sec

Secondary Hyperparathyroidism and Chronic Kidney Disease

Sarah Tomasello
Jan 1, 2008; 21:19-25
Articles




sec

Metric Spaces, Convexity and Nonpositive Curvature: Second Edition

Athanase Papadopoulos, Universite de Strasbourg - A publication of the European Mathematical Society, 2013, 320 pp., Softcover, ISBN-13: 978-3-03719-132-3, List: US$58, All AMS Members: US$46.40, EMSILMTP/6.R

This book is about metric spaces of nonpositive curvature in the sense of Busemann, that is, metric spaces whose distance function satisfies a...




sec

{gamma}-Hydroxybutyrate does not mediate glucose inhibition of glucagon secretion [Signal Transduction]

Hypersecretion of glucagon from pancreatic α-cells strongly contributes to diabetic hyperglycemia. Moreover, failure of α-cells to increase glucagon secretion in response to falling blood glucose concentrations compromises the defense against hypoglycemia, a common complication in diabetes therapy. However, the mechanisms underlying glucose regulation of glucagon secretion are poorly understood and likely involve both α-cell–intrinsic and intraislet paracrine signaling. Among paracrine factors, glucose-stimulated release of the GABA metabolite γ-hydroxybutyric acid (GHB) from pancreatic β-cells might mediate glucose suppression of glucagon release via GHB receptors on α-cells. However, the direct effects of GHB on α-cell signaling and glucagon release have not been investigated. Here, we found that GHB (4–10 μm) lacked effects on the cytoplasmic concentrations of the secretion-regulating messengers Ca2+ and cAMP in mouse α-cells. Glucagon secretion from perifused mouse islets was also unaffected by GHB at both 1 and 7 mm glucose. The GHB receptor agonist 3-chloropropanoic acid and the antagonist NCS-382 had no effects on glucagon secretion and did not affect stimulation of secretion induced by a drop in glucose from 7 to 1 mm. Inhibition of endogenous GHB formation with the GABA transaminase inhibitor vigabatrin also failed to influence glucagon secretion at 1 mm glucose and did not prevent the suppressive effect of 7 mm glucose. In human islets, GHB tended to stimulate glucagon secretion at 1 mm glucose, an effect mimicked by 3-chloropropanoic acid. We conclude that GHB does not mediate the inhibitory effect of glucose on glucagon secretion.




sec

ER stress increases store-operated Ca2+ entry (SOCE) and augments basal insulin secretion in pancreatic beta cells [Molecular Bases of Disease]

Type 2 diabetes mellitus (T2DM) is characterized by impaired glucose-stimulated insulin secretion and increased peripheral insulin resistance. Unremitting endoplasmic reticulum (ER) stress can lead to beta-cell apoptosis and has been linked to type 2 diabetes. Although many studies have attempted to link ER stress and T2DM, the specific effects of ER stress on beta-cell function remain incompletely understood. To determine the interrelationship between ER stress and beta-cell function, here we treated insulin-secreting INS-1(832/13) cells or isolated mouse islets with the ER stress–inducer tunicamycin (TM). TM induced ER stress as expected, as evidenced by activation of the unfolded protein response. Beta cells treated with TM also exhibited concomitant alterations in their electrical activity and cytosolic free Ca2+ oscillations. As ER stress is known to reduce ER Ca2+ levels, we tested the hypothesis that the observed increase in Ca2+ oscillations occurred because of reduced ER Ca2+ levels and, in turn, increased store-operated Ca2+ entry. TM-induced cytosolic Ca2+ and membrane electrical oscillations were acutely inhibited by YM58483, which blocks store-operated Ca2+ channels. Significantly, TM-treated cells secreted increased insulin under conditions normally associated with only minimal release, e.g. 5 mm glucose, and YM58483 blocked this secretion. Taken together, these results support a critical role for ER Ca2+ depletion–activated Ca2+ current in mediating Ca2+-induced insulin secretion in response to ER stress.




sec

Modification of a PE/PPE substrate pair reroutes an Esx substrate pair from the mycobacterial ESX-1 type VII secretion system to the ESX-5 system [Molecular Bases of Disease]

