an

An Improved Boosting to Amplify Signal with Isobaric Labeling (iBASIL) Strategy for Precise Quantitative Single-cell Proteomics

Chia-Feng Tsai
May 1, 2020; 19:828-838
Research




an

Acquiring and Analyzing Data Independent Acquisition Proteomics Experiments without Spectrum Libraries

Lindsay K Pino
Apr 20, 2020; 0:P119.001913v1-mcp.P119.001913
Perspective




an

Proximity Dependent Biotinylation: Key Enzymes and Adaptation to Proteomics Approaches

Payman Samavarchi-Tehrani
May 1, 2020; 19:757-773
Review




an

Rising to the challenge in the worst circumstances

In this era when we need to do everything possible to keep essential businesses operational, the people of the information security community have banded together in an inspirational effort to protect us all.






an

Bank of REU/Grad Fair Questions

By Lucy Martinez and Eduardo Torres Davila We attended the Joint Math Meetings (JMM) conference in Denver to present our research from our work at the Mathematical Sciences Research Institute Undergraduate Program. At JMM, there was a fair of graduate … Continue reading




an

A mathematician’s mission statement

By Pamela E. Harris and Julianne Vega Companies and organizations are driven by their mission statements. These mission statements provide a concrete summary of what they value and what they work to achieve. Take for example the following mission statements: … Continue reading




an

Learning During the Pandemic: What we wish our professors and mentors knew

Student Authors: Mayleen Cortez, Brooke Keene-Gomez, Lucy Martinez, Amaury V. Miniño, Jenna Race, Kelemua Tesfaye, and Stephanie. Blog post compiled by Melissa Gutiérrez González, Pamela E. Harris, and Alicia Prieto Langarica. In this blog we center the voices of mathematics students as … Continue reading




an

Strengthening Urban Preparedness and Resilience Against Biological Threats in Accra

Invitation Only Research Event

1 March 2019 - 10:30am to 2 March 2019 - 3:00pm

Chatham House, London

Capacity to contain and respond to biological threats varies considerably across the world. Yet such preparedness is vital for prevention, impact-reduction and resilience in the face of biological events, whether they be natural or deliberate outbreaks.

Chatham House is conducting a series of meetings to strengthen urban preparedness for, and resilience against, biological threats in African countries. This meeting will examine the preparedness and prevention mechanisms in Accra, reviewing the comprehensiveness of city-level preparedness.  

This meeting will focus on the formation and implementation of city-level action plans in the context of preparedness for managing biological threats. It will also explore how local authorities are contributing to this effort with their knowledge and expertise.

Attendance at this event is by invitation only.

Nilza Amaral

Project Manager, International Security Programme




an

Cybersecurity in the Commonwealth: Building the Foundations of Effective National Responses in the Caribbean

Invitation Only Research Event

8 March 2019 - 9:00am to 5:30pm

Bridgetown, Barbados

Event participants

Joyce Hakmeh, Cyber Research Fellow, International Security Department, Chatham House

This workshop is the second in a series in the 'Implementing the Commonwealth Cybersecurity Agenda' project. The workshop aims to provide a multi-stakeholder pan-Commonwealth platform to discuss how to take the implementation of the 'Commonwealth Cyber Declaration' forward with a focus on the second pillar of the declaration – building the foundations of an effective national cybersecurity response with eight action points. 

As such, the workshop gathers different project implementers under the UK Foreign and Commonwealth Office’s Cyber Programme, in addition to other key relevant stakeholders from the global level, to explore ongoing initiatives which aim to deliver one or more of pillar two’s action points.

The workshop addresses issues from a global perspective and a Commonwealth perspective and will include presentations from selected partners from different Commonwealth countries.

Calum Inverarity

Research Analyst and Coordinator, International Security Department
+44 (0) 207 957 5751




an

Transparency and Accountability for Drone Use: European Approaches

Invitation Only Research Event

11 March 2019 - 9:30am to 12 March 2019 - 12:30pm

Chatham House

With increased use of military drones in recent years there have also been many calls for greater transparency and accountability with regards to drone operations.

This would allow for greater public understanding, particularly as the complex nature of military operations today intensifies difficulties in sustaining perceptions of the legitimate use of force.

For example, in Europe, leading states rely on the US for drone platforms and for the infrastructure - such as military communication networks - that enable those operations, while the US also relies on airbases in European states to operate its drone programme.

In addition, with reports that the US is loosening the rules on the use of drones, it is important to understand how European approaches to transparency and accountability may be affected by these developments.

This workshop focuses on how European states can facilitate transparency to ensure accountability for drone use, as well as what the limits might be, considering both the complexity of military operations today and the need for achieving operational goals.

With the US easing restrictions on export controls, the discussion also considers the role of regulation in ensuring accountability and prospects for developing common standards.

Attendance at this event is by invitation only.

Nilza Amaral

Project Manager, International Security Programme




an

European Approaches to Remote Warfare

Research Event

15 May 2019 - 9:00am to 6:00pm

Brussels, Belgium

With continuing instability at Europe's borders, along with uncertainty on future US support for NATO, many European countries are increasing their allocations to defence budgets and to collective European strategic defence. In addition, with non-state armed groups creating instability and threatening civilian lives and livelihoods in proximity to the EU’s borders, various operations have been carried out in conflict theatres in the Middle East, North Africa and the Sahel under the auspices of NATO, the UN, the EU or by single EU member states.

Although European military personnel have been deployed in many regions, with countries becoming more reluctant to deploy ‘boots on the ground’, warfare has been increasingly conducted through remote means. This has led to criticism on the limited transparency and accountability mechanisms at work in these operations, while some have questioned the military effectiveness of such tactics or the capacity and willingness of states to ensure that targets are struck accurately and without impact on civilian populations.

Against this background, the EU has started allocating resources to military research and development projects with a focus on unmanned systems and related technologies. Under the auspices of the European Defence Fund such funding is set to increase, while potential bilateral programmes between some states have also been explored. Despite concerns raised by the European Parliament, the development of these policies and technologies has taken place without significant consideration of what the legal, ethical and military-strategic impact of these instruments might be.    

This event will bring together a range of experts, policymakers and civil society organizations to discuss the technology horizon of European defence investments and policy developments around remote warfare. Participants will discuss the implications of the new EU defence fund, legal, ethical, and transparency issues in military research and development and the position of the EU as a global actor. 

This event is being organized in partnership with PAX Netherlands.

THIS EVENT IS NOW FULL AND REGISTRATION HAS CLOSED.

Nilza Amaral

Project Manager, International Security Programme




an

How Regulation Could Break the Internet: In Conversation with Andrew Sullivan

Research Event

19 June 2019 - 6:00pm to 7:00pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Andrew Sullivan, President and CEO Internet Society
Chair: Emily Taylor, Associate Fellow, International Security Department, Chatham House; Editor, Journal of Cyber Policy

Internet regulation is increasing around the world creating positive obligations on internet providers and exerting negative unintended consequences on the internet infrastructure. In some ways, most of this regulatory activity is justifiable. Governments are concerned about the increased risk that the use of the internet brings to societies. As a response, many governments have been enacting regulations as their main approach to dealing with these concerns. The main challenge is that most of the current regulations are either ill-defined or unworkable.  

On the one hand, several governments have established procedures that seek to analyze the impacts of new regulatory proposals before they were adopted. However, there hasn’t been enough attention aimed at analyzing regulations after they have been adopted and only a few have measures in place to evaluate the impacts of the procedures and practices that govern the regulatory process itself.

On the other hand, much of the regulation creates unintended consequences to the internet itself. It undermines many of its fundamental properties and challenges the integrity and resiliency of its infrastructure.  

This event discusses current practices in internet-related regulation and the related challenges. Panellists will discuss how governments can enforce regulations that achieve their intended purpose while at the same time protecting the internet’s core infrastructure and its properties, including its openness, interoperability and global reach.

Calum Inverarity

Research Analyst and Coordinator, International Security Department
+44 (0) 207 957 5751




an

Cyber Insurance for Civil Nuclear Facilities: Risks and Opportunities

8 May 2019

This paper sets out a roadmap for how organizations in the civil nuclear sector can explore their options and review their cyber risk exposure.

Éireann Leverett

Senior Risk Researcher, University of Cambridge

GettyImages-667179424.jpg

The control room inside the Paks nuclear power plant in Hungary, 10 April 2017. Photo: Getty Images
  • Civil nuclear facilities and organizations hold sensitive information on security clearances, national security, health and safety, nuclear regulatory issues and international inspection obligations. The sensitivity and variety of such data mean that products tailored for insuring the civil nuclear industry have evolved independently and are likely to continue to do so.
  • ‘Air-gaps’ – measures designed to isolate computer systems from the internet – need to be continually maintained for industrial systems. Yet years of evidence indicate that proper maintenance of such protections is often lacking (mainly because very real economic drivers exist that push users towards keeping infrastructure connected). Indeed, even when air-gaps are maintained, security breaches can still occur.
  • Even if a particular organization has staff that are highly trained, ready and capable of handling a technological accident, hacking attack or incidence of insider sabotage, it still has to do business and/or communicate with other organizations that may not have the essentials of cybersecurity in place.
  • Regardless of whether the choice is made to buy external insurance or put aside revenues in preparation for costly incidents, the approach to cyber risk calculation should be the same. Prevention is one part of the equation, but an organization will also need to consider the resources and contingency measures available to it should prevention strategies fail. Can it balance the likelihood of a hacker’s success against the maximum cost to the organization, and put aside enough capital and manpower to get it through a crisis?
  • All civil nuclear facilities should consider the establishment of computer security incident response (CSIR) teams as a relevant concern, if such arrangements are not already in place. The existence of a CSIR team will be a prerequisite for any facility seeking to obtain civil nuclear cyber insurance.
  • Preventing attacks such as those involving phishing and ransomware requires good cyber hygiene practices throughout the workforce. Reducing an organization’s ‘time to recovery’ takes training and dedication. Practising the necessary tasks in crisis simulations greatly reduces the likelihood of friction and the potential for error in a crisis.




an

Understanding Cybercrime for Better Policing: Regional and Global Challenges

Research Event

18 June 2019 - 9:00am to 5:30pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

In recent years, cybercrime has evolved from a niche technological concern into a prominent global issue with substantial preventative and remedial costs for businesses and governments alike. Despite heavy investment in sophisticated cybersecurity measures and the adoption of several legal, organizational and capacity-building measures, cybercrime remains a major threat which is evolving on a daily basis. Today’s cybercrime is more aggressive, more complex, more organized and – importantly – more unpredictable than ever before.

The challenges posed by cybercrime are experienced acutely by countries undergoing digital transformations: as the level of connectivity rises, so too does the potential for online theft, fraud and abuse. Cybercrime is pervasive but governments can work to limit its impact by creating a resilient overall economy and robust institution, and appropriately equipping law enforcement and the justice system to navigate its novel challenges.

To advance the discourse surrounding these issues, this workshop will assess the current cyber threat landscape and how it is evolving. It will identify the main obstacles encountered by law enforcement, the judiciary and prosecutors in their fight against cybercrime. It will also compare national, regional and global approaches that countries can use to effectively curb cybercrime and tackle its emerging challenges.

Calum Inverarity

Research Analyst and Coordinator, International Security Department
+44 (0) 207 957 5751




an

The Destabilizing Danger of Cyberattacks on Missile Systems

2 July 2019

Dr Patricia Lewis

Research Director, Conflict, Science & Transformation; Director, International Security Programme

Dr Beyza Unal

Senior Research Fellow, International Security Programme
‘Left-of-launch’ attacks that aim to disable enemy missile systems may increase the chance of them being used, not least because the systems are so vulnerable.

2019-07-02-NKMissile.jpg

This undated photo released by North Korea's news agency in March 2017 shows the launch of four ballistic missiles during a military drill at an undisclosed location in North Korea. Photo: STR/AFP/Getty Images.

After President Trump decided to halt a missile attack on Iran in response to the downing of a US drone, it was revealed that the US had conducted cyberattacks on Iranian weapons systems to prevent Iran launching missiles against US assets in the region.

