co Engage China to Uphold Multilateralism – But Not at Any Cost By feedproxy.google.com Published On :: Thu, 23 May 2019 11:14:05 +0000 12 June 2019 Harriet Moynihan Senior Research Fellow, International Law Programme @HarrietMoyniha9 Where China’s interests align with those of the international community, there are opportunities for the country’s influence and economic power to strengthen the rules-based international order. Where they do not, states that traditionally support that order should join together to push back. 2019-02-01-China.jpg Students holding Chinese national flags watch the live broadcast of the 40th anniversary celebration of China's reform and opening-up at Huaibei Normal University on 18 December. Photo: Getty Images. China’s adherence to the rules-based international system is selective, prioritizing certain rules in favour of others. States supportive of that ‘system’ – or, as some argue, systems[1] – should identify areas of mutual strategic interest so that they can draw China further into the global rules-based order and leverage China as a constructive player that potentially also contributes to improvements in such areas. This is particularly apposite at a time when the US is in retreat from multilateralism and Russia seems bent on disrupting the rules-based international order.Supportive playerThere are many reasons for actively engaging with China on mutual areas of interest. China is a committed multilateralist in many areas, recognizing that often international cooperation and frameworks hold the key to its domestic problems, for example in the fields of environmental sustainability and financial regulation.China’s economic power is valuable in upholding international institutions: China is the UN’s third-largest donor (after the US and Japan) at a time when the UN is facing budgetary shortfalls. China is also the second-highest contributor to the UN peacekeeping budget, and the largest contributor of peacekeeping forces among the five permanent members of the UN Security Council.China also has a valuable role to play in the settlement of international disputes over trade and investment. China is a big supporter of the World Trade Organization (WTO)’s dispute settlement mechanism, and one of its most active participants;[2] China is currently playing an active role in negotiations to save the WTO’s appellate mechanism from folding in the wake of the US’s refusal to nominate new judges.The last 15 years have also seen a major shift in Chinese attitudes to investment arbitration, from a general suspicion and limitation of arbitration rights to broad acceptance and incorporation of such rights in China’s trade and investment treaties. China is actively engaged in multilateral negotiations through the UN Commission on International Trade Law (UNCITRAL) on reforms to investor–state dispute settlement.China has shown leadership on global climate change diplomacy, urging nations to remain committed to the Paris Agreement in the wake of the US decision to pull out, and has been an important interlocutor with the UK and the EU on these issues. As a strong supporter of the Paris Agreement, but also as the world’s top emitter of carbon dioxide, China has a crucial role to play in pushing forward implementation of the Paris targets. Despite its high emissions, China remains one of the few major economies on track to meet its targets,[3] giving it greater leverage to peer review other parties’ efforts.A recent report by the UK parliament’s Foreign Affairs Committee (FAC), on China and the rules-based international order, noted that where a body of trust and goodwill is developed with China, there is the possibility of discovering interests that coincide and the ability to work together on issues mutually regarded as of global importance. The report refers to a number of success stories from UK partnership with China in multilateral forums, including in counterproliferation and global health.[4]Developing areas of global governanceAs well as working with the current system, China is increasingly involved in the shaping of newer areas of international law – whether it be submissions to the International Tribunal for the Law of the Sea (ITLOS) on procedural rules for the emerging deep-sea mining regime or pitching for a greater role in Arctic governance.[5]This enthusiasm should be harnessed to promote the international rule of law, but at the same time there needs to be recognition of the strategic goals that drive China’s engagement. China’s interest in the Arctic, while including the desire to protect its ecology and environment, is also about access to marine resources, as well as about the Arctic’s strategic potential for China’s military.China’s submissions to ITLOS on the rules of procedure for deep-sea mining are constructive, but also reflect an ambition to secure first-mover advantage when commercial mining eventually takes place. Like other major powers working in this policy area, China’s actions are guided by self-interest, but that doesn’t mean its goals can’t be pursued through multilateral rules.China is also interested in creating new international structures and instruments that further its strategic aims. For example, with Russia (through the Shanghai Cooperation Organisation) it has proposed an International Code of Conduct for Information Security in the UN.[6]China is also pondering an array of options for dispute-resolution mechanisms for its Belt and Road projects, including the possibility of an Asian version of the international Convention on the Settlement of Investment Disputes, which might sit under the auspices of the Asian Infrastructure Investment Bank (AIIB).[7]The creation of new instruments and institutions need not be a threat to the rules-based international order in itself. We have already seen a combination of the creation of parallel complementary regimes alongside the reform of existing institutions, for example in development financing through the AIIB or the New Development Bank (often referred to as the ‘BRICS Bank’); these two banks are relatively conventionally structured along the lines of Western-dominated institutions, albeit with greater Chinese control. Based on these examples, selective adaptation seems more likely than a hostile ‘Eastphalian’ takeover.[8]RisksThere is, however, a real risk that in certain areas China may promote a rival authoritarian model of governance, assisted by an opportunistic convergence with Russia on issues such as human rights, development and internet governance. In areas where China’s core interests clash with those of the rules-based international order, China has shown itself to be unbending, as in its refusal to abide by the July 2016 decision of the Permanent Court of Arbitration in its dispute with the Philippines over the South China Sea.[9]China is becoming more assertive at the UN, but while it seeks to project itself there as a responsible emerging global leader, it is promoting a vision that weakens international norms of human rights, transparency and accountability,[10] while also carrying out practices domestically that raise serious human rights concerns (not least the detention of hundreds of thousands of Uighurs in re-education camps in Xinjiang).[11]China’s increased dominance geographically and geopolitically through its Belt and Road infrastructure projects carries with it a number of social and economic risks, including smaller states becoming trapped in unsustainable financial debts to China.But at a recent Chatham House conference on Asia and international law, participants highlighted the limitations on how far China can shape an alternative governance model.[12] China currently lacks soft power, cultural power and language power, all of which are needed in order to embed an alternative model abroad. China also currently lacks capacity and confidence to build coalitions with other states in the UN.Where it has tried to get buy-in from the international community for its new institutions, such as the China International Commercial Court (CICC) announced in July 2018, there has been scepticism about the standards to be applied.[13] Unless the court can demonstrate sufficient due process, international parties are likely to prefer other centres with a strong reputation for upholding the rule of law, such as those in London, Dubai and Singapore.Where China does promote its own governance model at the expense of the rules-based international order, states are starting to push back, often in concert. EU member states so far have adopted a joined-up approach to the Belt and Road Initiative. With the exception of Italy, they have refused to sign a Memorandum of Understanding on participation unless China provides much greater transparency on its compliance with international standards.The EU also recently presented a coordinated response to China on the situation in Xinjiang.[14] Similarly, members of the so-called ‘Five Eyes’ intelligence-sharing alliance (comprising Australia, Canada, New Zealand, the UK and the US) have acted together in relation to certain incidents of cyber interference attributed to China.[15]There are also signs of pushback from smaller states closer to home in relation to challenges to national sovereignty, debt diplomacy and financial viability arising from Belt and Road projects. The Sri Lankan government recently reversed the award of a $300 million housing deal to China, instead opting for a joint venture with an Indian company.China has been downscaling its investments as a way to counter some of the backlash it has received: the most recent Belt and Road summit put forward a more modest set of aspirations. This suggests that there is some scope for states to stand up to China and use leverage to secure better deals.Many international institutions have been Western-dominated for years;[16] China, together with many emerging and middle powers, has felt for some time that the international architecture does not reflect the world we live in. Given that context, states that champion the rules-based international order should acknowledge China’s desire to update the international order to reflect greater multipolarity, globalization and technological change, while being clear-eyed about their engagement with China. This involves investing in a proper understanding of China and how it works.[17]Where possible, cooperation with China should lead to outcomes that are backed up by international standards and transparency. The above-mentioned FAC report cites evidence that the UK’s support, and that of other developed countries, had a positive impact in shaping the governance and standards of the AIIB.[18] China has brought in international experts to advise on disputes before the CIIC, which may reassure would-be litigants.China’s relationship with the rules-based international order needs to be assessed pragmatically and dynamically. China can be a valuable partner in many areas where its objectives are closely aligned with those of the international community – from trade to climate change to peacekeeping.But where the country’s core interests are at odds with those of the wider international community, an increasingly confident China will strongly resist pressure, including on the South China Sea and human rights. In these areas, states supportive of international law can most powerfully push back through alliances and by ensuring that their own core values are not compromised in the interests of economic benefits.What needs to happenChina’s rising power and selective commitment to multilateralism make it a potentially influential ally in modernizing international governance.China is increasingly involved in shaping newer areas of international law. This enthusiasm could be harnessed in the service of institutional development and reform.Other states should identify areas of mutual strategic interest where China may offer a constructive role, including dispute settlement, health and climate change.However, engagement must not ignore the strategic calculations that drive China’s agenda, or its poor record on civil and political rights, transparency and accountability.Cooperation with China should lead to outcomes that are backed up by international standards and transparency.Where China’s actions undermine the rules-based international order, coordinated action by states supportive of that order is likely to be more effective than acting individually.Notes[1] Chalmers, M. (2019), Which Rules? Why There is No Single ‘Rules-Based International System’, RUSI Occasional Paper, April 2019, London: Royal United Services Institute, https://rusi.org/occasional-papers/Which-Rules-Why-There-Is-No-Single-Rules-Based-International-System.[2] See, for example, Moynihan, H. (2017), China’s Evolving Approach to International Dispute Settlement, Briefing, London: Royal Institute of International Affairs, https://www.chathamhouse.org/publication/chinas-evolving-approach-international-dispute-settlement.[3] UN Environment (2018), Emissions Gap Report 2018, p. XVII, https://www.unenvironment.org/resources/emissions-gap-report-2018.[4] House of Commons Foreign Affairs Committee (2019), China and the Rules-Based International System: Sixteenth Report of Session 2017–19, p. 32, https://publications.parliament.uk/pa/cm201719/cmselect/cmfaff/612/612.pdf.[5] Moynihan, H. (2018), ‘China Expands Its Global Governance Ambitions in the Arctic’, Expert Comment, 15 October 2018, https://www.chathamhouse.org/expert/comment/china-expands-its-global-governance-ambitions-arctic.[6] Updated version proposed 9 January 2015.[7] Moynihan, H. (2018), ‘Exploring Public International Law Issues with Chinese Scholars – Part Four’, Meeting Summary, 3 June 2018, https://www.chathamhouse.org/publication/exploring-public-international-law-issues-chinese-scholars-part-four.[8] Chatham House (2019, forthcoming, ‘Security and Prosperity in the Asia-Pacific: The Role of International Law’, conference summary, https://www.chathamhouse.org/event/security-and-prosperity-asia-pacific-role-international-law.[9] Permanent Court of Arbitration Case No. 2013-19 (Philippines v China), Award of 12 July 2016, https://pca-cpa.org/wp-content/uploads/sites/6/2016/07/PH-CN-20160712-Award.pdf.[10] Piccone, T. (2018), China’s Long Game on Human Rights at the United Nations, Washington, DC: Brookings Institution, https://www.brookings.edu/wp-content/uploads/2018/09/FP_20181009_china_human_rights.pdf.[11] Wye, R. (2018), ‘‘The entire Uyghur population is seemingly being treated as suspect’: China’s persecution of its Muslim minority’, LSE Religion and Global Society blog, 18 September 2018, https://blogs.lse.ac.uk/religionglobalsociety/2018/09/the-entire-uyghur-population-is-seemingly-being-treated-as-suspect-chinas-persecution-of-its-muslim-minority/.[12] Chatham House (2019, forthcoming, ‘Security and Prosperity in the Asia-Pacific: The Role of International Law’.[13] Walters, M. (2018), ‘Jury is out over China’s new commercial court, say lawyers’, Law Society Gazette, 1 November 2018, https://www.lawgazette.co.uk/law/jury-is-out-over-chinas-new-commercial-court-say-lawyers/5068125.article.[14] The Economist (2019), ‘Hope remains for Western solidarity. Look at embassies in Beijing’, 17 April 2019, https://www.economist.com/china/2019/04/20/hope-remains-for-western-solidarity-look-at-embassies-in-beijing.[15] In December 2018, the Five Eyes attributed the activities of a Chinese cyber espionage group targeting intellectual property and sensitive commercial property to China’s Ministry of State Security.[16] Roberts, A. (2017), Is International Law International?, Oxford: Oxford University Press.[17] Parton, C. (2019), China–UK Relations: Where to Draw the Border Between Influence and Interference?, RUSI Occasional Paper, February 2019, London: Royal United Services Institute, p. 30, https://rusi.org/publication/occasional-papers/china-uk-relations-where-draw-border-between-influence-and.[18] House of Commons Foreign Affairs Committee (2019), China and the Rules-Based International System, p. 15.This essay was produced for the 2019 edition of Chatham House Expert Perspectives – our annual survey of risks and opportunities in global affairs – in which our researchers identify areas where the current sets of rules, institutions and mechanisms for peaceful international cooperation are falling short, and present ideas for reform and modernization. Full Article
