re The transcriptional regulator MEIS2 sets up the ground state for palatal osteogenesis in mice [Gene Regulation] By feedproxy.google.com Published On :: 2020-04-17T00:06:05-07:00 Haploinsufficiency of Meis homeobox 2 (MEIS2), encoding a transcriptional regulator, is associated with human cleft palate, and Meis2 inactivation leads to abnormal palate development in mice, implicating MEIS2 functions in palate development. However, its functional mechanisms remain unknown. Here we observed widespread MEIS2 expression in the developing palate in mice. Wnt1Cre-mediated Meis2 inactivation in cranial neural crest cells led to a secondary palate cleft. Importantly, about half of the Wnt1Cre;Meis2f/f mice exhibited a submucous cleft, providing a model for studying palatal bone formation and patterning. Consistent with complete absence of palatal bones, the results from integrative analyses of MEIS2 by ChIP sequencing, RNA-Seq, and an assay for transposase-accessible chromatin sequencing identified key osteogenic genes regulated directly by MEIS2, indicating that it plays a fundamental role in palatal osteogenesis. De novo motif analysis uncovered that the MEIS2-bound regions are highly enriched in binding motifs for several key osteogenic transcription factors, particularly short stature homeobox 2 (SHOX2). Comparative ChIP sequencing analyses revealed genome-wide co-occupancy of MEIS2 and SHOX2 in addition to their colocalization in the developing palate and physical interaction, suggesting that SHOX2 and MEIS2 functionally interact. However, although SHOX2 was required for proper palatal bone formation and was a direct downstream target of MEIS2, Shox2 overexpression failed to rescue the palatal bone defects in a Meis2-mutant background. These results, together with the fact that Meis2 expression is associated with high osteogenic potential and required for chromatin accessibility of osteogenic genes, support a vital function of MEIS2 in setting up a ground state for palatal osteogenesis. Full Article
re Certain ortho-hydroxylated brominated ethers are promiscuous kinase inhibitors that impair neuronal signaling and neurodevelopmental processes [Cell Biology] By feedproxy.google.com Published On :: 2020-05-01T00:06:09-07:00 The developing nervous system is remarkably sensitive to environmental signals, including disruptive toxins, such as polybrominated diphenyl ethers (PBDEs). PBDEs are an environmentally pervasive class of brominated flame retardants whose neurodevelopmental toxicity mechanisms remain largely unclear. Using dissociated cortical neurons from embryonic Rattus norvegicus, we found here that chronic exposure to 6-OH–BDE-47, one of the most prevalent hydroxylated PBDE metabolites, suppresses both spontaneous and evoked neuronal electrical activity. On the basis of our previous work on mitogen-activated protein kinase (MAPK)/extracellular signal-related kinase (ERK) (MEK) biology and our observation that 6-OH–BDE-47 is structurally similar to kinase inhibitors, we hypothesized that certain hydroxylated PBDEs mediate neurotoxicity, at least in part, by impairing the MEK–ERK axis of MAPK signal transduction. We tested this hypothesis on three experimental platforms: 1) in silico, where modeling ligand–protein docking suggested that 6-OH–BDE-47 is a promiscuous ATP-competitive kinase inhibitor; 2) in vitro in dissociated neurons, where 6-OH–BDE-47 and another specific hydroxylated BDE metabolite similarly impaired phosphorylation of MEK/ERK1/2 and activity-induced transcription of a neuronal immediate early gene; and 3) in vivo in Drosophila melanogaster, where developmental exposures to 6-OH–BDE-47 and a MAPK inhibitor resulted in offspring displaying similarly increased frequency of mushroom-body β–lobe midline crossing, a metric of axonal guidance. Taken together, our results support that certain ortho-hydroxylated PBDE metabolites are promiscuous kinase inhibitors and can cause disruptions of critical neurodevelopmental processes, including neuronal electrical activity, pre-synaptic functions, MEK–ERK signaling, and axonal guidance. Full Article
re WYSIWYG Web Builder 7.0 released! By www.wysiwygwebbuilder.com Published On :: Wed, 23 Jun 2010 10:40:59 GMT We are pleased to announce a major new release with more than 150 new features and improvements! Full Article
re WYSIWYG Web Builder 8.0 released! By www.wysiwygwebbuilder.com Published On :: Mon, 21 Nov 2011 12:08:05 GMT We are pleased to announce a major new release with more than 150 new features and improvements! Full Article
re WYSIWYG Web Builder 9.0 released! By www.wysiwygwebbuilder.com Published On :: Mon, 17 Jun 2013 10:53:50 GMT We are pleased to announce a major new release with more than 150 new features and improvements! Full Article
re WYSIWYG Web Builder 10.0 released! By www.wysiwygwebbuilder.com Published On :: Tue, 14 Oct 2014 12:21:00 GMT We are pleased to announce a major new release with more than 100 new features and improvements! Full Article
re WYSIWYG Web Builder 11.0 released! By wysiwygwebbuilder.com Published On :: Mon, 25 Jan 2016 09:47:12 GMT We are pleased to announce a major new release with more than 150 new features and improvements! Full Article
re WYSIWYG Web Builder 12.0 released! By wysiwygwebbuilder.com Published On :: Tue, 04 Apr 2017 11:41:47 GMT We are pleased to announce a major new release with more than 125 new features and improvements! Full Article
re A Quantitative Tri-fluorescent Yeast Two-hybrid System: From Flow Cytometry to In cellula Affinities By feedproxy.google.com Published On :: 2020-04-01 David CluetApr 1, 2020; 19:701-715Technological Innovation and Resources Full Article
re Phenotypic Adaption of Pseudomonas aeruginosa by Hacking Siderophores Produced by Other Microorganisms By feedproxy.google.com Published On :: 2020-04-01 Quentin PerraudApr 1, 2020; 19:589-607Research Full Article
re Integrative Metabolic Pathway Analysis Reveals Novel Therapeutic Targets in Osteoarthritis By feedproxy.google.com Published On :: 2020-04-01 Beatriz RochaApr 1, 2020; 19:574-588Research Full Article