This ‘left-of-launch’ strategy – the pre-emptive action to prevent an adversary launch missiles – has been part of the US missile defence strategy for some time now. President George W Bush asked the US military and intelligence community to infiltrate the supply chain of North Korean missiles. It was claimed that the US hacked the North Korean ballistic missile programme, causing a failed ballistic missile test, in 2012.

It was not clear then – or now – whether these ‘left-of-launch’ cyberattacks aimed at North Korea were successful as described or whether they were primarily a bluff. But that is somewhat irrelevant; the belief in the possibility and the understanding of the potential impact of such cyber capabilities undermines North Korean or Iranian confidence in their abilities to launch their missiles. In times of conflict, loss of confidence in weapons systems may lead to escalation.

In other words, the adversary may be left with no option but to take the chance to use these missiles or to lose them in a conflict setting. ‘Left of launch’ is a dangerous game. If it is based on a bluff, it could be called upon and lead to deterrence failure. If it is based on real action, then it could create an asymmetrical power struggle. If the attacker establishes false confidence in the power of a cyber weapon, then it might lead to false signalling and messaging.

This is the new normal. The cat-and-mouse game has to be taken seriously, not least because missile systems are so vulnerable.

There are several ways an offensive cyber operation against missile systems might work. These include exploiting missile designs, altering software or hardware, or creating clandestine pathways to the missile command and control systems.

They can also be attacked in space, targeting space assets and their link to strategic systems.

Most missile systems rely, at least in part, on digital information that comes from or via space-based or space-dependent assets such as: communication satellites; satellites that provide position, navigation and timing (PNT) information (for example GPS or Galileo); weather satellites to help predict flight paths, accurate targeting and launch conditions; and remote imagery satellites to assist with information and intelligence for the planning and targeting.

Missile launches themselves depend on 1) the command and control systems of the missiles, 2) the way in which information is transmitted to the missile launch facilities and 3) the way in which information is transmitted to the missiles themselves in flight. All these aspects rely on space technology.

In addition, the ground stations that transmit and receive data to and from satellites are also vulnerable to cyberattack – either through their known and unknown internet connectivity or through malicious use of flash drives that contain a deliberate cyber infection.

Non-space-based communications systems that use cable and ground-to-air-to-ground masts are likewise under threat from cyberattacks that find their way in via internet connectivity, proximity interference or memory sticks. Human error in introducing connectivity via phones, laptops and external drives, and in clicking on malicious links in sophisticated phishing lures, is common in facilitating inadvertent connectivity and malware infection.

All of these can create a military capacity able to interfere with missile launches. Malware might have been sitting on the missile command and control system for months or even years, remaining inactivated until a chosen time or by a trigger that sets in motion a disruption either to the launch or to the flight path of the missile. The country that launches the missile that either fails to launch or fails to reach the target may never know if this was the result of a design flaw, a common malfunction or a deliberate cyberattack.

States with these capabilities must exercise caution: cyber offence manoeuvres may prevent the launch of missile attacks against US assets in the Middle East or in the Pacific regions, but they may also interfere with US missile launches in the future. Even, as has recently been revealed, US cyber weapons targeting an adversary may blow back and inadvertently infect US systems. Nobody is invulnerable.




an

Cybersecurity by Design in Civil Nuclear Power Plants

24 July 2019

Cyberattacks are increasingly challenging critical national infrastructure. This paper considers the security by design approach for civil nuclear power plants and analyses areas of risk and opportunities for the nuclear industry.

Dr Beyza Unal

Senior Research Fellow, International Security Programme

Roger Brunt

Managing Director, Grosmont Howe Ltd

2019-07-24-NuclearPlant.jpg

An employee climbs into the cooling tower of the third and fourth unit at Mochovce nuclear power plant in Slovakia on 2 July 2019. Photo: Getty Images

Summary

  • The application of ‘security by design’ in nuclear new builds could provide operators with the opportunity to establish a robust and resilient security architecture at the beginning of a nuclear power plant’s life cycle. This will enhance the protection of the plant and reduce the need for costly security improvements during its operating life.
  • Security by design cannot fully protect a nuclear power plant from rapidly evolving cyberattacks, which expose previously unsuspected or unknown vulnerabilities.
  • Careful design of security systems and architecture can – and should – achieve levels of protection that exceed current norms and expectations. However, the sourcing of components from a global supply chain means that the integrity of even the most skilfully designed security regime cannot be guaranteed without exhaustive checks of its components.
  • Security by design may well include a requirement for a technical support organization to conduct quality assurance of cyber defences and practices, and this regime should be endorsed by a facility’s executive board and continued at regular intervals after the new build facility has been commissioned.
  • Given the years it takes to design, plan and build a new nuclear power plant, it is important to recognize that from the point of ‘design freeze’ onwards, the operator will be building in vulnerabilities, as technology continues to evolve rapidly while construction fails to keep pace with it. Security by design cannot be a panacea, but it is an important factor in the establishment of a robust nuclear security – and cybersecurity – culture.




an

Cyber Governance in the Commonwealth: Towards Stability and Responsible State Behaviour in Cyberspace

Invitation Only Research Event

7 October 2019 - 10:30am to 5:30pm

Addis Ababa, Ethiopia

This roundtable is part of a series under the project, 'Implementing the Commonwealth Cybersecurity Agenda', funded by the UK Foreign and Commonwealth Office (FCO). The roundtable aims to provide a multi-stakeholder, pan-Commonwealth platform to discuss how to implement the Commonwealth Cyber Declaration with a focus on its third pillar 'To promote stability in cyberspace through international cooperation'.

In particular, the roundtable focuses on points 3 and 4 of the third pillar which revolve around the commitment to promote frameworks for stability in cyberspace including the applicability of international law, agreed voluntary norms of responsible state behaviour and the development and implementation of confidence-building measures consistent with the 2015 report of the UNGGE. 

The workshop also focuses on the commitment to advance discussions on how existing international law, including the Charter of the United Nations and applicable international humanitarian law, applies in cyberspace.

The roundtable addresses the issue of global cyber governance from a Commonwealth perspective and will also include a discussion around the way forward, the needed capacity of the different Commonwealth countries and the cooperation between its members for better cyber governance.

Participants include UNGGE members from Commonwealth countries in addition to representatives to the UN Open-Ended Working Group from African countries as well as members from academia, civil society and industry.

Calum Inverarity

Research Analyst and Coordinator, International Security Department
+44 (0) 207 957 5751




an

Artificial Intelligence Prediction and Counterterrorism

9 August 2019

The use of AI in counterterrorism is not inherently wrong, and this paper suggests some necessary conditions for legitimate use of AI as part of a predictive approach to counterterrorism on the part of liberal democratic states.

Kathleen McKendrick

British Army Officer, Former Visiting Research Fellow at Chatham House

2019-08-06-AICounterterrorism.jpg

Surveillance cameras manufactured by Hangzhou Hikvision Digital Technology Co. at a testing station near the company’s headquarters in Hangzhou, China. Photo: Getty Images

Summary

  • The use of predictive artificial intelligence (AI) in countering terrorism is often assumed to have a deleterious effect on human rights, generating spectres of ‘pre-crime’ punishment and surveillance states. However, the well-regulated use of new capabilities may enhance states’ abilities to protect citizens’ right to life, while at the same time improving adherence to principles intended to protect other human rights, such as transparency, proportionality and freedom from unfair discrimination. The same regulatory framework could also contribute to safeguarding against broader misuse of related technologies.
  • Most states focus on preventing terrorist attacks, rather than reacting to them. As such, prediction is already central to effective counterterrorism. AI allows higher volumes of data to be analysed, and may perceive patterns in those data that would, for reasons of both volume and dimensionality, otherwise be beyond the capacity of human interpretation. The impact of this is that traditional methods of investigation that work outwards from known suspects may be supplemented by methods that analyse the activity of a broad section of an entire population to identify previously unknown threats.
  • Developments in AI have amplified the ability to conduct surveillance without being constrained by resources. Facial recognition technology, for instance, may enable the complete automation of surveillance using CCTV in public places in the near future.
  • The current way predictive AI capabilities are used presents a number of interrelated problems from both a human rights and a practical perspective. Where limitations and regulations do exist, they may have the effect of curtailing the utility of approaches that apply AI, while not necessarily safeguarding human rights to an adequate extent.
  • The infringement of privacy associated with the automated analysis of certain types of public data is not wrong in principle, but the analysis must be conducted within a robust legal and policy framework that places sensible limitations on interventions based on its results.
  • In future, broader access to less intrusive aspects of public data, direct regulation of how those data are used – including oversight of activities by private-sector actors – and the imposition of technical as well as regulatory safeguards may improve both operational performance and compliance with human rights legislation. It is important that any such measures proceed in a manner that is sensitive to the impact on other rights such as freedom of expression, and freedom of association and assembly.




an

Human Control Is Essential to the Responsible Use of Military Neurotechnology

8 August 2019

Yasmin Afina

Research Assistant, International Security Programme
The military importance of AI-connected brain–machine interfaces is growing. Steps must be taken to ensure human control at all times over these technologies.

2019-08-08-BABWIB.jpg

A model of a human brain is displayed at an exhibition in Lisbon, Portugal. Photo: Getty Images.

Technological progress in neurotechnology and its military use is proceeding apace. As early as the 1970s, brain-machine interfaces have been the subject of study. By 2014, the UK’s Ministry of Defence was arguing that the development of artificial devices, such as artificial limbs, is ‘likely to see refinement of control to provide… new ways to connect the able-bodied to machines and computers.’ Today, brain-machine interface technology is being investigated around the world, including in Russia, China and South Korea.

Recent developments in the private sector are producing exciting new capabilities for people with disabilities and medical conditions. In early July, Elon Musk and Neuralink presented their ‘high-bandwidth’ brain-machine interface system, with small and flexible electrode threads packaged into a small device containing custom chips and to be inserted and implanted into the user’s brain for medical purposes.

In the military realm, in 2018, the United States’ Defense Advanced Research Projects Agency (DARPA) put out a call for proposals to investigate the potential of nonsurgical brain-machine interfaces to allow soldiers to ‘interact regularly and intuitively with artificially intelligent, semi-autonomous and autonomous systems in a manner currently not possible with conventional interfaces’. DARPA further highlighted the need for these interfaces to be bidirectional – where information is sent both from brain to machine (neural recording) and from machine to brain (neural stimulation) – which will eventually allow machines and humans to learn from each other.

This technology may provide soldiers and commanders with a superior level of sensory sensitivity and the ability to process a greater amount of data related to their environment at a faster pace, thus enhancing situational awareness. These capabilities will support military decision-making as well as targeting processes.

Neural recording will also enable the obtention of a tremendous amount of data from operations, including visuals, real-time thought processes and emotions. These sets of data may be used for feedback and training (including for virtual wargaming and for machine learning training), as well as for investigatory purposes. Collected data will also feed into research that may help researchers understand and predict human intent from brain signals – a tremendous advantage from a military standpoint.

Legal and ethical considerations

The flip side of these advancements is the responsibilities they will impose and the risks and vulnerabilities of the technology as well as legal and ethical considerations.

The primary risk would be for users to lose control over the technology, especially in a military context; hence a fail-safe feature is critical for humans to maintain ultimate control over decision-making. Despite the potential benefits of symbiosis between humans and AI, users must have the unconditional possibility to override these technologies should they believe it is appropriate and necessary for them to do so.

This is important given the significance of human control over targeting, as well as strategic and operational decision-making. An integrated fail-safe in brain-machine interfaces may in fact allow for a greater degree of human control over critical, time-sensitive decision-making. In other words, in the event of incoming missiles alert, while the AI may suggest a specific course of action, users must be able to decide in a timely manner whether to execute it or not.

Machines can learn from coded past experiences and decisions, but humans also use gut feelings to make life and death decisions. A gut feeling is a human characteristic that is not completely transferable, as it relies on both rational and emotional traits – and is part of the ‘second-brain’ and the gut-brain axis which is currently poorly understood. It is however risky to take decisions solely on gut feelings or solely on primary brain analysis—therefore, receiving a comprehensive set of data via an AI-connected brain-machine interface may help to verify and evaluate the information in a timely manner, and complement decision-making processes. However, these connections and interactions would have to be much better understood than the current state of knowledge. 

