberspace. President Macron’s ‘Paris Call for Trust and Security in Cyberspace’ has to date received the backing of 67 states, 139 international and civil society organizations, and 358 private-sector organizations.It remains to be seen in the long term whether the parallel processes at the UN will work constructively together or be competitive. But notwithstanding the challenging geopolitical backdrop, the UN GGE meeting next week at the least offers states the opportunity to consolidate and build on the results of past meetings; to increase knowledge and discussion about how international law might apply; and to encourage more states to put their own views of these issues on the record. Full Article
la 12-LOX catalyzes the oxidation of 2-arachidonoyl-lysolipids in platelets generating eicosanoid-lysolipids that are attenuated by iPLA2{gamma} knockout [Signal Transduction] By feedproxy.google.com Published On :: 2020-04-17T00:06:05-07:00 The canonical pathway of eicosanoid production in most mammalian cells is initiated by phospholipase A2-mediated release of arachidonic acid, followed by its enzymatic oxidation resulting in a vast array of eicosanoid products. However, recent work has demonstrated that the major phospholipase in mitochondria, iPLA2γ (patatin-like phospholipase domain containing 8 (PNPLA8)), possesses sn-1 specificity, with polyunsaturated fatty acids at the sn-2 position generating polyunsaturated sn-2-acyl lysophospholipids. Through strategic chemical derivatization, chiral chromatographic separation, and multistage tandem MS, here we first demonstrate that human platelet-type 12-lipoxygenase (12-LOX) can directly catalyze the regioselective and stereospecific oxidation of 2-arachidonoyl-lysophosphatidylcholine (2-AA-LPC) and 2-arachidonoyl-lysophosphatidylethanolamine (2-AA-LPE). Next, we identified these two eicosanoid-lysophospholipids in murine myocardium and in isolated platelets. Moreover, we observed robust increases in 2-AA-LPC, 2-AA-LPE, and their downstream 12-LOX oxidation products, 12(S)-HETE-LPC and 12(S)-HETE-LPE, in calcium ionophore (A23187)-stimulated murine platelets. Mechanistically, genetic ablation of iPLA2γ markedly decreased the calcium-stimulated production of 2-AA-LPC, 2-AA-LPE, and 12-HETE-lysophospholipids in mouse platelets. Importantly, a potent and selective 12-LOX inhibitor, ML355, significantly inhibited the production of 12-HETE-LPC and 12-HETE-LPE in activated platelets. Furthermore, we found that aging is accompanied by significant changes in 12-HETE-LPC in murine serum that were also markedly attenuated by iPLA2γ genetic ablation. Collectively, these results identify previously unknown iPLA2γ-initiated signaling pathways mediated by direct 12-LOX oxidation of 2-AA-LPC and 2-AA-LPE. This oxidation generates previously unrecognized eicosanoid-lysophospholipids that may serve as biomarkers for age-related diseases and could potentially be used as targets in therapeutic interventions. Full Article
la Glucocerebrosidases catalyze a transgalactosylation reaction that yields a newly-identified brain sterol metabolite, galactosylated cholesterol [Glycobiology and Extracellular Matrices] By feedproxy.google.com Published On :: 2020-04-17T00:06:05-07:00 β-Glucocerebrosidase (GBA) hydrolyzes glucosylceramide (GlcCer) to generate ceramide. Previously, we demonstrated that lysosomal GBA1 and nonlysosomal GBA2 possess not only GlcCer hydrolase activity, but also transglucosylation activity to transfer the glucose residue from GlcCer to cholesterol to form β-cholesterylglucoside (β-GlcChol) in vitro. β-GlcChol is a member of sterylglycosides present in diverse species. How GBA1 and GBA2 mediate β-GlcChol metabolism in the brain is unknown. Here, we purified and characterized sterylglycosides from rodent and fish brains. Although glucose is thought to be the sole carbohydrate component of sterylglycosides in vertebrates, structural analysis of rat brain sterylglycosides revealed the presence of galactosylated cholesterol (β-GalChol), in addition to β-GlcChol. Analyses of brain tissues from GBA2-deficient mice and GBA1- and/or GBA2-deficient Japanese rice fish (Oryzias latipes) revealed that GBA1 and GBA2 are responsible for β-GlcChol degradation and formation, respectively, and that both GBA1 and GBA2 are responsible for β-GalChol formation. Liquid chromatography–tandem MS revealed that β-GlcChol and β-GalChol are present throughout development from embryo to adult in the mouse brain. We found that β-GalChol expression depends on galactosylceramide (GalCer), and developmental onset of β-GalChol biosynthesis appeared to be during myelination. We also found that β-GlcChol and β-GalChol are secreted from neurons and glial cells in association with exosomes. In vitro enzyme assays confirmed that GBA1 and GBA2 have transgalactosylation activity to transfer the galactose residue from GalCer to cholesterol to form β-GalChol. This is the first report of the existence of β-GalChol in vertebrates and how β-GlcChol and β-GalChol are formed in the brain. Full Article