co Strengthen the International Criminal Court By feedproxy.google.com Published On :: Fri, 31 May 2019 10:54:53 +0000 12 June 2019 Elizabeth Wilmshurst CMG Distinguished Fellow, International Law Programme The ICC has been criticized for slow proceedings, weak management and ineffective prosecutions. The good news is that pragmatic reform need not entail fundamental treaty amendment; a culture change and more realistic expectations would go a long way. 2016-02-22-Gbagbo2.jpg Laurent Gbagbo looks on next to his lawyer Emmanuel Altit before the start of his trial at the ICC on 28 January 2016. Photo by Getty Images. The 1998 treaty which established the International Criminal Court (ICC) was adopted at a time when the world (or most of it) was willing to reach multilateral agreements on a variety of topics and was encouraging the development of international criminal justice. The two tribunals, set up by the UN Security Council, for the former Yugoslavia and for Rwanda had been relatively successful. The time was ripe for states to agree together to set up a permanent international court with wider scope than the two tribunals.So the ICC was created, with jurisdiction over the international crimes of genocide, crimes against humanity and war crimes; its jurisdiction for the crime of aggression developed later. The court was given the power to prosecute nationals of states that were parties to the ICC Statute, and also to prosecute where the crime was committed in the territory of a state party, whatever the nationality of the alleged criminals. The court had further jurisdiction when the Security Council referred a situation to it.That was some 20 years ago. There is now a perception in many quarters that the ICC has not fulfilled the expectations of its founders. The court’s proceedings are cumbersome and lengthy. Many of the accused are still at large, including Omar al-Bashir, the former president of Sudan. Some €1.5 billion has been spent, and there have been only three convictions for the core international crimes.There have been criticisms of the judges, the former Prosecutor and other officials, as well as concern over particular decisions of the court. The allegation that the court is only interested in crimes in Africa[1] is perhaps heard less frequently now than it once was (most of the African governments concerned referred the situations in their countries to the ICC themselves), and there has not been the mass walk-out of African states that was once predicted. Our Shared Humanity: The Arc of Intervention From Bosnia to the Brahimi Report and from Rwanda to R2P, Annan played a significant role in many critical moments that shaped approaches to peacekeeping and to the protection of civilians. What was the impact? But in other quarters there is serious unease about the situation in the court. As the UK representative said at a meeting last year, ‘We cannot bury our heads in the sand and pretend everything is fine when it isn’t.’[2]The negative assessment of the ICC’s work may be countered by the fact that it is the failure of states to cooperate with the court that causes many of the problems. Further, the expectations of states and civil society about the possibilities of international criminal justice have been so high that no court would be able to meet them. It is not possible for one court actually to ‘end impunity’ for international crimes,[3] nor to prevent war-related violence and mass atrocities, nor to satisfy all victims.Moreover, the criticisms of the ICC come against the background of the global crisis for multilateralism more generally. The present US administration is notoriously hostile towards this international institution.[4]On the plus side, the establishment of the court has encouraged states to revise their own laws on international crimes and to institute their own prosecutions where it is possible to do so. It is also claimed that the very existence of the court can be a deterrent to potential perpetrators of international crimes. The court has begun to add to the body of international criminal law and has increased the possibility that mass atrocities will be investigated.But there is indeed some truth in the criticisms made of the internal workings of the court. One problem is that the particular combination of the civil and common law systems that has developed has produced cumbersome procedures regarding the representation of victims at most stages of the proceedings. It has also resulted in endless appeals from huge numbers of small decisions made by one chamber or another.Then there are the management failures which have led to officials of the court being awarded compensation by the administrative tribunal of the International Labour Organization (ILO) because of the way they were treated by the court, and finally the decision of a few of the judges to take proceedings themselves at the ILO to have their salaries increased. Some ICC decisions have been met with surprise. For example, a former vice-president of the Democratic Republic of the Congo, Jean-Pierre Bemba, who was in the custody of the ICC for 10 years, was convicted by a unanimous trial chamber of various crimes and then succeeded on his appeal. Following this and the acquittal of former Côte d’Ivoire president Laurent Gbagbo,[5] there are concerns about the ability of the prosecution to succeed in cases against high-level alleged perpetrators.Most recently, there has been criticism of the reasoning behind the appeal court decision regarding the immunity – or, rather, lack of immunity – of former president Bashir. And a decision of a chamber of the ICC not to authorize the opening of an investigation in Afghanistan has been seen as shielding the US from possible proceedings (though it has been welcomed by others as a pragmatic approach).The message that certain problems with the ICC need fixing is coming not just from the writings of academics and the legal blogs,[6] but from governments too, including those, like the UK, which are among the foremost supporters of the court.The former presidents of the ICC’s Assembly of States Parties (which comprises the representatives of all states parties) say that they ‘are disappointed by the quality of some of [the court’s] judicial proceedings, frustrated by some of the results, and exasperated by the management deficiencies that prevent the Court from living up to its full potential’.[7] Changes to remove the worst excesses of the procedures that have evolved could be effected without amendments to the treaty incorporating the ICC Statute. It may be that a change in culture is also needed. More modesty by the court, along with more realism from governments and civil society, is needed.And, attractive as it might seem to push at the boundaries of the law, the court should be realistic in what it can achieve. It is next to impossible to prosecute a case effectively where there is no cooperation from the state on whose territory the crimes were committed.What is needed is a court that can undertake efficient and effective criminal proceedings, delivering fair and impartial justice in the small number of cases which it is reasonable to expect it to address, in the light of the evidential challenges, limited resources and limited state cooperation.Governments should decide together at the Assembly of States Parties to set in hand a review of the ICC’s operations. It has been suggested that a group of experts might be mandated to assess the management of the court;[8] on the basis of their report, governments could agree on the necessary improvements.Not everything, however, can come within the remit of such a group. Governments should adopt new rules and practices to address matters such as the election process for judges and their training; governments might consider reaching their own understandings on how some provisions of the ICC Statute should be interpreted in practice. Governments should reach out to the many civil society organizations which have supported the court over the years, to ensure that they are involved in the process.Measures of this kind cannot detract from the fact that the ICC is fundamentally sound and that its role is as necessary as when it was first established. As Richard Goldstone, former chief prosecutor of the United Nations International Criminal Tribunals for the former Yugoslavia and Rwanda, has said, ‘If there were no ICC in existence today, many people in many countries would be agitating for and demanding one. That we have one is a singular achievement. It behoves us to make it the best possible and to assist it, as States, civil society, and individuals, in the best and most productive way possible.’[9]What needs to happenCumbersome procedures, ineffective prosecutions against high-level alleged perpetrators, and weak internal management are among current criticisms of the ICC.Improvements to the court’s effectiveness and credibility may be possible without amending the treaty incorporating the ICC Statute.The Assembly of States Parties should review the ICC’s operations, whether or not with a group of experts, and governments should agree on improvements.New rules and practices should address matters such as the election process for judges and their training.Better management of expectations of the ICC among governments, civil society and the court itself is needed.Governments might consider reaching their own understandings on how some provisions of the ICC Statute should be interpreted in practice.Civil society organizations should be involved in any procedures for reform.Notes[1] See, for example, du Plessis, M., Maluwa, T. and O’Reilly, A. (2013), Africa and the International Criminal Court, London: Royal Institute of International Affairs, July 2013, https://www.chathamhouse.org/publications/papers/view/193415.[2] GOV.UK (2018), ‘UK statement to ICC Assembly of States Parties 17th session’, 5 December 2018, https://www.gov.uk/government/speeches/uk-statement-to-icc-assembly-of-states-parties-17th-session.[3] As the preamble to the ICC Statute desires. See ICC (2011), Rome Statute of the International Criminal Court, p. 1, https://www.icc-cpi.int/resource-library/Documents/RS-Eng.pdf.[4] See the speech of John Bolton, US National Security Advisor. Just Security (2018), ‘Bolton’s Remarks on the International Criminal Court’, 10 September 2018, https://www.justsecurity.org/60674/national-security-adviser-john-bolton-remarks-international-criminal-court/.[5] Gbagbo was accused of various crimes which took place after Côte d’Ivoire’s election in 2010, in which Gbagbo lost power to Alassane Ouattara. The case was terminated by the court following a year’s hearings in which the prosecution put forward its evidence.[6] See, for example, Guilfoyle, D. (2019), ‘Reforming the International Criminal Court: Is it Time for the Assembly of State Parties to be the adults in the room?’, EJIL:Talk! blog post, 8 May 2019, https://www.ejiltalk.org/reforming-the-international-criminal-court-is-it-time-for-the-assembly-of-state-parties-to-be-the-adults-in-the-room/.[7] Al Hussein, Z. R., Stagno Ugarte, B., Wenaweser, C. and Intelman, T. (2019), ‘The International Criminal Court Needs Fixing’, Atlantic Council, 24 April 2019, https://www.atlanticcouncil.org/blogs/new-atlanticist/the-international-criminal-court-needs-fixing.[8] Ibid.[9] Goldstone, R. (2019), ‘Acquittals by the International Criminal Court’, EJIL:Talk! blog post, 18 January 2019, https://www.ejiltalk.org/acquittals-by-the-international-criminal-court/. Richard Goldstone is also a former justice of the Constitutional Court of South Africa.This essay was produced for the 2019 edition of Chatham House Expert Perspectives – our annual survey of risks and opportunities in global affairs – in which our researchers identify areas where the current sets of rules, institutions and mechanisms for peaceful international cooperation are falling short, and present ideas for reform and modernization. Full Article
co The Protection of Children in Armed Conflict By feedproxy.google.com Published On :: Tue, 25 Jun 2019 18:10:01 +0000 Research Event 25 September 2019 - 5:30pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Emanuela-Chiara Gillard, Associate Fellow, International Law Programme, Chatham HouseJoanne Neenan, Legal Adviser, UK Foreign and Commonwealth OfficeDarren Stewart, Head of Operational Law, UK Army HeadquartersChair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House With more protracted and urbanized conflicts, the character of warfare is changing in a manner that is having a greater impact on children. Aside from physical harm, they face the trauma of family separation and displacement, are vulnerable to sexual abuse and recruitment as soldiers and suffer severe disruption to their education. This event will discuss how international humanitarian law applies to the protection of children. Are offences against children in armed conflict being prosecuted adequately? Are there better ways of ensuring compliance with the law?This meeting is the second in a series of three commemorating the 70th anniversary of the 1949 Geneva Conventions.This event, which is supported by the British Red Cross, will be followed by a drinks reception.THIS EVENT IS NOW FULL AND REGISTRATION HAS CLOSED. Department/project International Law Programme, The Limits on War and Preserving the Peace Chanu Peiris Programme Manager, International Law +44 (0)20 7314 3686 Email Full Article
co In Judging Prorogation, UK Supreme Court Marks Evolution, Not Revolution, in Law By feedproxy.google.com Published On :: Thu, 03 Oct 2019 07:49:48 +0000 3 October 2019 Ruma Mandal Director, International Law Programme @RumaCHLaw Despite the political significance, last week’s judgment does not signal a newly activist court. 2019-10-03-UKSC.jpg The Supreme Court building in Westminster. Photo: Getty Images. The UK Supreme Court’s ruling last Wednesday has, at least temporarily, scuppered the prime minister’s plans to limit parliamentary debate before the looming Brexit deadline. Some of the prime minister’s allies have attacked the ruling as a ‘constitutional coup’. But a close reading reveals that the court has stayed within its remit to interpret, rather than make, the law.In a carefully reasoned judgment, the court emphasized that the case was not about Brexit. But the judges certainly did not shy away from the extraordinary nature of the matters before it, noting that such factual situations have ‘never arisen before and are unlikely ever to arise again… But our law is used to rising to such challenges and supplies us with the legal tools to enable us to reason to a solution.’The key question before the court was whether the prime minister’s decision to seek prorogation was ‘justiciable’ – i.e. amenable to being reviewed by a court. The English and Scottish courts earlier on in these proceedings had come, dramatically, to opposing views on this.The Supreme Court was not dissuaded by the inherently political considerations involved in the prime minister’s decision, stating that while ‘courts cannot decide political questions, the fact that a legal dispute concerns the conduct of politicians, or arises from a matter of political controversy, has never been sufficient reason for the courts to refuse to consider it’.The court went on to emphasize that the Crown’s remaining prerogative powers (exercised on the advice of the government or directly by ministers) have long been subject to judicial scrutiny; such oversight is essential to guarding the separation of powers underpinning the UK’s constitution.So far, so conventional. The full bench of the Supreme Court was required to grapple, though, with a prerogative power that had never been tested before in the courts. And so they delved back to the 1611 Case of Proclamations: ‘the King hath no prerogative, but that which the law of the land allow him’. In the court’s view, the legal issue to be resolved was the scope of the power to prorogue (the existence of this particular prerogative not being in dispute).With no case law available to provide direct guidance on this question, the court, instead, relied on two fundamental principles of the UK’s constitution – parliamentary sovereignty and parliamentary accountability. What would be the logical consequence of an unlimited power to prorogue? The ability to shut parliament permanently.The conclusion: this particular prerogative power had limits. The court held that:‘A decision to prorogue Parliament (or to advise the monarch to prorogue Parliament) will be unlawful if the prorogation has the effect of frustrating or preventing, without reasonable justification, the ability of Parliament to carry out its constitutional functions as a legislature and as the body responsible for the supervision of the executive. In such a situation, the court will intervene if the effect is sufficiently serious to justify such an exceptional course.’Having come to this conclusion, the court was left to examine what justification had in fact been given, noting that the prime minister’s motives were irrelevant. It noted that no clear reason had been given – the relevant documents were all concerned with preparing for the Queen’s speech.Noting evidence on normal practice for such preparations, including from a former prime minister, the court found it ‘impossible… to conclude…that there was any reason – let alone a good reason – to advise Her Majesty to prorogue Parliament for five weeks’.The court’s decision was neither inevitable nor a radical departure from legal tradition. It represents the gradual evolution of the long-established legal principle that the crown’s powers are set by the law and supervised by the courts.Courts have traditionally been reticent to rule on prerogative powers which are ‘high politics’ by nature – classic examples include declaring war and negotiating treaties. In recent years, though, the judiciary has shown a growing confidence to grapple with the contours of those prerogative powers that remain. Deference is still shown when looking at how those powers have been used as opposed to the limits of the prerogative in question.The Supreme Court ruling won’t reassure those who worry about the emergence of an activist court willing to wade (improperly) into the political arena. Nor will it necessarily bring comfort to those anxious about an unwritten constitution in an era where political conventions are fast unravelling.But divisive court rulings are nothing new, nor are ministerial outbursts about inconvenient judgments. In the current environment, politicians should take particular care not to send mixed messages which undermine the independence of the UK’s judiciary. Public trust in British institutions is dangerously low and the UK can ill-afford further damage to its reputation as a country steeped in democracy and the rule of law. Full Article