re Modulation of natural HLA-B*27:05 ligandome by ankylosing spondylitis-associated endoplasmic reticulum aminopeptidase 2 (ERAP2) By feedproxy.google.com Published On :: 2020-04-07 Elena LorenteApr 7, 2020; 0:RA120.002014v1-mcp.RA120.002014Research Full Article
re HIGD2A is required for assembly of the COX3 module of human mitochondrial complex IV By feedproxy.google.com Published On :: 2020-04-21 Daniella H HockApr 21, 2020; 0:RA120.002076v1-mcp.RA120.002076Research Full Article
re Chemical Genetics of AGC-kinases Reveals Shared Targets of Ypk1, Protein Kinase A and Sch9 By feedproxy.google.com Published On :: 2020-04-01 Michael PlankApr 1, 2020; 19:655-671Research Full Article
re Characterization of Prenylated C-terminal Peptides Using a Thiopropyl-based Capture Technique and LC-MS/MS By feedproxy.google.com Published On :: 2020-04-13 James A. WilkinsApr 13, 2020; 0:RA120.001944v1-mcp.RA120.001944Research Full Article
re Flow-induced reorganization of laminin-integrin networks within the endothelial basement membrane uncovered by proteomics By feedproxy.google.com Published On :: 2020-04-24 Eelke P. BéguinApr 24, 2020; 0:RA120.001964v1-mcp.RA120.001964Research Full Article
re Cell Cycle Profiling Reveals Protein Oscillation, Phosphorylation, and Localization Dynamics By feedproxy.google.com Published On :: 2020-04-01 Patrick HerrApr 1, 2020; 19:608-623Research Full Article
re Robust summarization and inference in proteome-wide label-free quantification By feedproxy.google.com Published On :: 2020-04-22 Adriaan StickerApr 22, 2020; 0:RA119.001624v1-mcp.RA119.001624Research Full Article
re Dysregulation of Exosome Cargo by Mutant Tau Expressed in Human-Induced Pluripotent Stem Cell (iPSC) Neurons Revealed by Proteomics Analyses By feedproxy.google.com Published On :: 2020-04-15 Sonia PodvinApr 15, 2020; 0:RA120.002079v1-mcp.RA120.002079Research Full Article
re Identification of an Unconventional Subpeptidome Bound to the Behcet's Disease-associated HLA-B*51:01 that is Regulated by Endoplasmic Reticulum Aminopeptidase 1 (ERAP1) By feedproxy.google.com Published On :: 2020-05-01 Liye ChenMay 1, 2020; 19:871-883Research Full Article
re Quantitative proteomics of human heart samples collected in vivo reveal the remodeled protein landscape of dilated left atrium without atrial fibrillation By feedproxy.google.com Published On :: 2020-04-14 Nora LinscheidApr 14, 2020; 0:RA119.001878v1-mcp.RA119.001878Research Full Article
re Characterization of signaling pathways associated with pancreatic {beta}-cell adaptive flexibility in compensation of obesity-linked diabetes in db/db mice By feedproxy.google.com Published On :: 2020-04-07 Taewook KangApr 7, 2020; 0:RA119.001882v1-mcp.RA119.001882Research Full Article
re Discovery of a Redox Thiol Switch: Implications for Cellular Energy Metabolism By feedproxy.google.com Published On :: 2020-05-01 Xing-Huang GaoMay 1, 2020; 19:852-870Research Full Article
re Proteome and phosphoproteome analysis of brown adipocytes reveals that RICTOR loss dampens global insulin/AKT signaling By feedproxy.google.com Published On :: 2020-04-06 Samuel W EntwisleApr 6, 2020; 0:RA120.001946v2-mcp.RA120.001946Research Full Article
re Selection of features with consistent profiles improves relative protein quantification in mass spectrometry experiments By feedproxy.google.com Published On :: 2020-03-31 Tsung-Heng TsaiMar 31, 2020; 0:RA119.001792v1-mcp.RA119.001792Research Full Article
re Profiling Cell Signaling Networks at Single-cell Resolution By feedproxy.google.com Published On :: 2020-05-01 Xiao-Kang LunMay 1, 2020; 19:744-756Review Full Article
re Quantitative Profiling of the Human Substantia Nigra Proteome from Laser-capture Microdissected FFPE Tissue By feedproxy.google.com Published On :: 2020-05-01 Eva GriesserMay 1, 2020; 19:839-851Research Full Article
re DEqMS: a method for accurate variance estimation in differential protein expression analysis By feedproxy.google.com Published On :: 2020-03-23 Yafeng ZhuMar 23, 2020; 0:TIR119.001646v1-mcp.TIR119.001646Technological Innovation and Resources Full Article
re Compliance Checklists No Longer Required at Initial Manuscript Submission By feedproxy.google.com Published On :: 2020-04-01 Alma L. BurlingameApr 1, 2020; 19:571-571Editorial Full Article
re MaxQuant software for ion mobility enhanced shotgun proteomics By feedproxy.google.com Published On :: 2020-03-10 Nikita PrianichnikovMar 10, 2020; 0:TIR119.001720v1-mcp.TIR119.001720Technological Innovation and Resources Full Article
re An Improved Boosting to Amplify Signal with Isobaric Labeling (iBASIL) Strategy for Precise Quantitative Single-cell Proteomics By feedproxy.google.com Published On :: 2020-05-01 Chia-Feng TsaiMay 1, 2020; 19:828-838Research Full Article
re XG Firewall is now available on AWS By feedproxy.google.com Published On :: Mon, 20 Apr 2020 15:47:21 +0000 We are extremely pleased to announce the availability of XG Firewall on Amazon Web Services (AWS) public cloud infrastructure. Full Article Network Amazon Web Services AWS XG Firewall XG Firewall v18
re LockBit ransomware borrows tricks to keep up with REvil and Maze By feedproxy.google.com Published On :: Fri, 24 Apr 2020 13:03:38 +0000 Recently-adopted techniques advance LockBit to a major ransomware player...for now. Full Article SophosLabs Uncut data breach exfiltration I/O Completion Ports IOCP LockBit Ransomware UAC Bypass User Account Control
re “Asnarök” Trojan targets firewalls By feedproxy.google.com Published On :: Mon, 27 Apr 2020 01:26:19 +0000 Customized malware used to compromise physical and virtual firewalls Full Article SophosLabs Uncut Asnarok ELF Firewall malware shell script
re How to remove unused devices from Sophos Central By feedproxy.google.com Published On :: Tue, 28 Apr 2020 18:17:03 +0000 We take you through the steps to clear your old devices from Sophos Central, so you've got more time to focus on the devices that matter. Full Article Corporate Security Tips SIEM SOAR Sophos Central Sophos Central API Sophos Security Team
re Protecting the Cloud: Securing user remote access to AWS By feedproxy.google.com Published On :: Thu, 07 May 2020 13:19:27 +0000 How to create secure access to services hosted in AWS with Sophos XG Firewall. Full Article Cloud AWS XG Firewall XG Firewall v18
