ty Leading European computing society releases statement on COVID contact tracing By www.eurekalert.org Published On :: Thu, 07 May 2020 00:00:00 EDT (Association for Computing Machinery) Today, the ACM Europe Technology Policy Committee (Europe TPC) of the world's largest society of computing professionals, the Association for Computing Machinery (ACM), has released detailed principles and practices for the development and deployment of 'contact tracing' technology intended to track and arrest the spread of COVID-19. Full Article
ty The Maestro Project: A Patient Navigator for the Transition of Care for Youth With Type 1 Diabetes By spectrum.diabetesjournals.org Published On :: 2011-02-01 Norma Van WalleghemFeb 1, 2011; 24:9-13From Research to Practice/Transitions in Young Adults with Type 1 Diabetes Full Article
ty Going Mobile With Diabetes Support: A Randomized Study of a Text Message-Based Personalized Behavioral Intervention for Type 2 Diabetes Self-Care By spectrum.diabetesjournals.org Published On :: 2015-05-01 Korey CapozzaMay 1, 2015; 28:83-91Feature Articles Full Article
ty A Model of Community-Based Behavioral Intervention for Depression in Diabetes: Program ACTIVE By spectrum.diabetesjournals.org Published On :: 2010-01-01 Mary de GrootJan 1, 2010; 23:18-25From Research to Practice Full Article
ty A Novel Approach to Adolescents With Type 1 Diabetes: The Team Clinic Model By spectrum.diabetesjournals.org Published On :: 2015-02-01 Jennifer K. RaymondFeb 1, 2015; 28:68-71Care Innovations Full Article
ty A High Level of Patient Activation Is Observed But Unrelated to Glycemic Control Among Adults With Type 2 Diabetes By spectrum.diabetesjournals.org Published On :: 2010-07-01 Robert MayberryJul 1, 2010; 23:171-176Feature Articles Full Article
ty Depressive Affect Among Four Ethnic Groups of Male Patients With Type 2 Diabetes By spectrum.diabetesjournals.org Published On :: 2004-10-01 Lawrence FisherOct 1, 2004; 17:215-219Articles Full Article
ty Polypharmacy as a Risk Factor in the Treatment of Type 2 Diabetes By spectrum.diabetesjournals.org Published On :: 2006-01-01 Roger P. AustinJan 1, 2006; 19:13-16Pharmacy Update Full Article
ty Management of Type 1 Diabetes in Older Adults By spectrum.diabetesjournals.org Published On :: 2014-02-01 Ruban DhaliwalFeb 1, 2014; 27:9-20Research to Practice Full Article
ty Psychosocial Barriers to Diabetes Self-Management and Quality of Life By spectrum.diabetesjournals.org Published On :: 2001-01-01 Russell E. GlasgowJan 1, 2001; 14:Articles Full Article
ty Self-Management Goal Setting in a Community Health Center: The Impact of Goal Attainment on Diabetes Outcomes By spectrum.diabetesjournals.org Published On :: 2010-04-01 Daren R. AndersonApr 1, 2010; 23:97-105Feature Articles Full Article
ty Four Theories and a Philosophy: Self-Management Education for Individuals Newly Diagnosed With Type 2 Diabetes By spectrum.diabetesjournals.org Published On :: 2003-04-01 T. Chas SkinnerApr 1, 2003; 16:Lifestyle and Behavior Full Article
ty Autonomous Vehicles: Futurist Technologies in Markets and Society By www8.gsb.columbia.edu Published On :: Mon, 13 Jan 2020 17:00:21 +0000 What are the ethical, logistical and legal complexities that accompany Autonomous Vehicle technology—and what role should business strategists play in guiding AVs integration into business and society? Full Article
ty Reonomy: Selecting a Growth Strategy in New York City’s Proptech Sector By www8.gsb.columbia.edu Published On :: Fri, 20 Mar 2020 14:19:42 +0000 What strategic path would lead Reonomy, a successful commercial real estate proptech startup, to future growth and profitability within a reasonable time frame? Full Article
ty D’Angel raises J$225,000 from online charity concert By jamaica-star.com Published On :: Tue, 05 May 2020 05:01:17 -0500 The Lady of Dancehall, D'Angel, says although her COVID-19 Relief Concert did not meet its US$200,000 target, she is overwhelmed by the support. The event, held via Instagram Live last Friday, saw performances from the likes of Beenie Man, G... Full Article
ty Stylysh revives IG show By jamaica-star.com Published On :: Fri, 08 May 2020 05:01:34 -0500 Dancehall artiste Stylysh is set to restart her Instagram (IG) show, which is centred around love, sex, and relationships. Last season's guests included the likes of Shauna Chin, Destiny Sparta, and Gaza Sheba, who spoke candidly of her sexual... Full Article
ty Bad Gyal Jade gets boost from Bounty endorsement By jamaica-star.com Published On :: Fri, 08 May 2020 05:01:50 -0500 In an interview with THE STAR last August, up-and-coming artiste Bad Gyal Jade dubbed herself the 'female Kartel'. Drawing comparisons between her style and flow and that of the incarcerated deejay, Jade said the label was a fitting one. Though... Full Article
ty NYC Silkscreen Studio Swaps Fine Art Prints for Safety Signage By www8.gsb.columbia.edu Published On :: Wed, 22 Apr 2020 00:00:00 -0400 Gary Lichtenstein Editions has partnered with Urban Pathways to increase awareness and safety in the homeless community. Full Article
ty Proportionality in the Conduct of Hostilities: The Incidental Harm Side of the Assessment By feedproxy.google.com Published On :: Thu, 06 Dec 2018 14:56:29 +0000 10 December 2018 Clarification of international humanitarian law is important in ensuring compliance with the rule of proportionality, but a culture of compliance within armed forces and groups is also crucial. Download PDF Emanuela-Chiara Gillard Associate Fellow, International Law Programme 2018-12-10-ilp-proportionality-paper.jpg Members of civil right defence conduct a search and rescue operation on destroyed buildings after an airstrike was carried out over the city of Jisr al-Shughur in Idlib province in Syria, on 6 May 2018. Photo: Hadi Harrat/Anadolu Agency/Getty Images. SummaryMilitary operations are taking place with increasing frequency in densely populated areas. Such operations result in loss of life and harm to civilians, as well as damage to civilian objects, (including infrastructure providing essential services). In order to protect civilians, it is imperative that armed forces and groups comply with the rules of international humanitarian law on the conduct of hostilities, including the rule of proportionality.The rule of proportionality prohibits attacks which may be expected to cause incidental loss of civilian life, injury to civilians, damage to civilian objects or a combination thereof, which would be excessive in relation to the concrete and direct military advantage anticipated. This research paper analyses the key steps that belligerents must take to give effect to the rule, with a particular focus on one side of proportionality assessments – the expected incidental harm.Those undertaking proportionality assessments before or during an attack must consider whether the expected harm will be caused by the attack, and whether that harm could be expected (that is, was it reasonably foreseeable).For the purpose of proportionality assessments, injury to civilians includes disease, and there is no reason in principle to exclude mental harm, even though it is currently challenging to identify and quantify it. Damage to civilian objects includes damage to elements of the natural environment.Once the incidental harm to be considered has been identified, a value or weight must be assigned to it. This is then balanced against the value or weight of the military advantage anticipated from the attack to determine whether the harm would be excessive.In the determination of whether the expected incidental harm would be excessive compared to the anticipated military advantage, ‘excessive’ is a wide but not indeterminate standard.Belligerents should develop methodologies so that those planning and deciding attacks are provided with all necessary information on expected incidental harm, and to assist them in assigning weight to the incidental harm to be considered.If it becomes apparent that the rule of proportionality will be contravened, the attack in question must be cancelled or suspended.Clarification of the law is important in ensuring compliance with the rule of proportionality, but a culture of compliance within armed forces and groups, inculcated by their leaders, is also crucial. Department/project International Law Programme, The Limits on War and Preserving the Peace Full Article