Fail-safe features are necessary to ensure compliance with the law, including international humanitarian law and international human rights law. As a baseline, human control must be used to 1) define areas where technology may or may not be trusted and to what extent, and 2) ensure legal, political and ethical accountability, responsibility and explainability at all times. Legal and ethical considerations must be taken into account from as early as the design and conceptualizing stage of these technologies, and oversight must be ensured across the entirety of the manufacturing supply chain.  

The second point raises the need to further explore and clarify whether existing national, regional and international legal, political and ethical frameworks are sufficient to cover the development and use of these technologies. For instance, there is value in assessing to what extent AI-connected brain-machine interfaces will affect the assessment of the mental element in war crimes and their human rights implications.

In addition, these technologies need to be highly secure and invulnerable to cyber hacks. Neural recording and neural stimulation will be directly affecting brain processes in humans and if an adversary has the ability to connect to a human brain, steps need to be taken to ensure that memory and personality could not be damaged.

Future questions

Military applications of technological progress in neurotechnology is inevitable, and their implications cannot be ignored. There is an urgent need for policymakers to understand the fast-developing neurotechnical capabilities, develop international standards and best practices – and, if necessary, new and dedicated legal instruments – to frame the use of these technologies.

Considering the opportunities that brain-machine interfaces may present in the realms of security and defence, inclusive, multi-stakeholder discussions and negotiations leading to the development of standards must include the following considerations:

  • What degree of human control would be desirable, at what stage and by whom? To what extent could human users be trusted with their own judgment in decision-making processes?
  • How could algorithmic and human biases, the cyber security and vulnerabilities of these technologies and the quality of data be factored into these discussions?
  • How can ethical and legal considerations be incorporated into the design stage of these technologies?
  • How can it be ensured that humans cannot be harmed in the process, either inadvertently or deliberately?
  • Is there a need for a dedicated international forum to discuss the military applications of neurotechnology? How could these discussions be integrated to existing international processes related to emerging military applications of technological progress, such as the Convention on Certain Conventional Weapons (CCW) Group of Governmental Experts on Lethal Autonomous Weapons Systems?




an

The Future of EU–US Cooperation in Space Traffic Management and Space Situational Awareness

29 August 2019

As more space activities develop, there is an increasing requirement for comprehensive space situational awareness (SSA). This paper provides an overview of the current landscape in SSA and space traffic management as well as possible scenarios for EU–US cooperation in this area. 

Alexandra Stickings

Research Fellow for Space Policy and Security, RUSI

2019-08-19-SpaceTrafficManagement.jpg

Deployment of the NanoRacks-Remove Debris Satellite from the International Space Station. Photo: Getty Images.

Summary

  • Space situational awareness (SSA) and space traffic management (STM) are essential for sustainable near-Earth orbit. International cooperation in SSA and STM is vital with the growing number of satellite operators and the increasingly complex space environment.
  • The various definitions of SSA and STM are ambiguous. Understanding the activities that fall under each term can better assist in finding areas for cooperation and collaboration.
  • SSA has historically been a military activity, leading to an incomplete public catalogue of its use and barriers to sharing information with other states and the commercial sector. The rise in private space actors has increased the number of commercial STM providers and, with plans in the US to move responsibility for STM to civilian control, there will likely be more opportunities for international collaboration, particularly through the EU Space Surveillance and Tracking (SST) programme.
  • Individual EU member states possess developed STM capabilities, but overall these are still some way behind those of allies such as the US. Further investment in STM infrastructure and programmes is required for the EU and individual European states to be an essential partner to the US and add value to the global effort.
  • There are worldwide challenges, both political and technical, to providing STM coverage, which may lead to a lack of collaboration and gaps in understanding of activities in orbit. Existing sensors have limitations in terms of the size of objects that can be detected and the precision with which their movements can be predicted. These capability gaps represent opportunities for the EU to contribute.
  • The EU can build on its tradition of support for openness and civil society by creating a system that fosters an environment of cooperation and collaboration involving industry, commercial STM providers and the wider international community.
  • Although collaboration in STM is vital, the EU should also aim to tackle issues within the wider definition of SSA including space weather, intelligence and the security of ground stations.
  • The EU is well placed to become a global leader in SSA and STM. However, it needs to take into consideration the current political and technical landscape when making decisions regarding investment in capabilities and the pursuit of international partnerships.




an

Who’s Afraid of Huawei? Understanding the 5G Security Concerns

9 September 2019

Emily Taylor

Associate Fellow, International Security Programme
Emily Taylor examines the controversy around the Chinese tech giant’s mobile broadband equipment and the different approaches taken by Western countries.

2019-09-06-Huawei.jpg

Huawei's Ox Horn campus in Dongguan, China. Photo: Getty Images.

As countries move towards the fifth generation of mobile broadband, 5G, the United States has been loudly calling out Huawei as a security threat. It has employed alarmist rhetoric and threatened to limit trade and intelligence sharing with close allies that use Huawei in their 5G infrastructure.

While some countries such as Australia have adopted a hard line against Huawei, others like the UK have been more circumspect, arguing that the risks of using the firm’s technology can be mitigated without forgoing the benefits.

So, who is right, and why have these close allies taken such different approaches?

The risks

Long-standing concerns relating to Huawei are plausible. There are credible allegations that it has benefitted from stolen intellectual property, and that it could not thrive without a close relationship with the Chinese state.

Huawei hotly denies allegations that users are at risk of its technology being used for state espionage, and says it would resist any order to share information with the Chinese government. But there are questions over whether it could really resist China’s stringent domestic legislation, which compels companies to share data with the government. And given China’s track record of using cyberattacks to conduct intellectual property theft, there may be added risks of embedding a Chinese provider into critical communications infrastructure.

In addition, China’s rise as a global technological superpower has been boosted by the flow of financial capital through government subsidies, venture and private equity, which reveal murky boundaries between the state and private sector for domestic darlings. Meanwhile, the Belt and Road initiative has seen generous investment by China in technology infrastructure across Africa, South America and Asia.

There’s no such thing as a free lunch or a free network – as Sri Lanka discovered when China assumed shares in a strategic port in return for debt forgiveness; or Mexico when a 1% interest loan for its 4G network came on the condition that 80% of the funding was spent with Huawei.

Aside from intelligence and geopolitical concerns, the quality of Huawei’s products represents a significant cyber risk, one that has received less attention than it deserves.

On top of that, 5G by itself will significantly increase the threat landscape from a cybersecurity perspective. The network layer will be more intelligent and adaptable through the use of software and cloud services. The number of network antennae will increase by a factor of 20, and many will be poorly secured ‘things’; there is no need for a backdoor if you have any number of ‘bug doors’.

Finally, the US is threatening to limit intelligence sharing with its closest allies if they adopt Huawei. So why would any country even consider using Huawei in their 5G infrastructure?

Different situations

The truth is that not every country is free to manoeuvre; 5G technology will sit on top of existing mobile infrastructure.

Australia and the US can afford to take a hard line: their national infrastructure has been largely Huawei-free since 2012. However, the Chinese firm is deeply embedded in other countries’ existing structures – for example, in the UK, Huawei has provided telecommunications infrastructure since 2005. Even if the UK decided tomorrow to ditch Huawei, it cannot just rip up existing 4G infrastructure. To do so would cost a fortune, risk years of delay in the adoption of 5G and limit competition in 5G provisioning.

As a result, the UK has adopted a pragmatic approach resulting from years of oversight and analysis of Huawei equipment, during which it has never found evidence of malicious Chinese state cyber activity through Huawei.

At the heart of this process is the Huawei Cyber Security Evaluation Centre, which was founded in 2010 as a confidence-building measure. Originally criticized for ‘effectively policing itself’, as it was run and staffed entirely by Huawei, the governance has now been strengthened, with the National Cyber Security Centre chairing its oversight board.

The board’s 2019 report makes grim reading, highlighting ‘serious and system defects in Huawei’s software engineering and cyber security competence’. But it does not accuse the company of serving as a platform for state-sponsored surveillance.

Similar evidence-based policy approaches are emerging in other countries like Norway and Italy. They offer flexibility for governments, for example by limiting access to some contract competition through legitimate and transparent means, such as security reviews during procurement. The approaches also raise security concerns (both national and cyber) to a primary issue when awarding contracts – something that was not always done in the past, when price was the key driver.

The UK is also stressing the need to manage risk and increase vendor diversity in the ecosystem to avoid single points of failure. A further approach that is beginning to emerge is to draw a line between network ‘core’ and ‘periphery’ components, excluding some providers from the more sensitive ‘core’. The limited rollouts of 5G in the UK so far have adopted multi-provider strategies, and only one has reportedly not included Huawei kit.

Managing the risks to cyber security and national security will become more complex in a 5G environment. In global supply chains, bans based on the nationality of the provider offer little assurance. For countries that have already committed to Huawei in the past, and who may not wish to be drawn into an outright trade war with China, these moderate approaches offer a potential way forward.




an

Who Runs the Internet: Internet Consolidation and Control

Research Event

10 December 2019 - 6:00pm to 7:15pm

Chatham House, London

Event participants

Andrew Sullivan, President and CEO, Internet Society
Jennifer Cobbe, Research Associate, Department of Computer Science and Technology, University of Cambridge
Jesse Sowell, Assistant Professor, Department of International Affairs, Bush School of Government and Public Service, Texas A&M University
Chair: Emily Taylor, Associate Fellow, International Security, Chatham House, Editor, Journal of Cyber Policy

In recent years, there has been a growing debate around the influence of a few large internet technology companies on the internet’s infrastructure and over the popular applications and social media platforms that we use every day.

The internet which was once widely viewed as a collective platform for limitless, permissionless innovation, competition and growth, is now increasingly viewed as a consolidated environment dominated by a few. Such market dominance threatens to undermine the internet’s fundamental benefits as a distributed network in which no single entity has control.  

The panel examines the risks of consolidation throughout the internet’s technology stack such as the impact on complex supply chains that support applications, including cloud provisions, ‘as a service’.

It also explores the potential benefits, for example, when building out essential infrastructure to support faster and cheaper internet services in developing economies, consolidation can create economies of scale that bring the resource-intensive building blocks of the internet economy within the reach of new start-ups and innovators.

The panel provides an interdisciplinary perspective exploring the relationship between consolidation and evolutions in the internet infrastructure as well as unpacking its policy implications.

This event supports a special issue of the Journal of Cyber Policy as part of a collaboration between Chatham House and the Internet Society which explores the impact of the consolidation on the internet’s fundamental architecture.

Nilza Amaral

Project Manager, International Security Programme




an

EU–US Relations on Internet Governance

14 November 2019

As internet governance issues emerge in the wake of innovations such as the Internet of Things and advanced artificial intelligence, there is an urgent need for the EU and US to establish a common, positive multi-stakeholder vision for regulating and governing the internet.

Emily Taylor

Associate Fellow, International Security Programme

Stacie Hoffmann

Internet Policy and Cybersecurity Consultant, Oxford Information Labs

2019-11-14-EUUSInternet.jpg

Server room network cables in New York City, November 2014. Photo: Michael Bocchieri/Staff/Getty.
  • Political, economic, sociological and technological factors are poised to challenge EU and US ideological positions on internet governance, which will make it difficult to find consensus and common ground in the years to come.
  • The EU and US share core values and perspectives relating to internet governance, such as openness, freedom and interoperability, as well as a human rights framework for cybersecurity. There have been many examples of successful multi-stakeholder cooperation between the EU and US, including the Internet Assigned Numbers Authority (IANA) transition and the European Dialogue on Internet Governance (EuroDIG).
  • There are also subtle differences between the EU and US, and each has different reasons to support multi-stakeholderism. Cases that highlight growing tensions in EU–US coordination on internet governance include the controversies surrounding the EU General Data Protection Regulation (GDPR), the WHOIS system that governs domain name registration data, and the board of the Internet Corporation for Assigned Names and Numbers (ICANN), which undermined an independent cybersecurity review.
  • Internet governance is becoming more complex, with a multiplicity of actors and no obvious authority for important emerging issues. Additionally, the rise of China and its authoritarian vision for the future of the internet is a threat to the current internet governance institutions that have been shaped by and reflect Western values.
  • To bridge ideological gaps the EU and US should build capacity between likeminded stakeholders, create a taskforce on effective multi-stakeholder internet governance, and work through non-governmental stakeholders to improve participation.




an

AI-driven Personalization in Digital Media: Political and Societal Implications

2 December 2019

The fallout from disinformation and online manipulation strategies have alerted Western democracies to the novel, nuanced vulnerabilities of our information society. This paper outlines the implications of the adoption of AI by the the legacy media, as well as by the new media, focusing on personalization.