re Making the most of attending conferences By blogs.ams.org Published On :: Tue, 08 Oct 2019 16:54:02 +0000 In this blog by Julianne Vega, graduate student at University of Kentucky, Julianne tells us how to make the most of attending math conferences. If you are heading to a conference, challenge yourself! Your first conference may not be the … Continue reading → Full Article career advancement General Graduate School Uncategorized Undegraduates
re Bank of REU/Grad Fair Questions By blogs.ams.org Published On :: Fri, 24 Jan 2020 19:14:06 +0000 By Lucy Martinez and Eduardo Torres Davila We attended the Joint Math Meetings (JMM) conference in Denver to present our research from our work at the Mathematical Sciences Research Institute Undergraduate Program. At JMM, there was a fair of graduate … Continue reading → Full Article career advancement Changing Graduate Programs General Going to graduate school Graduate School Uncategorized Undegraduates
re Dare To Share By blogs.ams.org Published On :: Sun, 08 Mar 2020 03:26:53 +0000 Guest blog by Professor Mohamed Omar It started as a dare between friends. Would you dare post a video of yourself doing math on YouTube, for the entire world to see? That was the seed of what has become a … Continue reading → Full Article General Going to graduate school Uncategorized
re Strengthening Urban Preparedness and Resilience Against Biological Threats in Accra By feedproxy.google.com Published On :: Wed, 23 Jan 2019 17:40:01 +0000 Invitation Only Research Event 1 March 2019 - 10:30am to 2 March 2019 - 3:00pm Chatham House, London Capacity to contain and respond to biological threats varies considerably across the world. Yet such preparedness is vital for prevention, impact-reduction and resilience in the face of biological events, whether they be natural or deliberate outbreaks.Chatham House is conducting a series of meetings to strengthen urban preparedness for, and resilience against, biological threats in African countries. This meeting will examine the preparedness and prevention mechanisms in Accra, reviewing the comprehensiveness of city-level preparedness. This meeting will focus on the formation and implementation of city-level action plans in the context of preparedness for managing biological threats. It will also explore how local authorities are contributing to this effort with their knowledge and expertise.Attendance at this event is by invitation only. Department/project International Security Programme, Strengthening Urban Preparedness and Resilience against Biological Threats Nilza Amaral Project Manager, International Security Programme Email Full Article
re Cybersecurity in the Commonwealth: Building the Foundations of Effective National Responses in the Caribbean By feedproxy.google.com Published On :: Thu, 07 Feb 2019 14:20:01 +0000 Invitation Only Research Event 8 March 2019 - 9:00am to 5:30pm Bridgetown, Barbados Event participants Joyce Hakmeh, Cyber Research Fellow, International Security Department, Chatham House This workshop is the second in a series in the 'Implementing the Commonwealth Cybersecurity Agenda' project. The workshop aims to provide a multi-stakeholder pan-Commonwealth platform to discuss how to take the implementation of the 'Commonwealth Cyber Declaration' forward with a focus on the second pillar of the declaration – building the foundations of an effective national cybersecurity response with eight action points. As such, the workshop gathers different project implementers under the UK Foreign and Commonwealth Office’s Cyber Programme, in addition to other key relevant stakeholders from the global level, to explore ongoing initiatives which aim to deliver one or more of pillar two’s action points.The workshop addresses issues from a global perspective and a Commonwealth perspective and will include presentations from selected partners from different Commonwealth countries. Department/project International Security Programme Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email Full Article
Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email
re Transparency and Accountability for Drone Use: European Approaches By feedproxy.google.com Published On :: Thu, 07 Mar 2019 17:35:01 +0000 Invitation Only Research Event 11 March 2019 - 9:30am to 12 March 2019 - 12:30pm Chatham House With increased use of military drones in recent years there have also been many calls for greater transparency and accountability with regards to drone operations.This would allow for greater public understanding, particularly as the complex nature of military operations today intensifies difficulties in sustaining perceptions of the legitimate use of force.For example, in Europe, leading states rely on the US for drone platforms and for the infrastructure - such as military communication networks - that enable those operations, while the US also relies on airbases in European states to operate its drone programme.In addition, with reports that the US is loosening the rules on the use of drones, it is important to understand how European approaches to transparency and accountability may be affected by these developments.This workshop focuses on how European states can facilitate transparency to ensure accountability for drone use, as well as what the limits might be, considering both the complexity of military operations today and the need for achieving operational goals.With the US easing restrictions on export controls, the discussion also considers the role of regulation in ensuring accountability and prospects for developing common standards.Attendance at this event is by invitation only. Nilza Amaral Project Manager, International Security Programme Email Department/project International Security Programme, Policy Implications of Armed Drone Use Full Article