ty How Human Rights Law Is Evolving to Address Inequality By feedproxy.google.com Published On :: Mon, 10 Dec 2018 13:15:42 +0000 10 December 2018 Chanu Peiris Programme Manager, International Law Programme @chanupeiris On the 70th anniversary of the Universal Declaration of Human Rights, Chanu Peiris examines how its principles apply to one of today’s burning political issues. 2018-12-10-UDHR.jpg Copies of the Universal Declaration of Human Rights in a variety of languages. Photo: Getty Images. There is growing attention to human rights in debates on economic inequality. In the UK, concerns about the disproportionate impact of economic policy on vulnerable groups have been raised recently by the UN special rapporteur on extreme poverty and human rights – who issued a statement criticizing the Conservative government’s austerity policies – as well as in a report from the UK government’s independent Equality and Human Rights Commission. These reports echo global concerns about fiscal policies, poverty and extreme economic inequality.The Universal Declaration of Human Rights – which celebrates its 70th anniversary today – and the human rights treaties it inspired do not expressly address income and wealth gaps. But international human rights law is playing an increasing role in addressing economic polarization. Those concerned about inequality should consider how, especially over the past 25 years, the principles of socioeconomic rights have been clarified by courts and other human rights mechanisms. While the focus in the Global North has historically been on civil and political rights, such as the prohibition on torture or the right to fair trial, international human rights law does set out economic and social rights. For example, Article 23(4) of the Declaration – which is replicated in the International Covenant on Economic, Social and Cultural Rights and other treaties – calls for the right to collective bargaining in employment. Weakening protection in this area has been raised as a partial cause of the current escalation in income inequality. Human rights law also guarantees rights, including to education, healthcare and social security, that have redistributive potential and so have the potential to mitigate inequality.Human rights law recognizes that fulfilment of economic and social rights, unlike civil and political rights, can be limited by the resources available to different states, and this conditionality – along with a lack of guidelines to assist with implementation and monitoring – has historically shielded fiscal policies from human rights scrutiny. However, attitudes have shifted.For example, international human rights law has come to embody a commitment to tackling substantive inequalities which impair human dignity. This requires the state regulate markets, and redistribute resources, in order to prevent discrimination against disadvantaged groups such as the poor. The UN Committee on Economic, Social and Cultural Rights and other human rights bodies assert that states have an immediate obligation, even during times of resource constraint, to ensure the fulfilment, without discrimination, of the minimum essential levels of socioeconomic rights, for example essential subsistence and basic shelter. Thus, austerity measures that scale back the enjoyment of rights may breach human rights standards. In order to justify such measures, governments need to first demonstrate they have considered ‘less restrictive’ avenues, including taxation options.Although the application of human rights standards to economic policy is an emerging area, human rights campaigners have been successfully leveraging these protections to address the causes and consequences of the inequality crisis. For example, in case No. 66/2011 the European Committee of Social Rights overturned austerity measures that would have brought wages under the poverty level, citing breaches of labour rights and protections against discrimination. In Brazil, a coalition of civil society actors successfully used human rights standards to legitimize their critiques of a 2008 tax reform bill that would have given additional tax breaks to the wealthy while withdrawing resources for social services.Beyond legal enforcement, framing concerns within the architecture of human rights can shift power to rights-bearers and move debates on tackling extreme inequality from the policy sphere into one where the state has a duty for which it is accountable. While the state bears primary responsibility for realizing human rights, non-state actors such as businesses have responsibilities to respect human rights. Thus, human rights can also help communities to recast the scope of the crisis to one of shared responsibility.While human rights have seen many normative developments and advocacy successes since the adoption of the Universal Declaration of Human Rights, the last 70 years also offer several lessons and strategies to adopt going forward. As highlighted at a recent Chatham House event, the continued emphasis on civil and political rights in the discussion about human rights is at odds with the lived experience of individuals and communities worldwide, who may not feel their economic and material concerns are reflected in campaigns for human rights.There will need to be a greater emphasis on adapting messaging to be more inclusive and to build alliances between disparate groups. Human rights analysis will also need to move beyond documenting the impact of systemic issues towards tackling root causes and creating a positive vision for economic inclusion and governance. Full Article
ty Security and Prosperity in the Asia-Pacific: The Role of International Law By feedproxy.google.com Published On :: Thu, 17 Jan 2019 11:25:01 +0000 Research Event 27 March 2019 - 10:00am to 5:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Agendapdf | 119.32 KB Security and Prosperity in Asia: The Role of International Lawpdf | 881.12 KB Event participants Koji Tsuruoka, Ambassador of Japan to the United KingdomBen Saul, Associate Fellow, International Law Programme, Chatham House; Challis Chair of International Law, Australian National UniversityLee Chen Chen, Director, Singapore Institute of International AffairsAniruddha Rajput, Member, UN International Law Commission; Consultant, Withersworldwide The rapid growth in the Asia-Pacific’s economic and political power has significant implications for global governance. Asia-Pacific countries such as Japan, India and China – and regional bodies such as ASEAN – are increasingly informing, influencing and seeking to shape international standards and norms.This conference will bring together international law and policy experts to explore the political and legal dynamics affecting economic relations, security challenges and maritime governance in the region.Given security and prosperity challenges within the region as well as the increasingly complex environment for global governance, to what extent is international law operating as a tool of cooperation in the Asia-Pacific? In which areas is it a source of friction?And what are the broader implications for global governance including the development of international law? Department/project International Law Programme, Asia-Pacific Programme, Geopolitics and Governance Chanu Peiris Programme Manager, International Law +44 (0)20 7314 3686 Email Full Article