co Online Disinformation and Political Discourse: Applying a Human Rights Framework By feedproxy.google.com Published On :: Tue, 05 Nov 2019 11:03:02 +0000 6 November 2019 Although some digital platforms now have an impact on more people’s lives than does any one state authority, the international community has been slow to hold to account these platforms’ activities by reference to human rights law. This paper examines how human rights frameworks should guide digital technology. Download PDF Kate Jones Associate Fellow, International Law Programme @katejones77 LinkedIn 2019-11-05-Disinformation.jpg A man votes in Manhattan, New York City, during the US elections on 8 November 2016. Photo: Getty Images. SummaryOnline political campaigning techniques are distorting our democratic political processes. These techniques include the creation of disinformation and divisive content; exploiting digital platforms’ algorithms, and using bots, cyborgs and fake accounts to distribute this content; maximizing influence through harnessing emotional responses such as anger and disgust; and micro-targeting on the basis of collated personal data and sophisticated psychological profiling techniques. Some state authorities distort political debate by restricting, filtering, shutting down or censoring online networks.Such techniques have outpaced regulatory initiatives and, save in egregious cases such as shutdown of networks, there is no international consensus on how they should be tackled. Digital platforms, driven by their commercial impetus to encourage users to spend as long as possible on them and to attract advertisers, may provide an environment conducive to manipulative techniques.International human rights law, with its careful calibrations designed to protect individuals from abuse of power by authority, provides a normative framework that should underpin responses to online disinformation and distortion of political debate. Contrary to popular view, it does not entail that there should be no control of the online environment; rather, controls should balance the interests at stake appropriately.The rights to freedom of thought and opinion are critical to delimiting the appropriate boundary between legitimate influence and illegitimate manipulation. When digital platforms exploit decision-making biases in prioritizing bad news and divisive, emotion-arousing information, they may be breaching these rights. States and digital platforms should consider structural changes to digital platforms to ensure that methods of online political discourse respect personal agency and prevent the use of sophisticated manipulative techniques.The right to privacy includes a right to choose not to divulge your personal information, and a right to opt out of trading in and profiling on the basis of your personal data. Current practices in collecting, trading and using extensive personal data to ‘micro-target’ voters without their knowledge are not consistent with this right. Significant changes are needed.Data protection laws should be implemented robustly, and should not legitimate extensive harvesting of personal data on the basis of either notional ‘consent’ or the data handler’s commercial interests. The right to privacy should be embedded in technological design (such as by allowing the user to access all information held on them at the click of a button); and political parties should be transparent in their collection and use of personal data, and in their targeting of messages. Arguably, the value of personal data should be shared with the individuals from whom it derives.The rules on the boundaries of permissible content online should be set by states, and should be consistent with the right to freedom of expression. Digital platforms have had to rapidly develop policies on retention or removal of content, but those policies do not necessarily reflect the right to freedom of expression, and platforms are currently not well placed to take account of the public interest. Platforms should be far more transparent in their content regulation policies and decision-making, and should develop frameworks enabling efficient, fair, consistent internal complaints and content monitoring processes. Expertise on international human rights law should be integral to their systems.The right to participate in public affairs and to vote includes the right to engage in public debate. States and digital platforms should ensure an environment in which all can participate in debate online and are not discouraged from standing for election, from participating or from voting by online threats or abuse. Department/project International Law Programme, Cyber, Sovereignty and Human Rights, Rights, Accountability and Justice Full Article
co Power Politics Could Impede Progress on Responsible Regulation of Cyberspace By feedproxy.google.com Published On :: Tue, 03 Dec 2019 14:34:13 +0000 3 December 2019 Harriet Moynihan Senior Research Fellow, International Law Programme @HarrietMoyniha9 A new Chatham House paper examines the prospects of countries reaching agreement on issues of sovereignty and non-intervention in cyberspace in the face of persistent, low-level, state-to-state cyber attacks. 2019-11-29-Intl-Law-Cyberattacks.jpg A computer hacked by a virus known as Petya. The Petya ransomware cyberattack hit computers of Russian and Ukrainian companies on 27 June 2017. Photo: Getty Images. In discussions to date about how international law applies in cyberspace, commentators have tended to focus their attention on how the rules on the use of force, or the law of armed conflict, apply to cyber activities conducted by states that give rise to physical damage, injury or death.But in practice, the vast majority of state cyberattacks fall below this threshold. Far more common are persistent, low-level attacks that may leave no physical trace but that are capable of doing significant damage to a state’s ability to control its systems, often at serious economic cost.Such cyber incursions might include network disruptions in the operation of another government’s websites; tampering with electoral infrastructure to change or undermine the result; or using cyber means to destabilize another state’s financial sector.For these kinds of cyber operation, the principle of sovereignty, and the principle of non-intervention in another state’s internal affairs, are the starting point.A UN Group of Government Experts (GGE) agreed in 2013 and 2015 that the principles in the UN Charter, including sovereignty and the prohibition on intervention in another state’s affairs, apply to states’ activities in cyberspace. The 2015 GGE also recommended eleven (non-binding) norms of responsible state behaviour in cyberspace.However, states have not yet reached agreement on how to apply these principles. Until recently, there has also been very little knowledge of what states actually do in cyberspace, as they usually conduct cyber operations covertly and have been reluctant to put their views on record.A new Chatham House research paper analyses the application of the principles of sovereignty and non-intervention to state cyberattacks that fall below the principle of use of force. As well as analysing the application of the law in this area, the paper also makes recommendations to governments on how they might best make progress in reaching agreement in this area.Existing rules or new rules?As the research paper makes clear, there is currently some debate, principally between countries in the West, about the extent to which sovereignty is a legally binding rule in the context of cyberspace and, if so, how it and the principle of non-intervention might apply in practice.In the last few years, certain states have put on record how they consider international law to apply to states’ activities in cyberspace, namely the UK, Australia, France and the Netherlands. While there may be some differences in their approaches, which are discussed in the paper, there also remains important common ground: namely, that existing international law already provides a solid framework for regulating states’ cyber activities, as it regulates every other domain of state-to-state activity.There is also an emerging trend for states to work together when attributing cyberattacks to hostile states, enabling them to call out malign cyber activity when it violates international law. (See, for example, the joint statements made in relation to the NotPetya cyber attack and malicious cyber activity attributed to the Russian government).However, other countries have questioned whether existing international law as it stands is capable of regulating states’ cyber interactions and have called for ‘new legal instruments’ in this area.This includes a proposal by the Shanghai Cooperation Organization (led by Russia and China) for an International Code of Conduct on Information Security, a draft of which was submitted to the UN in 2011 and 2015, without success. The UN has also formed a new Open-Ended Working Group (OEWG) under a resolution proposed by Russia to consider how international law applies to states’ activities in cyberspace.The resolution establishing the OEWG, which began work earlier this year, includes the possibility of the group ‘introducing changes to the rules, norms and principles of responsible behaviour of States’ agreed in the 2013 and 2015 GGE reports. In the OEWG discussions at the UN in September, several countries claimed that a new legal instrument was needed to fill the ‘legal vacuum’ (Cuba) or ‘the gap of ungoverned areas’ (Indonesia).It would be concerning if the hard-won consensus on the application of international law to cyberspace that has been reached at past GGEs started to unravel. In contrast to 2013 and 2015, the 2017 meeting failed to reach an agreement.On 9 December, a renewed GGE will meet in New York, but the existence of the OEWG exploring the same issues in a separate process reflects the fact that cyber norms have become an area of geopolitical rivalry.Aside from the application of international law, states are also adopting divergent approaches to the domestic regulation of cyberspace within their own territory. The emerging trend towards a ‘splinternet’ – i.e. between states that believe the internet should be global and open on the hand, and those that favour a ‘sovereignty and control’ model on the other – is also likely to make discussions at the GGE more challenging.Distinct from the international law concept of sovereignty is the notion of ‘cybersovereignty’, a term coined by China to describe the wide-ranging powers it assumes under domestic law to regulate its citizens’ access to the internet and personal data within its territory. This approach is catching on (as reflected in Russia’s recently enacted ‘Sovereign Internet Law’), with other authoritarian states likely to follow suit.The importance of non-state actorsIn parallel with regional and UN discussions on how international law applies, a number of initiatives by non-state actors have also sought to establish voluntary principles about responsible state behaviour in cyberspace.The Global Commission on the Stability of Cyberspace, a multi-stakeholder body that has proposed principles, norms and recommendations to guide responsible behaviour by all parties in cyberspace, recently published its final report. The Cybersecurity Tech Accord aims to promote collaboration between tech companies on stability and resilience in cyberspace. President Macron’s ‘Paris Call for Trust and Security in Cyberspace’ has to date received the backing of 67 states, 139 international and civil society organizations, and 358 private-sector organizations.It remains to be seen in the long term whether the parallel processes at the UN will work constructively together or be competitive. But notwithstanding the challenging geopolitical backdrop, the UN GGE meeting next week at the least offers states the opportunity to consolidate and build on the results of past meetings; to increase knowledge and discussion about how international law might apply; and to encourage more states to put their own views of these issues on the record. Full Article
co Seventy Years of the Geneva Conventions: What of the Future? By feedproxy.google.com Published On :: Tue, 24 Mar 2020 12:19:34 +0000 24 March 2020 Seventy years after the adoption of the Geneva Conventions, there are challenges that remain to be addressed. This briefing takes three pertinent examples, and discusses possibilities for addressing them. Read online Download PDF Emanuela-Chiara Gillard Associate Fellow, International Law Programme GettyImages-913468402.jpg Rescue of the wounded in Duma city by Syrian Red Crescent paramedics, 2 February 2018. Photo: Samer Bouidani/NurPhoto/Getty Summary The 70th anniversary of the adoption of the 1949 Geneva Conventions was commemorated in 2019. But violations of the Conventions and of the 1977 Additional Protocols are widespread.Contemporary conflicts have been marked by violations of some of the foundational rules of international humanitarian law (IHL) relating to the protection of the wounded and sick and of providers of medical assistance.A further area of IHL that has come under strain and scrutiny are the rules regulating humanitarian relief operations and their application to sieges and blockades.War has a huge impact on children, and the treatment of children in armed conflict is another area of the law that requires further attention.In the current political climate, it is unlikely that new treaties will be negotiated to address emerging issues or uncertainties in the law.Other measures must be explored, including the adoption of domestic measures to implement existing law; support for processes that interpret the law; and initiatives to promote compliance with the law by organized armed groups.One overarching challenge is the interplay between IHL and counterterrorism measures. It can undermine the protections set out in IHL, and hinder principled humanitarian action and activities to promote compliance with the law by organized armed groups. Department/project International Law Programme, The Limits on War and Preserving the Peace Full Article
co COVID-19 Brings Human Rights into Focus By feedproxy.google.com Published On :: Thu, 09 Apr 2020 10:59:58 +0000 9 April 2020 Sonya Sceats Associate Fellow, International Law Programme @SonyaSceats With a reawakened sense of our shared humanity and vulnerability, and the benefits of collective action, this crisis may translate into a comeback for human rights as a popular idea. 2020-04-09-US-COVID-homeless A previously homeless family in the backyard of their newly reclaimed home in Los Angeles, where officials are trying to find homes to protect the state's huge homeless population from COVID-19. Photo by FREDERIC J. BROWN/AFP via Getty Images. During this extraordinary global public health emergency, governments must strike the right balance between assertive measures to slow the spread of the virus and protect lives on the one hand, and respect for human autonomy, dignity and equality on the other.International law already recognises the grave impact of pandemics and other catastrophic events on social order and provides criteria to guide states in their emergency action. The International Covenant on Civil and Political Rights permits curbs on the right to ‘liberty of movement’ so long as restrictions are provided by law, deemed necessary to protect public health, and consistent with other rights in that treaty.Freedom of expression and association, and the rights to privacy and family life are also qualified in these terms under international and regional human rights treaties. But, as emphasised in the Siracusa Principles, any limitations must not be applied in an arbitrary or discriminatory way, and must be of limited duration and subject to review.International law also guarantees the right to the highest attainable standard of health, while states are specifically required to take steps to prevent, treat and control epidemics under the International Covenant on Economic, Social and Cultural Rights. Even in health emergencies, access to health services must be ensured on a non-discriminatory basis, especially for vulnerable or marginalised groups.Abuse of coronavirus emergency measuresMany governments have taken pains to craft emergency laws that respect human rights, such as permitting reasonable exceptions to lockdowns for essential shopping and exercise, and making them subject to ongoing parliamentary review and sunset clauses. But even laws that appear to be human rights compliant can still easily be misapplied, as the recent debates about over-zealous policing of people walking and travelling in the UK illustrate.And disturbing stories are emerging from states where police brutality is entrenched. In Kenya, a 13-year-old boy was reportedly shot on the balcony of his home by police enforcing a coronavirus curfew. Authorities in the Philippines' are allegedly locking those caught defying the curfew in dog cages.As the recent history of counterterrorism demonstrates, emergency laws tend to be sticky, remaining on the statute books far longer than desirable.The virus is also proving a powerful accelerant for the current global authoritarian drift which is so detrimental to progress on human rights. Many authoritarian leaders have seized the opportunity to further reduce constraints on their power.Hungary's prime minister Viktor Orbán has used the pandemic as a pretext for new laws enabling him to rule by decree, completing the country's transition to an elected dictatorship. In Brazil, president Jair Bolsonaro has suspended deadlines for public bodies to reply to freedom of information requests. Iran is the latest of many repressive states in the Middle East to ban the printing and distribution of all newspapers. In China, the government brushed off criticism over ‘disappearances’ of whistleblowers and citizen journalists who questioned its response to the crisis.Others have exploited the turmoil to undermine justice for human rights abuses - Sri Lanka's president Gotabaya Rajapaksa pardoned one of the only soldiers held accountable for crimes during the country's brutal civil war.Coronavirus also places liberal values under further strain. Fear is a major driver in the appeal of populist authoritarians and the virus is stoking it. One poll showed 73% of British citizens agreed coronavirus is just the latest sign that the world we live in is increasingly dangerous. Extremists are exploiting these fears to spread hate by blaming the outbreak on ethnic or religious groups, and encouraging those infected to spread it to these groups.The closure of borders helps reinforce xenophobic tendencies, and high public tolerance of emergency measures could easily spill into normalisation of intrusive digital surveillance and restrictions on liberty for other reasons well into the future.Disadvantaged groups face a higher level of risk from the crisis. The health of aboriginal Australians is so poor that those aged 50 and above are being urged to stay home, advice otherwise given to those over 70 in the general population. The Moria refugee camp on Lesbos is reporting no soap and just one water tap for 1,300 refugees. In the UK, asylum seekers struggle to self-isolate in shared accommodation and have a daily allowance of just £5.40 for food, medicine and toiletries. Women's rights groups are reporting a spike in domestic violence.For countries racked by war and extreme poverty, the impact is catastrophic. The virus is set to run rampant in slums, refugee camps and informal settlements where public health systems - if they exist at all - will struggle to cope. And detainees are among the most at risk, with the UN calling for release of political prisoners and anyone detained without sufficient legal basis.But the crisis has galvanised debate around the right to health and universal health coverage. Many governments have quickly bankrolled generous relief packages which will actually safeguard the socio-economic rights of many, even if they are not being justified in those terms. Portugal and Ireland have rolled back barriers to accessing healthcare for asylum seekers and other marginalised migrants.The pandemic strikes as many powerful governments have become increasingly nationalistic, undermining or retreating from international rules and institutions on human rights. But as the crisis spreads, the role of well-established international human rights standards in shaping and implementing effective - but also legitimate - measures is becoming ever clearer.The virus has reminded us of our interconnectedness as human beings and the need for global cooperation to protect our lives and health. This may help to revive popular support for human rights, creating momentum for the efforts to tackle inequality and repression - factors which have made the global impact of coronavirus so much worse than it might have been. Full Article