re European Approaches to Remote Warfare By feedproxy.google.com Published On :: Fri, 26 Apr 2019 14:50:01 +0000 Research Event 15 May 2019 - 9:00am to 6:00pm Brussels, Belgium With continuing instability at Europe's borders, along with uncertainty on future US support for NATO, many European countries are increasing their allocations to defence budgets and to collective European strategic defence. In addition, with non-state armed groups creating instability and threatening civilian lives and livelihoods in proximity to the EU’s borders, various operations have been carried out in conflict theatres in the Middle East, North Africa and the Sahel under the auspices of NATO, the UN, the EU or by single EU member states.Although European military personnel have been deployed in many regions, with countries becoming more reluctant to deploy ‘boots on the ground’, warfare has been increasingly conducted through remote means. This has led to criticism on the limited transparency and accountability mechanisms at work in these operations, while some have questioned the military effectiveness of such tactics or the capacity and willingness of states to ensure that targets are struck accurately and without impact on civilian populations.Against this background, the EU has started allocating resources to military research and development projects with a focus on unmanned systems and related technologies. Under the auspices of the European Defence Fund such funding is set to increase, while potential bilateral programmes between some states have also been explored. Despite concerns raised by the European Parliament, the development of these policies and technologies has taken place without significant consideration of what the legal, ethical and military-strategic impact of these instruments might be. This event will bring together a range of experts, policymakers and civil society organizations to discuss the technology horizon of European defence investments and policy developments around remote warfare. Participants will discuss the implications of the new EU defence fund, legal, ethical, and transparency issues in military research and development and the position of the EU as a global actor. This event is being organized in partnership with PAX Netherlands.THIS EVENT IS NOW FULL AND REGISTRATION HAS CLOSED. Department/project International Security Programme Nilza Amaral Project Manager, International Security Programme Email Full Article
re How Regulation Could Break the Internet: In Conversation with Andrew Sullivan By feedproxy.google.com Published On :: Mon, 29 Apr 2019 13:30:01 +0000 Research Event 19 June 2019 - 6:00pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Andrew Sullivan, President and CEO Internet SocietyChair: Emily Taylor, Associate Fellow, International Security Department, Chatham House; Editor, Journal of Cyber Policy Internet regulation is increasing around the world creating positive obligations on internet providers and exerting negative unintended consequences on the internet infrastructure. In some ways, most of this regulatory activity is justifiable. Governments are concerned about the increased risk that the use of the internet brings to societies. As a response, many governments have been enacting regulations as their main approach to dealing with these concerns. The main challenge is that most of the current regulations are either ill-defined or unworkable. On the one hand, several governments have established procedures that seek to analyze the impacts of new regulatory proposals before they were adopted. However, there hasn’t been enough attention aimed at analyzing regulations after they have been adopted and only a few have measures in place to evaluate the impacts of the procedures and practices that govern the regulatory process itself.On the other hand, much of the regulation creates unintended consequences to the internet itself. It undermines many of its fundamental properties and challenges the integrity and resiliency of its infrastructure. This event discusses current practices in internet-related regulation and the related challenges. Panellists will discuss how governments can enforce regulations that achieve their intended purpose while at the same time protecting the internet’s core infrastructure and its properties, including its openness, interoperability and global reach. Department/project International Security Programme, Internet Governance Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email Full Article
Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email
re Protecting Children in Conflict: See Me Safe Symposium By feedproxy.google.com Published On :: Wed, 01 May 2019 14:55:01 +0000 Invitation Only Research Event 7 May 2019 - 10:00am to 5:00pm Chatham House, London Today there are 420 million children, or one-fifth of children worldwide, who live in conflict zones and are at risk of being killed or injured and denied access to education, healthcare and humanitarian assistance. From Myanmar and Syria, to South Sudan and Yemen, the impact of conflict on children and their families is devastating. With conflicts becoming more protracted and urbanized, and the undermining of international rules and norms, the risk to civilians is rapidly increasing. The impact of the crisis in civilian protection is not only devastating children’s lives and risking a lost generation, it threatens global stability and prosperity, contributing to the degradation of the international rules-based system and its institutions and undermining the ability to hold perpetrators accountable and prevent these atrocities from happening. This symposium will bring together practitioners, policymakers, business leaders, philanthropists and academics for a day of panel discussions on the protection of children in conflict. The aim of the event is to generate an informed debate and to deepen engagement with issues around protecting children in conflict as well as to inspire support to help rebuild children’s lives. This event will be followed by a reception from 17:00-18:30. Attendance is by invitation only. Celebrating its centenary in 2020, Chatham House is partnering with Save the Children on this core area of their work, in their anniversary year. Department/project International Security Programme Nilza Amaral Project Manager, International Security Programme Email Full Article