Sophia Ignatidou

Academy Associate, International Security Programme

2019-12-02-AI-Driven-Personalization-small.jpg

The Reuters and other news apps seen on an iPhone, 29 January 2019. Photo: Getty Images.

Summary

  • Machine learning (ML)-driven personalization is fast expanding from social media to the wider information space, encompassing legacy media, multinational conglomerates and digital-native publishers: however, this is happening within a regulatory and oversight vacuum that needs to be addressed as a matter of urgency.
  • Mass-scale adoption of personalization in communication has serious implications for human rights, societal resilience and political security. Data protection, privacy and wrongful discrimination, as well as freedom of opinion and of expression, are some of the areas impacted by this technological transformation.
  • Artificial intelligence (AI) and its ML subset are novel technologies that demand novel ways of approaching oversight, monitoring and analysis. Policymakers, regulators, media professionals and engineers need to be able to conceptualize issues in an interdisciplinary way that is appropriate for sociotechnical systems.
  • Funding needs to be allocated to research into human–computer interaction in information environments, data infrastructure, technology market trends, and the broader impact of ML systems within the communication sector.
  • Although global, high-level ethical frameworks for AI are welcome, they are no substitute for domain- and context-specific codes of ethics. Legacy media and digital-native publishers need to overhaul their editorial codes to make them fit for purpose in a digital ecosystem transformed by ML. Journalistic principles need to be reformulated and refined in the current informational context in order to efficiently inform the ML models built for personalized communication.
  • Codes of ethics will not by themselves be enough, so current regulatory and legislative frameworks as they relate to media need to be reassessed. Media regulators need to develop their in-house capacity for thorough research and monitoring into ML systems, and – when appropriate –proportionate sanctions for actors found to be employing such systems towards malign ends. Collaboration with data protection authorities, competition authorities and national electoral commissions is paramount for preserving the integrity of elections and of a political discourse grounded on democratic principles.
  • Upskilling senior managers and editorial teams is fundamental if media professionals are to be able to engage meaningfully and effectively with data scientists and AI engineers.




an

Trump’s Threat to Target Iran’s Cultural Heritage Is Illegal and Wrong

7 January 2020

Héloïse Goodley

Army Chief of General Staff Research Fellow (2018–19), International Security
Targeting cultural property is rightly prohibited under the 1954 Hague Convention.

2020-01-07-Trump.jpg

Donald Trump at Mar-a-Lago in December. Photo: Getty Images

As tensions escalate in the Middle East, US President Donald Trump has threatened to strike targets in Iran should they seek to retaliate over the killing of Qassem Soleimani. According to the president’s tweet, these sites includes those that are ‘important to Iran and Iranian culture’.

Defense Secretary Mark Esper was quick on Monday to rule out any such action and acknowledged that the US would ‘follow the laws of armed conflict’. But Trump has not since commented further on the matter.

Any move to target Iranian cultural heritage could constitute a breach of the international laws protecting cultural property. Attacks on cultural sites are deemed unlawful under two United Nations conventions; the 1954 Hague Convention for the Protection of Cultural Property during Armed Conflict, and the 1972 UNESCO World Heritage Convention for the Protection of the World Cultural and Natural Heritage.

These have established deliberate attacks on cultural heritage (when not militarily necessary) as a war crime under the Rome Statute of the International Criminal Court in recognition of the irreparable damage that the loss of cultural heritage can have locally, regionally and globally.

These conventions were established in the aftermath of the Second World War, in reaction to the legacy of the massive destruction of cultural property that took place, including the intense bombing of cities, and systematic plunder of artworks across Europe. The conventions recognize that damage to the cultural property of any people means ‘damage to the cultural heritage of all mankind’. The intention of these is to establish a new norm whereby protecting culture and history – that includes cultural and historical property – is as important as safeguarding people.

Such historical sites are important not simply as a matter of buildings and statues, but rather for their symbolic significance in a people’s history and identity. Destroying cultural artefacts is a direct attack on the identity of the population that values them, erasing their memories and historical legacy. Following the heavy bombing of Dresden during the Second World War, one resident summed up the psychological impact of such destruction in observing that ‘you expect people to die, but you don’t expect the buildings to die’.

Targeting sites of cultural significance isn’t just an act of intimidation during conflict. It can also have a lasting effect far beyond the cessation of violence, hampering post-conflict reconciliation and reconstruction, where ruins or the absence of previously significant cultural monuments act as a lasting physical reminder of hostilities.

For example, during the Bosnian War in the 1990s, the Old Bridge in Mostar represented a symbol of centuries of shared cultural heritage and peaceful co-existence between the Serbian and Croat communities. The bridge’s destruction in 1993 at the height of the civil war and the temporary cable bridge which took its place acted as a lasting reminder of the bitter hostilities, prompting its reconstruction a decade later as a mark of the reunification of the ethnically divided town.

More recently, the destruction of cultural property has been a feature of terrorist organizations, such as the Taliban’s demolition of the 1,700-year-old Buddhas of Bamiyan in 2001, eliciting international condemnation. Similarly, in Iraq in 2014 following ISIS’s seizure of the city of Mosul, the terrorist group set about systematically destroying a number of cultural sites, including the Great Mosque of al-Nuri with its leaning minaret, which had stood since 1172. And in Syria, the ancient city of Palmyra was destroyed by ISIS in 2015, who attacked its archaeological sites with bulldozers and explosives.

Such violations go beyond destruction: they include the looting of archaeological sites and trafficking of cultural objects, which are used to finance terrorist activities, which are also prohibited under the 1954 Hague Convention.

As a war crime, the destruction of cultural property has been successfully prosecuted in the International Criminal Court, which sentenced Ahmad Al-Faqi Al-Mahdi to nine years in jail in 2016 for his part in the destruction of the Timbuktu mausoleums in Mali. Mahdi led members of Al-Qaeda in the Islamic Maghreb to destroy mausoleums and monuments of cultural and religious importance in Timbuktu, irreversibly erasing what the chief prosecutor described as ‘the embodiment of Malian history captured in tangible form from an era long gone’.

Targeting cultural property is prohibited under customary international humanitarian law, not only by the Hague Convention. But the Convention sets out detailed regulations for protection of such property, and it has taken some states a lot of time to provide for these.

Although the UK was an original signatory to the 1954 Hague Convention, it did not ratify it until 2017, introducing into law the Cultural Property (Armed Conflicts) Act 2017, and setting up the Cultural Protection Fund to safeguard heritage of international importance threatened by conflict in countries across the Middle East and North Africa.

Ostensibly, the UK’s delay in ratifying the convention lay in concerns over the definition of key terms and adequate criminal sanctions, which were addressed in the Second Protocol in 1999. However, changing social attitudes towards the plunder of antiquities, and an alarming increase in the use of cultural destruction as a weapon of war by extremist groups to eliminate cultures that do not align with their own ideology, eventually compelled the UK to act.

In the US, it is notoriously difficult to get the necessary majority for the approval of any treaty in the Senate; for the Hague Convention, approval was achieved in 2008, following which the US ratified the Convention in 2009.

Destroying the buildings and monuments which form the common heritage of humanity is to wipe out the physical record of who we are. People are people within a place, and they draw meaning about who they are from their surroundings. Religious buildings, historical sites, works of art, monuments and historic artefacts all tell the story of who we are and how we got here. We have a responsibility to protect them.




an

Building LGBTIQ+ Inclusivity in the Armed Forces, 20 Years After the Ban Was Lifted

16 January 2020

Will Davies

Army Chief of General Staff Research Fellow, International Security Programme
Change was slow to come but progress has since been swift. Not only can a continuing focus on inclusivity benefit service people and the organization, it is also an essential element of a values-based foreign policy.

2020-01-16-Westminster.jpg

Crew members from HMS Westminster march through Admiralty Arch as they exercise their freedom of the city in August 2019 in London. Photo: Getty Images.

The new UK government will conduct a review of foreign, security and defence policy in 2020. If the UK decides to use values as a framework for foreign policy this needs to be reflected in its armed forces. One area where this is essential is continuing to deepen inclusivity for LGBTIQ+ personnel, building on the progress made since the ban on their service was lifted in 2000.

I witnessed the ban first-hand as a young officer in the British Army in 1998. As the duty officer I visited soldiers being held in the regimental detention cells to check all was well. One day a corporal, who I knew, was there awaiting discharge from the army having been convicted of being gay. On the one hand, here was service law in action, which was officially protecting the army’s operational effectiveness and an authority not to be questioned at my level. On the other, here was an excellent soldier in a state of turmoil and public humiliation. How extreme this seems now.

On 12 January 2000 Tony Blair’s Labour government announced an immediate lifting of the ban for lesbian, gay and bisexual personnel (LGB) and introduced a new code of conduct for personal relationships. (LGB is the term used by the armed forces to describe those personnel who had been banned prior to 2000.) This followed a landmark ruling in a case taken to the European Court of Human Rights in 1999 by four LGB ex-service personnel – supported by Stonewall – who had been dismissed from service for their sexuality.

Up to that point the Ministry of Defence's long-held position had been that LGB personnel had a negative impact on the morale and cohesion of a unit and damaged operational effectiveness. Service personnel were automatically dismissed if it was discovered they were LGB, even though homosexuality had been decriminalized in the UK by 1967.

Proof that the armed forces had been lagging behind the rest of society was confirmed by the positive response to the change among service personnel, despite a handful of vocal political and military leaders who foresaw negative impacts. The noteworthy service of LGBTIQ+ people in Iraq and Afghanistan only served to debunk any residual myths.

Twenty years on, considerable progress has been made and my memories from 1998 now seem alien. This is a story to celebrate – however in the quest for greater inclusivity there is always room for improvement.

Defence Minister Johnny Mercer last week apologized following recent calls from campaign group Liberty for a fuller apology. In December 2019, the Ministry of Defence announced it was putting in place a scheme to return medals stripped from veterans upon their discharge.

The armed forces today have a range of inclusivity measures to improve workplace culture including assessments of workplace climate and diversity networks supported by champions drawn from senior leadership.

But assessing the actual lived experience for LGBTIQ+ people is challenging due to its subjectivity. This has not been helped by low participation in the 2015 initiative to encourage people to declare confidentially their sexual orientation, designed to facilitate more focused and relevant policies. As of 1 October 2019, only 20.3 per cent of regular service people had declared a sexual orientation.

A measure of positive progress is the annual Stonewall Workplace Equality Index, the definitive benchmarking tool for employers to measure their progress on LGBTIQ+ inclusion in the workplace; 2015 marked the first year in which all three services were placed in the top 100 employers in the UK and in 2019 the Royal Navy, British Army and Royal Air Force were placed 15th=, 51st= and 68th respectively.

Nevertheless, LGBTIQ+ service people and those in other protected groups still face challenges. The 2019 Ministry of Defence review of inappropriate behaviour in the armed forces, the Wigston Report, concluded there is an unacceptable level of sexual harassment, bullying and discrimination. It found that 26-36% of LGBTIQ+ service people have experienced negative comments or conduct at work because of their sexual orientation.

The Secretary of State for Defence accepted the report’s 36 recommendations on culture, incident reporting, training and a more effective complaints system. Pivotal to successful implementation will be a coherent strategy driven by fully engaged leaders.