co 12-LOX catalyzes the oxidation of 2-arachidonoyl-lysolipids in platelets generating eicosanoid-lysolipids that are attenuated by iPLA2{gamma} knockout [Signal Transduction] By feedproxy.google.com Published On :: 2020-04-17T00:06:05-07:00 The canonical pathway of eicosanoid production in most mammalian cells is initiated by phospholipase A2-mediated release of arachidonic acid, followed by its enzymatic oxidation resulting in a vast array of eicosanoid products. However, recent work has demonstrated that the major phospholipase in mitochondria, iPLA2γ (patatin-like phospholipase domain containing 8 (PNPLA8)), possesses sn-1 specificity, with polyunsaturated fatty acids at the sn-2 position generating polyunsaturated sn-2-acyl lysophospholipids. Through strategic chemical derivatization, chiral chromatographic separation, and multistage tandem MS, here we first demonstrate that human platelet-type 12-lipoxygenase (12-LOX) can directly catalyze the regioselective and stereospecific oxidation of 2-arachidonoyl-lysophosphatidylcholine (2-AA-LPC) and 2-arachidonoyl-lysophosphatidylethanolamine (2-AA-LPE). Next, we identified these two eicosanoid-lysophospholipids in murine myocardium and in isolated platelets. Moreover, we observed robust increases in 2-AA-LPC, 2-AA-LPE, and their downstream 12-LOX oxidation products, 12(S)-HETE-LPC and 12(S)-HETE-LPE, in calcium ionophore (A23187)-stimulated murine platelets. Mechanistically, genetic ablation of iPLA2γ markedly decreased the calcium-stimulated production of 2-AA-LPC, 2-AA-LPE, and 12-HETE-lysophospholipids in mouse platelets. Importantly, a potent and selective 12-LOX inhibitor, ML355, significantly inhibited the production of 12-HETE-LPC and 12-HETE-LPE in activated platelets. Furthermore, we found that aging is accompanied by significant changes in 12-HETE-LPC in murine serum that were also markedly attenuated by iPLA2γ genetic ablation. Collectively, these results identify previously unknown iPLA2γ-initiated signaling pathways mediated by direct 12-LOX oxidation of 2-AA-LPC and 2-AA-LPE. This oxidation generates previously unrecognized eicosanoid-lysophospholipids that may serve as biomarkers for age-related diseases and could potentially be used as targets in therapeutic interventions. Full Article
co Glucocerebrosidases catalyze a transgalactosylation reaction that yields a newly-identified brain sterol metabolite, galactosylated cholesterol [Glycobiology and Extracellular Matrices] By feedproxy.google.com Published On :: 2020-04-17T00:06:05-07:00 β-Glucocerebrosidase (GBA) hydrolyzes glucosylceramide (GlcCer) to generate ceramide. Previously, we demonstrated that lysosomal GBA1 and nonlysosomal GBA2 possess not only GlcCer hydrolase activity, but also transglucosylation activity to transfer the glucose residue from GlcCer to cholesterol to form β-cholesterylglucoside (β-GlcChol) in vitro. β-GlcChol is a member of sterylglycosides present in diverse species. How GBA1 and GBA2 mediate β-GlcChol metabolism in the brain is unknown. Here, we purified and characterized sterylglycosides from rodent and fish brains. Although glucose is thought to be the sole carbohydrate component of sterylglycosides in vertebrates, structural analysis of rat brain sterylglycosides revealed the presence of galactosylated cholesterol (β-GalChol), in addition to β-GlcChol. Analyses of brain tissues from GBA2-deficient mice and GBA1- and/or GBA2-deficient Japanese rice fish (Oryzias latipes) revealed that GBA1 and GBA2 are responsible for β-GlcChol degradation and formation, respectively, and that both GBA1 and GBA2 are responsible for β-GalChol formation. Liquid chromatography–tandem MS revealed that β-GlcChol and β-GalChol are present throughout development from embryo to adult in the mouse brain. We found that β-GalChol expression depends on galactosylceramide (GalCer), and developmental onset of β-GalChol biosynthesis appeared to be during myelination. We also found that β-GlcChol and β-GalChol are secreted from neurons and glial cells in association with exosomes. In vitro enzyme assays confirmed that GBA1 and GBA2 have transgalactosylation activity to transfer the galactose residue from GalCer to cholesterol to form β-GalChol. This is the first report of the existence of β-GalChol in vertebrates and how β-GlcChol and β-GalChol are formed in the brain. Full Article
co MtrP, a putative methyltransferase in Corynebacteria, is required for optimal membrane transport of trehalose mycolates [Lipids] By feedproxy.google.com Published On :: 2020-05-01T00:06:09-07:00 Pathogenic bacteria of the genera Mycobacterium and Corynebacterium cause severe human diseases such as tuberculosis (Mycobacterium tuberculosis) and diphtheria (Corynebacterium diphtheriae). The cells of these species are surrounded by protective cell walls rich in long-chain mycolic acids. These fatty acids are conjugated to the disaccharide trehalose on the cytoplasmic side of the bacterial cell membrane. They are then transported across the membrane to the periplasm where they act as donors for other reactions. We have previously shown that transient acetylation of the glycolipid trehalose monohydroxycorynomycolate (hTMCM) enables its efficient transport to the periplasm in Corynebacterium glutamicum and that acetylation is mediated by the membrane protein TmaT. Here, we show that a putative methyltransferase, encoded at the same genetic locus as TmaT, is also required for optimal hTMCM transport. Deletion of the C. glutamicum gene NCgl2764 (Rv0224c in M. tuberculosis) abolished acetyltrehalose monocorynomycolate (AcTMCM) synthesis, leading to accumulation of hTMCM in the inner membrane and delaying its conversion to trehalose dihydroxycorynomycolate (h2TDCM). Complementation with NCgl2764 normalized turnover of hTMCM to h2TDCM. In contrast, complementation with NCgl2764 derivatives mutated at residues essential for methyltransferase activity failed to rectify the defect, suggesting that NCgl2764/Rv0224c encodes a methyltransferase, designated here as MtrP. Comprehensive analyses of the individual mtrP and tmaT mutants and of a double mutant revealed strikingly similar changes across several lipid classes compared with WT bacteria. These findings indicate that both MtrP and TmaT have nonredundant roles in regulating AcTMCM synthesis, revealing additional complexity in the regulation of trehalose mycolate transport in the Corynebacterineae. Full Article
co COQ11 deletion mitigates respiratory deficiency caused by mutations in the gene encoding the coenzyme Q chaperone protein Coq10 [Lipids] By feedproxy.google.com Published On :: 2020-05-01T00:06:09-07:00 Coenzyme Q (Qn) is a vital lipid component of the electron transport chain that functions in cellular energy metabolism and as a membrane antioxidant. In the yeast Saccharomyces cerevisiae, coq1–coq9 deletion mutants are respiratory-incompetent, sensitive to lipid peroxidation stress, and unable to synthesize Q6. The yeast coq10 deletion mutant is also respiratory-deficient and sensitive to lipid peroxidation, yet it continues to produce Q6 at an impaired rate. Thus, Coq10 is required for the function of Q6 in respiration and as an antioxidant and is believed to chaperone Q6 from its site of synthesis to the respiratory complexes. In several fungi, Coq10 is encoded as a fusion polypeptide with Coq11, a recently identified protein of unknown function required for efficient Q6 biosynthesis. Because “fused” proteins are often involved in similar biochemical pathways, here we examined the putative functional relationship between Coq10 and Coq11 in yeast. We used plate growth and Seahorse assays and LC-MS/MS analysis to show that COQ11 deletion rescues respiratory deficiency, sensitivity to lipid peroxidation, and decreased Q6 biosynthesis of the coq10Δ mutant. Additionally, immunoblotting indicated that yeast coq11Δ mutants accumulate increased amounts of certain Coq polypeptides and display a stabilized CoQ synthome. These effects suggest that Coq11 modulates Q6 biosynthesis and that its absence increases mitochondrial Q6 content in the coq10Δcoq11Δ double mutant. This augmented mitochondrial Q6 content counteracts the respiratory deficiency and lipid peroxidation sensitivity phenotypes of the coq10Δ mutant. This study further clarifies the intricate connection between Q6 biosynthesis, trafficking, and function in mitochondrial metabolism. Full Article
co The testis-specific LINC component SUN3 is essential for sperm head shaping during mouse spermiogenesis [Cell Biology] By feedproxy.google.com Published On :: 2020-05-08T03:41:14-07:00 Sperm head shaping is a key event in spermiogenesis and is tightly controlled via the acrosome–manchette network. Linker of nucleoskeleton and cytoskeleton (LINC) complexes consist of Sad1 and UNC84 domain–containing (SUN) and Klarsicht/ANC-1/Syne-1 homology (KASH) domain proteins and form conserved nuclear envelope bridges implicated in transducing mechanical forces from the manchette to sculpt sperm nuclei into a hook-like shape. However, the role of LINC complexes in sperm head shaping is still poorly understood. Here we assessed the role of SUN3, a testis-specific LINC component harboring a conserved SUN domain, in spermiogenesis. We show that CRISPR/Cas9-generated Sun3 knockout male mice are infertile, displaying drastically reduced sperm counts and a globozoospermia-like phenotype, including a missing, mislocalized, or fragmented acrosome, as well as multiple defects in sperm flagella. Further examination revealed that the sperm head abnormalities are apparent at step 9 and that the sperm nuclei fail to elongate because of the absence of manchette microtubules and perinuclear rings. These observations indicate that Sun3 deletion likely impairs the ability of the LINC complex to transduce the cytoskeletal force to the nuclear envelope, required for sperm head elongation. We also found that SUN3 interacts with SUN4 in mouse testes and that the level of SUN4 proteins is drastically reduced in Sun3-null mice. Altogether, our results indicate that SUN3 is essential for sperm head shaping and male fertility, providing molecular clues regarding the underlying pathology of the globozoospermia-like phenotype. Full Article
co Organellar maps through proteomic profiling - a conceptual guide By feedproxy.google.com Published On :: 2020-04-28 Georg H H BornerApr 28, 2020; 0:R120.001971v1-mcp.R120.001971Review Full Article
co The DNA sensor cGAS is decorated by acetylation and phosphorylation modifications in the context of immune signaling By feedproxy.google.com Published On :: 2020-04-28 Bokai SongApr 28, 2020; 0:RA120.001981v1-mcp.RA120.001981Research Full Article
co HIGD2A is required for assembly of the COX3 module of human mitochondrial complex IV By feedproxy.google.com Published On :: 2020-04-21 Daniella H HockApr 21, 2020; 0:RA120.002076v1-mcp.RA120.002076Research Full Article
co Flow-induced reorganization of laminin-integrin networks within the endothelial basement membrane uncovered by proteomics By feedproxy.google.com Published On :: 2020-04-24 Eelke P. BéguinApr 24, 2020; 0:RA120.001964v1-mcp.RA120.001964Research Full Article
co Identification of an Unconventional Subpeptidome Bound to the Behcet's Disease-associated HLA-B*51:01 that is Regulated by Endoplasmic Reticulum Aminopeptidase 1 (ERAP1) By feedproxy.google.com Published On :: 2020-05-01 Liye ChenMay 1, 2020; 19:871-883Research Full Article
co Human Hepatocyte Nuclear Factor 4-{alpha} Encodes Isoforms with Distinct Transcriptional Functions By feedproxy.google.com Published On :: 2020-05-01 Élie LambertMay 1, 2020; 19:808-827Research Full Article
co Quantitative proteomics of human heart samples collected in vivo reveal the remodeled protein landscape of dilated left atrium without atrial fibrillation By feedproxy.google.com Published On :: 2020-04-14 Nora LinscheidApr 14, 2020; 0:RA119.001878v1-mcp.RA119.001878Research Full Article
co Immediate adaptation analysis implicates BCL6 as an EGFR-TKI combination therapy target in NSCLC By feedproxy.google.com Published On :: 2020-03-31 Yan Zhou TranMar 31, 2020; 0:RA120.002036v1-mcp.RA120.002036Research Full Article
co Characterization of signaling pathways associated with pancreatic {beta}-cell adaptive flexibility in compensation of obesity-linked diabetes in db/db mice By feedproxy.google.com Published On :: 2020-04-07 Taewook KangApr 7, 2020; 0:RA119.001882v1-mcp.RA119.001882Research Full Article
co Discovery of a Redox Thiol Switch: Implications for Cellular Energy Metabolism By feedproxy.google.com Published On :: 2020-05-01 Xing-Huang GaoMay 1, 2020; 19:852-870Research Full Article
co Large-scale Identification of N-linked Intact Glycopeptides in Human Serum using HILIC Enrichment and Spectral Library Search By feedproxy.google.com Published On :: 2020-04-01 Qingbo ShuApr 1, 2020; 19:672-689Research Full Article
co Selection of features with consistent profiles improves relative protein quantification in mass spectrometry experiments By feedproxy.google.com Published On :: 2020-03-31 Tsung-Heng TsaiMar 31, 2020; 0:RA119.001792v1-mcp.RA119.001792Research Full Article
co Compliance Checklists No Longer Required at Initial Manuscript Submission By feedproxy.google.com Published On :: 2020-04-01 Alma L. BurlingameApr 1, 2020; 19:571-571Editorial Full Article
co Improving Identification of In-organello Protein-Protein Interactions Using an Affinity-enrichable, Isotopically Coded, and Mass Spectrometry-cleavable Chemical Crosslinker By feedproxy.google.com Published On :: 2020-04-01 Karl A. T. MakepeaceApr 1, 2020; 19:624-639Research Full Article
co A Compact Quadrupole-Orbitrap Mass Spectrometer with FAIMS Interface Improves Proteome Coverage in Short LC Gradients By feedproxy.google.com Published On :: 2020-04-01 Dorte B. Bekker-JensenApr 1, 2020; 19:716-729Technological Innovation and Resources Full Article
co Protecting the Cloud: Securing access to public cloud accounts By feedproxy.google.com Published On :: Tue, 05 May 2020 12:44:15 +0000 How Sophos Cloud Optix helps you secure access to your AWS, Azure and Google Cloud Platform accounts. Full Article Cloud Amazon Web Services AWS Azure Cloud Optix GCP Google cloud platform MFA Microsoft Azure public cloud
co Making the most of attending conferences By blogs.ams.org Published On :: Tue, 08 Oct 2019 16:54:02 +0000 In this blog by Julianne Vega, graduate student at University of Kentucky, Julianne tells us how to make the most of attending math conferences. If you are heading to a conference, challenge yourself! Your first conference may not be the … Continue reading → Full Article career advancement General Graduate School Uncategorized Undegraduates
co A New Type of Learning Community By blogs.ams.org Published On :: Wed, 05 Feb 2020 13:42:16 +0000 Setting high standards is expected from all educators. Yet, I think I may have taken this to an extreme in my 2019 spring senior seminar course in algebraic combinatorics. Students walked in to class, got a copy of the syllabus … Continue reading → Full Article career advancement General Journals and Publications Uncategorized Undegraduates
co Cybersecurity in the Commonwealth: Building the Foundations of Effective National Responses in the Caribbean By feedproxy.google.com Published On :: Thu, 07 Feb 2019 14:20:01 +0000 Invitation Only Research Event 8 March 2019 - 9:00am to 5:30pm Bridgetown, Barbados Event participants Joyce Hakmeh, Cyber Research Fellow, International Security Department, Chatham House This workshop is the second in a series in the 'Implementing the Commonwealth Cybersecurity Agenda' project. The workshop aims to provide a multi-stakeholder pan-Commonwealth platform to discuss how to take the implementation of the 'Commonwealth Cyber Declaration' forward with a focus on the second pillar of the declaration – building the foundations of an effective national cybersecurity response with eight action points. As such, the workshop gathers different project implementers under the UK Foreign and Commonwealth Office’s Cyber Programme, in addition to other key relevant stakeholders from the global level, to explore ongoing initiatives which aim to deliver one or more of pillar two’s action points.The workshop addresses issues from a global perspective and a Commonwealth perspective and will include presentations from selected partners from different Commonwealth countries. Department/project International Security Programme Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email Full Article
Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email
co Transparency and Accountability for Drone Use: European Approaches By feedproxy.google.com Published On :: Thu, 07 Mar 2019 17:35:01 +0000 Invitation Only Research Event 11 March 2019 - 9:30am to 12 March 2019 - 12:30pm Chatham House With increased use of military drones in recent years there have also been many calls for greater transparency and accountability with regards to drone operations.This would allow for greater public understanding, particularly as the complex nature of military operations today intensifies difficulties in sustaining perceptions of the legitimate use of force.For example, in Europe, leading states rely on the US for drone platforms and for the infrastructure - such as military communication networks - that enable those operations, while the US also relies on airbases in European states to operate its drone programme.In addition, with reports that the US is loosening the rules on the use of drones, it is important to understand how European approaches to transparency and accountability may be affected by these developments.This workshop focuses on how European states can facilitate transparency to ensure accountability for drone use, as well as what the limits might be, considering both the complexity of military operations today and the need for achieving operational goals.With the US easing restrictions on export controls, the discussion also considers the role of regulation in ensuring accountability and prospects for developing common standards.Attendance at this event is by invitation only. Nilza Amaral Project Manager, International Security Programme Email Department/project International Security Programme, Policy Implications of Armed Drone Use Full Article