Bacterial type VII secretion systems secrete a wide range of extracellular proteins that play important roles in bacterial viability and in interactions of pathogenic mycobacteria with their hosts. Mycobacterial type VII secretion systems consist of five subtypes, ESX-1–5, and have four substrate classes, namely, Esx, PE, PPE, and Esp proteins. At least some of these substrates are secreted as heterodimers. Each ESX system mediates the secretion of a specific set of Esx, PE, and PPE proteins, raising the question of how these substrates are recognized in a system-specific fashion. For the PE/PPE heterodimers, it has been shown that they interact with their cognate EspG chaperone and that this chaperone determines the designated secretion pathway. However, both structural and pulldown analyses have suggested that EspG cannot interact with the Esx proteins. Therefore, the determining factor for system specificity of the Esx proteins remains unknown. Here, we investigated the secretion specificity of the ESX-1 substrate pair EsxB_1/EsxA_1 in Mycobacterium marinum. Although this substrate pair was hardly secreted when homologously expressed, it was secreted when co-expressed together with the PE35/PPE68_1 pair, indicating that this pair could stimulate secretion of the EsxB_1/EsxA_1 pair. Surprisingly, co-expression of EsxB_1/EsxA_1 with a modified PE35/PPE68_1 version that carried the EspG5 chaperone-binding domain, previously shown to redirect this substrate pair to the ESX-5 system, also resulted in redirection and co-secretion of the Esx pair via ESX-5. Our results suggest a secretion model in which PE35/PPE68_1 determines the system-specific secretion of EsxB_1/EsxA_1.




sec

Government announces Study Subsidy Scheme for Designated Professions/Sectors for 2020/21 cohort - sub-degree programmes




sec

Revamp of Committee on Self-financing Post-secondary Education announced




sec

New notification arrangements on Secondary One discretionary places and distribution of school choice documents for Central Allocation




sec

Loan repayment by self-financing post-secondary institutions under Start-up Loan Scheme, non-profit-making international schools and student loan repayers to be deferred for two years




sec

EDB provides more relief grants to affected sectors




sec

GSA's North-Central Section Meeting goes virtual

(Geological Society of America) The annual meeting of The Geological Society of America's North-Central Section, originally scheduled to take place in Duluth, Minnesota, will be held virtually on May 18-19, 2020, with technical sessions in the morning and student programming in the afternoon. The online meeting is open and available to everyone for free. No registration is required.




sec

Recycler, property sector subsidies set

The Government today said the first batch of subsidies amounting to $5.6 million under two relief measures for recyclers has been disbursed, while $5.6 million in subsidies had been approved under a management sector support scheme.

 

The two Recycling Fund measures aim to help the recycling industry cope with the current economic situation and recent operational difficulties arising from the COVID-19 epidemic.

 

The Advisory Committee on Recycling Fund announced in mid-March to reserve $100 million to launch the One-off Recycling Industry Anti-epidemic Scheme.

 

The scheme provides timely financial support to help with recyclers’ operational costs for six months. The funding limit for each recycler is $20,000 per month from January 1 to June 30, or $120,000 in total maximum subsidy.

 

The committee has also allocated additional funds to extend the earlier-launched One-off Rental Support Scheme for another six months, providing a total funding of $200 million to fight the virus and help the recycling industry ride out the difficult times.

 

The rental support scheme, which benefits street-corner recycling shops and recycling sites, originally ran from October to March. It has been extended for six months until September this year, totalling 12 months.

 

The monthly rental subsidy for each recycler is capped at $25,000, setting the maximum total rental subsidy at $300,000.

 

Separately, the Anti-epidemic Support Scheme for Property Management Sector has approved 205 applications involving around $5.6 million in subsidies to benefit more than 1,500 building blocks.

 

The relevant property management companies and owners’ organisations will receive notifications for subsidy disbursement shortly.

 

The list of properties for which applications have been approved is available online.