Society is also expecting ever higher standards, particularly in public bodies. The armed forces emphasise their values and standards, including ‘respect for others’, as defining organisational characteristics; individuals are expected to live by them. Only in a genuinely inclusive environment can an individual thrive and operate confidently within a team.

The armed forces also recognize as a priority the need to connect to and reflect society more closely in order to attract and retain talent from across all of society. The armed forces’ active participation in UK Pride is helping to break down barriers in this area.

In a post-Brexit world, the UK’s values, support for human rights and reputation for fairness are distinctive strengths that can have an impact on the world stage and offer a framework for future policy. The armed forces must continue to push and promote greater inclusivity in support. When operating overseas with less liberal regimes, this will be sensitive and require careful handling; however it will be an overt manifestation of a broader policy and a way to communicate strong and consistent values over time.

The armed forces were damagingly behind the times 20 years ago. But good progress has been made since. Inclusion initiatives must continue to be pushed to bring benefits to the individual and the organization as well as demonstrate a values-based foreign policy.




an

The Commonwealth Cyber Declaration: Achievements and Way Forward

Invitation Only Research Event

4 February 2020 - 9:15am to 5:30pm

Chatham House, London

In April 2018, the Commonwealth Heads of Government Meeting (CHOGM), held in London, saw the creation and the adoption of the Commonwealth Cyber Declaration. The declaration outlines the framework for a concerted effort to advance cybersecurity practices to promote a safe and prosperous cyberspace for Commonwealth citizens, businesses and societies. 

The conference will aim to provide an overview on the progress made on cybersecurity in the Commonwealth since the declaration was announced in 2018. In addition, it will examine future challenges and potential solutions going forward.

This conference is part of the International Security Programme's project on Implementing the Commonwealth Cybersecurity Agenda and will convene a range of senior Commonwealth representatives as well as a selection of civil society and industry stakeholders. This project aims to develop a pan-Commonwealth platform to take the Commonwealth Cyber Declaration forward by means of a holistic, inclusive and representative approach.

Please see below meeting summaries from previous events on Cybersecurity in the Commonwealth:  

Attendance at this event is by invitation only. 

Esther Naylor

Research Assistant, International Security Programme
+44 (0)20 7314 3628




an

Ana Alecsandru

Research Assistant, International Security Programme

Biography

Ana Alecsandru is a research assistant for the International Security programme, covering projects related to nuclear weapons policy and emerging technologies. She is also a PhD candidate at the University of Birmingham (awaiting Viva examination).

Her doctoral research examined the relationship between trust and verification in nuclear arms control negotiations between the United States and Russia.

Prior to joining Chatham House, she worked at the University of Birmingham on various projects concerning nuclear weapons policy while doing her PhD.

Ana completed an internship in the Arms Control, Disarmament, and WMD Non-Proliferation Centre at NATO HQ in Brussels in 2014. She was also a research intern at the United Nations Office for Disarmament Affairs (UNODA) in New York in 2016.

During her doctoral studies, she received full grants to participate in the 2017 IGCC’s Public Policy and Nuclear Threats Boot Camp hosted at UC San Diego and the 2017 Nuclear Safeguards and Non-Proliferation Training Course hosted by the European Commission’s Research Centre in Ispra.

Ana holds an MA in Security Studies and an MA in Research Methods from the University of Birmingham. She completed her BSc (hons) in International Relations at the University of Bath. For her doctoral research, she was awarded a studentship by the UK Economic and Social Research Council. 

Areas of expertise

  • Nuclear weapons policy
  • Nuclear arms control and strategic stability
  • Emerging military technologies
  • Emotions in strategic decision-making




an

The Smart Peace Initiative: An Integrated and Adaptive Approach to Building Peace

Invitation Only Research Event

12 May 2020 - 10:00am to 11:30am
Add to Calendar

Smart Peace brings together global expertise in conflict analysis and research, peacebuilding and mediation programming, and behavioural science and evaluation. Together, Smart Peace partners are developing integrated and adaptive peace initiatives, working with local partners to prevent and resolve complex and intractable conflicts in Central African Republic, Myanmar and northern Nigeria.
 
This roundtable is an opportunity for Smart Peace partners to share the Smart Peace concept, approach and objectives, and experiences of the first phases of programme implementation. Roundtable discussions among participants from policy, practice and research communities will inform future priorities and planning for Smart Peace learning, advocacy and communication.
 
Smart Peace partners include Conciliation Resources, Behavioural Insights Team, The Centre for Humanitarian Dialogue, Chatham House, ETH Zurich, International Crisis Group and The Asia Foundation.

Nilza Amaral

Project Manager, International Security Programme




an

POSTPONED: Working Towards Cyber Resilience in the GCC: Opportunities and Challenges

Invitation Only Research Event

12 March 2020 - 9:00am to 5:00pm

Muscat, Oman

The GCC states have invested significantly in cybersecurity and have made large strides in protecting governments, businesses and individuals from cyber threats, with the aim of delivering on their ambitious national strategies and future visions. However, several challenges to cybersecurity and cyber resilience in the region persist, putting those ambitious plans at risk.

These challenges include the uneven nature of cybersecurity protections, the incomplete implementation of cybersecurity strategies and regulations, and the issues around international cooperation. Such challenges mean that GCC states need to focus on the more difficult task of cyber resilience, in addition to the simpler initial stages of cybersecurity capacity-building, to ensure they harness the true potential of digital technologies and mitigate associated threats.

Set against this background, this workshop will explore opportunities and challenges to cyber resilience in the GCC focusing on four main pillars:

1. Cyber resilience: in concept and in practice
2. Building an effective cybersecurity capacity
3. The potential of regional and international cooperation to cyber resilience
4. Deterrence and disruption: different approaches

This event will be held in collaboration with the Arab Regional Cybersecurity Centre (ARCC) and OMAN CERT.

PLEASE NOTE THIS EVENT IS POSTPONED UNTIL FURTHER NOTICE. 

Event attributes

Chatham House Rule

Esther Naylor

Research Assistant, International Security Programme
+44 (0)20 7314 3628




an

Cyber Security and Nuclear Weapons

This project aims to improve resilience in NATO’s nuclear weapons systems against cyber threats.

Cyber security is a vital part of the national and international strategic infrastructure and weapons systems. The increasing cyber capabilities of countries such as China, Russia and North Korea put the North Atlantic Treaty Organization’s (NATO’s) nuclear systems - capabilities that include nuclear command, control and communication, weapons systems and early warning systems - in danger.

There is an urgent need to study and address cyber challenges to nuclear assets within NATO and in key NATO countries. Greater awareness of the potential threats and vulnerabilities is key to improving preparedness and mitigating the risks of a cyber-attack on NATO nuclear weapons systems.

Chatham House produces research responding to the need for information on enhancing cybersecurity for command, control and communications. This project constitutes the beginning of the second phase of the Cyber Security of Nuclear Weapons Systems: Threats, Vulnerabilities and Consequences, a report published in January 2018 in partnership with the Stanley Foundation.

The project responds to the need both for more public information on cyber risks in NATO’s nuclear mission, and to provide policy-driven research to shape and inform nuclear policy within NATO member states and the Nuclear Planning Group.

This project is supported by the Ploughshares Fund and the Stanley Foundation.




an

Understanding NATO Obligations Under the NPT

The objective of the project is to understand Alliance obligations within the framework of nuclear non-proliferation and disarmament treaties.

Examining obligations under the Treaty on the Non-Proliferation of Nuclear Weapons (NPT), and exploring new approaches that NATO could adopt to reconcile strategic stability with nuclear disarmament policies which could be introduced at the 2020 NPT Review Conference (RevCon).

The project facilitates the reconciliation of different positions in advance of the RevCon by providing a platform for stakeholders to communicate their respective positions and engage in constructive dialogue. Key research findings and contemporary analysis will be disseminated to officials and the policy community.

Through dialogue and research, the project aims to reduce polarisation in the nuclear field and consequently lay a foundation for increased collaboration during the discussions. It also provides a unique opportunity for NATO countries to explore specific new approaches, including in relation to identifying and analysing relevant geopolitical conditions for nuclear disarmament measures that will inform their inputs into the RevCon and related policy framework discussions.

This project is supported by the Carnegie Corporation of New York.




an

Predictions and Policymaking: Complex Modelling Beyond COVID-19

1 April 2020

Yasmin Afina

Research Assistant, International Security Programme

Calum Inverarity

Research Analyst and Coordinator, International Security Programme
The COVID-19 pandemic has highlighted the potential of complex systems modelling for policymaking but it is crucial to also understand its limitations.

GettyImages-1208425931.jpg

A member of the media wearing a protective face mask works in Downing Street where Britain's Prime Minister Boris Johnson is self-isolating in central London, 27 March 2020. Photo by TOLGA AKMEN/AFP via Getty Images.

Complex systems models have played a significant role in informing and shaping the public health measures adopted by governments in the context of the COVID-19 pandemic. For instance, modelling carried out by a team at Imperial College London is widely reported to have driven the approach in the UK from a strategy of mitigation to one of suppression.

Complex systems modelling will increasingly feed into policymaking by predicting a range of potential correlations, results and outcomes based on a set of parameters, assumptions, data and pre-defined interactions. It is already instrumental in developing risk mitigation and resilience measures to address and prepare for existential crises such as pandemics, prospects of a nuclear war, as well as climate change.

The human factor

In the end, model-driven approaches must stand up to the test of real-life data. Modelling for policymaking must take into account a number of caveats and limitations. Models are developed to help answer specific questions, and their predictions will depend on the hypotheses and definitions set by the modellers, which are subject to their individual and collective biases and assumptions. For instance, the models developed by Imperial College came with the caveated assumption that a policy of social distancing for people over 70 will have a 75 per cent compliance rate. This assumption is based on the modellers’ own perceptions of demographics and society, and may not reflect all societal factors that could impact this compliance rate in real life, such as gender, age, ethnicity, genetic diversity, economic stability, as well as access to food, supplies and healthcare. This is why modelling benefits from a cognitively diverse team who bring a wide range of knowledge and understanding to the early creation of a model.

The potential of artificial intelligence

Machine learning, or artificial intelligence (AI), has the potential to advance the capacity and accuracy of modelling techniques by identifying new patterns and interactions, and overcoming some of the limitations resulting from human assumptions and bias. Yet, increasing reliance on these techniques raises the issue of explainability. Policymakers need to be fully aware and understand the model, assumptions and input data behind any predictions and must be able to communicate this aspect of modelling in order to uphold democratic accountability and transparency in public decision-making.

In addition, models using machine learning techniques require extensive amounts of data, which must also be of high quality and as free from bias as possible to ensure accuracy and address the issues at stake. Although technology may be used in the process (i.e. automated extraction and processing of information with big data), data is ultimately created, collected, aggregated and analysed by and for human users. Datasets will reflect the individual and collective biases and assumptions of those creating, collecting, processing and analysing this data. Algorithmic bias is inevitable, and it is essential that policy- and decision-makers are fully aware of how reliable the systems are, as well as their potential social implications.

The age of distrust

Increasing use of emerging technologies for data- and evidence-based policymaking is taking place, paradoxically, in an era of growing mistrust towards expertise and experts, as infamously surmised by Michael Gove. Policymakers and subject-matter experts have faced increased public scrutiny of their findings and the resultant policies that they have been used to justify.

This distrust and scepticism within public discourse has only been fuelled by an ever-increasing availability of diffuse sources of information, not all of which are verifiable and robust. This has caused tension between experts, policymakers and public, which has led to conflicts and uncertainty over what data and predictions can be trusted, and to what degree. This dynamic is exacerbated when considering that certain individuals may purposefully misappropriate, or simply misinterpret, data to support their argument or policies. Politicians are presently considered the least trusted professionals by the UK public, highlighting the importance of better and more effective communication between the scientific community, policymakers and the populations affected by policy decisions.