co How Regulation Could Break the Internet: In Conversation with Andrew Sullivan By feedproxy.google.com Published On :: Mon, 29 Apr 2019 13:30:01 +0000 Research Event 19 June 2019 - 6:00pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Andrew Sullivan, President and CEO Internet SocietyChair: Emily Taylor, Associate Fellow, International Security Department, Chatham House; Editor, Journal of Cyber Policy Internet regulation is increasing around the world creating positive obligations on internet providers and exerting negative unintended consequences on the internet infrastructure. In some ways, most of this regulatory activity is justifiable. Governments are concerned about the increased risk that the use of the internet brings to societies. As a response, many governments have been enacting regulations as their main approach to dealing with these concerns. The main challenge is that most of the current regulations are either ill-defined or unworkable. On the one hand, several governments have established procedures that seek to analyze the impacts of new regulatory proposals before they were adopted. However, there hasn’t been enough attention aimed at analyzing regulations after they have been adopted and only a few have measures in place to evaluate the impacts of the procedures and practices that govern the regulatory process itself.On the other hand, much of the regulation creates unintended consequences to the internet itself. It undermines many of its fundamental properties and challenges the integrity and resiliency of its infrastructure. This event discusses current practices in internet-related regulation and the related challenges. Panellists will discuss how governments can enforce regulations that achieve their intended purpose while at the same time protecting the internet’s core infrastructure and its properties, including its openness, interoperability and global reach. Department/project International Security Programme, Internet Governance Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email Full Article
Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email
co Protecting Children in Conflict: See Me Safe Symposium By feedproxy.google.com Published On :: Wed, 01 May 2019 14:55:01 +0000 Invitation Only Research Event 7 May 2019 - 10:00am to 5:00pm Chatham House, London Today there are 420 million children, or one-fifth of children worldwide, who live in conflict zones and are at risk of being killed or injured and denied access to education, healthcare and humanitarian assistance. From Myanmar and Syria, to South Sudan and Yemen, the impact of conflict on children and their families is devastating. With conflicts becoming more protracted and urbanized, and the undermining of international rules and norms, the risk to civilians is rapidly increasing. The impact of the crisis in civilian protection is not only devastating children’s lives and risking a lost generation, it threatens global stability and prosperity, contributing to the degradation of the international rules-based system and its institutions and undermining the ability to hold perpetrators accountable and prevent these atrocities from happening. This symposium will bring together practitioners, policymakers, business leaders, philanthropists and academics for a day of panel discussions on the protection of children in conflict. The aim of the event is to generate an informed debate and to deepen engagement with issues around protecting children in conflict as well as to inspire support to help rebuild children’s lives. This event will be followed by a reception from 17:00-18:30. Attendance is by invitation only. Celebrating its centenary in 2020, Chatham House is partnering with Save the Children on this core area of their work, in their anniversary year. Department/project International Security Programme Nilza Amaral Project Manager, International Security Programme Email Full Article
co Create a Global Code of Conduct for Outer Space By feedproxy.google.com Published On :: Thu, 06 Jun 2019 12:24:56 +0000 12 June 2019 Dr Patricia Lewis Research Director, Conflict, Science & Transformation; Director, International Security Programme @PatriciaMary The rules governing human activity in space have been in place for only a few decades, and yet they are already out of date. They need to be built on and extended to reflect the dramatic and rapid changes in the use of space. 2016-09-27-Space2.jpg Nighttime view of the strait of Gibraltar. Photo by NASA. The 1967 Outer Space Treaty (OST) is the mainframe for space law. It recognizes the importance of the use and scientific exploration of outer space for the benefit and in the interests of all countries. It also prohibits national sovereignty in space, including of the Moon and other celestial bodies.The OST prohibits all weapons of mass destruction in space – in orbit or on other planets and moons – and does not allow the establishment of military infrastructure, manoeuvres or the testing of any type of weapon on planets or moons. As the treaty makes clear, outer space is for peaceful purposes only. Except of course, it is not – nor has it ever been so.The very first satellite, Sputnik, was a military satellite which kicked off the Cold War space race between the US and the USSR. The militaries of many countries followed suit, and space is now used for military communication, signals intelligence, imaging, targeting, arms control verification and so on.However, in keeping with international aspirations, space is also being used for all kinds of peaceful purposes such as environmental monitoring, broadcast communications, delivering the internet, weather prediction, navigation, scientific exploration and – very importantly – monitoring the ‘space weather’ (including the activity from the Sun).There are several other international agreements on space, such as on the rescue of astronauts, the registration of satellites and liability for damage caused by space objects. There is also the Moon Treaty, which governs activities on the Moon and other moons, asteroids and planets.[i]More recently, states at the UN Committee on the Peaceful Uses of Outer Space (COPUOS) in Vienna have agreed on guidelines to deal with the worrying situation of space debris which is cluttering up orbits and posing a danger to satellites, the space station and astronauts.The problem the international community now faces is that the use of space is changing dramatically and rapidly. There are more satellites than ever – well over 1,000 – and more owners of satellites – almost every country uses information generated from space. Increasingly, however, those owners are not countries, militaries or international organizations but the commercial sector. Very soon, the owners will even include individuals.Small ‘mini-satellites’ or ‘cube-sats’ are poised to be deployed in space. These can act independently or in ‘swarms’, and are so small that they piggy-back on the launching of other satellites and so are very cheap to launch. This is changing the cost–benefit equation of satellite ownership and use. Developing countries are increasingly dependent on space for communications, the internet and information on, for example, weather systems, coastal activities and agriculture. Another major development is the advent of asteroid mining. Asteroids contain a wide range of metals and minerals – some asteroids are more promising than others, and some are closer to Earth than others. Several companies have been set up and registered around the world to begin the exploitation of asteroids for precious metals (such as platinum) and compounds (such as rare-earth minerals).Legally, however, this will be a murky venture. The current international treaty regime prohibits the ownership of a celestial body by a country – space is for all. But does international law prohibit the ownership or exploitation of a celestial body by a private company? The law has yet to be tested, but there are space lawyers who think that companies are exempt. Luxembourg and Australia are two countries that have already begun the registration of interest for space-mining companies.As humanity becomes more dependent on information that is generated in or transmitted through space, the vulnerability to the manipulation of space data is increasing. The demands on the use of communications frequencies (the issue of spectrum availability and rights), managed by the International Telecommunication Union (ITU),[ii] need to be urgently addressed.There are now constant cyberattacks in space and on the digital information on which our systems rely. For example, position, navigation and timing information such as from GPS or Galileo is not only vital for getting us safely from A to B, but also for fast-moving financial transactions that require accurate timing signals.Almost all of our electronic systems depend on those timing signals for synchronization and basic functioning. Cyber hacks, digital spoofing and ‘fake’ information are now a real possibility. There is no rules-based order in place that is fit to deal with these types of attacks.Cyberweapons are only part of the problem. It is assumed that states, if they haven’t already done so, will be positioning ‘defensive’ space weaponry to protect their satellites. The protection may be intended to be against space debris – nets, grabber bars and harpoons, for example, are all being investigated.All of these ideas, however, could be used as offensive weapons. Once one satellite operator decides to equip its assets with such devices, many others will follow. The weaponization of space is in the horizon.There are no international rules or agreements to manage these developments. Attempts in Geneva to address the arms race in space have floundered alongside the inability of the Conference on Disarmament to negotiate any instrument since 1996.Attempts to develop rules of the road and codes of conduct, or even to begin negotiations to prohibit weapons in space, have failed again and again. There are no agreed rules to govern cyber activity. The Tallinn Manuals[iii] that address how international law is applicable to cyberwarfare also address the laws of armed conflict in space, but data spoofing and cyber hacking in space exist in far murkier legal frameworks.The current system of international space law – which does not even allow for a regular review and consideration of the OST – is struggling to keep up. Space is the inheritance of humankind, yet the current generation of elders – as they have done with so many other parts of our global environment – have let things go and failed to shepherd in the much-needed system of rules to protect space for future generations.It is not too late, but it will require international cooperation among the major space players: Russia, the US, China, India and Europe – hardly a promising line-up of collaborators in the current political climate.Filling the governance gapsNorms of behaviour and rules of the road need to be established for space before it becomes a 21st-century ‘wild west’ of technology and activity. Issues such as cleaning up space debris, the principle of non-interference, and how close satellites can manoeuvre to each other (proximity rules) need to be agreed as a set of international norms for space behaviour.A cross-regional group of like-minded countries (for example Algeria, Canada, Chile, France, India, Kazakhstan, Malaysia, Nigeria, Sweden, the UAE and the UK) should link up with UN bodies, including the Office for Outer Space Affairs (UNOOSA), COPUOS and ITU, and key private-sector companies to kick-start a new process for a global code of conduct to establish norms and regulate behaviour in space.The UN could be the host entity for this new approach – or it could be established in the way the Ottawa process for landmines was established, by a group of like-minded states with collective responsibility for, and collective hosting and funding of, the negotiations.A new approach should also cover cybersecurity in space. The UN processes on space and cyber should intersect more to find ways to create synergies in their endeavours. And the problems ahead as regards spectrum management – particularly given the large number of small satellites and constellations that are to be launched in the near future – need urgent attention in ITU.What needs to happenThe international rules-based order for space – enshrined in particular in the 1967 Outer Space Treaty – has not kept pace with the rapid and dramatic changes in the use of space. New norms of behaviour and rules of the road are needed.These norms and rules need to address a host of contemporary or prospective developments, including asteroid mining, increased numbers of satellite owners, the emergence of ‘mini-satellites’, cyberwarfare, and the potential deployment of ‘defensive’ space weaponry to protect satellites.A cross-regional group of like-minded countries should link up with UN bodies – including UNOOSA, COPUOS and ITU – and key private-sector companies to kick-start a new process for developing a global code of conduct.Problems related to radio spectrum management – given the large number of small satellites and constellations to be launched in the near future – need urgent attention in ITU.Notes[i] All of these treaties and other documents can be found at UN Office for Outer Space Affairs (2002), United Nations Treaties and Principles on Outer Space, http://www.unoosa.org/pdf/publications/STSPACE11E.pdf.[ii] ITU (undated), ‘ITU Radiocommunication Sector’, https://www.itu.int/en/ITU-R/Pages/default.aspx.[iii] The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), ‘Tallinn Manual 2.0’, https://ccdcoe.org/research/tallinn-manual/.This essay was produced for the 2019 edition of Chatham House Expert Perspectives – our annual survey of risks and opportunities in global affairs – in which our researchers identify areas where the current sets of rules, institutions and mechanisms for peaceful international cooperation are falling short, and present ideas for reform and modernization. Full Article
co Cyber Governance in the Commonwealth: Towards Stability and Responsible State Behaviour in Cyberspace By feedproxy.google.com Published On :: Mon, 05 Aug 2019 14:05:02 +0000 Invitation Only Research Event 7 October 2019 - 10:30am to 5:30pm Addis Ababa, Ethiopia This roundtable is part of a series under the project, 'Implementing the Commonwealth Cybersecurity Agenda', funded by the UK Foreign and Commonwealth Office (FCO). The roundtable aims to provide a multi-stakeholder, pan-Commonwealth platform to discuss how to implement the Commonwealth Cyber Declaration with a focus on its third pillar 'To promote stability in cyberspace through international cooperation'.In particular, the roundtable focuses on points 3 and 4 of the third pillar which revolve around the commitment to promote frameworks for stability in cyberspace including the applicability of international law, agreed voluntary norms of responsible state behaviour and the development and implementation of confidence-building measures consistent with the 2015 report of the UNGGE. The workshop also focuses on the commitment to advance discussions on how existing international law, including the Charter of the United Nations and applicable international humanitarian law, applies in cyberspace.The roundtable addresses the issue of global cyber governance from a Commonwealth perspective and will also include a discussion around the way forward, the needed capacity of the different Commonwealth countries and the cooperation between its members for better cyber governance.Participants include UNGGE members from Commonwealth countries in addition to representatives to the UN Open-Ended Working Group from African countries as well as members from academia, civil society and industry. Department/project International Security Programme Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email Full Article
Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email
co Artificial Intelligence Prediction and Counterterrorism By feedproxy.google.com Published On :: Tue, 06 Aug 2019 10:46:13 +0000 9 August 2019 The use of AI in counterterrorism is not inherently wrong, and this paper suggests some necessary conditions for legitimate use of AI as part of a predictive approach to counterterrorism on the part of liberal democratic states. Download PDF Kathleen McKendrick British Army Officer, Former Visiting Research Fellow at Chatham House 2019-08-06-AICounterterrorism.jpg Surveillance cameras manufactured by Hangzhou Hikvision Digital Technology Co. at a testing station near the company’s headquarters in Hangzhou, China. Photo: Getty Images SummaryThe use of predictive artificial intelligence (AI) in countering terrorism is often assumed to have a deleterious effect on human rights, generating spectres of ‘pre-crime’ punishment and surveillance states. However, the well-regulated use of new capabilities may enhance states’ abilities to protect citizens’ right to life, while at the same time improving adherence to principles intended to protect other human rights, such as transparency, proportionality and freedom from unfair discrimination. The same regulatory framework could also contribute to safeguarding against broader misuse of related technologies.Most states focus on preventing terrorist attacks, rather than reacting to them. As such, prediction is already central to effective counterterrorism. AI allows higher volumes of data to be analysed, and may perceive patterns in those data that would, for reasons of both volume and dimensionality, otherwise be beyond the capacity of human interpretation. The impact of this is that traditional methods of investigation that work outwards from known suspects may be supplemented by methods that analyse the activity of a broad section of an entire population to identify previously unknown threats.Developments in AI have amplified the ability to conduct surveillance without being constrained by resources. Facial recognition technology, for instance, may enable the complete automation of surveillance using CCTV in public places in the near future.The current way predictive AI capabilities are used presents a number of interrelated problems from both a human rights and a practical perspective. Where limitations and regulations do exist, they may have the effect of curtailing the utility of approaches that apply AI, while not necessarily safeguarding human rights to an adequate extent.The infringement of privacy associated with the automated analysis of certain types of public data is not wrong in principle, but the analysis must be conducted within a robust legal and policy framework that places sensible limitations on interventions based on its results.In future, broader access to less intrusive aspects of public data, direct regulation of how those data are used – including oversight of activities by private-sector actors – and the imposition of technical as well as regulatory safeguards may improve both operational performance and compliance with human rights legislation. It is important that any such measures proceed in a manner that is sensitive to the impact on other rights such as freedom of expression, and freedom of association and assembly. Department/project Digital Society Initiative, International Security Programme, UK Defence Full Article