re Understanding Cybercrime for Better Policing: Regional and Global Challenges By feedproxy.google.com Published On :: Fri, 24 May 2019 15:25:01 +0000 Research Event 18 June 2019 - 9:00am to 5:30pm Chatham House | 10 St James's Square | London | SW1Y 4LE In recent years, cybercrime has evolved from a niche technological concern into a prominent global issue with substantial preventative and remedial costs for businesses and governments alike. Despite heavy investment in sophisticated cybersecurity measures and the adoption of several legal, organizational and capacity-building measures, cybercrime remains a major threat which is evolving on a daily basis. Today’s cybercrime is more aggressive, more complex, more organized and – importantly – more unpredictable than ever before.The challenges posed by cybercrime are experienced acutely by countries undergoing digital transformations: as the level of connectivity rises, so too does the potential for online theft, fraud and abuse. Cybercrime is pervasive but governments can work to limit its impact by creating a resilient overall economy and robust institution, and appropriately equipping law enforcement and the justice system to navigate its novel challenges.To advance the discourse surrounding these issues, this workshop will assess the current cyber threat landscape and how it is evolving. It will identify the main obstacles encountered by law enforcement, the judiciary and prosecutors in their fight against cybercrime. It will also compare national, regional and global approaches that countries can use to effectively curb cybercrime and tackle its emerging challenges. Department/project International Security Programme Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email Full Article
Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email
re Create a Global Code of Conduct for Outer Space By feedproxy.google.com Published On :: Thu, 06 Jun 2019 12:24:56 +0000 12 June 2019 Dr Patricia Lewis Research Director, Conflict, Science & Transformation; Director, International Security Programme @PatriciaMary The rules governing human activity in space have been in place for only a few decades, and yet they are already out of date. They need to be built on and extended to reflect the dramatic and rapid changes in the use of space. 2016-09-27-Space2.jpg Nighttime view of the strait of Gibraltar. Photo by NASA. The 1967 Outer Space Treaty (OST) is the mainframe for space law. It recognizes the importance of the use and scientific exploration of outer space for the benefit and in the interests of all countries. It also prohibits national sovereignty in space, including of the Moon and other celestial bodies.The OST prohibits all weapons of mass destruction in space – in orbit or on other planets and moons – and does not allow the establishment of military infrastructure, manoeuvres or the testing of any type of weapon on planets or moons. As the treaty makes clear, outer space is for peaceful purposes only. Except of course, it is not – nor has it ever been so.The very first satellite, Sputnik, was a military satellite which kicked off the Cold War space race between the US and the USSR. The militaries of many countries followed suit, and space is now used for military communication, signals intelligence, imaging, targeting, arms control verification and so on.However, in keeping with international aspirations, space is also being used for all kinds of peaceful purposes such as environmental monitoring, broadcast communications, delivering the internet, weather prediction, navigation, scientific exploration and – very importantly – monitoring the ‘space weather’ (including the activity from the Sun).There are several other international agreements on space, such as on the rescue of astronauts, the registration of satellites and liability for damage caused by space objects. There is also the Moon Treaty, which governs activities on the Moon and other moons, asteroids and planets.[i]More recently, states at the UN Committee on the Peaceful Uses of Outer Space (COPUOS) in Vienna have agreed on guidelines to deal with the worrying situation of space debris which is cluttering up orbits and posing a danger to satellites, the space station and astronauts.The problem the international community now faces is that the use of space is changing dramatically and rapidly. There are more satellites than ever – well over 1,000 – and more owners of satellites – almost every country uses information generated from space. Increasingly, however, those owners are not countries, militaries or international organizations but the commercial sector. Very soon, the owners will even include individuals.Small ‘mini-satellites’ or ‘cube-sats’ are poised to be deployed in space. These can act independently or in ‘swarms’, and are so small that they piggy-back on the launching of other satellites and so are very cheap to launch. This is changing the cost–benefit equation of satellite ownership and use. Developing countries are increasingly dependent on space for communications, the internet and information on, for example, weather systems, coastal activities and agriculture. Another major development is the advent of asteroid mining. Asteroids contain a wide range of metals and minerals – some asteroids are more promising than others, and some are closer to Earth than others. Several companies have been set up and registered around the world to begin the exploitation of asteroids for precious metals (such as platinum) and compounds (such as rare-earth minerals).Legally, however, this will be a murky venture. The current international treaty regime prohibits the ownership of a celestial body by a country – space is for all. But does international law prohibit the ownership or exploitation of a celestial body by a private company? The law has yet to be tested, but there are space lawyers who think that companies are exempt. Luxembourg and Australia are two countries that have already begun the registration of interest for space-mining companies.As humanity becomes more dependent on information that is generated in or transmitted through space, the vulnerability to the manipulation of space data is increasing. The demands on the use of communications frequencies (the issue of spectrum availability and rights), managed by the International Telecommunication Union (ITU),[ii] need to be urgently addressed.There are now