ty 'Our Shared Humanity': The Legacy of Kofi Annan By feedproxy.google.com Published On :: Wed, 06 Mar 2019 13:50:01 +0000 Research Event 3 June 2019 - 10:00am to 4 June 2019 - 5:30pm Chatham House | 10 St James's Square | London | SW1Y 4LE Agenda - Our Shared Humanitypdf | 165.77 KB Event participants This event is now full and registration has closed.Participants includeZeinab Badawi, Presenter, BBC Global Questions and HardTalkLakhdar Brahimi, The Elders; Chair, Panel on United Nations Peace Operations (2000)Alan Doss, President, Kofi Annan Foundation Raila Odinga, High Representative for Infrastructure Development, African Union; Prime Minister of Kenya (2008-13)Patrick Gaspard, President, Open Society FoundationsMichèle Griffin, Senior Policy Advisor to the UN Secretary-GeneralIan Martin, Special Representative of the UN Secretary-General in East Timor (1999), Nepal (2007-09) and Libya (2011-12)Strive Masiyiwa, Chair of the Board, AGRA; CEO, Econet WirelessAmina Mohammed, Deputy Secretary-General, United NationsKumi Naidoo, Secretary-General, Amnesty InternationalDanny Sriskandarajah, Chief Executive, OxfamMark Suzman, Chief Strategy Officer and President of Global Policy and Advocacy, Bill & Melinda Gates Foundation In a decade as UN Secretary-General, Kofi Annan championed a vision of global governance anchored in shared responsibility and the rights and dignity of the individual.Confronted with multiple global crises that raised questions about the UN’s purpose, Annan pressed for human rights and development to be at the centre of international efforts and sought to broaden participation in shaping and delivering solutions to global challenges.As the UN’s 75th anniversary approaches, this conference will explore Annan’s legacy for the future of global governance.Questions include the appropriate response to high-profile and ongoing failures to prevent human rights atrocities and protect victims of conflict, the impact of technology on democracy, lessons from the Millennium Development Goals for the Sustainable Development Goals and ways to meaningfully involve civil society, businesses and individuals in addressing global challenges.The conference will bring together key figures involved in Annan’s initiatives with actors currently engaged in conflict prevention, humanitarian action, human rights and development to identify lessons and generate forward-looking recommendations.This conference is being held as part of a series, including a public event hosted by UNA-UK at Central Hall in Westminster, exploring Kofi Annan's legacy.This initiative is generously supported by the Bill & Melinda Gates Foundation and Open Society Foundations and enjoys the cooperation of the Kofi Annan Foundation. Department/project International Law Programme, Global Governance and the Rule of Law, Rights, Accountability and Justice Chanu Peiris Programme Manager, International Law +44 (0)20 7314 3686 Email Full Article
ty Cyber, Sovereignty and Human Rights By feedproxy.google.com Published On :: Fri, 20 Sep 2019 14:01:20 +0000 Our work in this area explores how international law regulates cyber operations by states - such as electoral disinformation campaigns or attacks on critical infrastructure - and asks whether new rules are required. Rapid technological change raises urgent questions around equity, transparency, privacy and security. We are looking at the human rights dividend from new technologies as well as how international human rights law standards, for example on freedom of thought, expression and privacy, guide the use of digital technology in the electoral context. Latest (3) Expert comment Power Politics Could Impede Progress on Responsible Regulation of Cyberspace 3 December 2019 Research paper The Application of International Law to State Cyberattacks: Sovereignty and Non-Intervention 2 December 2019 Research paper Online Disinformation and Political Discourse: Applying a Human Rights Framework 6 November 2019 Expert comment (1) Expert comment Power Politics Could Impede Progress on Responsible Regulation of Cyberspace 3 December 2019 Research & Publications (2) Research paper The Application of International Law to State Cyberattacks: Sovereignty and Non-Intervention 2 December 2019 Research paper Online Disinformation and Political Discourse: Applying a Human Rights Framework 6 November 2019 Past events (2) Research Event Sovereignty and Non-Intervention: The Application of International Law to State Cyberattacks 4 December 2019 Research Event Tackling Cyber Disinformation in Elections: Applying International Human Rights Law 6 November 2019 Video & audio (1) Video Tackling Cyber Disinformation in Elections: Applying International Human Rights Law 6 November 2019 Full Article
ty ‘Our Shared Humanity’ – The Legacy of Kofi Annan By feedproxy.google.com Published On :: Wed, 23 Oct 2019 10:12:11 +0000 23 October 2019 The ‘Our Shared Humanity’ conference explored Kofi Annan’s legacy for the future of global governance in the run-up to the UN’s 75th anniversary. This paper summarizes key points raised during the conference, and presents the substantive recommendations that emerged from the discussion. Read online Download PDF 2019-10-23-OurSharedHumanity.jpg Kofi Annan meets with high-school students in Kabul, Afghanistan, in January 2002. Photo: Getty Images. About the ConferenceIn the run-up to the UN’s 75th anniversary and almost a year after his death, Chatham House and the United Nations Association – UK (UNA-UK) held a two-day conference to explore Kofi Annan’s legacy in the context of the current period of global uncertainty.The ‘Our Shared Humanity’ conference brought together a global and diverse group of individualsworking on peace and security, human rights and development issues to:Reflect critically on Annan’s record, and capture lessons learned from his tenure as UN secretary-general, and his later work as a mediator and elder statesperson; andGenerate recommendations for current policymakers and influencers. This paper summarizes key points raised during each session of the conference, and presents the substantive recommendations that emerged from the discussion.In order to bring the conference themes to a wider audience, UNA-UK held a public event on the eve of the first day of the conference at Central Hall Westminster – where the UN had held its first ever meetings in 1946 – with speakers including Nane Annan, Sherrie Westin (president of global impact and philanthropy, Sesame Workshop), Amina Mohammed (current UN deputy secretary-general) and Mary Robinson (chair of The Elders and former UN High Commissioner for Human Rights). Department/project International Law Programme, Global Governance and the Rule of Law, Rights, Accountability and Justice Full Article
ty Human Rights Priorities: An Agenda for Equality and Social Justice By feedproxy.google.com Published On :: Wed, 23 Oct 2019 13:50:01 +0000 Members Event 19 November 2019 - 6:00pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Michelle Bachelet, United Nations High Commissioner for Human RightsChair: Ruma Mandal, Head, International Law Programme, Chatham House Following just over one year in office, UN High Commissioner for Human Rights, Michelle Bachelet, outlines her ongoing priorities at a tumultuous time for fundamental rights protections worldwide.She discusses the rights implications of climate change, gender inequality including the advancement of sexual and reproductive rights, the protection of vulnerable groups and the need to work closely with states, civil society and business to protect and advance human rights. Department/project International Law Programme Members Events Team Email Full Article