co Human Control Is Essential to the Responsible Use of Military Neurotechnology By feedproxy.google.com Published On :: Wed, 07 Aug 2019 15:09:10 +0000 8 August 2019 Yasmin Afina Research Assistant, International Security Programme @afinayasmin LinkedIn The military importance of AI-connected brain–machine interfaces is growing. Steps must be taken to ensure human control at all times over these technologies. 2019-08-08-BABWIB.jpg A model of a human brain is displayed at an exhibition in Lisbon, Portugal. Photo: Getty Images. Technological progress in neurotechnology and its military use is proceeding apace. As early as the 1970s, brain-machine interfaces have been the subject of study. By 2014, the UK’s Ministry of Defence was arguing that the development of artificial devices, such as artificial limbs, is ‘likely to see refinement of control to provide… new ways to connect the able-bodied to machines and computers.’ Today, brain-machine interface technology is being investigated around the world, including in Russia, China and South Korea.Recent developments in the private sector are producing exciting new capabilities for people with disabilities and medical conditions. In early July, Elon Musk and Neuralink presented their ‘high-bandwidth’ brain-machine interface system, with small and flexible electrode threads packaged into a small device containing custom chips and to be inserted and implanted into the user’s brain for medical purposes.In the military realm, in 2018, the United States’ Defense Advanced Research Projects Agency (DARPA) put out a call for proposals to investigate the potential of nonsurgical brain-machine interfaces to allow soldiers to ‘interact regularly and intuitively with artificially intelligent, semi-autonomous and autonomous systems in a manner currently not possible with conventional interfaces’. DARPA further highlighted the need for these interfaces to be bidirectional – where information is sent both from brain to machine (neural recording) and from machine to brain (neural stimulation) – which will eventually allow machines and humans to learn from each other.This technology may provide soldiers and commanders with a superior level of sensory sensitivity and the ability to process a greater amount of data related to their environment at a faster pace, thus enhancing situational awareness. These capabilities will support military decision-making as well as targeting processes.Neural recording will also enable the obtention of a tremendous amount of data from operations, including visuals, real-time thought processes and emotions. These sets of data may be used for feedback and training (including for virtual wargaming and for machine learning training), as well as for investigatory purposes. Collected data will also feed into research that may help researchers understand and predict human intent from brain signals – a tremendous advantage from a military standpoint.Legal and ethical considerationsThe flip side of these advancements is the responsibilities they will impose and the risks and vulnerabilities of the technology as well as legal and ethical considerations.The primary risk would be for users to lose control over the technology, especially in a military context; hence a fail-safe feature is critical for humans to maintain ultimate control over decision-making. Despite the potential benefits of symbiosis between humans and AI, users must have the unconditional possibility to override these technologies should they believe it is appropriate and necessary for them to do so.This is important given the significance of human control over targeting, as well as strategic and operational decision-making. An integrated fail-safe in brain-machine interfaces may in fact allow for a greater degree of human control over critical, time-sensitive decision-making. In other words, in the event of incoming missiles alert, while the AI may suggest a specific course of action, users must be able to decide in a timely manner whether to execute it or not.Machines can learn from coded past experiences and decisions, but humans also use gut feelings to make life and death decisions. A gut feeling is a human characteristic that is not completely transferable, as it relies on both rational and emotional traits – and is part of the ‘second-brain’ and the gut-brain axis which is currently poorly understood. It is however risky to take decisions solely on gut feelings or solely on primary brain analysis—therefore, receiving a comprehensive set of data via an AI-connected brain-machine interface may help to verify and evaluate the information in a timely manner, and complement decision-making processes. However, these connections and interactions would have to be much better understood than the current state of knowledge. Fail-safe features are necessary to ensure compliance with the law, including international humanitarian law and international human rights law. As a baseline, human control must be used to 1) define areas where technology may or may not be trusted and to what extent, and 2) ensure legal, political and ethical accountability, responsibility and explainability at all times. Legal and ethical considerations must be taken into account from as early as the design and conceptualizing stage of these technologies, and oversight must be ensured across the entirety of the manufacturing supply chain. The second point raises the need to further explore and clarify whether existing national, regional and international legal, political and ethical frameworks are sufficient to cover the development and use of these technologies. For instance, there is value in assessing to what extent AI-connected brain-machine interfaces will affect the assessment of the mental element in war crimes and their human rights implications.In addition, these technologies need to be highly secure and invulnerable to cyber hacks. Neural recording and neural stimulation will be directly affecting brain processes in humans and if an adversary has the ability to connect to a human brain, steps need to be taken to ensure that memory and personality could not be damaged.Future questionsMilitary applications of technological progress in neurotechnology is inevitable, and their implications cannot be ignored. There is an urgent need for policymakers to understand the fast-developing neurotechnical capabilities, develop international standards and best practices – and, if necessary, new and dedicated legal instruments – to frame the use of these technologies.Considering the opportunities that brain-machine interfaces may present in the realms of security and defence, inclusive, multi-stakeholder discussions and negotiations leading to the development of standards must include the following considerations:What degree of human control would be desirable, at what stage and by whom? To what extent could human users be trusted with their own judgment in decision-making processes?How could algorithmic and human biases, the cyber security and vulnerabilities of these technologies and the quality of data be factored into these discussions?How can ethical and legal considerations be incorporated into the design stage of these technologies?How can it be ensured that humans cannot be harmed in the process, either inadvertently or deliberately?Is there a need for a dedicated international forum to discuss the military applications of neurotechnology? How could these discussions be integrated to existing international processes related to emerging military applications of technological progress, such as the Convention on Certain Conventional Weapons (CCW) Group of Governmental Experts on Lethal Autonomous Weapons Systems? Full Article
co The Future of EU–US Cooperation in Space Traffic Management and Space Situational Awareness By feedproxy.google.com Published On :: Mon, 19 Aug 2019 10:09:54 +0000 29 August 2019 As more space activities develop, there is an increasing requirement for comprehensive space situational awareness (SSA). This paper provides an overview of the current landscape in SSA and space traffic management as well as possible scenarios for EU–US cooperation in this area. Read online Download PDF Alexandra Stickings Research Fellow for Space Policy and Security, RUSI 2019-08-19-SpaceTrafficManagement.jpg Deployment of the NanoRacks-Remove Debris Satellite from the International Space Station. Photo: Getty Images. SummarySpace situational awareness (SSA) and space traffic management (STM) are essential for sustainable near-Earth orbit. International cooperation in SSA and STM is vital with the growing number of satellite operators and the increasingly complex space environment.The various definitions of SSA and STM are ambiguous. Understanding the activities that fall under each term can better assist in finding areas for cooperation and collaboration.SSA has historically been a military activity, leading to an incomplete public catalogue of its use and barriers to sharing information with other states and the commercial sector. The rise in private space actors has increased the number of commercial STM providers and, with plans in the US to move responsibility for STM to civilian control, there will likely be more opportunities for international collaboration, particularly through the EU Space Surveillance and Tracking (SST) programme.Individual EU member states possess developed STM capabilities, but overall these are still some way behind those of allies such as the US. Further investment in STM infrastructure and programmes is required for the EU and individual European states to be an essential partner to the US and add value to the global effort.There are worldwide challenges, both political and technical, to providing STM coverage, which may lead to a lack of collaboration and gaps in understanding of activities in orbit. Existing sensors have limitations in terms of the size of objects that can be detected and the precision with which their movements can be predicted. These capability gaps represent opportunities for the EU to contribute.The EU can build on its tradition of support for openness and civil society by creating a system that fosters an environment of cooperation and collaboration involving industry, commercial STM providers and the wider international community.Although collaboration in STM is vital, the EU should also aim to tackle issues within the wider definition of SSA including space weather, intelligence and the security of ground stations.The EU is well placed to become a global leader in SSA and STM. However, it needs to take into consideration the current political and technical landscape when making decisions regarding investment in capabilities and the pursuit of international partnerships. Department/project International Security Programme, Cyber and Space Full Article
co Who’s Afraid of Huawei? Understanding the 5G Security Concerns By feedproxy.google.com Published On :: Fri, 06 Sep 2019 09:55:03 +0000 9 September 2019 Emily Taylor Associate Fellow, International Security Programme @etaylaw LinkedIn Emily Taylor examines the controversy around the Chinese tech giant’s mobile broadband equipment and the different approaches taken by Western countries. 2019-09-06-Huawei.jpg Huawei's Ox Horn campus in Dongguan, China. Photo: Getty Images. As countries move towards the fifth generation of mobile broadband, 5G, the United States has been loudly calling out Huawei as a security threat. It has employed alarmist rhetoric and threatened to limit trade and intelligence sharing with close allies that use Huawei in their 5G infrastructure.While some countries such as Australia have adopted a hard line against Huawei, others like the UK have been more circumspect, arguing that the risks of using the firm’s technology can be mitigated without forgoing the benefits.So, who is right, and why have these close allies taken such different approaches?The risksLong-standing concerns relating to Huawei are plausible. There are credible allegations that it has benefitted from stolen intellectual property, and that it could not thrive without a close relationship with the Chinese state.Huawei hotly denies allegations that users are at risk of its technology being used for state espionage, and says it would resist any order to share information with the Chinese government. But there are questions over whether it could really resist China’s stringent domestic legislation, which compels companies to share data with the government. And given China’s track record of using cyberattacks to conduct intellectual property theft, there may be added risks of embedding a Chinese provider into critical communications infrastructure.In addition, China’s rise as a global technological superpower has been boosted by the flow of financial capital through government subsidies, venture and private equity, which reveal murky boundaries between the state and private sector for domestic darlings. Meanwhile, the Belt and Road initiative has seen generous investment by China in technology infrastructure across Africa, South America and Asia.There’s no such thing as a free lunch or a free network – as Sri Lanka discovered when China assumed shares in a strategic port in return for debt forgiveness; or Mexico when a 1% interest loan for its 4G network came on the condition that 80% of the funding was spent with Huawei.Aside from intelligence and geopolitical concerns, the quality of Huawei’s products represents a significant cyber risk, one that has received less attention than it deserves.On top of that, 5G by itself will significantly increase the threat landscape from a cybersecurity perspective. The network layer will be more intelligent and adaptable through the use of software and cloud services. The number of network antennae will increase by a factor of 20, and many will be poorly secured ‘things’; there is no need for a backdoor if you have any number of ‘bug doors’.Finally, the US is threatening to limit intelligence sharing with its closest allies if they adopt Huawei. So why would any country even consider using Huawei in their 5G infrastructure?Different situationsThe truth is that not every country is free to manoeuvre; 5G technology will sit on top of existing mobile infrastructure.Australia and the US can afford to take a hard line: their national infrastructure has been largely Huawei-free since 2012. However, the Chinese firm is deeply embedded in other countries’ existing structures – for example, in the UK, Huawei has provided telecommunications infrastructure since 2005. Even if the UK decided tomorrow to ditch Huawei, it cannot just rip up existing 4G infrastructure. To do so would cost a fortune, risk years of delay in the adoption of 5G and limit competition in 5G provisioning.As a result, the UK has adopted a pragmatic approach resulting from years of oversight and analysis of Huawei equipment, during which it has never found evidence of malicious Chinese state cyber activity through Huawei.At the heart of this process is the Huawei Cyber Security Evaluation Centre, which was founded in 2010 as a confidence-building measure. Originally criticized for ‘effectively policing itself’, as it was run and staffed entirely by Huawei, the governance has now been strengthened, with the National Cyber Security Centre chairing its oversight board.The board’s 2019 report makes grim reading, highlighting ‘serious and system defects in Huawei’s software engineering and cyber security competence’. But it does not accuse the company of serving as a platform for state-sponsored surveillance.Similar evidence-based policy approaches are emerging in other countries like Norway and Italy. They offer flexibility for governments, for example by limiting access to some contract competition through legitimate and transparent means, such as security reviews during procurement. The approaches also raise security concerns (both national and cyber) to a primary issue when awarding contracts – something that was not always done in the past, when price was the key driver.The UK is also stressing the need to manage risk and increase vendor diversity in the ecosystem to avoid single points of failure. A further approach that is beginning to emerge is to draw a line between network ‘core’ and ‘periphery’ components, excluding some providers from the more sensitive ‘core’. The limited rollouts of 5G in the UK so far have adopted multi-provider strategies, and only one has reportedly not included Huawei kit.Managing the risks to cyber security and national security will become more complex in a 5G environment. In global supply chains, bans based on the nationality of the provider offer little assurance. For countries that have already committed to Huawei in the past, and who may not wish to be drawn into an outright trade war with China, these moderate approaches offer a potential way forward. Full Article