constant cyberattacks in space and on the digital information on which our systems rely. For example, position, navigation and timing information such as from GPS or Galileo is not only vital for getting us safely from A to B, but also for fast-moving financial transactions that require accurate timing signals.Almost all of our electronic systems depend on those timing signals for synchronization and basic functioning. Cyber hacks, digital spoofing and ‘fake’ information are now a real possibility. There is no rules-based order in place that is fit to deal with these types of attacks.Cyberweapons are only part of the problem. It is assumed that states, if they haven’t already done so, will be positioning ‘defensive’ space weaponry to protect their satellites. The protection may be intended to be against space debris – nets, grabber bars and harpoons, for example, are all being investigated.All of these ideas, however, could be used as offensive weapons. Once one satellite operator decides to equip its assets with such devices, many others will follow. The weaponization of space is in the horizon.There are no international rules or agreements to manage these developments. Attempts in Geneva to address the arms race in space have floundered alongside the inability of the Conference on Disarmament to negotiate any instrument since 1996.Attempts to develop rules of the road and codes of conduct, or even to begin negotiations to prohibit weapons in space, have failed again and again. There are no agreed rules to govern cyber activity. The Tallinn Manuals[iii] that address how international law is applicable to cyberwarfare also address the laws of armed conflict in space, but data spoofing and cyber hacking in space exist in far murkier legal frameworks.The current system of international space law – which does not even allow for a regular review and consideration of the OST – is struggling to keep up. Space is the inheritance of humankind, yet the current generation of elders – as they have done with so many other parts of our global environment – have let things go and failed to shepherd in the much-needed system of rules to protect space for future generations.It is not too late, but it will require international cooperation among the major space players: Russia, the US, China, India and Europe – hardly a promising line-up of collaborators in the current political climate.Filling the governance gapsNorms of behaviour and rules of the road need to be established for space before it becomes a 21st-century ‘wild west’ of technology and activity. Issues such as cleaning up space debris, the principle of non-interference, and how close satellites can manoeuvre to each other (proximity rules) need to be agreed as a set of international norms for space behaviour.A cross-regional group of like-minded countries (for example Algeria, Canada, Chile, France, India, Kazakhstan, Malaysia, Nigeria, Sweden, the UAE and the UK) should link up with UN bodies, including the Office for Outer Space Affairs (UNOOSA), COPUOS and ITU, and key private-sector companies to kick-start a new process for a global code of conduct to establish norms and regulate behaviour in space.The UN could be the host entity for this new approach – or it could be established in the way the Ottawa process for landmines was established, by a group of like-minded states with collective responsibility for, and collective hosting and funding of, the negotiations.A new approach should also cover cybersecurity in space. The UN processes on space and cyber should intersect more to find ways to create synergies in their endeavours. And the problems ahead as regards spectrum management – particularly given the large number of small satellites and constellations that are to be launched in the near future – need urgent attention in ITU.What needs to happenThe international rules-based order for space – enshrined in particular in the 1967 Outer Space Treaty – has not kept pace with the rapid and dramatic changes in the use of space. New norms of behaviour and rules of the road are needed.These norms and rules need to address a host of contemporary or prospective developments, including asteroid mining, increased numbers of satellite owners, the emergence of ‘mini-satellites’, cyberwarfare, and the potential deployment of ‘defensive’ space weaponry to protect satellites.A cross-regional group of like-minded countries should link up with UN bodies – including UNOOSA, COPUOS and ITU – and key private-sector companies to kick-start a new process for developing a global code of conduct.Problems related to radio spectrum management – given the large number of small satellites and constellations to be launched in the near future – need urgent attention in ITU.Notes[i] All of these treaties and other documents can be found at UN Office for Outer Space Affairs (2002), United Nations Treaties and Principles on Outer Space, http://www.unoosa.org/pdf/publications/STSPACE11E.pdf.[ii] ITU (undated), ‘ITU Radiocommunication Sector’, https://www.itu.int/en/ITU-R/Pages/default.aspx.[iii] The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), ‘Tallinn Manual 2.0’, https://ccdcoe.org/research/tallinn-manual/.This essay was produced for the 2019 edition of Chatham House Expert Perspectives – our annual survey of risks and opportunities in global affairs – in which our researchers identify areas where the current sets of rules, institutions and mechanisms for peaceful international cooperation are falling short, and present ideas for reform and modernization. Full Article