ty Sovereignty and Non-Intervention: The Application of International Law to State Cyberattacks By feedproxy.google.com Published On :: Fri, 01 Nov 2019 10:55:01 +0000 Research Event 4 December 2019 - 5:30pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Douglas, Legal Director, GCHQZhixiong Huang, Luojia Chair of International Law, Wuhan UniversityNemanja Malisevic, Director of Digital Diplomacy, MicrosoftHarriet Moynihan, Associate Fellow, International Law Programme, Chatham HouseChair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House International law applies to cyber operations – but views differ on exactly how. Does state-sponsored interference in another state's affairs using cyber means – for example, disinformation campaigns in elections, disabling government websites, or disrupting transport systems – breach international law? If so, on what basis and how are the principles of sovereignty and non-intervention relevant? States are increasingly attributing cyber operations to other states and engaging in the debate on how international law applies, including circumstances that would justify countermeasures.As states meet to debate these issues at the UN, the panel will explore how international law regulates cyberoperations by states, consider the prospects of progress at the UN, and assess the value of other initiatives.This event coincides with the launch of a Chatham House research paper which analyses how the principles of sovereignty and intervention apply in the context of cyberoperations, and considers a way forward for agreeing a common understanding of cyber norms.This event will bring together a broad group of actors, including policymakers, the private sector, legal experts and civil society, and will be followed by a drinks reception. Department/project International Law Programme, Cyber, Sovereignty and Human Rights Jacqueline Rowe Programme Assistant, International Law Programme 020 7389 3287 Email Full Article
ty Security and Prosperity in Asia: The Role of International Law By feedproxy.google.com Published On :: Fri, 01 Nov 2019 11:38:35 +0000 1 November 2019 The 'Security and Prosperity in Asia' conference looked at the impact of international law in the Asia-Pacific with a focus on regional economic and security issues such as the South China Sea disputes. Read online Download PDF Security and Prosperity in Asia Cover Image.jpg Singapore skyline at sunset, 2016. Photo: Getty Images. About the ConferenceAt a time of geopolitical uncertainty and with multilateralism under pressure, this conference brought together diverse actors to explore the evolving role of international law on critical security and economic issues in the Asia-Pacific. From trade agreements to deep-sea mining, cyberwarfare to territorial disputes, the breadth of the discussion illustrated the growing reach of international law in the region.Hosted by the International Law Programme and the Asia-Pacific Programme at Chatham House on 27 March 2019, the conference focused on three themes: trade and investment, maritime security and governance, and emerging security challenges. What trends are emerging in terms of engagement with international law in the region, and how can international standards play a greater role in encouraging collaboration and reducing tensions? And, with the eastward shift in geopolitical power, how will Asia-Pacific states shape the future of international law? Department/project International Law Programme, Global Governance and the Rule of Law, Asia-Pacific Programme, Geopolitics and Governance, Trade, Investment and Economics Full Article
ty The Application of International Law to State Cyberattacks: Sovereignty and Non-Intervention By feedproxy.google.com Published On :: Fri, 29 Nov 2019 16:56:12 +0000 2 December 2019 Hostile cyber operations by one state against another state are increasingly common. This paper analyzes the application of the sovereignty and non-intervention principles in relation to states’ cyber operations in another state below the threshold of the use of force. Read online Download PDF Harriet Moynihan Senior Research Fellow, International Law Programme @HarrietMoyniha9 2019-11-29-Intl-Law-Cyberattacks.jpg A computer hacked by a virus known as Petya. The Petya ransomware cyberattack hit computers of Russian and Ukrainian companies on 27 June 2017. Photo: Getty Images. SummaryThe vast majority of state-to-state cyberattacks consist of persistent, low-level intrusions that take place below the threshold of use of force. International law, including the principle of non-intervention in another state’s internal affairs and the principle of sovereignty, applies to these cyber operations.It is not clear whether any unauthorized cyber intrusion would violate the target state’s sovereignty, or whether there is a threshold in operation. While some would like to set limits by reference to effects of the cyber activity, at this time such limits are not reflected in customary international law. The assessment of whether sovereignty has been violated therefore has to be made on a case by case basis, if no other more specific rules of international law apply.In due course, further state practice and opinio iuris may give rise to an emerging cyber-specific understanding of sovereignty, just as specific rules deriving from the sovereignty principle have crystallized in other areas of international law.Before a principle of due diligence can be invoked in the cyber context, further work is needed by states to agree upon rules as to what might be expected of a state in this context.The principle of non-intervention applies to a state’s cyber operations as it does to other state activities. It consists of coercive behaviour by one state that deprives the target state of its free will in relation to the exercise of its sovereign functions in order to compel an outcome in, or conduct with respect to, a matter reserved to the target state.In practice, activities that contravene the non-intervention principle and activities that violates sovereignty will often overlap.In order to reach agreement on how international law applies to states’ cyber operations below the level of use of force, states should put their views on record, where possible giving examples of when they consider that an obligation may be breached, as states such as the UK, Australia, France and the Netherlands have done.Further discussion between states should focus on how the rules apply to practical examples of state-sponsored cyber operations. There is likely to be more commonality about specific applications of the law than there is about abstract principles.The prospects of a general treaty in this area are still far off. In due course, there may be benefit in considering limited rules, for example on due diligence and a prohibition on attacking critical infrastructure, before tackling broad principles. Department/project International Law Programme, Cyber, Sovereignty and Human Rights Full Article
ty Seventy Years of the Geneva Conventions: What of the Future? By feedproxy.google.com Published On :: Tue, 24 Mar 2020 12:19:34 +0000 24 March 2020 Seventy years after the adoption of the Geneva Conventions, there are challenges that remain to be addressed. This briefing takes three pertinent examples, and discusses possibilities for addressing them. Read online Download PDF Emanuela-Chiara Gillard Associate Fellow, International Law Programme GettyImages-913468402.jpg Rescue of the wounded in Duma city by Syrian Red Crescent paramedics, 2 February 2018. Photo: Samer Bouidani/NurPhoto/Getty Summary The 70th anniversary of the adoption of the 1949 Geneva Conventions was commemorated in 2019. But violations of the Conventions and of the 1977 Additional Protocols are widespread.Contemporary conflicts have been marked by violations of some of the foundational rules of international humanitarian law (IHL) relating to the protection of the wounded and sick and of providers of medical assistance.A further area of IHL that has come under strain and scrutiny are the rules regulating humanitarian relief operations and their application to sieges and blockades.War has a huge impact on children, and the treatment of children in armed conflict is another area of the law that requires further attention.In the current political climate, it is unlikely that new treaties will be negotiated to address emerging issues or uncertainties in the law.Other measures must be explored, including the adoption of domestic measures to implement existing law; support for processes that interpret the law; and initiatives to promote compliance with the law by organized armed groups.One overarching challenge is the interplay between IHL and counterterrorism measures. It can undermine the protections set out in IHL, and hinder principled humanitarian action and activities to promote compliance with the law by organized armed groups. Department/project International Law Programme, The Limits on War and Preserving the Peace Full Article