 

Briefing sessions were held earlier to introduce the scheme to the property management sector and owners’ organisations.




sec

Clinical Management of Food-Insecure Individuals With Diabetes

Andrea López
Feb 1, 2012; 25:14-18
From Research to Practice




sec

Reonomy: Selecting a Growth Strategy in New York City’s Proptech Sector

What strategic path would lead Reonomy, a successful commercial real estate proptech startup, to future growth and profitability within a reasonable time frame?




sec

What about entertainment? - Industry insider feels sector under-represented in COVID recovery task force

Last month, Prime Minister Andrew Holness announced the establishment of an Economic Recovery Task Force, chaired by Finance Minister Dr Nigel Clarke. The multisectoral task force, which is mandated to oversee Jamaica's economic recovery from...




sec

Security and Prosperity in the Asia-Pacific: The Role of International Law

Research Event

27 March 2019 - 10:00am to 5:00pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Koji Tsuruoka, Ambassador of Japan to the United Kingdom
Ben Saul, Associate Fellow, International Law Programme, Chatham House; Challis Chair of International Law, Australian National University
Lee Chen Chen, Director, Singapore Institute of International Affairs
Aniruddha​ Rajput, Member, UN International Law Commission; Consultant, Withersworldwide

 

The rapid growth in the Asia-Pacific’s economic and political power has significant implications for global governance. Asia-Pacific countries such as Japan, India and China – and regional bodies such as ASEAN – are increasingly informing, influencing and seeking to shape international standards and norms.

This conference will bring together international law and policy experts to explore the political and legal dynamics affecting economic relations, security challenges and maritime governance in the region.

Given security and prosperity challenges within the region as well as the increasingly complex environment for global governance, to what extent is international law operating as a tool of cooperation in the Asia-Pacific? In which areas is it a source of friction?

And what are the broader implications for global governance including the development of international law?

Chanu Peiris

Programme Manager, International Law
+44 (0)20 7314 3686




sec

Security and Prosperity in Asia: The Role of International Law

1 November 2019

The 'Security and Prosperity in Asia' conference looked at the impact of international law in the Asia-Pacific with a focus on regional economic and security issues such as the South China Sea disputes.

Security and Prosperity in Asia Cover Image.jpg

Singapore skyline at sunset, 2016. Photo: Getty Images.

About the Conference

At a time of geopolitical uncertainty and with multilateralism under pressure, this conference brought together diverse actors to explore the evolving role of international law on critical security and economic issues in the Asia-Pacific. From trade agreements to deep-sea mining, cyberwarfare to territorial disputes, the breadth of the discussion illustrated the growing reach of international law in the region.

Hosted by the International Law Programme and the Asia-Pacific Programme at Chatham House on 27 March 2019, the conference focused on three themes: trade and investment, maritime security and governance, and emerging security challenges. What trends are emerging in terms of engagement with international law in the region, and how can international standards play a greater role in encouraging collaboration and reducing tensions? And, with the eastward shift in geopolitical power, how will Asia-Pacific states shape the future of international law?




sec

POSTPONED: Supporting Civic Space: The Role and Impact of the Private Sector

Invitation Only Research Event

16 March 2020 - 11:00am to 5:00pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

A healthy civic space is vital for an enabling business environment. In recognition of this, a growing number of private sector actors are challenging, publicly or otherwise, the deteriorating environment for civic freedoms.

However, this corporate activism is often limited and largely ad hoc. It remains confined to a small cluster of multinationals leaving potential routes for effective coordination and collaboration with other actors underexplored.

This roundtable will bring together a diverse and international group of business actors, civil society actors and foreign policy experts to exchange perspectives and experiences on how the private sector can be involved in issues around civic space. The meeting will provide an opportunity to explore the drivers of – and barriers to – corporate activism, develop a better understanding of existing initiatives, identify good practice and discuss practical strategies for the business community.

This meeting will be the first of a series of roundtables at Chatham House in support of initiatives to build broad alliances for the protection of civic space. 

Attendance at this event is by invitation only. 

PLEASE NOTE THIS EVENT IS POSTPONED UNTIL FURTHER NOTICE. 

Jacqueline Rowe

Programme Assistant, International Law Programme
020 7389 3287




sec

War Crimes and Their Prosecution

Invitation Only Research Event

5 March 2020 - 9:00am to 10:30am

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Michelle Butler, Barrister, Matrix Chambers
Charles Garraway, Visiting Fellow, Human Rights Centre, University of Essex
Chair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House

 

The International Criminal Court cannot act when crimes are being genuinely prosecuted in a state. The meeting will discuss whether the ICC complementarity rules apply when a state puts restrictions on the prosecution of war crimes committed in particular circumstances or within a particular time period. In this context, the discussion will also cover the extent to which such restrictions are precluded by international obligations such as those in the Geneva Conventions with regard to the investigation and prosecution of war crimes.