re Cyber Governance in the Commonwealth: Towards Stability and Responsible State Behaviour in Cyberspace By feedproxy.google.com Published On :: Mon, 05 Aug 2019 14:05:02 +0000 Invitation Only Research Event 7 October 2019 - 10:30am to 5:30pm Addis Ababa, Ethiopia This roundtable is part of a series under the project, 'Implementing the Commonwealth Cybersecurity Agenda', funded by the UK Foreign and Commonwealth Office (FCO). The roundtable aims to provide a multi-stakeholder, pan-Commonwealth platform to discuss how to implement the Commonwealth Cyber Declaration with a focus on its third pillar 'To promote stability in cyberspace through international cooperation'.In particular, the roundtable focuses on points 3 and 4 of the third pillar which revolve around the commitment to promote frameworks for stability in cyberspace including the applicability of international law, agreed voluntary norms of responsible state behaviour and the development and implementation of confidence-building measures consistent with the 2015 report of the UNGGE. The workshop also focuses on the commitment to advance discussions on how existing international law, including the Charter of the United Nations and applicable international humanitarian law, applies in cyberspace.The roundtable addresses the issue of global cyber governance from a Commonwealth perspective and will also include a discussion around the way forward, the needed capacity of the different Commonwealth countries and the cooperation between its members for better cyber governance.Participants include UNGGE members from Commonwealth countries in addition to representatives to the UN Open-Ended Working Group from African countries as well as members from academia, civil society and industry. Department/project International Security Programme Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email Full Article
Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email
re Artificial Intelligence Prediction and Counterterrorism By feedproxy.google.com Published On :: Tue, 06 Aug 2019 10:46:13 +0000 9 August 2019 The use of AI in counterterrorism is not inherently wrong, and this paper suggests some necessary conditions for legitimate use of AI as part of a predictive approach to counterterrorism on the part of liberal democratic states. Download PDF Kathleen McKendrick British Army Officer, Former Visiting Research Fellow at Chatham House 2019-08-06-AICounterterrorism.jpg Surveillance cameras manufactured by Hangzhou Hikvision Digital Technology Co. at a testing station near the company’s headquarters in Hangzhou, China. Photo: Getty Images SummaryThe use of predictive artificial intelligence (AI) in countering terrorism is often assumed to have a deleterious effect on human rights, generating spectres of ‘pre-crime’ punishment and surveillance states. However, the well-regulated use of new capabilities may enhance states’ abilities to protect citizens’ right to life, while at the same time improving adherence to principles intended to protect other human rights, such as transparency, proportionality and freedom from unfair discrimination. The same regulatory framework could also contribute to safeguarding against broader misuse of related technologies.Most states focus on preventing terrorist attacks, rather than reacting to them. As such, prediction is already central to effective counterterrorism. AI allows higher volumes of data to be analysed, and may perceive patterns in those data that would, for reasons of both volume and dimensionality, otherwise be beyond the capacity of human interpretation. The impact of this is that traditional methods of investigation that work outwards from known suspects may be supplemented by methods that analyse the activity of a broad section of an entire population to identify previously unknown threats.Developments in AI have amplified the ability to conduct surveillance without being constrained by resources. Facial recognition technology, for instance, may enable the complete automation of surveillance using CCTV in public places in the near future.The current way predictive AI capabilities are used presents a number of interrelated problems from both a human rights and a practical perspective. Where limitations and regulations do exist, they may have the effect of curtailing the utility of approaches that apply AI, while not necessarily safeguarding human rights to an adequate extent.The infringement of privacy associated with the automated analysis of certain types of public data is not wrong in principle, but the analysis must be conducted within a robust legal and policy framework that places sensible limitations on interventions based on its results.In future, broader access to less intrusive aspects of public data, direct regulation of how those data are used – including oversight of activities by private-sector actors – and the imposition of technical as well as regulatory safeguards may improve both operational performance and compliance with human rights legislation. It is important that any such measures proceed in a manner that is sensitive to the impact on other rights such as freedom of expression, and freedom of association and assembly. Department/project Digital Society Initiative, International Security Programme, UK Defence Full Article
re Human Control Is Essential to the Responsible Use of Military Neurotechnology By feedproxy.google.com Published On :: Wed, 07 Aug 2019 15:09:10 +0000 8 August 2019 Yasmin Afina Research Assistant, International Security Programme @afinayasmin LinkedIn The military importance of AI-connected brain–machine interfaces is growing. Steps must be taken to ensure human control at all times over these technologies. 2019-08-08-BABWIB.jpg A model of a human brain is displayed at an exhibition in Lisbon, Portugal. Photo: Getty Images. Technological progress in neurotechnology and its military use is proceeding apace. As early as the 1970s, brain-machine interfaces have been the subject of study. By 2014, the UK’s Ministry of Defence was arguing that the development of artificial devices, such as artificial limbs, is ‘likely to see refinement of control to provide… new ways to connect the able-bodied to machines and computers.’ Today, brain-machine interface technology is being investigated around the world, including in Russia, China and South Korea.Recent developments in the private sector are producing exciting new capabilities for people with disabilities and medical conditions. In early July, Elon Musk and Neuralink presented their ‘high-bandwidth’ brain-machine interface system, with small and flexible electrode threads packaged into a small device containing custom chips and to be inserted and implanted into the user’s brain for medical purposes.In the military realm, in 2018, the United States’ Defense Advanced Research Projects Agency (DARPA) put out a call for proposals to investigate the potential of nonsurgical brain-machine interfaces to allow soldiers to ‘interact regularly and intuitively with artificially intelligent, semi-autonomous and autonomous systems in a manner currently not possible with conventional interfaces’. DARPA further highlighted the need for these interfaces to be bidirectional – where information is sent both from brain to machine (neural recording) and from machine to brain (neural stimulation) – which will eventually allow machines and humans to learn from each other.This technology may provide soldiers and commanders with a superior level of sensory sensitivity and the ability to process a greater amount of data related to their environment at a faster pace, thus enhancing situational awareness. These capabilities will support military decision-making as well as targeting processes.Neural recording will also enable the obtention of a tremendous amount of data from operations, including visuals, real-time thought processes and emotions. These sets of data may be used for feedback and training (including for virtual wargaming and for machine learning training), as well as for investigatory purposes. Collected data will also feed into research that may help researchers understand and predict human intent from brain signals – a tremendous advantage from a military standpoint.Legal and ethical considerationsThe flip side of these advancements is the responsibilities they will impose and the risks and vulnerabilities of the technology as well as legal and ethical considerations.The primary risk would be for users to lose control over the technology, especially in a military context; hence a fail-safe feature is critical for humans to maintain ultimate control over decision-making. Despite the potential benefits of symbiosis between humans and AI, users must have the unconditional possibility to override these technologies should they believe it is appropriate and necessary for them to do so.This is important given the significance of human control over targeting, as well as strategic and operational decision-making. An integrated fail-safe in brain-machine interfaces may in fact allow for a greater degree of human control over critical, time-sensitive decision-making. In other words, in the event of incoming missiles alert, while the AI may suggest a specific course of action, users must be able to decide in a timely manner whether to execute it or not.Machines can learn from coded past experiences and decisions, but humans also use gut feelings to make life and death decisions. A gut feeling is a human characteristic that is not completely transferable, as it relies on both rational and emotional traits – and is part of the ‘second-brain’ and the gut-brain axis which is currently poorly understood. It is however risky to take decisions solely on gut feelings or solely on primary brain analysis—therefore, receiving a comprehensive set of data via an AI-connected brain-machine interface may help to verify and evaluate the information in a timely manner, and complement decision-making processes. However, these connections and interactions would have to be much better understood than the current state of knowledge. Fail-safe features are necessary to ensure compliance with the law, including international humanitarian law and international human rights law. As a baseline, human control must be used to 1) define areas where technology may or may not be trusted and to what extent, and 2) ensure legal, political and ethical accountability, responsibility and explainability at all times. Legal and ethical considerations must be taken into account from as early as the design and conceptualizing stage of these technologies, and oversight must be ensured across the entirety of the manufacturing supply chain. The second point raises the need to further explore and clarify whether existing national, regional and international legal, political and ethical frameworks are sufficient to cover the development and use of these technologies. For instance, there is value in assessing to what extent AI-connected brain-machine interfaces will affect the assessment of the mental element in war crimes and their human rights implications.In addition, these technologies need to be highly secure and invulnerable to cyber hacks. Neural recording and neural stimulation will be directly affecting brain processes in humans and if an adversary has the ability to connect to a human brain, steps need to be taken to ensure that memory and personality could not be damaged.Future questionsMilitary applications of technological progress in neurotechnology is inevitable, and their implications cannot be ignored. There is an urgent need for policymakers to understand the fast-developing neurotechnical capabilities, develop international standards and best practices – and, if necessary, new and dedicated legal instruments – to frame the use of these technologies.Considering the opportunities that brain-machine interfaces may present in the realms of security and defence, inclusive, multi-stakeholder discussions and negotiations leading to the development of standards must include the following considerations:What degree of human control would be desirable, at what stage and by whom? To what extent could human users be trusted with their own judgment in decision-making processes?How could algorithmic and human biases, the cyber security and vulnerabilities of these technologies and the quality of data be factored into these discussions?How can ethical and legal considerations be incorporated into the design stage of these technologies?How can it be ensured that humans cannot be harmed in the process, either inadvertently or deliberately?Is there a need for a dedicated international forum to discuss the military applications of neurotechnology? How could these discussions be integrated to existing international processes related to emerging military applications of technological progress, such as the Convention on Certain Conventional Weapons (CCW) Group of Governmental Experts on Lethal Autonomous Weapons Systems? Full Article