ty Deletion of fatty acid transport protein 2 (FATP2) in the mouse liver changes the metabolic landscape by increasing the expression of PPAR{alpha}-regulated genes [Lipids] By feedproxy.google.com Published On :: 2020-04-24T06:08:45-07:00 Fatty acid transport protein 2 (FATP2) is highly expressed in the liver, small intestine, and kidney, where it functions in both the transport of exogenous long-chain fatty acids and the activation of very-long-chain fatty acids. Here, using a murine model, we investigated the phenotypic impacts of deleting FATP2, followed by a transcriptomic analysis using unbiased RNA-Seq to identify concomitant changes in the liver transcriptome. WT and FATP2-null (Fatp2−/−) mice (5 weeks) were maintained on a standard chow diet for 6 weeks. The Fatp2−/− mice had reduced weight gain, lowered serum triglyceride, and increased serum cholesterol levels and attenuated dietary fatty acid absorption. Transcriptomic analysis of the liver revealed 258 differentially expressed genes in male Fatp2−/− mice and a total of 91 in female Fatp2−/− mice. These genes mapped to the following gene ontology categories: fatty acid degradation, peroxisome biogenesis, fatty acid synthesis, and retinol and arachidonic acid metabolism. Targeted RT-quantitative PCR verified the altered expression of selected genes. Of note, most of the genes with increased expression were known to be regulated by peroxisome proliferator–activated receptor α (PPARα), suggesting that FATP2 activity is linked to a PPARα-specific proximal ligand. Targeted metabolomic experiments in the Fatp2−/− liver revealed increases of total C16:0, C16:1, and C18:1 fatty acids; increases in lipoxin A4 and prostaglandin J2; and a decrease in 20-hydroxyeicosatetraenoic acid. We conclude that the expression of FATP2 in the liver broadly affects the metabolic landscape through PPARα, indicating that FATP2 provides an important role in liver lipid metabolism through its transport or activation activities. Full Article
ty AIG1 and ADTRP are endogenous hydrolases of fatty acid esters of hydroxy fatty acids (FAHFAs) in mice [Metabolism] By feedproxy.google.com Published On :: 2020-05-01T00:06:09-07:00 Fatty acid esters of hydroxy fatty acids (FAHFAs) are a newly discovered class of signaling lipids with anti-inflammatory and anti-diabetic properties. However, the endogenous regulation of FAHFAs remains a pressing but unanswered question. Here, using MS-based FAHFA hydrolysis assays, LC-MS–based lipidomics analyses, and activity-based protein profiling, we found that androgen-induced gene 1 (AIG1) and androgen-dependent TFPI-regulating protein (ADTRP), two threonine hydrolases, control FAHFA levels in vivo in both genetic and pharmacologic mouse models. Tissues from mice lacking ADTRP (Adtrp-KO), or both AIG1 and ADTRP (DKO) had higher concentrations of FAHFAs particularly isomers with the ester bond at the 9th carbon due to decreased FAHFA hydrolysis activity. The levels of other lipid classes were unaltered indicating that AIG1 and ADTRP specifically hydrolyze FAHFAs. Complementing these genetic studies, we also identified a dual AIG1/ADTRP inhibitor, ABD-110207, which is active in vivo. Acute treatment of WT mice with ABD-110207 resulted in elevated FAHFA levels, further supporting the notion that AIG1 and ADTRP activity control endogenous FAHFA levels. However, loss of AIG1/ADTRP did not mimic the changes associated with pharmacologically administered FAHFAs on extent of upregulation of FAHFA levels, glucose tolerance, or insulin sensitivity in mice, indicating that therapeutic strategies should weigh more on FAHFA administration. Together, these findings identify AIG1 and ADTRP as the first endogenous FAHFA hydrolases identified and provide critical genetic and chemical tools for further characterization of these enzymes and endogenous FAHFAs to unravel their physiological functions and roles in health and disease. Full Article
ty Phenotypic Adaption of Pseudomonas aeruginosa by Hacking Siderophores Produced by Other Microorganisms By feedproxy.google.com Published On :: 2020-04-01 Quentin PerraudApr 1, 2020; 19:589-607Research Full Article
ty Tandem Mass Tag Approach Utilizing Pervanadate BOOST Channels Delivers Deeper Quantitative Characterization of the Tyrosine Phosphoproteome By feedproxy.google.com Published On :: 2020-04-01 Xien Yu ChuaApr 1, 2020; 19:730-743Technological Innovation and Resources Full Article
ty The DNA sensor cGAS is decorated by acetylation and phosphorylation modifications in the context of immune signaling By feedproxy.google.com Published On :: 2020-04-28 Bokai SongApr 28, 2020; 0:RA120.001981v1-mcp.RA120.001981Research Full Article
ty Seminal Plasma Proteome as an Indicator of Sperm Dysfunction and Low Sperm Motility By feedproxy.google.com Published On :: 2020-04-20 Yunlei LiApr 20, 2020; 0:RA120.002017v1-mcp.RA120.002017Research Full Article
ty Investigation of inter- and intra-tumoral heterogeneity of glioblastoma using TOF-SIMS By feedproxy.google.com Published On :: 2020-04-06 Samvel K GularyanApr 6, 2020; 0:RA120.001986v1-mcp.RA120.001986Research Full Article
ty Arginine in C9ORF72 Dipolypeptides Mediates Promiscuous Proteome Binding and Multiple Modes of Toxicity By feedproxy.google.com Published On :: 2020-04-01 Mona RadwanApr 1, 2020; 19:640-654Research Full Article
ty Characterization of signaling pathways associated with pancreatic {beta}-cell adaptive flexibility in compensation of obesity-linked diabetes in db/db mice By feedproxy.google.com Published On :: 2020-04-07 Taewook KangApr 7, 2020; 0:RA119.001882v1-mcp.RA119.001882Research Full Article
ty Improving Identification of In-organello Protein-Protein Interactions Using an Affinity-enrichable, Isotopically Coded, and Mass Spectrometry-cleavable Chemical Crosslinker By feedproxy.google.com Published On :: 2020-04-01 Karl A. T. MakepeaceApr 1, 2020; 19:624-639Research Full Article
ty MaxQuant software for ion mobility enhanced shotgun proteomics By feedproxy.google.com Published On :: 2020-03-10 Nikita PrianichnikovMar 10, 2020; 0:TIR119.001720v1-mcp.TIR119.001720Technological Innovation and Resources Full Article
ty Proximity Dependent Biotinylation: Key Enzymes and Adaptation to Proteomics Approaches By feedproxy.google.com Published On :: 2020-05-01 Payman Samavarchi-TehraniMay 1, 2020; 19:757-773Review Full Article
ty A New Type of Learning Community By blogs.ams.org Published On :: Wed, 05 Feb 2020 13:42:16 +0000 Setting high standards is expected from all educators. Yet, I think I may have taken this to an extreme in my 2019 spring senior seminar course in algebraic combinatorics. Students walked in to class, got a copy of the syllabus … Continue reading → Full Article career advancement General Journals and Publications Uncategorized Undegraduates