la Deletion of fatty acid transport protein 2 (FATP2) in the mouse liver changes the metabolic landscape by increasing the expression of PPAR{alpha}-regulated genes [Lipids] By feedproxy.google.com Published On :: 2020-04-24T06:08:45-07:00 Fatty acid transport protein 2 (FATP2) is highly expressed in the liver, small intestine, and kidney, where it functions in both the transport of exogenous long-chain fatty acids and the activation of very-long-chain fatty acids. Here, using a murine model, we investigated the phenotypic impacts of deleting FATP2, followed by a transcriptomic analysis using unbiased RNA-Seq to identify concomitant changes in the liver transcriptome. WT and FATP2-null (Fatp2−/−) mice (5 weeks) were maintained on a standard chow diet for 6 weeks. The Fatp2−/− mice had reduced weight gain, lowered serum triglyceride, and increased serum cholesterol levels and attenuated dietary fatty acid absorption. Transcriptomic analysis of the liver revealed 258 differentially expressed genes in male Fatp2−/− mice and a total of 91 in female Fatp2−/− mice. These genes mapped to the following gene ontology categories: fatty acid degradation, peroxisome biogenesis, fatty acid synthesis, and retinol and arachidonic acid metabolism. Targeted RT-quantitative PCR verified the altered expression of selected genes. Of note, most of the genes with increased expression were known to be regulated by peroxisome proliferator–activated receptor α (PPARα), suggesting that FATP2 activity is linked to a PPARα-specific proximal ligand. Targeted metabolomic experiments in the Fatp2−/− liver revealed increases of total C16:0, C16:1, and C18:1 fatty acids; increases in lipoxin A4 and prostaglandin J2; and a decrease in 20-hydroxyeicosatetraenoic acid. We conclude that the expression of FATP2 in the liver broadly affects the metabolic landscape through PPARα, indicating that FATP2 provides an important role in liver lipid metabolism through its transport or activation activities. Full Article
la MtrP, a putative methyltransferase in Corynebacteria, is required for optimal membrane transport of trehalose mycolates [Lipids] By feedproxy.google.com Published On :: 2020-05-01T00:06:09-07:00 Pathogenic bacteria of the genera Mycobacterium and Corynebacterium cause severe human diseases such as tuberculosis (Mycobacterium tuberculosis) and diphtheria (Corynebacterium diphtheriae). The cells of these species are surrounded by protective cell walls rich in long-chain mycolic acids. These fatty acids are conjugated to the disaccharide trehalose on the cytoplasmic side of the bacterial cell membrane. They are then transported across the membrane to the periplasm where they act as donors for other reactions. We have previously shown that transient acetylation of the glycolipid trehalose monohydroxycorynomycolate (hTMCM) enables its efficient transport to the periplasm in Corynebacterium glutamicum and that acetylation is mediated by the membrane protein TmaT. Here, we show that a putative methyltransferase, encoded at the same genetic locus as TmaT, is also required for optimal hTMCM transport. Deletion of the C. glutamicum gene NCgl2764 (Rv0224c in M. tuberculosis) abolished acetyltrehalose monocorynomycolate (AcTMCM) synthesis, leading to accumulation of hTMCM in the inner membrane and delaying its conversion to trehalose dihydroxycorynomycolate (h2TDCM). Complementation with NCgl2764 normalized turnover of hTMCM to h2TDCM. In contrast, complementation with NCgl2764 derivatives mutated at residues essential for methyltransferase activity failed to rectify the defect, suggesting that NCgl2764/Rv0224c encodes a methyltransferase, designated here as MtrP. Comprehensive analyses of the individual mtrP and tmaT mutants and of a double mutant revealed strikingly similar changes across several lipid classes compared with WT bacteria. These findings indicate that both MtrP and TmaT have nonredundant roles in regulating AcTMCM synthesis, revealing additional complexity in the regulation of trehalose mycolate transport in the Corynebacterineae. Full Article