Acknowledging limitations

While measures can and should be built in to improve the transparency and robustness of scientific models in order to counteract these common criticisms, it is important to acknowledge that there are limitations to the steps that can be taken. This is particularly the case when dealing with predictions of future events, which inherently involve degrees of uncertainty that cannot be fully accounted for by human or machine. As a result, if not carefully considered and communicated, the increased use of complex modelling in policymaking holds the potential to undermine and obfuscate the policymaking process, which may contribute towards significant mistakes being made, increased uncertainty, lack of trust in the models and in the political process and further disaffection of citizens.

The potential contribution of complexity modelling to the work of policymakers is undeniable. However, it is imperative to appreciate the inner workings and limitations of these models, such as the biases that underpin their functioning and the uncertainties that they will not be fully capable of accounting for, in spite of their immense power. They must be tested against the data, again and again, as new information becomes available or there is a risk of scientific models becoming embroiled in partisan politicization and potentially weaponized for political purposes. It is therefore important not to consider these models as oracles, but instead as one of many contributions to the process of policymaking.




an

Iran Crisis: The Impact on Oil Markets

14 January 2020

Professor Paul Stevens

Distinguished Fellow, Energy, Environment and Resources Programme
The assassination of Qassem Soleimani has exacerbated the sensitivity of oil markets to political events and brought geopolitics back into global oil prices.

2020-01-14-Hormuz.jpg

Satellite image of the Strait of Hormuz. Photo: Getty Images.

The assassination of General Qassem Soleimani has created much speculation about the possible impact on oil markets and – although any impact will very much depend upon what happens next in terms of political and military responses – theoretically the potential exists for Iran to seriously destabilize oil markets, raising oil prices.

Arguably, it would be in Iran’s interest to do so. It would certainly hurt Trump’s possibility of a second term if higher prices were to last for some time as the 2020 presidential election gets underway. And it would also help shore up Iran’s failing economy. 

The assassination did initially cause oil prices to rise by a few dollars before quickly falling back, and the missile attacks by Iran produced a similar response. However, direct action by Iran to raise prices – for example by trying to close the Strait of Hormuz – is unlikely.

Around one-fifth of the world's oil supplies passes through the Strait of Hormuz, a narrow choke point between Iran and the Arabian Peninsula. Closing it would invite serious military action by the Americans and many of its allies who, so far, have been rather lukewarm over Trump’s actions. It would also possibly limit Iran’s own oil exports.

Similarly, overt attacks on American allies in the region such as Saudi Arabia and the UAE would probably invite too heavy a reaction, although this is uncertain given the lack of response after the alleged Iranian attacks on Abqaiq and Khurais in mid-September.

Indirect action by Iran to affect oil supplies is much more likely as they have many options by using their proxies to affect others’ oil production. This is especially true for Iraq, which is now an important source of global oil supply as Iraqi exports in 2019 averaged 3.53 million barrels per day (Mb/d), a significant amount.

Iraq’s future production has already been damaged as international oil companies are withdrawing staff for safety reasons, anticipating potential attacks by both Iraqi and Iranian sources. It is now very unlikely that the crucial ‘common seawater supply project’ being run by Exxon – essential for expanding production capacity – will go ahead in the near future.

However, one important consequence of the assassination that has attracted little attention is that it has almost fully restored the role of geopolitics into the determination of oil prices. Up to 2014, geopolitics played a key role in determining oil prices in the paper markets where perceptions and expectations ruled.

Prices determined in these markets – NYMEX in New York, ICE in London and other lesser futures markets throughout the world – then influence wet barrel markets where real barrels of oil are traded. 

In 2014, the world was so oversupplied with real oil barrels that the oil price collapsed – the price of Brent crude fell from $110.72 on 23 May to $46.44 eight months later. Thereafter, little if any attention was given to geopolitical events, and geopolitics became marginalized in the determination of crude oil prices.

This began to change in 2019. The market remained physically over-supplied but events in the Gulf began to attract attention. In June, there were a series of attacks on oil tankers close to the Gulf, followed by attacks on Saudi Arabia’s Abqaiq processing facility and the Khurais oil field in September.

The Americans claimed these attacks were launched by Iran, but no convincing evidence for the claim was provided. Both attacks produced an initial price response but it was surprisingly limited and short-lived. However, it did suggest that geopolitics might be creeping back into influencing oil prices.

This became ever more noticeable in the third and fourth quarters as rumours regarding the trade talks between China and US clearly began to affect price – talks going well meant higher oil demand, and prices rose; talks going badly meant lower oil demand, and prices fell.

Meanwhile, the oil market showed signs of tightening towards the end of 2019. Although there was much cheating on the OPEC+ agreement that was trying to restrain production and protect prices, the OPEC meeting last December saw both Iraq and Nigeria agreeing to restrain production. 

US stock levels also began to fall in December and the futures markets began to price in a tightening market towards the end of 2020. Significantly, the tighter the market appears, the greater attention is paid to the level of spare producing capacity.

Just before the attack on Abqaiq, the International Energy Agency (IEA) estimated there was 3.5 Mb/d spare capacity in OPEC which, historically, is quite comfortable. However, 2.5 of this was estimated to be in Saudi Arabia, so how much of this spare capacity still existed after the Abqaiq attack?

The Saudis claimed the Abqaiq capacity was quickly restored but technical experts greeted this with considerable skepticism, not least because the Abqaiq equipment was highly specialized. If spare capacity is tight, this makes the oil price vulnerable to geopolitical scares and rumours, real or imagined. 

Although the assassination of General Soleimani has exacerbated the sensitivity of oil markets to geopolitical events, this becomes irrelevant if a serious shooting war starts in the region. Saudi Arabia, the UAE and Iraq’s oil infrastructure remains highly vulnerable to attack either directly by Iran or one of its many proxies, suggesting oil prices will become increasingly volatile but, at the same time, benefit from a rising geopolitical premium.




an

Oman’s New Sultan Needs to Take Bold Economic Steps

16 January 2020

Dr John Sfakianakis

Associate Fellow, Middle East and North Africa Programme
The country is in a good regional position, but the economy is at a crossroads.

2020-01-16-SultanHaitham2.jpg

Sultan Haitham bin Tariq speaks during a swearing in ceremony as Oman's new leader. Photo: Getty Images.

The transition of power in Oman from the deceased Sultan Qaboos to his cousin and the country’s new ruler, Sultan Haitham bin Tariq, has been smooth and quick, but the new sultan will soon find that he has a task in shoring up the country’s economic position.

Above all, the fiscal and debt profile of the country requires careful management. Fiscal discipline was rare for Oman even during the oil price spike of the 2000s. Although oil prices only collapsed in 2014, Oman has been registering a fiscal deficit since 2010, reaching a 20.6 per cent high in 2016. As long as fiscal deficits remain elevated, so will Oman’s need to finance those deficits, predominately by borrowing in the local and international market.

Oman’s Debt-to-GDP ratio has been rising at a worrying pace, from 4.9 per cent in 2014 to an IMF-estimated 59.8 per cent in 2019. By 2024, the IMF is forecasting the ratio to reach nearly 77 per cent. A study by the World Bank found that if the debt-to-GDP ratio in emerging markets exceeds 64 per cent for an extended period, it slows economic growth by as much as 2 per cent each year.

Investors are willing to lend to Oman, but the sultanate is paying for it in terms of higher spreads due to the underlying risk markets are placing on the rising debt profile of the country. For instance, Oman has a higher sovereign debt rating than Bahrain yet markets perceive it to be of higher risk, making it costlier to borrow. Failure to address the fiscal and debt situation also risks creating pressure on the country’s pegged currency.

If oil revenues remain low, Sultan Haitham will have to craft a daring strategy of diversification and private sector growth. He is well placed for this: Sultan Haitham headed Oman’s Vision 2040, which set out the country’s future development plans and aspirations, the first Gulf country to embark on such an assessment. However, like all vision documents in the Gulf, Oman’s challenge will be implementation.

In the age of climate change, renewable energy is a serious economic opportunity, which Oman has to keep pursuing. If cheap electricity is generated it could also be exported to other Gulf states and to south Asia. In Oman, the share of renewables in total electricity capacity was around 0.5 per cent in 2018; the ambition is to reach 10 per cent by 2025.

However, in order to reach this target, Oman would have to take additional measures such as enhancing its regulatory framework, introducing a transparent and gradual energy market pricing policy and integrating all stakeholders, including the private sector, into a wider national strategy.

Mining could provide another economic opportunity for Oman’s diversification efforts, with help from a more robust mining law passed last year. The country has large deposits of metals and industrial minerals and its mountains could have gold, palladium, zinc, rare earths and manganese.

Oman’s strategic location connecting the Gulf and Indian Ocean with east Africa and the Red Sea could also boost the country’s economy. The Duqm special economic zone, which is among the largest in the world, could become the commercial thread between Oman, south Asia and China’s ‘Belt and Road Initiative.’

Oman has taken important steps to make its economy more competitive and conducive to foreign direct investment. Incentives include a five-year renewable tax holiday, subsidized plant facilities and utilities, and custom duties relief on equipment and raw materials for the first 10 years of a firm’s operation in Oman.

A private sector economic model that embraces small- and medium-sized enterprises as well as greater competition and entrepreneurship would help increase opportunities in Oman. Like all other Gulf economies, future employment in Oman will have to be driven be the private sector, as there is little space left to grow the public sector.

Privatization needs to continue. Last year’s successful sale of 49 per cent of the electricity transmission company to China’s State Grid is a very positive step. The electricity distribution company as well as Oman Oil are next in line for some form of partial privatization.

The next decade will require Oman to be even more adept in its competitiveness as the region itself tries to find its new bearings. Take tourism for instance; Oman hopes to double its contribution to GDP from around 3 per cent today to 6 per cent by 2040 and the industry is expected to generate half a million jobs by then. Over the next 20 years, Oman will most likely be facing stiff competition in this area not only by the UAE but by Saudi Arabia as well.

The new sultan has an opportunity to embark on deeper economic reforms that could bring higher growth, employment opportunities and a sustainable future. But he has a big task.




an

Prospects for Reforming Libya’s Economic Governance: Ways Forward

Invitation Only Research Event

6 February 2020 - 10:30am to 12:30pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Jason Pack, Non-Resident Fellow, Middle East Institute
Tim Eaton, Senior Research Fellow, Middle East and North Africa Programme, Chatham House
Chair: Elham Saudi, Director, Lawyers for Justice Libya

There is a broad consensus that Libya’s rentier, patronage-based system of governance is a driver, and not only a symptom, of Libya’s continuing conflict. The dysfunction of Libya’s economic system of governance has been exacerbated by the governance split that has prevailed since 2014 whereby rival administrations of state institutions have emerged. Despite these challenges, a system of economic interdependence, whereby forces aligned with Field Marshal Haftar control much of the oil and gas infrastructure and the UN-backed Government of National Accord controls the means of financial distribution, has largely prevailed. Yet, at the time of writing, this is under threat: a damaging oil blockade is being implemented by forces aligned with Haftar and those state institutions that do function on a national basis are finding it increasingly difficult to avoid being dragged into the conflict.

This roundtable will bring together analysts and policymakers to discuss these dynamics and look at possible remedies. Jason Pack, non-resident fellow at the Middle East Institute, will present the findings of his latest paper on the issue which recommends the formation of 'a Libyan-requested and Libyan-led International Financial Commission vested with the requisite authorities to completely restructure the economy.' Tim Eaton, who has been leading Chatham House’s work on Libya’s conflict economy, supporting UNSMIL’s efforts in this field, will act as respondent.

Attendance at this event is by invitation only. 

Event attributes

Chatham House Rule




an

Iran Workshop Series: Domestic, Regional and International Outlook

Invitation Only Research Event

17 December 2019 - 10:00am to 3:30pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

After a summer of regional tensions and continued uncertainty regarding the future of the JCPOA, the Chatham House MENA Programme held a closed workshop to examine the impact of the Trump administration’s maximum pressure campaign.

Discussions focused on the domestic developments and challenges inside Iran, prospects for new negotiations with Iran, and the regional issues facing the country. Participants also considered the differences between American and European approaches towards Iran.