Event attributes

Chatham House Rule

Jacqueline Rowe

Programme Assistant, International Law Programme
020 7389 3287




sec

Quantitative Profiling of the Human Substantia Nigra Proteome from Laser-capture Microdissected FFPE Tissue

Eva Griesser
May 1, 2020; 19:839-851
Research





sec

Protecting the Cloud: Securing access to public cloud accounts

How Sophos Cloud Optix helps you secure access to your AWS, Azure and Google Cloud Platform accounts.




sec

Protecting the Cloud: Securing user remote access to AWS

How to create secure access to services hosted in AWS with Sophos XG Firewall.




sec

Cybersecurity in the Commonwealth: Building the Foundations of Effective National Responses in the Caribbean

Invitation Only Research Event

8 March 2019 - 9:00am to 5:30pm

Bridgetown, Barbados

Event participants

Joyce Hakmeh, Cyber Research Fellow, International Security Department, Chatham House

This workshop is the second in a series in the 'Implementing the Commonwealth Cybersecurity Agenda' project. The workshop aims to provide a multi-stakeholder pan-Commonwealth platform to discuss how to take the implementation of the 'Commonwealth Cyber Declaration' forward with a focus on the second pillar of the declaration – building the foundations of an effective national cybersecurity response with eight action points. 

As such, the workshop gathers different project implementers under the UK Foreign and Commonwealth Office’s Cyber Programme, in addition to other key relevant stakeholders from the global level, to explore ongoing initiatives which aim to deliver one or more of pillar two’s action points.

The workshop addresses issues from a global perspective and a Commonwealth perspective and will include presentations from selected partners from different Commonwealth countries.

Calum Inverarity

Research Analyst and Coordinator, International Security Department
+44 (0) 207 957 5751




sec

Cybersecurity of NATO’s Space-based Strategic Assets

1 July 2019

Almost all modern military engagements rely on space-based assets, but cyber vulnerabilities can undermine confidence in the performance of strategic systems. This paper will evaluate the threats, vulnerabilities and consequences of cyber risks to strategic systems.

Dr Beyza Unal

Senior Research Fellow, International Security Programme

2019-06-25-Space-Cybersecurity.jpg

The radar domes of RAF Menwith Hill, reported to be the biggest spy base in the world, dominate the skyline on 30 October 2007 in Harrogate, UK. Photo: Getty Images

Summary

  • All satellites depend on cyber technology including software, hardware and other digital components. Any threat to a satellite’s control system or available bandwidth poses a direct challenge to national critical assets.
  • NATO’s missions and operations are conducted in the air, land, cyber and maritime domains. Space-based architecture is fundamental to the provision of data and services in each of these contexts. The critical dependency on space has resulted in new cyber risks that disproportionately affect mission assurance. Investing in mitigation measures and in the resilience of space systems for the military is key to achieving protection in all domains.
  • Almost all modern military engagements rely on space-based assets. During the US-led invasion of Iraq in 2003, 68 per cent of US munitions were guided utilizing space-based means (including laser-, infrared- and satellite-guided munitions); up sharply from 10 per cent in 1990–91, during the first Gulf war. In 2001, 60 per cent of the weapons used by the US in Afghanistan were precision-guided munitions, many of which had the capability to use information provided by space-based assets to correct their own positioning to hit a target.
  • NATO does not own satellites. It owns and operates a few terrestrial elements, such as satellite communications anchor stations and terminals. It requests access to products and services – such as space weather reports and satellite overflight reports provided via satellite reconnaissance advance notice systems – but does not have direct access to satellites: it is up to individual NATO member states to determine whether they allow access.
  • Cyber vulnerabilities undermine confidence in the performance of strategic systems. As a result, rising uncertainty in information and analysis continues to impact the credibility of deterrence and strategic stability. Loss of trust in technology also has implications for determining the source of a malicious attack (attribution), strategic calculus in crisis decision-making and may increase the risk of misperception.




sec

Cybersecurity by Design in Civil Nuclear Power Plants

24 July 2019

Cyberattacks are increasingly challenging critical national infrastructure. This paper considers the security by design approach for civil nuclear power plants and analyses areas of risk and opportunities for the nuclear industry.