la AIG1 and ADTRP are endogenous hydrolases of fatty acid esters of hydroxy fatty acids (FAHFAs) in mice [Metabolism] By feedproxy.google.com Published On :: 2020-05-01T00:06:09-07:00 Fatty acid esters of hydroxy fatty acids (FAHFAs) are a newly discovered class of signaling lipids with anti-inflammatory and anti-diabetic properties. However, the endogenous regulation of FAHFAs remains a pressing but unanswered question. Here, using MS-based FAHFA hydrolysis assays, LC-MS–based lipidomics analyses, and activity-based protein profiling, we found that androgen-induced gene 1 (AIG1) and androgen-dependent TFPI-regulating protein (ADTRP), two threonine hydrolases, control FAHFA levels in vivo in both genetic and pharmacologic mouse models. Tissues from mice lacking ADTRP (Adtrp-KO), or both AIG1 and ADTRP (DKO) had higher concentrations of FAHFAs particularly isomers with the ester bond at the 9th carbon due to decreased FAHFA hydrolysis activity. The levels of other lipid classes were unaltered indicating that AIG1 and ADTRP specifically hydrolyze FAHFAs. Complementing these genetic studies, we also identified a dual AIG1/ADTRP inhibitor, ABD-110207, which is active in vivo. Acute treatment of WT mice with ABD-110207 resulted in elevated FAHFA levels, further supporting the notion that AIG1 and ADTRP activity control endogenous FAHFA levels. However, loss of AIG1/ADTRP did not mimic the changes associated with pharmacologically administered FAHFAs on extent of upregulation of FAHFA levels, glucose tolerance, or insulin sensitivity in mice, indicating that therapeutic strategies should weigh more on FAHFA administration. Together, these findings identify AIG1 and ADTRP as the first endogenous FAHFA hydrolases identified and provide critical genetic and chemical tools for further characterization of these enzymes and endogenous FAHFAs to unravel their physiological functions and roles in health and disease. Full Article
la The transcriptional regulator MEIS2 sets up the ground state for palatal osteogenesis in mice [Gene Regulation] By feedproxy.google.com Published On :: 2020-04-17T00:06:05-07:00 Haploinsufficiency of Meis homeobox 2 (MEIS2), encoding a transcriptional regulator, is associated with human cleft palate, and Meis2 inactivation leads to abnormal palate development in mice, implicating MEIS2 functions in palate development. However, its functional mechanisms remain unknown. Here we observed widespread MEIS2 expression in the developing palate in mice. Wnt1Cre-mediated Meis2 inactivation in cranial neural crest cells led to a secondary palate cleft. Importantly, about half of the Wnt1Cre;Meis2f/f mice exhibited a submucous cleft, providing a model for studying palatal bone formation and patterning. Consistent with complete absence of palatal bones, the results from integrative analyses of MEIS2 by ChIP sequencing, RNA-Seq, and an assay for transposase-accessible chromatin sequencing identified key osteogenic genes regulated directly by MEIS2, indicating that it plays a fundamental role in palatal osteogenesis. De novo motif analysis uncovered that the MEIS2-bound regions are highly enriched in binding motifs for several key osteogenic transcription factors, particularly short stature homeobox 2 (SHOX2). Comparative ChIP sequencing analyses revealed genome-wide co-occupancy of MEIS2 and SHOX2 in addition to their colocalization in the developing palate and physical interaction, suggesting that SHOX2 and MEIS2 functionally interact. However, although SHOX2 was required for proper palatal bone formation and was a direct downstream target of MEIS2, Shox2 overexpression failed to rescue the palatal bone defects in a Meis2-mutant background. These results, together with the fact that Meis2 expression is associated with high osteogenic potential and required for chromatin accessibility of osteogenic genes, support a vital function of MEIS2 in setting up a ground state for palatal osteogenesis. Full Article