co EU–US Cooperation on Tackling Disinformation By feedproxy.google.com Published On :: Tue, 17 Sep 2019 15:23:58 +0000 3 October 2019 Disinformation, as the latest iteration of propaganda suitable for a digitally interconnected world, shows no signs of abating. This paper provides a holistic overview of the current state of play and outlines how EU and US cooperation can mitigate disinformation in the future. Read online Download PDF Sophia Ignatidou Academy Associate, International Security Programme @SophiaIgnatidou LinkedIn 2019-09-19-FakeNews.jpg A congressional staff member displays print outs of social media posts during a hearing before the House Select Intelligence Committee 1 November 2017 in Washington, DC. Photo: Getty Images. EU and US cooperation on tackling disinformation needs to be grounded in an international human rights framework in order to bridge the differences of both parties and include other countries facing this challenge.The disinformation debate needs to be reformulated to cover systemic issues rather than merely technical or security concerns. A lag in regulatory development has led to systemic vulnerabilities. In this context, policymakers need to push for more evidence-based analysis, which is only attainable if technology companies engage in honest debate and allow meaningful access to data – as determined by government appointed researchers rather than the companies themselves – taking into account and respecting users’ privacy.Data governance needs to be the focus of attempts to tackle disinformation. Data’s implications for information, market and power asymmetries, feed into and exacerbate the problem.Policymakers should focus on regulating the distribution of online content rather than the subject matter itself, which may have implications for freedom of speech.Disinformation is mainly the result of inefficient gatekeeping of highly extractive digital companies. The old gatekeepers, journalists and their respective regulators, need to be actively engaged in devising the new regulatory framework.Legacy media need to urgently consider the issue of ‘strategic silence’ and avoid being co-opted by political actors aiming to manipulate the accelerated, reactive news cycle by engaging in divisive ‘clickbait’ rhetoric verging on disinformation and propaganda. When strategic silence is not an option, contextual analysis is fundamental. The EU delegation should assist the coordination of EU–US efforts to tackle disinformation by drawing on the work and expertise at the G7 Rapid Response Mechanism (RRM), the Transatlantic Commission on Election Integrity (TCEI), the European Centre of Excellence for Countering Hybrid Threats (Hybrid CoE), the High-level Panel on Digital Cooperation, and work with the International Telecommunication Union (ITU) to foster a long-term interdisciplinary forum to harness technological innovation to protect and support democracy from threats such as disinformation.The EU and US must avoid rushed regulation that may condone enhanced surveillance or vilify journalism that scrutinizes those in power in the name of security. Department/project International Security Programme, Internet Governance Full Article
co Who Runs the Internet: Internet Consolidation and Control By feedproxy.google.com Published On :: Tue, 12 Nov 2019 13:35:01 +0000 Research Event 10 December 2019 - 6:00pm to 7:15pm Chatham House, London Event participants Andrew Sullivan, President and CEO, Internet SocietyJennifer Cobbe, Research Associate, Department of Computer Science and Technology, University of CambridgeJesse Sowell, Assistant Professor, Department of International Affairs, Bush School of Government and Public Service, Texas A&M UniversityChair: Emily Taylor, Associate Fellow, International Security, Chatham House, Editor, Journal of Cyber Policy In recent years, there has been a growing debate around the influence of a few large internet technology companies on the internet’s infrastructure and over the popular applications and social media platforms that we use every day.The internet which was once widely viewed as a collective platform for limitless, permissionless innovation, competition and growth, is now increasingly viewed as a consolidated environment dominated by a few. Such market dominance threatens to undermine the internet’s fundamental benefits as a distributed network in which no single entity has control. The panel examines the risks of consolidation throughout the internet’s technology stack such as the impact on complex supply chains that support applications, including cloud provisions, ‘as a service’.It also explores the potential benefits, for example, when building out essential infrastructure to support faster and cheaper internet services in developing economies, consolidation can create economies of scale that bring the resource-intensive building blocks of the internet economy within the reach of new start-ups and innovators.The panel provides an interdisciplinary perspective exploring the relationship between consolidation and evolutions in the internet infrastructure as well as unpacking its policy implications.This event supports a special issue of the Journal of Cyber Policy as part of a collaboration between Chatham House and the Internet Society which explores the impact of the consolidation on the internet’s fundamental architecture. Department/project International Security Programme Nilza Amaral Project Manager, International Security Programme Email Full Article
co The Commonwealth Cyber Declaration: Achievements and Way Forward By feedproxy.google.com Published On :: Thu, 23 Jan 2020 11:20:01 +0000 Invitation Only Research Event 4 February 2020 - 9:15am to 5:30pm Chatham House, London Agendapdf | 149.42 KB In April 2018, the Commonwealth Heads of Government Meeting (CHOGM), held in London, saw the creation and the adoption of the Commonwealth Cyber Declaration. The declaration outlines the framework for a concerted effort to advance cybersecurity practices to promote a safe and prosperous cyberspace for Commonwealth citizens, businesses and societies. The conference will aim to provide an overview on the progress made on cybersecurity in the Commonwealth since the declaration was announced in 2018. In addition, it will examine future challenges and potential solutions going forward.This conference is part of the International Security Programme's project on Implementing the Commonwealth Cybersecurity Agenda and will convene a range of senior Commonwealth representatives as well as a selection of civil society and industry stakeholders. This project aims to develop a pan-Commonwealth platform to take the Commonwealth Cyber Declaration forward by means of a holistic, inclusive and representative approach.Please see below meeting summaries from previous events on Cybersecurity in the Commonwealth: A cyberspace that supports economic and social rights online (London)Build the foundations of an effective national cybersecurity response (Barbados)Promote stability in cyberspace through international cooperation (Addis Ababa)Attendance at this event is by invitation only. Department/project International Security Programme Esther Naylor Research Assistant, International Security Programme +44 (0)20 7314 3628 Email Full Article
co Nuclear Weapons: Innovative Approaches for the Complex International Security Environment By feedproxy.google.com Published On :: Fri, 28 Feb 2020 10:09:26 +0000 This programme of work addresses the conundrum of nuclear weapons as a wicked problem in a complex adaptive system. Understanding the complexity and the wickedness of the situation allows analysts and strategic planners to approach these complex and intractable issues in new and transformative ways – with a better chance of coping or succeeding and reducing the divisions between experts.Using complexity theory, a complex adaptive system representing the international system and its interaction with the environment can be represented through an interactive visualization tool that will aid thought processes and policy decision-making. Until recently, analysts did not have the tools to be able to create models that could represent the complexity of the international system and the role that nuclear weapons play. Now that these tools are available, analysts should use them to enable decision-makers to gain insights into the range of possible outcomes from a set of possible actions.This programme builds on work by Chatham House on cyber security and artificial intelligence (AI) in the nuclear/strategic realms.In order to approach nuclear weapons as wicked problems in a complex adaptive system from different and sometimes competing perspectives, the programme of work involves the wider community of specialists who do not agree on what constitutes the problems of nuclear weapons nor on what are the desired solutions.Different theories of deterrence, restraint and disarmament are tested. The initiative is international and inclusive, paying attention to gender, age and other aspects of diversity, and the network of MacArthur Grantees are given the opportunity to participate in the research, including in the writing of research papers, so that the complexity modelling can be tested against a wide range of approaches and hypotheses.In addition, a Senior Reference Group will work alongside the programme, challenging its outcome and findings, and evaluating and guiding the direction of the research.This project is supported by the MacArthur Foundation. Full Article
co Predictions and Policymaking: Complex Modelling Beyond COVID-19 By feedproxy.google.com Published On :: Wed, 01 Apr 2020 09:11:23 +0000 1 April 2020 Yasmin Afina Research Assistant, International Security Programme @afinayasmin LinkedIn Calum Inverarity Research Analyst and Coordinator, International Security Programme LinkedIn The COVID-19 pandemic has highlighted the potential of complex systems modelling for policymaking but it is crucial to also understand its limitations. GettyImages-1208425931.jpg A member of the media wearing a protective face mask works in Downing Street where Britain's Prime Minister Boris Johnson is self-isolating in central London, 27 March 2020. Photo by TOLGA AKMEN/AFP via Getty Images. Complex systems models have played a significant role in informing and shaping the public health measures adopted by governments in the context of the COVID-19 pandemic. For instance, modelling carried out by a team at Imperial College London is widely reported to have driven the approach in the UK from a strategy of mitigation to one of suppression.Complex systems modelling will increasingly feed into policymaking by predicting a range of potential correlations, results and outcomes based on a set of parameters, assumptions, data and pre-defined interactions. It is already instrumental in developing risk mitigation and resilience measures to address and prepare for existential crises such as pandemics, prospects of a nuclear war, as well as climate change.The human factorIn the end, model-driven approaches must stand up to the test of real-life data. Modelling for policymaking must take into account a number of caveats and limitations. Models are developed to help answer specific questions, and their predictions will depend on the hypotheses and definitions set by the modellers, which are subject to their individual and collective biases and assumptions. For instance, the models developed by Imperial College came with the caveated assumption that a policy of social distancing for people over 70 will have a 75 per cent compliance rate. This assumption is based on the modellers’ own perceptions of demographics and society, and may not reflect all societal factors that could impact this compliance rate in real life, such as gender, age, ethnicity, genetic diversity, economic stability, as well as access to food, supplies and healthcare. This is why modelling benefits from a cognitively diverse team who bring a wide range of knowledge and understanding to the early creation of a model.The potential of artificial intelligenceMachine learning, or artificial intelligence (AI), has the potential to advance the capacity and accuracy of modelling techniques by identifying new patterns and interactions, and overcoming some of the limitations resulting from human assumptions and bias. Yet, increasing reliance on these techniques raises the issue of explainability. Policymakers need to be fully aware and understand the model, assumptions and input data behind any predictions and must be able to communicate this aspect of modelling in order to uphold democratic accountability and transparency in public decision-making.In addition, models using machine learning techniques require extensive amounts of data, which must also be of high quality and as free from bias as possible to ensure accuracy and address the issues at stake. Although technology may be used in the process (i.e. automated extraction and processing of information with big data), data is ultimately created, collected, aggregated and analysed by and for human users. Datasets will reflect the individual and collective biases and assumptions of those creating, collecting, processing and analysing this data. Algorithmic bias is inevitable, and it is essential that policy- and decision-makers are fully aware of how reliable the systems are, as well as their potential social implications.The age of distrustIncreasing use of emerging technologies for data- and evidence-based policymaking is taking place, paradoxically, in an era of growing mistrust towards expertise and experts, as infamously surmised by Michael Gove. Policymakers and subject-matter experts have faced increased public scrutiny of their findings and the resultant policies that they have been used to justify.This distrust and scepticism within public discourse has only been fuelled by an ever-increasing availability of diffuse sources of information, not all of which are verifiable and robust. This has caused tension between experts, policymakers and public, which has led to conflicts and uncertainty over what data and predictions can be trusted, and to what degree. This dynamic is exacerbated when considering that certain individuals may purposefully misappropriate, or simply misinterpret, data to support their argument or policies. Politicians are presently considered the least trusted professionals by the UK public, highlighting the importance of better and more effective communication between the scientific community, policymakers and the populations affected by policy decisions.Acknowledging limitationsWhile measures can and should be built in to improve the transparency and robustness of scientific models in order to counteract these common criticisms, it is important to acknowledge that there are limitations to the steps that can be taken. This is particularly the case when dealing with predictions of future events, which inherently involve degrees of uncertainty that cannot be fully accounted for by human or machine. As a result, if not carefully considered and communicated, the increased use of complex modelling in policymaking holds the potential to undermine and obfuscate the policymaking process, which may contribute towards significant mistakes being made, increased uncertainty, lack of trust in the models and in the political process and further disaffection of citizens.The potential contribution of complexity modelling to the work of policymakers is undeniable. However, it is imperative to appreciate the inner workings and limitations of these models, such as the biases that underpin their functioning and the uncertainties that they will not be fully capable of accounting for, in spite of their immense power. They must be tested against the data, again and again, as new information becomes available or there is a risk of scientific models becoming embroiled in partisan politicization and potentially weaponized for political purposes. It is therefore important not to consider these models as oracles, but instead as one of many contributions to the process of policymaking. Full Article