 

Event attributes

Chatham House Rule

Reni Zhelyazkova

Programme Coordinator, Middle East and North Africa Programme
+44 (0)20 7314 3624




an

Conflict and the Water Crisis in Iraq

Invitation Only Research Event

9 March 2020 - 9:00am to 10:30am

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Dr Azzam Alwash, Founder & CEO, Nature Iraq
Peter Schwartzstein, Independent Journalist; Non-Resident Fellow, Centre for Climate Security
Discussant: Dr Jehan Baban, Founder & President, The Iraqi Environment and Health Society-UK
Chair: Dr Glada Lahn, Senior Research Fellow, Energy, Environment and Resources Department, Chatham House

Water is a critical issue for Iraq’s future stability and prosperity. Only a few decades ago, the country was one of the most fertile in the region, with two major rivers flowing through it. Today, national and transboundary pollution, mismanagement, and debilitating cycles of conflict have contributed to a situation where only half of current water needs are being met, and where an 80% reduction in the flow of water down the Tigris and Euphrates rivers has led to the loss of millions of acres of formerly productive land and the displacement of rural communities.

Water scarcity can be a driver of violence and conflict. Tribal conflicts over water sources have erupted sporadically in the south and the contamination of municipal water which led to the hospitalization of some 118,000 citizens was a trigger for the large-scale protests in Basra in late 2018. Without concerted action by national and local governments, companies and international agencies, the situation will only worsen as higher temperatures and reduced rainfall drive rural-to-urban migration and increase the risk of drought, food insecurity and water-related diseases.

At this roundtable, part of the Chatham House Iraq Initiative, experts will discuss the domestic, regional and international factors that continue to exacerbate the water crisis in Iraq, and propose solutions, including technical innovation, public sector capacity-building and greater international cooperation, that might contribute to effective state-building, build resilience to the effects of climate change and reduce the risk of further conflict.

Event attributes

Chatham House Rule

Georgia Cooke

Project Manager, Middle East and North Africa Programme
+44 (0)20 7957 5740




an

Lebanon Is Paying the Cost of Its Dysfunctional Politics

26 February 2020

Nadim Shehadi

Associate Fellow, Middle East and North Africa Programme
A series of fights to political stalemate have led its economy to the brink and cut it off from its natural economic partners in the Gulf.

2020-02-25-Leb1.jpg

Protests against economic conditions and government inaction turned violent in January. Photo: Getty Images.

To understand Lebanon’s financial collapse, look to its politics.

The country has been deeply damaged by an increasingly dysfunctional political system. A series of compromises have alienated it from its main markets in the Gulf and strangled its economy; anyone that has glanced at fluctuations in Lebanese bank deposits over the last 10 years can see the correlation.

Imagine if Boris Johnson or Donald Trump were obliged to form joint governments with Jeremy Corbyn or Bernie Sanders. The result would be paralysis and lack of accountability as each party pulls the country in opposite directions and blames the other for the state of limbo. This has been the state of affairs in Lebanon since the Doha agreement of 2008. 

That agreement followed an 18-month siege that paralyzed Beirut and an attack on the city by Hezbollah’s ‘black shirts’. The Doha formula imposed governments of national unity between Prime Minister Saad Hariri’s pro-Saudi camp and Hezbollah’s pro-Iran camp and their respective internal allies.

The pattern was set: each period of subsequent paralysis was followed by further compromise as the tug of war pulled the country away from its principal economic partners, the Arab Gulf states, with the regional balance of power tilting towards Hezbollah. 

It was not supposed to be like this. The Baabda Declaration in June 2012, reached after a process of national dialogue, was meant to secure Lebanon’s neutrality in regional conflicts, with both sides promising to hold back on external alliances and coexist despite difference over major regional issues like the war in Syria, the standoff between the US and Iran or relations with Israel or the Gulf states.

This has worn away. The Baabda declaration itself became a sham when Hezbollah inserted itself into the war in Syria in support of the Assad regime and overtly got involved in Iraq and Yemen as an Iranian proxy. This was followed by Saudi opposition to concessions by Hariri that led to the election of General Michel Aoun, an ally of Hezbollah, as president in October 2016; again, after a political paralysis that lasted 29 months with no active government and no head of state.  

The Saudis were also furious when President Aoun’s son-in-law, Foreign Minister Gebran Bassil, abstained from condemning the burning of the Saudi embassy in Tehran at an Arab League meeting in Cairo in January 2016, citing the need to preserve national unity.

Fearing that he was simply providing Hezbollah with protection in the guise of compromise, the Saudis pressured Hariri to resign in November 2017 during a trip to Riyadh, but he later challenged that by retracting on his resignation when back in Beirut. Lebanon was caught between two sides, and as the regional conflict intensified from tension to open confrontation, neutrality was no longer an option.

Gulf connections

An estimated 350,000 Lebanese expats live and work in Saudi Arabia, the UAE, Qatar and Kuwait. These countries are also the main clients for Lebanese contractors, consultants and advertising companies, some of which have offices there. The domestic tourism industry relies heavily on Arab Gulf visitors and they are a principal source of foreign investments especially in the real estate sector.

Lebanon also enjoyed a certain degree of political and economic protection from the US and the Gulf, and Hezbollah benefited indirectly from that protection, as it also shielded it to a certain degree from sanctions.

The deterioration of relations meant that the country was cut off by its Gulf partners. This was manifested in travel bans for Gulf Cooperation Council (GCC) nationals to Lebanon and a decrease in investments and bank deposits, as well as a decrease in remittances from Lebanese expats, partly because of economic crisis in the Gulf countries themselves.

Saudi Arabia withdrew $4 billion of aid to the Lebanese army and internal security forces, and no aid or deposits were forthcoming as the economic and financial situation deteriorated. 

The costs to the Lebanese economy include the opportunity cost created by the annual threat of war with Israel, after which trips are cancelled and projects postponed. Hezbollah also controls a section of Beirut port where it pays no duty or taxes. Add to that the economic fallout from the war in Syria, such as the impact on exports, the inflow of refugees and the cost of Hezbollah’s involvement.

The burden of these political factors is difficult to estimate but it constitutes the ransom that the Lebanese economy bears as a cost of the compromise. This is not to absolve Lebanese politicians from corruption or bankers of mismanagement but to add that political factors cannot be ignored.

The cumulative cost and economic impact of being cut off from its main economic partner eventually bankrupted the country. The fiscal and financial aspects, with Lebanon’s inability to service its debt, are but a reflection of these political factors. In the long run, the key to avoiding complete collapse is to restore relations with the GCC and free Lebanon from that very costly grip.




an

Expanding Sino–Maghreb Relations: Morocco and Tunisia

26 February 2020

Over the past two decades, China has increased its presence in North Africa in terms of trade and investment. This paper looks at China’s policy within the context of its Africa and Middle East policies to better understand its approach to Morocco and Tunisia.

Yahia H. Zoubir

Senior Professor of International Studies, KEDGE Business School, France and Visiting Fellow, Brookings Doha Center

2020-02-26-Xi-Jinping-King-Mohammed.jpg

Chinese President Xi Jinping and King Mohammed VI of Morocco wave during a welcoming ceremony outside the Great Hall of the People in Beijing on 11 May 2016. Photo: Getty Images.

Summary

  • China’s presence in the Maghreb has increased in recent years, raising concerns among Western powers. China has focused on bilateral relations with these countries while also working within the Forum on China–Africa Cooperation (FOCAC) and the China–Arab States Cooperation Forum (CASCF). However, this engagement has limited strategic value compared to relations China has with Saudi Arabia or the United Arab Emirates.
  • Since the launch of the Belt and Road Initiative (BRI) in 2013, China has shown greater interest in the Maghreb as an entry point to European and African markets. China has pursued commercial relations over political influence in the region. Morocco and Tunisia are still dependent on France, their former colonial power, and the European Union, which exert great political, economic, security and cultural influence over the two countries.
  • The Maghreb countries’ economic relations with China have grown exponentially, with Algeria forming the closest relationship. However, Morocco and Tunisia are keen to attract China’s investment and involvement in major construction and infrastructure projects to boost industrial and economic development. While China’s investments in Morocco and Tunisia remain at a low level, trade relations with both countries have grown steadily. Politically, China’s policy of noninterference in domestic affairs appeals to Maghreb states, which resent Western interference.
  • China’s influence in the Maghreb remains minimal. Its soft power push has struggled to promote advantages of strong relations with China beyond economics. Furthermore, Morocco and Tunisia’s populations have generally scant knowledge about China’s politics and culture. China has tried to address this lack of familiarity through the establishment of Confucius Institutes and other cultural activities. However, language and cultural barriers still impede the development of close relations, compared to those China has with other countries in Africa.




an

POSTPONED: Libya: Political Fragmentation, War and Foreign Intervention

Members Event

24 March 2020 - 6:00pm to 7:00pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Dr Wolfram Lacher, Senior Associate, German Institute for International and Security Affairs; Author, Libya's Fragmentation: Structure and Process in Violent Conflict
Chair: Maryam Nemazee, Anchor, Al Jazeera

Further speakers to be announced.

PLEASE NOTE THIS EVENT IS POSTPONED UNTIL FURTHER NOTICE.

 

Libya's third bout of civil war in a decade began when Khalifa Haftar's Libyan Arab Armed Forces (LAAF) launched an offensive on Tripoli in April 2019. Since then, a growing number of foreign states have intervened ever more deeply in the conflict. Warring Libyan armed factions, broadly aligned with either the internationally recognized Government of National Accord or the LAAF, have become increasingly reliant on foreign support to prosecute their war effort.  

Against this backdrop, the panellists will reflect on the forces that have shaped Libya’s trajectory since 2011. As the prospects for international mediation remain bleak, what motivations and grievances are driving the country’s warring parties? How can this war be explained beyond a scramble for the control of Libya’s oil wealth? And are Libyans at risk of being mere pawns in a proxy war?

 

Members Events Team




an

Unpacking the role of religion in political transnationalism: the case of the Shi'a Iraqi diaspora since 2003

4 March 2020 , Volume 96, Number 2

Oula Kadhum

This article explores the role of religion in political transnationalism using the case of the Shi'a Iraqi diaspora since 2003. The article focuses on three areas that capture important trends in Shi'a transnationalism and their implications for transnational Shi'a identity politics. These include Shi'a diasporic politics, transnational Shi'a civic activism, and the cultural production of Iraqi Shi'a identity through pilgrimages, rituals and new practices. It is argued that understanding Shi'a Islam and identity formation requires adopting a transnational lens. The evolution of Shi'a Islam is not only a result of the dictates of the Shi'a clerical centres, and how they influence Shi'a populations abroad, but also the transnational interrelationships and links to holy shrine cities, Shi'i national and international politics, humanitarianism and commemorations and rituals. The article demonstrates that Shi'a political transnationalism is unexceptional in that it echoes much of the literature on diasporic politics and development where diaspora involve themselves from afar in the politics and societies of their countries of origin. At the same time, it shows the exceptionalism of Shi'a diasporic movements, in that their motivations and mobilizations are contributing to the reification of sectarian geographical and social borders, creating a transnationalism that is defined by largely Shi'a networks, spaces, actors and causes. The case of Shi'a political transnationalism towards Iraq shows that this is increasing the distance between Shi'is and Iraq's other communities, simultaneously fragmenting Iraq's national unity while deepening Shi'a identity and politics both nationally and supra-nationally.




an

POSTPONED: The Development of Libyan Armed Groups since 2014: Community Dynamics and Economic Interests

Invitation Only Research Event

18 March 2020 - 9:00am to 10:30am

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Abdul Rahman Alageli, Associate Fellow, MENA Programme, Chatham House
Emaddedin Badi, Non-Resident Scholar, Middle East Institute
Tim Eaton, Senior Research Fellow, MENA Programme Chatham House
Valerie Stocker, Independent Researcher

Since the overthrow of the regime of Muammar Gaddafi in 2011, Libya’s multitude of armed groups have followed a range of paths. While many of these have gradually demobilized, others have remained active, and others have expanded their influence. In the west and south of the country,  armed groups have used their state affiliation to co-opt the state and professionals from the state security apparatus into their ranks.