la Certain ortho-hydroxylated brominated ethers are promiscuous kinase inhibitors that impair neuronal signaling and neurodevelopmental processes [Cell Biology] By feedproxy.google.com Published On :: 2020-05-01T00:06:09-07:00 The developing nervous system is remarkably sensitive to environmental signals, including disruptive toxins, such as polybrominated diphenyl ethers (PBDEs). PBDEs are an environmentally pervasive class of brominated flame retardants whose neurodevelopmental toxicity mechanisms remain largely unclear. Using dissociated cortical neurons from embryonic Rattus norvegicus, we found here that chronic exposure to 6-OH–BDE-47, one of the most prevalent hydroxylated PBDE metabolites, suppresses both spontaneous and evoked neuronal electrical activity. On the basis of our previous work on mitogen-activated protein kinase (MAPK)/extracellular signal-related kinase (ERK) (MEK) biology and our observation that 6-OH–BDE-47 is structurally similar to kinase inhibitors, we hypothesized that certain hydroxylated PBDEs mediate neurotoxicity, at least in part, by impairing the MEK–ERK axis of MAPK signal transduction. We tested this hypothesis on three experimental platforms: 1) in silico, where modeling ligand–protein docking suggested that 6-OH–BDE-47 is a promiscuous ATP-competitive kinase inhibitor; 2) in vitro in dissociated neurons, where 6-OH–BDE-47 and another specific hydroxylated BDE metabolite similarly impaired phosphorylation of MEK/ERK1/2 and activity-induced transcription of a neuronal immediate early gene; and 3) in vivo in Drosophila melanogaster, where developmental exposures to 6-OH–BDE-47 and a MAPK inhibitor resulted in offspring displaying similarly increased frequency of mushroom-body β–lobe midline crossing, a metric of axonal guidance. Taken together, our results support that certain ortho-hydroxylated PBDE metabolites are promiscuous kinase inhibitors and can cause disruptions of critical neurodevelopmental processes, including neuronal electrical activity, pre-synaptic functions, MEK–ERK signaling, and axonal guidance. Full Article
la WYSIWYG Web Builder 7.5 available now! By www.wysiwygwebbuilder.com Published On :: Mon, 20 Dec 2010 10:58:56 GMT WYSIWYG Web Builder 7.5 is a major update with more than 50 new features and improvements (compared to version 7.2.1). Our christmas gift to you! Full Article
la WYSIWYG Web Builder 8.5 available now! By www.wysiwygwebbuilder.com Published On :: Mon, 01 Oct 2012 08:23:59 GMT WYSIWYG Web Builder 8.5 is a major update with more than 50 new features and improvements (compared to version 8.2.1). Full Article
la Genetic Profile and Functional Proteomics of Anal Squamous Cell Carcinoma: Proposal for a Molecular Classification By feedproxy.google.com Published On :: 2020-04-01 Lucía Trilla-FuertesApr 1, 2020; 19:690-700Research Full Article
la A Quantitative Tri-fluorescent Yeast Two-hybrid System: From Flow Cytometry to In cellula Affinities By feedproxy.google.com Published On :: 2020-04-01 David CluetApr 1, 2020; 19:701-715Technological Innovation and Resources Full Article
la Organellar maps through proteomic profiling - a conceptual guide By feedproxy.google.com Published On :: 2020-04-28 Georg H H BornerApr 28, 2020; 0:R120.001971v1-mcp.R120.001971Review Full Article
la The DNA sensor cGAS is decorated by acetylation and phosphorylation modifications in the context of immune signaling By feedproxy.google.com Published On :: 2020-04-28 Bokai SongApr 28, 2020; 0:RA120.001981v1-mcp.RA120.001981Research Full Article
la Modulation of natural HLA-B*27:05 ligandome by ankylosing spondylitis-associated endoplasmic reticulum aminopeptidase 2 (ERAP2) By feedproxy.google.com Published On :: 2020-04-07 Elena LorenteApr 7, 2020; 0:RA120.002014v1-mcp.RA120.002014Research Full Article
la Characterization of Prenylated C-terminal Peptides Using a Thiopropyl-based Capture Technique and LC-MS/MS By feedproxy.google.com Published On :: 2020-04-13 James A. WilkinsApr 13, 2020; 0:RA120.001944v1-mcp.RA120.001944Research Full Article
la Flow-induced reorganization of laminin-integrin networks within the endothelial basement membrane uncovered by proteomics By feedproxy.google.com Published On :: 2020-04-24 Eelke P. BéguinApr 24, 2020; 0:RA120.001964v1-mcp.RA120.001964Research Full Article
la Seminal Plasma Proteome as an Indicator of Sperm Dysfunction and Low Sperm Motility By feedproxy.google.com Published On :: 2020-04-20 Yunlei LiApr 20, 2020; 0:RA120.002017v1-mcp.RA120.002017Research Full Article
la Cell Cycle Profiling Reveals Protein Oscillation, Phosphorylation, and Localization Dynamics By feedproxy.google.com Published On :: 2020-04-01 Patrick HerrApr 1, 2020; 19:608-623Research Full Article
la Robust summarization and inference in proteome-wide label-free quantification By feedproxy.google.com Published On :: 2020-04-22 Adriaan StickerApr 22, 2020; 0:RA119.001624v1-mcp.RA119.001624Research Full Article