ty Cybersecurity in the Commonwealth: Building the Foundations of Effective National Responses in the Caribbean By feedproxy.google.com Published On :: Thu, 07 Feb 2019 14:20:01 +0000 Invitation Only Research Event 8 March 2019 - 9:00am to 5:30pm Bridgetown, Barbados Event participants Joyce Hakmeh, Cyber Research Fellow, International Security Department, Chatham House This workshop is the second in a series in the 'Implementing the Commonwealth Cybersecurity Agenda' project. The workshop aims to provide a multi-stakeholder pan-Commonwealth platform to discuss how to take the implementation of the 'Commonwealth Cyber Declaration' forward with a focus on the second pillar of the declaration – building the foundations of an effective national cybersecurity response with eight action points. As such, the workshop gathers different project implementers under the UK Foreign and Commonwealth Office’s Cyber Programme, in addition to other key relevant stakeholders from the global level, to explore ongoing initiatives which aim to deliver one or more of pillar two’s action points.The workshop addresses issues from a global perspective and a Commonwealth perspective and will include presentations from selected partners from different Commonwealth countries. Department/project International Security Programme Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email Full Article
Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email
ty Transparency and Accountability for Drone Use: European Approaches By feedproxy.google.com Published On :: Thu, 07 Mar 2019 17:35:01 +0000 Invitation Only Research Event 11 March 2019 - 9:30am to 12 March 2019 - 12:30pm Chatham House With increased use of military drones in recent years there have also been many calls for greater transparency and accountability with regards to drone operations.This would allow for greater public understanding, particularly as the complex nature of military operations today intensifies difficulties in sustaining perceptions of the legitimate use of force.For example, in Europe, leading states rely on the US for drone platforms and for the infrastructure - such as military communication networks - that enable those operations, while the US also relies on airbases in European states to operate its drone programme.In addition, with reports that the US is loosening the rules on the use of drones, it is important to understand how European approaches to transparency and accountability may be affected by these developments.This workshop focuses on how European states can facilitate transparency to ensure accountability for drone use, as well as what the limits might be, considering both the complexity of military operations today and the need for achieving operational goals.With the US easing restrictions on export controls, the discussion also considers the role of regulation in ensuring accountability and prospects for developing common standards.Attendance at this event is by invitation only. Nilza Amaral Project Manager, International Security Programme Email Department/project International Security Programme, Policy Implications of Armed Drone Use Full Article
ty Cybersecurity of NATO’s Space-based Strategic Assets By feedproxy.google.com Published On :: Tue, 25 Jun 2019 15:38:20 +0000 1 July 2019 Almost all modern military engagements rely on space-based assets, but cyber vulnerabilities can undermine confidence in the performance of strategic systems. This paper will evaluate the threats, vulnerabilities and consequences of cyber risks to strategic systems. Read online Download PDF Dr Beyza Unal Senior Research Fellow, International Security Programme @beyzaunal Google Scholar 2019-06-25-Space-Cybersecurity.jpg The radar domes of RAF Menwith Hill, reported to be the biggest spy base in the world, dominate the skyline on 30 October 2007 in Harrogate, UK. Photo: Getty Images SummaryAll satellites depend on cyber technology including software, hardware and other digital components. Any threat to a satellite’s control system or available bandwidth poses a direct challenge to national critical assets.NATO’s missions and operations are conducted in the air, land, cyber and maritime domains. Space-based architecture is fundamental to the provision of data and services in each of these contexts. The critical dependency on space has resulted in new cyber risks that disproportionately affect mission assurance. Investing in mitigation measures and in the resilience of space systems for the military is key to achieving protection in all domains.Almost all modern military engagements rely on space-based assets. During the US-led invasion of Iraq in 2003, 68 per cent of US munitions were guided utilizing space-based means (including laser-, infrared- and satellite-guided munitions); up sharply from 10 per cent in 1990–91, during the first Gulf war. In 2001, 60 per cent of the weapons used by the US in Afghanistan were precision-guided munitions, many of which had the capability to use information provided by space-based assets to correct their own positioning to hit a target.NATO does not own satellites. It owns and operates a few terrestrial elements, such as satellite communications anchor stations and terminals. It requests access to products and services – such as space weather reports and satellite overflight reports provided via satellite reconnaissance advance notice systems – but does not have direct access to satellites: it is up to individual NATO member states to determine whether they allow access.Cyber vulnerabilities undermine confidence in the performance of strategic systems. As a result, rising uncertainty in information and analysis continues to impact the credibility of deterrence and strategic stability. Loss of trust in technology also has implications for determining the source of a malicious attack (attribution), strategic calculus in crisis decision-making and may increase the risk of misperception. Department/project International Security Programme, Cyber and Space Full Article
ty Cybersecurity by Design in Civil Nuclear Power Plants By feedproxy.google.com Published On :: Tue, 23 Jul 2019 17:34:51 +0000 24 July 2019 Cyberattacks are increasingly challenging critical national infrastructure. This paper considers the security by design approach for civil nuclear power plants and analyses areas of risk and opportunities for the nuclear industry. Read online Download PDF Dr Beyza Unal Senior Research Fellow, International Security Programme @beyzaunal Google Scholar Roger Brunt Managing Director, Grosmont Howe Ltd 2019-07-24-NuclearPlant.jpg An employee climbs into the cooling tower of the third and fourth unit at Mochovce nuclear power plant in Slovakia on 2 July 2019. Photo: Getty Images SummaryThe application of ‘security by design’ in nuclear new builds could provide operators with the opportunity to establish a robust and resilient security architecture at the beginning of a nuclear power plant’s life cycle. This will enhance the protection of the plant and reduce the need for costly security improvements during its operating life.Security by design cannot fully protect a nuclear power plant from rapidly evolving cyberattacks, which expose previously unsuspected or unknown vulnerabilities.Careful design of security systems and architecture can – and should – achieve levels of protection that exceed current norms and expectations. However, the sourcing of components from a global supply chain means that the integrity of even the most skilfully designed security regime cannot be guaranteed without exhaustive checks of its components.Security by design may well include a requirement for a technical support organization to conduct quality assurance of cyber defences and practices, and this regime should be endorsed by a facility’s executive board and continued at regular intervals after the new build facility has been commissioned.Given the years it takes to design, plan and build a new nuclear power plant, it is important to recognize that from the point of ‘design freeze’ onwards, the operator will be building in vulnerabilities, as technology continues to evolve rapidly while construction fails to keep pace with it. Security by design cannot be a panacea, but it is an important factor in the establishment of a robust nuclear security – and cybersecurity – culture. Department/project International Security Programme, Cyber and Nuclear Security Full Article