Dr Beyza Unal

Senior Research Fellow, International Security Programme

Roger Brunt

Managing Director, Grosmont Howe Ltd

2019-07-24-NuclearPlant.jpg

An employee climbs into the cooling tower of the third and fourth unit at Mochovce nuclear power plant in Slovakia on 2 July 2019. Photo: Getty Images

Summary

  • The application of ‘security by design’ in nuclear new builds could provide operators with the opportunity to establish a robust and resilient security architecture at the beginning of a nuclear power plant’s life cycle. This will enhance the protection of the plant and reduce the need for costly security improvements during its operating life.
  • Security by design cannot fully protect a nuclear power plant from rapidly evolving cyberattacks, which expose previously unsuspected or unknown vulnerabilities.
  • Careful design of security systems and architecture can – and should – achieve levels of protection that exceed current norms and expectations. However, the sourcing of components from a global supply chain means that the integrity of even the most skilfully designed security regime cannot be guaranteed without exhaustive checks of its components.
  • Security by design may well include a requirement for a technical support organization to conduct quality assurance of cyber defences and practices, and this regime should be endorsed by a facility’s executive board and continued at regular intervals after the new build facility has been commissioned.
  • Given the years it takes to design, plan and build a new nuclear power plant, it is important to recognize that from the point of ‘design freeze’ onwards, the operator will be building in vulnerabilities, as technology continues to evolve rapidly while construction fails to keep pace with it. Security by design cannot be a panacea, but it is an important factor in the establishment of a robust nuclear security – and cybersecurity – culture.




sec

Who’s Afraid of Huawei? Understanding the 5G Security Concerns

9 September 2019

Emily Taylor

Associate Fellow, International Security Programme
Emily Taylor examines the controversy around the Chinese tech giant’s mobile broadband equipment and the different approaches taken by Western countries.

2019-09-06-Huawei.jpg

Huawei's Ox Horn campus in Dongguan, China. Photo: Getty Images.

As countries move towards the fifth generation of mobile broadband, 5G, the United States has been loudly calling out Huawei as a security threat. It has employed alarmist rhetoric and threatened to limit trade and intelligence sharing with close allies that use Huawei in their 5G infrastructure.

While some countries such as Australia have adopted a hard line against Huawei, others like the UK have been more circumspect, arguing that the risks of using the firm’s technology can be mitigated without forgoing the benefits.

So, who is right, and why have these close allies taken such different approaches?

The risks

Long-standing concerns relating to Huawei are plausible. There are credible allegations that it has benefitted from stolen intellectual property, and that it could not thrive without a close relationship with the Chinese state.

Huawei hotly denies allegations that users are at risk of its technology being used for state espionage, and says it would resist any order to share information with the Chinese government. But there are questions over whether it could really resist China’s stringent domestic legislation, which compels companies to share data with the government. And given China’s track record of using cyberattacks to conduct intellectual property theft, there may be added risks of embedding a Chinese provider into critical communications infrastructure.

In addition, China’s rise as a global technological superpower has been boosted by the flow of financial capital through government subsidies, venture and private equity, which reveal murky boundaries between the state and private sector for domestic darlings. Meanwhile, the Belt and Road initiative has seen generous investment by China in technology infrastructure across Africa, South America and Asia.

There’s no such thing as a free lunch or a free network – as Sri Lanka discovered when China assumed shares in a strategic port in return for debt forgiveness; or Mexico when a 1% interest loan for its 4G network came on the condition that 80% of the funding was spent with Huawei.

Aside from intelligence and geopolitical concerns, the quality of Huawei’s products represents a significant cyber risk, one that has received less attention than it deserves.

On top of that, 5G by itself will significantly increase the threat landscape from a cybersecurity perspective. The network layer will be more intelligent and adaptable through the use of software and cloud services. The number of network antennae will increase by a factor of 20, and many will be poorly secured ‘things’; there is no need for a backdoor if you have any number of ‘bug doors’.

Finally, the US is threatening to limit intelligence sharing with its closest allies if they adopt Huawei. So why would any country even consider using Huawei in their 5G infrastructure?

Different situations

The truth is that not every country is free to manoeuvre; 5G technology will sit on top of existing mobile infrastructure.