la Investigation of inter- and intra-tumoral heterogeneity of glioblastoma using TOF-SIMS By feedproxy.google.com Published On :: 2020-04-06 Samvel K GularyanApr 6, 2020; 0:RA120.001986v1-mcp.RA120.001986Research Full Article
la Dysregulation of Exosome Cargo by Mutant Tau Expressed in Human-Induced Pluripotent Stem Cell (iPSC) Neurons Revealed by Proteomics Analyses By feedproxy.google.com Published On :: 2020-04-15 Sonia PodvinApr 15, 2020; 0:RA120.002079v1-mcp.RA120.002079Research Full Article
la Identification of an Unconventional Subpeptidome Bound to the Behcet's Disease-associated HLA-B*51:01 that is Regulated by Endoplasmic Reticulum Aminopeptidase 1 (ERAP1) By feedproxy.google.com Published On :: 2020-05-01 Liye ChenMay 1, 2020; 19:871-883Research Full Article
la Quantitative proteomics of human heart samples collected in vivo reveal the remodeled protein landscape of dilated left atrium without atrial fibrillation By feedproxy.google.com Published On :: 2020-04-14 Nora LinscheidApr 14, 2020; 0:RA119.001878v1-mcp.RA119.001878Research Full Article
la Discovery of a Redox Thiol Switch: Implications for Cellular Energy Metabolism By feedproxy.google.com Published On :: 2020-05-01 Xing-Huang GaoMay 1, 2020; 19:852-870Research Full Article
la Large-scale Identification of N-linked Intact Glycopeptides in Human Serum using HILIC Enrichment and Spectral Library Search By feedproxy.google.com Published On :: 2020-04-01 Qingbo ShuApr 1, 2020; 19:672-689Research Full Article
la Selection of features with consistent profiles improves relative protein quantification in mass spectrometry experiments By feedproxy.google.com Published On :: 2020-03-31 Tsung-Heng TsaiMar 31, 2020; 0:RA119.001792v1-mcp.RA119.001792Research Full Article
la Quantitative Profiling of the Human Substantia Nigra Proteome from Laser-capture Microdissected FFPE Tissue By feedproxy.google.com Published On :: 2020-05-01 Eva GriesserMay 1, 2020; 19:839-851Research Full Article
la An Improved Boosting to Amplify Signal with Isobaric Labeling (iBASIL) Strategy for Precise Quantitative Single-cell Proteomics By feedproxy.google.com Published On :: 2020-05-01 Chia-Feng TsaiMay 1, 2020; 19:828-838Research Full Article
la Proximity Dependent Biotinylation: Key Enzymes and Adaptation to Proteomics Approaches By feedproxy.google.com Published On :: 2020-05-01 Payman Samavarchi-TehraniMay 1, 2020; 19:757-773Review Full Article
la XG Firewall is now available on AWS By feedproxy.google.com Published On :: Mon, 20 Apr 2020 15:47:21 +0000 We are extremely pleased to announce the availability of XG Firewall on Amazon Web Services (AWS) public cloud infrastructure. Full Article Network Amazon Web Services AWS XG Firewall XG Firewall v18
la How Regulation Could Break the Internet: In Conversation with Andrew Sullivan By feedproxy.google.com Published On :: Mon, 29 Apr 2019 13:30:01 +0000 Research Event 19 June 2019 - 6:00pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Andrew Sullivan, President and CEO Internet SocietyChair: Emily Taylor, Associate Fellow, International Security Department, Chatham House; Editor, Journal of Cyber Policy Internet regulation is increasing around the world creating positive obligations on internet providers and exerting negative unintended consequences on the internet infrastructure. In some ways, most of this regulatory activity is justifiable. Governments are concerned about the increased risk that the use of the internet brings to societies. As a response, many governments have been enacting regulations as their main approach to dealing with these concerns. The main challenge is that most of the current regulations are either ill-defined or unworkable. On the one hand, several governments have established procedures that seek to analyze the impacts of new regulatory proposals before they were adopted. However, there hasn’t been enough attention aimed at analyzing regulations after they have been adopted and only a few have measures in place to evaluate the impacts of the procedures and practices that govern the regulatory process itself.On the other hand, much of the regulation creates unintended consequences to the internet itself. It undermines many of its fundamental properties and challenges the integrity and resiliency of its infrastructure. This event discusses current practices in internet-related regulation and the related challenges. Panellists will discuss how governments can enforce regulations that achieve their intended purpose while at the same time protecting the internet’s core infrastructure and its properties, including its openness, interoperability and global reach. Department/project International Security Programme, Internet Governance Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email Full Article
Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email
la Cybersecurity by Design in Civil Nuclear Power Plants By feedproxy.google.com Published On :: Tue, 23 Jul 2019 17:34:51 +0000 24 July 2019 Cyberattacks are increasingly challenging critical national infrastructure. This paper considers the security by design approach for civil nuclear power plants and analyses areas of risk and opportunities for the nuclear industry. Read online Download PDF Dr Beyza Unal Senior Research Fellow, International Security Programme @beyzaunal Google Scholar Roger Brunt Managing Director, Grosmont Howe Ltd 2019-07-24-NuclearPlant.jpg An employee climbs into the cooling tower of the third and fourth unit at Mochovce nuclear power plant in Slovakia on 2 July 2019. Photo: Getty Images SummaryThe application of ‘security by design’ in nuclear new builds could provide operators with the opportunity to establish a robust and resilient security architecture at the beginning of a nuclear power plant’s life cycle. This will enhance the protection of the plant and reduce the need for costly security improvements during its operating life.Security by design cannot fully protect a nuclear power plant from rapidly evolving cyberattacks, which expose previously unsuspected or unknown vulnerabilities.Careful design of security systems and architecture can – and should – achieve levels of protection that exceed current norms and expectations. However, the sourcing of components from a global supply chain means that the integrity of even the most skilfully designed security regime cannot be guaranteed without exhaustive checks of its components.Security by design may well include a requirement for a technical support organization to conduct quality assurance of cyber defences and practices, and this regime should be endorsed by a facility’s executive board and continued at regular intervals after the new build facility has been commissioned.Given the years it takes to design, plan and build a new nuclear power plant, it is important to recognize that from the point of ‘design freeze’ onwards, the operator will be building in vulnerabilities, as technology continues to evolve rapidly while construction fails to keep pace with it. Security by design cannot be a panacea, but it is an important factor in the establishment of a robust nuclear security – and cybersecurity – culture. Department/project International Security Programme, Cyber and Nuclear Security Full Article
la How Is New Technology Driving Geopolitical Relations? By feedproxy.google.com Published On :: Mon, 16 Sep 2019 14:20:01 +0000 Research Event 22 October 2019 - 6:00pm to 7:00pm Chatham House, London Event participants Rt Hon Baroness Neville-Jones DCMG, Minister of State for Security and Counter Terrorism (2010-11)Jamie Condliffe, Editor, DealBook Newsletter and Writer, Bits Tech Newsletter, The New York TimesJamie Saunders, Partner, Wychwood Partners LLP; Visiting Professor, University College LondonChair: Dr Patricia Lewis, Research Director, International Security Department, Chatham House New technology such as 5G, artificial intelligence, nanotechnology and robotics have become, now more than ever, intertwined with geopolitical, economic and trade interests. Leading powers are using new technology to exert power and influence and to shape geopolitics more generally.The ongoing race between the US and China around 5G technology is a case in point. Amid these tensions, the impact on developing countries is not sufficiently addressed.Arguably, the existing digital divide will increase leading developing countries to the early, if not hasty, adoption of new technology for fear of lagging behind. This could create opportunities but will also pose risks.This panel discusses how new technology is changing the geopolitical landscape. It also discusses the role that stakeholders, including governments, play in the creation of standards for new technologies and what that means for its deployment in key markets technically and financially.Finally, the panel looks at the issue from the perspective of developing countries, addressing the choices that have to be made in terms of affordability, development priorities and security concerns.This event was organized with the kind support of DXC Technology. Department/project International Security Programme Nicole Darabian Research Assistant, Cyber Policy, International Security Department Email Full Article