In the east, the Libyan Arab Armed Forces projects a nationalist narrative yet is ultimately subservient to its leader, Field Marshal Khalifa Haftar. Prevailing policy narratives presuppose that the interests of armed actors are distinct from those of the communities they claim to represent. Given the degree to which most armed groups are embedded in local society, however, successful engagement will need to address the fears, grievances and desires of the surrounding communities, even while the development of armed groups’ capacities dilutes their accountability to those communities.

This roundtable will discuss the findings of a forthcoming Chatham House research paper, ‘The Development of Libyan Armed Groups Since 2014: Community Dynamics and Economic Interests’, which presents insights from over 200 interviews of armed actors and members of local communities and posits how international policymakers might seek to curtail the continued expansion of the conflict economy.

PLEASE NOTE THIS EVENT IS POSTPONED UNTIL FURTHER NOTICE.

Event attributes

Chatham House Rule

Georgia Cooke

Project Manager, Middle East and North Africa Programme
+44 (0)20 7957 5740




an

POSTPONED: Russia in MENA: An Update

Invitation Only Research Event

26 March 2020 - 9:30am to 11:00am

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Nikolay Kozhanov, Research Associate Professor, Gulf Studies Center, Qatar University; Consulting Fellow, Russia and Eurasia Programme, Chatham House 
Chair: Sanam Vakil, Senior Research Fellow, Project Director, Future Dynamics of the Gulf, Middle East & North Africa Programme, Chatham House

Russia’s Middle East policy is driven by a complex mixture of traditional factors (such as the ongoing confrontation with the West) and new trends. The Kremlin is keen to maintain its position as an influential external broker. However, it is not confident Russia would be able to respond effectively if forced into a reactive mode by other regional players. The Kremlin therefore seeks to retain initiative and shape the agenda according to its needs and resources. This makes prediction of Moscow’s next moves in the region a challenging, but not impossible, task.

Nikolay Kozhanov will offer remarks on the changes that have taken place in Russia’s strategy since the publication of his research paper Russian Policy Across the Middle East: Motivations and Methods (2018).

PLEASE NOTE THIS EVENT IS POSTPONED UNTIL FURTHER NOTICE.

Event attributes

Chatham House Rule

Anna Morgan

Administrator, Ukraine Forum
+44 (0)20 7389 3274




an

The Development of Libyan Armed Groups Since 2014: Community Dynamics and Economic Interests

17 March 2020

This paper explores armed group–community relations in Libya and the sources of revenue that have allowed armed groups to grow in power and influence. It draws out the implications for policy and identifies options for mitigating conflict dynamics.

Tim Eaton

Senior Research Fellow, Middle East and North Africa Programme

Abdul Rahman Alageli

Associate Fellow, Middle East and North Africa Programme

Emadeddin Badi

Policy Leader Fellow, School of Transnational Governance, European University Institute

Mohamed Eljarh

Co-founder and CEO, Libya Outlook

Valerie Stocker

Researcher

Amru_24-2_13.jpg

Fighters of the UN-backed Government of National Accord patrol in Ain Zara suburb in Tripoli, February 2020. Photo: Amru Salahuddien

Summary

  • Libya’s multitude of armed groups have followed a range of paths since the emergence of a national governance split in 2014. Many have gradually demobilized, others have remained active, and others have expanded their influence. However, the evolution of the Libyan security sector in this period remains relatively understudied. Prior to 2011, Libya’s internal sovereignty – including the monopoly on force and sole agency in international relations – had been personally vested in the figure of Muammar Gaddafi. After his death, these elements of sovereignty reverted to local communities, which created armed organizations to fill that central gap. National military and intelligence institutions that were intended to protect the Libyan state have remained weak, with their coherence undermined further by the post-2014 governance crisis and ongoing conflict. As a result, the most effective armed groups have remained localized in nature; the exception is the Libyan Arab Armed Forces (LAAF), which has combined and amalgamated locally legitimate forces under a central command.
  • In the west and south of the country, the result of these trends resembles a kind of inversion of security sector reform (SSR) and disarmament, demobilization and reintegration (DDR): the armed groups have used their state affiliation to co-opt the state and professionals from the state security apparatus into their ranks; and have continued to arm, mobilize and integrate themselves into the state’s security apparatus without becoming subservient to it. In the eastern region, the LAAF projects a nationalist narrative yet is ultimately subservient to its leader, Field Marshal Khalifa Haftar. The LAAF has co-opted social organizations to dominate political and economic decision-making.
  • The LAAF has established a monopoly over the control of heavy weapons and the flow of arms in eastern Libya, and has built alliances with armed groups in the east. Armed groups in the south have been persuaded to join the LAAF’s newly established command structure. The LAAF’s offensive on the capital, which started in April 2019, represents a serious challenge to armed groups aligned with the Tripoli-based Government of National Accord (GNA). The fallout from the war will be a challenge to the GNA or any future government, as groups taking part in the war will expect to be rewarded. SSR is thus crucial in the short term: if the GNA offers financial and technical expertise and resources, plus legal cover, to armed groups under its leadership, it will increase the incentive for armed groups to be receptive to its plans for reform.
  • Prevailing policy narratives presuppose that the interests of armed actors are distinct from those of the communities they claim to represent. Given the degree to which most armed groups are embedded in local society, however, successful engagement will necessarily rely on addressing the fears, grievances and desires of the surrounding communities. Yet the development of armed groups’ capacities, along with their increasing access to autonomous means of generating revenue, has steadily diluted their accountability to local communities. This process is likely to be accelerated by the ongoing violence around Tripoli.
  • Communities’ relationship to armed groups varies across different areas of the country, reflecting the social, political, economic and security environment:
  • Despite their clear preference for a more formal, state-controlled security sector, Tripoli’s residents broadly accept the need for    the presence of armed groups to provide security. The known engagement of the capital’s four main armed groups in criminal activity is a trade-off that many residents seem able to tolerate, providing that overt violence remains low. Nonetheless, there is a widespread view that the greed of Tripoli’s armed groups has played a role in stoking the current conflict.
  • In the east, many residents appear to accept (or even welcome) the LAAF’s expansion beyond the security realm, provided that it undertakes these roles effectively. That said, such is the extent of LAAF control that opposition to the alliance comes at a high price.
  • In the south, armed groups draw heavily on social legitimacy, acting as guardians of tribal zones of influence and defenders of their respective communities against outside threats, while also at times stoking local conflicts. Social protections continue to hold sway, meaning that accountability within communities is also limited.
  • To varying extents since 2014, Libya’s armed groups have developed networks that enmesh political and business stakeholders in revenue-generation models:
  • Armed groups in Tripoli have compensated for reduced financial receipts from state budgets by cultivating unofficial and illicit sources of income. They have also focused on infiltrating state institutions to ensure access to state budgets and contracts dispersed in the capital.
  • In the east of the country, the LAAF has developed a long-term strategy to dominate the security, political and economic spheres through the establishment of a quasi-legal basis for receiving funds from Libya’s rival state authorities. It has supplemented this with extensive intervention in the private sector. External patronage supports military operations, but also helps to keep this financial system, based on unsecured debt, afloat.
  • In the south, limited access to funds from the central state has spurred armed groups to become actively involved in the economy. This has translated into the taxation of movement and the imposition of protection fees, particularly on informal (and often illicit) activity.
  • Without real commitment from international policymakers to enforcing the arms embargo and protecting the economy from being weaponized, Libya will be consigned to sustained conflict, further fragmentation and potential economic collapse. Given the likely absence of a political settlement in the short term, international policymakers should seek to curtail the continued expansion of the conflict economy by reducing armed groups’ engagement in economic life.
  • In order to reduce illicit activities, international policymakers should develop their capacity to identify and target chokepoints along illicit supply chains, with a focus on restraining activities and actors in closest proximity to violence. Targeted sanctions against rent maximizers (both armed and unarmed) is likely to be the most effective strategy. More effective investigation and restraint of conflict economy actors will require systemic efforts to improve transparency and enhance the institutional capacity of anti-corruption authorities. International policymakers should also support the development of tailored alternative livelihoods that render conflict economy activities less attractive.




an

Webinar: OPEC, Falling Oil Prices and COVID-19

Corporate Members Event Webinar

7 April 2020 - 1:00pm to 2:00pm

Online

Event participants

Julian Lee, Oil Strategist, Bloomberg LP London
Dr John Sfakianakis, Associate Fellow, Middle East and North Africa Programme, Chatham House; Chief Economist and Head of Research, Gulf Research Center
Professor Paul Stevens, Distinguished Fellow, Energy, Environment and Resources Programme, Chatham House
Emily Stromquist, Director, Castlereagh Associates
Chair: Dr Sanam Vakil, Deputy Director and Senior Research Fellow, Middle East and North Africa Programme, Chatham House

In early March, global oil prices fell sharply, hitting lows of under $30 a barrel. Two factors explain this collapse: firstly the decrease in global demand for oil as a result of the COVID-19 pandemic and, secondly, the breakdown in OPEC-Russian relations and the subsequent Saudi-Russian price war which has seen both countries move to flood the market with cheap oil.
 
Against this backdrop, the panellists will reflect on the challenges currently facing OPEC as well as the oil industry as a whole. How are OPEC countries affected by the ever-evolving Covid-19 pandemic? What are the underlying causes behind the Saudi-Russian price war? Is the conflict likely to be resolved soon? And what are the implications of these challenges for the oil industry?

This event is part of a fortnightly series of 'Business in Focus' webinars reflecting on the impact of COVID-19 on areas of particular professional interest for our corporate members and giving circles.

Not a corporate member? Find out more.




an

Webinar: Can the Justice and Development Party Still Absorb Popular Anger in Morocco?

Webinar Research Event

8 April 2020 - 1:00pm to 2:00pm

Event participants

Mohammed Masbah, Director, Moroccan Institute for Policy Analysis; Associate Fellow, MENA Programme, Chatham House
Moderator: Lina Khatib, Director, MENA Programme, Chatham House

Ever since independence, the Moroccan monarchy has used political parties to legitimize the country’s authoritarian political process and structure, and to absorb social and political anger. The palace puts successive governments and other elected institutions, such as local and regional councils, at the frontline of public blame, and replaces them once they fail this function.

In a recent article, MENA Programme Associate Fellow, Mohammed Masbah, examines how the Moroccan monarchy has used this strategy with the ruling Justice and Development Party (PJD) so that the palace remains the centre of political power, while the PJD – and other political parties before it– takes responsibility for coping with the mounting socio-economic crisis.

In this webinar, part of the Chatham House project on The Future of the State in the Middle East and North Africa, the article’s author will discuss the risks this approach presents for the long-term stability of Morocco and what reforms are needed to increase citizens’ dwindling confidence in the political process.

You can express your interest in attending by following this link. You will receive a Zoom confirmation email should your registration be successful.




an

Webinar: The Environmental Crisis in the MENA Region – Impacts and Mitigation

Research Event

16 April 2020 - 11:30am to 12:30pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Glada Lahn, Senior Research Fellow, Energy, Environment and Resources Programme, Chatham House
Greg Shapland, Associate Fellow, Middle East and North Africa Programme, Chatham House 
Moderator: Sanam Vakil, Deputy Director and Senior Research Fellow, Middle East and North Africa Programme, Chatham House

The event will be livestreamed on the MENA Programme Facebook page.

Climate and environmental issues have largely been marginalized in discussions about the Middle East and North Africa region and yet are critical to peace and security. In this webinar, experts will explore mounting pressures including those related to water (reduced, less reliable and more polluted sources), extreme temperatures, air pollution, land degradation and sea-level rise. Panelists will discuss the potential impact of worsening environmental conditions and what the region's governments can do to protect the health and livelihoods of their peoples.

This webinar is part of the Chatham House MENA Programme's Online Event Series and will be held on the record.

Reni Zhelyazkova

Programme Coordinator, Middle East and North Africa Programme
+44 (0)20 7314 3624