ty Cyber Governance in the Commonwealth: Towards Stability and Responsible State Behaviour in Cyberspace By feedproxy.google.com Published On :: Mon, 05 Aug 2019 14:05:02 +0000 Invitation Only Research Event 7 October 2019 - 10:30am to 5:30pm Addis Ababa, Ethiopia This roundtable is part of a series under the project, 'Implementing the Commonwealth Cybersecurity Agenda', funded by the UK Foreign and Commonwealth Office (FCO). The roundtable aims to provide a multi-stakeholder, pan-Commonwealth platform to discuss how to implement the Commonwealth Cyber Declaration with a focus on its third pillar 'To promote stability in cyberspace through international cooperation'.In particular, the roundtable focuses on points 3 and 4 of the third pillar which revolve around the commitment to promote frameworks for stability in cyberspace including the applicability of international law, agreed voluntary norms of responsible state behaviour and the development and implementation of confidence-building measures consistent with the 2015 report of the UNGGE. The workshop also focuses on the commitment to advance discussions on how existing international law, including the Charter of the United Nations and applicable international humanitarian law, applies in cyberspace.The roundtable addresses the issue of global cyber governance from a Commonwealth perspective and will also include a discussion around the way forward, the needed capacity of the different Commonwealth countries and the cooperation between its members for better cyber governance.Participants include UNGGE members from Commonwealth countries in addition to representatives to the UN Open-Ended Working Group from African countries as well as members from academia, civil society and industry. Department/project International Security Programme Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email Full Article
Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email
ty Who’s Afraid of Huawei? Understanding the 5G Security Concerns By feedproxy.google.com Published On :: Fri, 06 Sep 2019 09:55:03 +0000 9 September 2019 Emily Taylor Associate Fellow, International Security Programme @etaylaw LinkedIn Emily Taylor examines the controversy around the Chinese tech giant’s mobile broadband equipment and the different approaches taken by Western countries. 2019-09-06-Huawei.jpg Huawei's Ox Horn campus in Dongguan, China. Photo: Getty Images. As countries move towards the fifth generation of mobile broadband, 5G, the United States has been loudly calling out Huawei as a security threat. It has employed alarmist rhetoric and threatened to limit trade and intelligence sharing with close allies that use Huawei in their 5G infrastructure.While some countries such as Australia have adopted a hard line against Huawei, others like the UK have been more circumspect, arguing that the risks of using the firm’s technology can be mitigated without forgoing the benefits.So, who is right, and why have these close allies taken such different approaches?The risksLong-standing concerns relating to Huawei are plausible. There are credible allegations that it has benefitted from stolen intellectual property, and that it could not thrive without a close relationship with the Chinese state.Huawei hotly denies allegations that users are at risk of its technology being used for state espionage, and says it would resist any order to share information with the Chinese government. But there are questions over whether it could really resist China’s stringent domestic legislation, which compels companies to share data with the government. And given China’s track record of using cyberattacks to conduct intellectual property theft, there may be added risks of embedding a Chinese provider into critical communications infrastructure.In addition, China’s rise as a global technological superpower has been boosted by the flow of financial capital through government subsidies, venture and private equity, which reveal murky boundaries between the state and private sector for domestic darlings. Meanwhile, the Belt and Road initiative has seen generous investment by China in technology infrastructure across Africa, South America and Asia.There’s no such thing as a free lunch or a free network – as Sri Lanka discovered when China assumed shares in a strategic port in return for debt forgiveness; or Mexico when a 1% interest loan for its 4G network came on the condition that 80% of the funding was spent with Huawei.Aside from intelligence and geopolitical concerns, the quality of Huawei’s products represents a significant cyber risk, one that has received less attention than it deserves.On top of that, 5G by itself will significantly increase the threat landscape from a cybersecurity perspective. The network layer will be more intelligent and adaptable through the use of software and cloud services. The number of network antennae will increase by a factor of 20, and many will be poorly secured ‘things’; there is no need for a backdoor if you have any number of ‘bug doors’.Finally, the US is threatening to limit intelligence sharing with its closest allies if they adopt Huawei. So why would any country even consider using Huawei in their 5G infrastructure?Different situationsThe truth is that not every country is free to manoeuvre; 5G technology will sit on top of existing mobile infrastructure.Australia and the US can afford to take a hard line: their national infrastructure has been largely Huawei-free since 2012. However, the Chinese firm is deeply embedded in other countries’ existing structures – for example, in the UK, Huawei has provided telecommunications infrastructure since 2005. Even if the UK decided tomorrow to ditch Huawei, it cannot just rip up existing 4G infrastructure. To do so would cost a fortune, risk years of delay in the adoption of 5G and limit competition in 5G provisioning.As a result, the UK has adopted a pragmatic approach resulting from years of oversight and analysis of Huawei equipment, during which it has never found evidence of malicious Chinese state cyber activity through Huawei.At the heart of this process is the Huawei Cyber Security Evaluation Centre, which was founded in 2010 as a confidence-building measure. Originally criticized for ‘effectively policing itself’, as it was run and staffed entirely by Huawei, the governance has now been strengthened, with the National Cyber Security Centre chairing its oversight board.The board’s 2019 report makes grim reading, highlighting ‘serious and system defects in Huawei’s software engineering and cyber security competence’. But it does not accuse the company of serving as a platform for state-sponsored surveillance.Similar evidence-based policy approaches are emerging in other countries like Norway and Italy. They offer flexibility for governments, for example by limiting access to some contract competition through legitimate and transparent means, such as security reviews during procurement. The approaches also raise security concerns (both national and cyber) to a primary issue when awarding contracts – something that was not always done in the past, when price was the key driver.The UK is also stressing the need to manage risk and increase vendor diversity in the ecosystem to avoid single points of failure. A further approach that is beginning to emerge is to draw a line between network ‘core’ and ‘periphery’ components, excluding some providers from the more sensitive ‘core’. The limited rollouts of 5G in the UK so far have adopted multi-provider strategies, and only one has reportedly not included Huawei kit.Managing the risks to cyber security and national security will become more complex in a 5G environment. In global supply chains, bans based on the nationality of the provider offer little assurance. For countries that have already committed to Huawei in the past, and who may not wish to be drawn into an outright trade war with China, these moderate approaches offer a potential way forward. Full Article