co Supporting NHS Cybersecurity During COVID-19 is Vital By feedproxy.google.com Published On :: Thu, 02 Apr 2020 12:09:33 +0000 2 April 2020 Joyce Hakmeh Senior Research Fellow, International Security Programme; Co-Editor, Journal of Cyber Policy @joycehakmeh LinkedIn The current crisis is an opportunity for the UK government to show agility in how it deals with cyber threats and how it cooperates with the private sector in creating cyber resilience. 2020-04-02-NHS-nurse-tech-cyber Nurse uses a wireless electronic tablet to order medicines from the pharmacy at The Queen Elizabeth Hospital, Birmingham, England. Photo by Christopher Furlong/Getty Images. The World Health Organization, US Department of Health and Human Services, and hospitals in Spain, France and the Czech Republic have all suffered cyberattacks during the ongoing COVID-19 crisis.In the Czech Republic, a successful attack targeted a hospital with one of the country’s biggest COVID-19 testing laboratories, forcing its entire IT network to shut down, urgent surgical operations to be rescheduled, and patients to be moved to nearby hospitals. The attack also delayed dozens of COVID-19 test results and affected the hospital’s data transfer and storage, affecting the healthcare the hospital could provide.In the UK, the National Health Service (NHS) is already in crisis mode, focused on providing beds and ventilators to respond to one of the largest peacetime threats ever faced. But supporting the health sector goes beyond increasing human resources and equipment capacity.Health services ill-preparedCybersecurity support, both at organizational and individual level, is critical so health professionals can carry on saving lives, safely and securely. Yet this support is currently missing and the health services may be ill-prepared to deal with the aftermath of potential cyberattacks.When the NHS was hit by the Wannacry ransomware attack in 2017 - one of the largest cyberattacks the UK has witnessed to date – it caused massive disruption, with at least 80 of the 236 trusts across England affected and thousands of appointments and operations cancelled. Fortunately, a ‘kill-switch’ activated by a cybersecurity researcher quickly brought it to a halt.But the UK’s National Cyber Security Centre (NCSC), has been warning for some time against a cyber attack targeting national critical infrastructure sectors, including the health sector. A similar attack, known as category one (C1) attack, could cripple the UK with devastating consequences. It could happen and we should be prepared.Although the NHS has taken measures since Wannacry to improve cybersecurity, its enormous IT networks, legacy equipment and the overlap between the operational and information technology (OT/IT) does mean mitigating current potential threats are beyond its ability.And the threats have radically increased. More NHS staff with access to critical systems and patient health records are increasingly working remotely. The NHS has also extended its physical presence with new premises, such as the Nightingale hospital, potentially the largest temporary hospital in the world.Radical change frequently means proper cybersecurity protocols are not put in place. Even existing cybersecurity processes had to be side-stepped because of the outbreak, such as the decision by NHS Digital to delay its annual cybersecurity audit until September. During this audit, health and care organizations submit data security and protection toolkits to regulators setting out their cybersecurity and cyber resilience levels.The decision to delay was made to allow the NHS organizations to focus capacity on responding to COVID-19, but cybersecurity was highlighted as a high risk, and the importance of NHS and Social Care remaining resilient to cyberattacks was stressed.The NHS is stretched to breaking point. Expecting it to be on top of its cybersecurity during these exceptionally challenging times is unrealistic, and could actually add to the existing risk.Now is the time where new partnerships and support models should be emerging to support the NHS and help build its resilience. Now is the time where innovative public-private partnerships on cybersecurity should be formed.Similar to the economic package from the UK chancellor and innovative thinking on ventilator production, the government should oversee a scheme calling on the large cybersecurity capacity within the private sector to step in and assist the NHS. This support can be delivered in many different ways, but it must be mobilized swiftly.The NCSC for instance has led the formation of the Cyber Security Information Sharing Partnership (CiSP)— a joint industry and UK government initiative to exchange cyber threat information confidentially in real time with the aim of reducing the impact of cyberattacks on UK businesses.CiSP comprises organizations vetted by NCSC which go through a membership process before being able to join. These members could conduct cybersecurity assessment and penetration testing for NHS organizations, retrospectively assisting in implementing key security controls which may have been overlooked.They can also help by making sure NHS remote access systems are fully patched and advising on sensible security systems and approved solutions. They can identify critical OT and legacy systems and advise on their security.The NCSC should continue working with the NHS to enhance provision of public comprehensive guidance on cyber defence and response to potential attack. This would show they are on top of the situation, projecting confidence and reassurance.It is often said in every crisis lies an opportunity. This is an opportunity for the UK government to show agility in how it deals with cyber threats and how it cooperates with the private sector in creating cyber resilience.It is an opportunity to lead a much-needed cultural change showing cybersecurity should never be an afterthought. Full Article
co Nuclear Tensions Must Not Be Sidelined During Coronavirus By feedproxy.google.com Published On :: Fri, 01 May 2020 11:18:35 +0000 1 May 2020 Ana Alecsandru Research Assistant, International Security Programme @anaalecs LinkedIn Although the pandemic means the Nuclear Non-Proliferation Treaty (NPT) Review Conference (RevCon) is postponed, the delay could be an opportunity to better the health of the NPT regime. 2020-05-01-Iran-Peace-Nuclear Painted stairs in Tehran, Iran symbolizing hope. Photo by Fatemeh Bahrami/Anadolu Agency/Getty Images. Despite face-to-face diplomatic meetings being increasingly rare during the current disruption, COVID-19 will ultimately force a redefinition of national security and defence spending priorities, and this could provide the possibility of an improved political climate at RevCon when it happens in 2021.With US presidential elections due in November and a gradual engagement growing between the EU and Iran, there could be a new context for more cooperation between states by 2021. Two key areas of focus over the coming months will be the arms control talks between the United States and Russia, and Iran’s compliance with the 2015 Joint Comprehensive Plan of Action (JCPOA), also known as the Iran Nuclear Deal.It is too early to discern the medium- and longer-term consequences of COVID-19 for defence ministries, but a greater focus on societal resilience and reinvigorating economic productivity will likely undercut the rationale for expensive nuclear modernization.Therefore, extending the current New START (Strategic Arms Reduction Treaty) would be the best, most practical option to give both Russia and the United States time to explore more ambitious multilateral arms control measures, while allowing their current focus to remain on the pandemic and economic relief.Continuing distrustBut with the current treaty — which limits nuclear warheads, missiles, bombers, and launchers — due to expire in February 2021, the continuing distrust between the United States and Russia makes this extension hard to achieve, and a follow-on treaty even less likely.Prospects for future bilateral negotiations are hindered by President Donald Trump’s vision for a trilateral arms control initiative involving both China and Russia. But China opposes this on the grounds that its nuclear arsenal is far smaller than that of the two others.While there appears to be agreement that the nuclear arsenals of China, France, and the UK (the NPT nuclear-weapons states) and those of the states outside the treaty (India, Pakistan, North Korea, and Israel) will all have to be taken into account going forward, a practical mechanism for doing so proves elusive.If Joe Biden wins the US presidency he seems likely to pursue an extension of the New START treaty and could also prevent a withdrawal from the Open Skies treaty, the latest arms control agreement targeted by the Trump administration.Under a Biden administration, the United States would also probably re-join the JCPOA, provided Tehran returned to strict compliance with the deal. Biden could even use the team that negotiated the Iran deal to advance the goal of denuclearization of the Korean peninsula.For an NPT regime already confronted by a series of longstanding divergences, it is essential that Iran remains a signatory especially as tensions between Iran and the United States have escalated recently — due to the Qassim Suleimani assassination and the recent claim by Iran’s Revolutionary Guard Corps to have successfully placed the country’s first military satellite into orbit.This announcement raised red flags among experts about whether Iran is developing intercontinental ballistic missiles due to the dual-use nature of space technology. The satellite launch — deeply troubling for Iran’s neighbours and the EU countries — may strengthen the US argument that it is a cover for the development of ballistic missiles capable of delivering nuclear weapons.However, as with many other countries, Iran is struggling with a severe coronavirus crisis and will be pouring its scientific expertise and funds into that rather than other efforts — including the nuclear programme.Those European countries supporting the trading mechanism INSTEX (Instrument in Support of Trade Exchanges) for sending humanitarian goods into Iran could use this crisis to encourage Iran to remain in compliance with the JCPOA and its NPT obligations.France, Germany and the UK (the E3) have already successfully concluded the first transaction, which was to facilitate the export of medical goods from Europe to Iran. But the recent Iranian escalatory steps will most certainly place a strain on the preservation of this arrangement.COVID-19 might have delayed Iran’s next breach of the 2015 nuclear agreement but Tehran will inevitably seek to strengthen its hand before any potential negotiations with the United States after the presidential elections.As frosty US-Iranian relations — exacerbated by the coronavirus pandemic — prevent diplomatic negotiations, this constructive engagement between the E3 and Iran might prove instrumental in reviving the JCPOA and ensuring Iran stays committed to both nuclear non-proliferation and disarmament.While countries focus their efforts on tackling the coronavirus pandemic, it is understandable resources may be limited for other global challenges, such as the increasing risk of nuclear weapons use across several regions.But the potential ramifications of the COVID-19 crisis for the NPT regime are profound. Ongoing tensions between the nuclear-armed states must not be ignored while the world’s focus is elsewhere, and the nuclear community should continue to work together to progress nuclear non-proliferation and disarmament, building bridges of cooperation and trust that can long outlast the pandemic. Full Article
co Oman’s New Sultan Needs to Take Bold Economic Steps By feedproxy.google.com Published On :: Thu, 16 Jan 2020 11:20:41 +0000 16 January 2020 Dr John Sfakianakis Associate Fellow, Middle East and North Africa Programme The country is in a good regional position, but the economy is at a crossroads. 2020-01-16-SultanHaitham2.jpg Sultan Haitham bin Tariq speaks during a swearing in ceremony as Oman's new leader. Photo: Getty Images. The transition of power in Oman from the deceased Sultan Qaboos to his cousin and the country’s new ruler, Sultan Haitham bin Tariq, has been smooth and quick, but the new sultan will soon find that he has a task in shoring up the country’s economic position.Above all, the fiscal and debt profile of the country requires careful management. Fiscal discipline was rare for Oman even during the oil price spike of the 2000s. Although oil prices only collapsed in 2014, Oman has been registering a fiscal deficit since 2010, reaching a 20.6 per cent high in 2016. As long as fiscal deficits remain elevated, so will Oman’s need to finance those deficits, predominately by borrowing in the local and international market.Oman’s Debt-to-GDP ratio has been rising at a worrying pace, from 4.9 per cent in 2014 to an IMF-estimated 59.8 per cent in 2019. By 2024, the IMF is forecasting the ratio to reach nearly 77 per cent. A study by the World Bank found that if the debt-to-GDP ratio in emerging markets exceeds 64 per cent for an extended period, it slows economic growth by as much as 2 per cent each year.Investors are willing to lend to Oman, but the sultanate is paying for it in terms of higher spreads due to the underlying risk markets are placing on the rising debt profile of the country. For instance, Oman has a higher sovereign debt rating than Bahrain yet markets perceive it to be of higher risk, making it costlier to borrow. Failure to address the fiscal and debt situation also risks creating pressure on the country’s pegged currency.If oil revenues remain low, Sultan Haitham will have to craft a daring strategy of diversification and private sector growth. He is well placed for this: Sultan Haitham headed Oman’s Vision 2040, which set out the country’s future development plans and aspirations, the first Gulf country to embark on such an assessment. However, like all vision documents in the Gulf, Oman’s challenge will be implementation.In the age of climate change, renewable energy is a serious economic opportunity, which Oman has to keep pursuing. If cheap electricity is generated it could also be exported to other Gulf states and to south Asia. In Oman, the share of renewables in total electricity capacity was around 0.5 per cent in 2018; the ambition is to reach 10 per cent by 2025.However, in order to reach this target, Oman would have to take additional measures such as enhancing its regulatory framework, introducing a transparent and gradual energy market pricing policy and integrating all stakeholders, including the private sector, into a wider national strategy.Mining could provide another economic opportunity for Oman’s diversification efforts, with help from a more robust mining law passed last year. The country has large deposits of metals and industrial minerals and its mountains could have gold, palladium, zinc, rare earths and manganese.Oman’s strategic location connecting the Gulf and Indian Ocean with east Africa and the Red Sea could also boost the country’s economy. The Duqm special economic zone, which is among the largest in the world, could become the commercial thread between Oman, south Asia and China’s ‘Belt and Road Initiative.’Oman has taken important steps to make its economy more competitive and conducive to foreign direct investment. Incentives include a five-year renewable tax holiday, subsidized plant facilities and utilities, and custom duties relief on equipment and raw materials for the first 10 years of a firm’s operation in Oman.A private sector economic model that embraces small- and medium-sized enterprises as well as greater competition and entrepreneurship would help increase opportunities in Oman. Like all other Gulf economies, future employment in Oman will have to be driven be the private sector, as there is little space left to grow the public sector.Privatization needs to continue. Last year’s successful sale of 49 per cent of the electricity transmission company to China’s State Grid is a very positive step. The electricity distribution company as well as Oman Oil are next in line for some form of partial privatization.The next decade will require Oman to be even more adept in its competitiveness as the region itself tries to find its new bearings. Take tourism for instance; Oman hopes to double its contribution to GDP from around 3 per cent today to 6 per cent by 2040 and the industry is expected to generate half a million jobs by then. Over the next 20 years, Oman will most likely be facing stiff competition in this area not only by the UAE but by Saudi Arabia as well.The new sultan has an opportunity to embark on deeper economic reforms that could bring higher growth, employment opportunities and a sustainable future. But he has a big task. Full Article
co Synergy in North Africa: Furthering Cooperation By feedproxy.google.com Published On :: Mon, 20 Jan 2020 15:57:54 +0000 21 January 2020 Discussions of North African integration have evoked ideas of a shared identity and a common destiny in the region. However, recent attempts to build regional blocs in North Africa have been unsuccessful. This paper examines the benefits of a ‘synergistic’ approach to North African cooperation. Read online Download PDF in English Download PDF in Arabic Dr Mohammed Masbah Associate Fellow, Middle East and North Africa Programme @MasbahMohammed LinkedIn Google Scholar Mohamed El Dahshan Associate Fellow, Middle East and North Africa Programme @eldahshan LinkedIn Google Scholar 2020-01-21-Market.jpg A Tunisian vendor poses as he sells white truffles at a market in the town of Ben Guerdane, 40km west of the Libyan border, in February 2016. Photo: Getty Images. SummaryNorth African integration is not a new idea. However, countries in the region have so far struggled to form a cohesive bloc with deep political, economic and social ties. Political instability has effectively deprioritized North African integration. A focus on thematic (political, economic and security) ‘synergies’ may provide a better framework for cooperation than seeking opportunities for all-encompassing ‘deep’ and ‘comprehensive’ integration.Governments of North Africa dedicate considerable resources to domestic security. Much of their efforts are conducted at the national-level and directed towards threats from terrorists, insurgents and militias. Improved security cooperation would achieve better outcomes and economies of scale, including efforts to tackle human trafficking.A new generation of jihadis has emerged in North Africa since 2011. Nearly 27 per cent of the 30,000 fighters who travelled to Syria are from the Maghreb. While government counterterrorism operations have been effective, countries have failed to address the root causes of radicalization.Border economies have suffered as a consequence of a security focus on terrorism and smuggling, which has rendered many previously accepted cross-border trade activities illegal. States have struggled to provide alternative livelihoods for those who have lost this source of income. Border forces tend to lack the right combination of capacity, training and equipment to secure borders and often resort to heavy-handed tactics.New thinking is required to develop a more human-centric and proactive approach to migration issues in the region, which continues to witness huge flows of migrants. The migration policy of Morocco, introduced through legislation in 2014, could be a model for North Africa.The countries of North Africa have varying economic profiles, ranging from economically diverse Morocco to oil-and-gas-dependant Libya. However, they all face similar challenges including unemployment (particularly among the young), poor public-service delivery, low FDI levels, an oversized public sector, ineffective tax collection, and high informality.Fostering entrepreneurship and the development of small and medium-sized enterprises (SMEs) are priorities for North African countries, particularly regarding job creation. Regulatory cooperation – such as harmonizing SME definitions, legislation and support institutions – across North Africa is an obvious area where further integration would encourage the development of start-ups and small businesses.With the advent of the fourth industrial revolution, North African governments must address their technological gaps and work to improve public–private cooperation. In some sectors, such as the fintech industry, North African countries can build upon nascent synergies that have developed organically, such as those of start-up incubators and angel investors that work across the region.Renewables, particularly solar energy production, are a promising development for North Africa. While regional initiatives, such as Desertec, have stalled due to political differences between countries, the sector has witnessed exponential growth in Tunisia, Egypt and Morocco, where the involvement of the private sector has proved successful. Department/project Middle East and North Africa Programme, North Africa Dialogues Full Article