la EU–US Relations on Internet Governance By feedproxy.google.com Published On :: Thu, 14 Nov 2019 16:12:28 +0000 14 November 2019 As internet governance issues emerge in the wake of innovations such as the Internet of Things and advanced artificial intelligence, there is an urgent need for the EU and US to establish a common, positive multi-stakeholder vision for regulating and governing the internet. Read online Download PDF Emily Taylor Associate Fellow, International Security Programme @etaylaw LinkedIn Stacie Hoffmann Internet Policy and Cybersecurity Consultant, Oxford Information Labs 2019-11-14-EUUSInternet.jpg Server room network cables in New York City, November 2014. Photo: Michael Bocchieri/Staff/Getty. Political, economic, sociological and technological factors are poised to challenge EU and US ideological positions on internet governance, which will make it difficult to find consensus and common ground in the years to come.The EU and US share core values and perspectives relating to internet governance, such as openness, freedom and interoperability, as well as a human rights framework for cybersecurity. There have been many examples of successful multi-stakeholder cooperation between the EU and US, including the Internet Assigned Numbers Authority (IANA) transition and the European Dialogue on Internet Governance (EuroDIG).There are also subtle differences between the EU and US, and each has different reasons to support multi-stakeholderism. Cases that highlight growing tensions in EU–US coordination on internet governance include the controversies surrounding the EU General Data Protection Regulation (GDPR), the WHOIS system that governs domain name registration data, and the board of the Internet Corporation for Assigned Names and Numbers (ICANN), which undermined an independent cybersecurity review.Internet governance is becoming more complex, with a multiplicity of actors and no obvious authority for important emerging issues. Additionally, the rise of China and its authoritarian vision for the future of the internet is a threat to the current internet governance institutions that have been shaped by and reflect Western values.To bridge ideological gaps the EU and US should build capacity between likeminded stakeholders, create a taskforce on effective multi-stakeholder internet governance, and work through non-governmental stakeholders to improve participation. Department/project International Security Programme, Internet Governance Full Article
la The Commonwealth Cyber Declaration: Achievements and Way Forward By feedproxy.google.com Published On :: Thu, 23 Jan 2020 11:20:01 +0000 Invitation Only Research Event 4 February 2020 - 9:15am to 5:30pm Chatham House, London Agendapdf | 149.42 KB In April 2018, the Commonwealth Heads of Government Meeting (CHOGM), held in London, saw the creation and the adoption of the Commonwealth Cyber Declaration. The declaration outlines the framework for a concerted effort to advance cybersecurity practices to promote a safe and prosperous cyberspace for Commonwealth citizens, businesses and societies. The conference will aim to provide an overview on the progress made on cybersecurity in the Commonwealth since the declaration was announced in 2018. In addition, it will examine future challenges and potential solutions going forward.This conference is part of the International Security Programme's project on Implementing the Commonwealth Cybersecurity Agenda and will convene a range of senior Commonwealth representatives as well as a selection of civil society and industry stakeholders. This project aims to develop a pan-Commonwealth platform to take the Commonwealth Cyber Declaration forward by means of a holistic, inclusive and representative approach.Please see below meeting summaries from previous events on Cybersecurity in the Commonwealth: A cyberspace that supports economic and social rights online (London)Build the foundations of an effective national cybersecurity response (Barbados)Promote stability in cyberspace through international cooperation (Addis Ababa)Attendance at this event is by invitation only. Department/project International Security Programme Esther Naylor Research Assistant, International Security Programme +44 (0)20 7314 3628 Email Full Article