ty Building LGBTIQ+ Inclusivity in the Armed Forces, 20 Years After the Ban Was Lifted By feedproxy.google.com Published On :: Thu, 16 Jan 2020 12:27:18 +0000 16 January 2020 Will Davies Army Chief of General Staff Research Fellow, International Security Programme @williamhldavies LinkedIn Change was slow to come but progress has since been swift. Not only can a continuing focus on inclusivity benefit service people and the organization, it is also an essential element of a values-based foreign policy. 2020-01-16-Westminster.jpg Crew members from HMS Westminster march through Admiralty Arch as they exercise their freedom of the city in August 2019 in London. Photo: Getty Images. The new UK government will conduct a review of foreign, security and defence policy in 2020. If the UK decides to use values as a framework for foreign policy this needs to be reflected in its armed forces. One area where this is essential is continuing to deepen inclusivity for LGBTIQ+ personnel, building on the progress made since the ban on their service was lifted in 2000.I witnessed the ban first-hand as a young officer in the British Army in 1998. As the duty officer I visited soldiers being held in the regimental detention cells to check all was well. One day a corporal, who I knew, was there awaiting discharge from the army having been convicted of being gay. On the one hand, here was service law in action, which was officially protecting the army’s operational effectiveness and an authority not to be questioned at my level. On the other, here was an excellent soldier in a state of turmoil and public humiliation. How extreme this seems now.On 12 January 2000 Tony Blair’s Labour government announced an immediate lifting of the ban for lesbian, gay and bisexual personnel (LGB) and introduced a new code of conduct for personal relationships. (LGB is the term used by the armed forces to describe those personnel who had been banned prior to 2000.) This followed a landmark ruling in a case taken to the European Court of Human Rights in 1999 by four LGB ex-service personnel – supported by Stonewall – who had been dismissed from service for their sexuality.Up to that point the Ministry of Defence's long-held position had been that LGB personnel had a negative impact on the morale and cohesion of a unit and damaged operational effectiveness. Service personnel were automatically dismissed if it was discovered they were LGB, even though homosexuality had been decriminalized in the UK by 1967.Proof that the armed forces had been lagging behind the rest of society was confirmed by the positive response to the change among service personnel, despite a handful of vocal political and military leaders who foresaw negative impacts. The noteworthy service of LGBTIQ+ people in Iraq and Afghanistan only served to debunk any residual myths.Twenty years on, considerable progress has been made and my memories from 1998 now seem alien. This is a story to celebrate – however in the quest for greater inclusivity there is always room for improvement.Defence Minister Johnny Mercer last week apologized following recent calls from campaign group Liberty for a fuller apology. In December 2019, the Ministry of Defence announced it was putting in place a scheme to return medals stripped from veterans upon their discharge.The armed forces today have a range of inclusivity measures to improve workplace culture including assessments of workplace climate and diversity networks supported by champions drawn from senior leadership.But assessing the actual lived experience for LGBTIQ+ people is challenging due to its subjectivity. This has not been helped by low participation in the 2015 initiative to encourage people to declare confidentially their sexual orientation, designed to facilitate more focused and relevant policies. As of 1 October 2019, only 20.3 per cent of regular service people had declared a sexual orientation.A measure of positive progress is the annual Stonewall Workplace Equality Index, the definitive benchmarking tool for employers to measure their progress on LGBTIQ+ inclusion in the workplace; 2015 marked the first year in which all three services were placed in the top 100 employers in the UK and in 2019 the Royal Navy, British Army and Royal Air Force were placed 15th=, 51st= and 68th respectively.Nevertheless, LGBTIQ+ service people and those in other protected groups still face challenges. The 2019 Ministry of Defence review of inappropriate behaviour in the armed forces, the Wigston Report, concluded there is an unacceptable level of sexual harassment, bullying and discrimination. It found that 26-36% of LGBTIQ+ service people have experienced negative comments or conduct at work because of their sexual orientation.The Secretary of State for Defence accepted the report’s 36 recommendations on culture, incident reporting, training and a more effective complaints system. Pivotal to successful implementation will be a coherent strategy driven by fully engaged leaders.Society is also expecting ever higher standards, particularly in public bodies. The armed forces emphasise their values and standards, including ‘respect for others’, as defining organisational characteristics; individuals are expected to live by them. Only in a genuinely inclusive environment can an individual thrive and operate confidently within a team.The armed forces also recognize as a priority the need to connect to and reflect society more closely in order to attract and retain talent from across all of society. The armed forces’ active participation in UK Pride is helping to break down barriers in this area.In a post-Brexit world, the UK’s values, support for human rights and reputation for fairness are distinctive strengths that can have an impact on the world stage and offer a framework for future policy. The armed forces must continue to push and promote greater inclusivity in support. When operating overseas with less liberal regimes, this will be sensitive and require careful handling; however it will be an overt manifestation of a broader policy and a way to communicate strong and consistent values over time.The armed forces were damagingly behind the times 20 years ago. But good progress has been made since. Inclusion initiatives must continue to be pushed to bring benefits to the individual and the organization as well as demonstrate a values-based foreign policy. Full Article
ty Cyber Security and Nuclear Weapons By feedproxy.google.com Published On :: Fri, 28 Feb 2020 09:15:20 +0000 This project aims to improve resilience in NATO’s nuclear weapons systems against cyber threats. Cyber security is a vital part of the national and international strategic infrastructure and weapons systems. The increasing cyber capabilities of countries such as China, Russia and North Korea put the North Atlantic Treaty Organization’s (NATO’s) nuclear systems - capabilities that include nuclear command, control and communication, weapons systems and early warning systems - in danger.There is an urgent need to study and address cyber challenges to nuclear assets within NATO and in key NATO countries. Greater awareness of the potential threats and vulnerabilities is key to improving preparedness and mitigating the risks of a cyber-attack on NATO nuclear weapons systems.Chatham House produces research responding to the need for information on enhancing cybersecurity for command, control and communications. This project constitutes the beginning of the second phase of the Cyber Security of Nuclear Weapons Systems: Threats, Vulnerabilities and Consequences, a report published in January 2018 in partnership with the Stanley Foundation.The project responds to the need both for more public information on cyber risks in NATO’s nuclear mission, and to provide policy-driven research to shape and inform nuclear policy within NATO member states and the Nuclear Planning Group.This project is supported by the Ploughshares Fund and the Stanley Foundation. Full Article