Australia and the US can afford to take a hard line: their national infrastructure has been largely Huawei-free since 2012. However, the Chinese firm is deeply embedded in other countries’ existing structures – for example, in the UK, Huawei has provided telecommunications infrastructure since 2005. Even if the UK decided tomorrow to ditch Huawei, it cannot just rip up existing 4G infrastructure. To do so would cost a fortune, risk years of delay in the adoption of 5G and limit competition in 5G provisioning.

As a result, the UK has adopted a pragmatic approach resulting from years of oversight and analysis of Huawei equipment, during which it has never found evidence of malicious Chinese state cyber activity through Huawei.

At the heart of this process is the Huawei Cyber Security Evaluation Centre, which was founded in 2010 as a confidence-building measure. Originally criticized for ‘effectively policing itself’, as it was run and staffed entirely by Huawei, the governance has now been strengthened, with the National Cyber Security Centre chairing its oversight board.

The board’s 2019 report makes grim reading, highlighting ‘serious and system defects in Huawei’s software engineering and cyber security competence’. But it does not accuse the company of serving as a platform for state-sponsored surveillance.

Similar evidence-based policy approaches are emerging in other countries like Norway and Italy. They offer flexibility for governments, for example by limiting access to some contract competition through legitimate and transparent means, such as security reviews during procurement. The approaches also raise security concerns (both national and cyber) to a primary issue when awarding contracts – something that was not always done in the past, when price was the key driver.

The UK is also stressing the need to manage risk and increase vendor diversity in the ecosystem to avoid single points of failure. A further approach that is beginning to emerge is to draw a line between network ‘core’ and ‘periphery’ components, excluding some providers from the more sensitive ‘core’. The limited rollouts of 5G in the UK so far have adopted multi-provider strategies, and only one has reportedly not included Huawei kit.

Managing the risks to cyber security and national security will become more complex in a 5G environment. In global supply chains, bans based on the nationality of the provider offer little assurance. For countries that have already committed to Huawei in the past, and who may not wish to be drawn into an outright trade war with China, these moderate approaches offer a potential way forward.




sec

Cyber Security and Nuclear Weapons

This project aims to improve resilience in NATO’s nuclear weapons systems against cyber threats.

Cyber security is a vital part of the national and international strategic infrastructure and weapons systems. The increasing cyber capabilities of countries such as China, Russia and North Korea put the North Atlantic Treaty Organization’s (NATO’s) nuclear systems - capabilities that include nuclear command, control and communication, weapons systems and early warning systems - in danger.

There is an urgent need to study and address cyber challenges to nuclear assets within NATO and in key NATO countries. Greater awareness of the potential threats and vulnerabilities is key to improving preparedness and mitigating the risks of a cyber-attack on NATO nuclear weapons systems.

Chatham House produces research responding to the need for information on enhancing cybersecurity for command, control and communications. This project constitutes the beginning of the second phase of the Cyber Security of Nuclear Weapons Systems: Threats, Vulnerabilities and Consequences, a report published in January 2018 in partnership with the Stanley Foundation.

The project responds to the need both for more public information on cyber risks in NATO’s nuclear mission, and to provide policy-driven research to shape and inform nuclear policy within NATO member states and the Nuclear Planning Group.

This project is supported by the Ploughshares Fund and the Stanley Foundation.




sec

Nuclear Weapons: Innovative Approaches for the Complex International Security Environment

This programme of work addresses the conundrum of nuclear weapons as a wicked problem in a complex adaptive system.

Understanding the complexity and the wickedness of the situation allows analysts and strategic planners to approach these complex and intractable issues in new and transformative ways – with a better chance of coping or succeeding and reducing the divisions between experts.

Using complexity theory, a complex adaptive system representing the international system and its interaction with the environment can be represented through an interactive visualization tool that will aid thought processes and policy decision-making. 

Until recently, analysts did not have the tools to be able to create models that could represent the complexity of the international system and the role that nuclear weapons play. Now that these tools are available, analysts should use them to enable decision-makers to gain insights into the range of possible outcomes from a set of possible actions.

This programme builds on work by Chatham House on cyber security and artificial intelligence (AI) in the nuclear/strategic realms.

In order to approach nuclear weapons as wicked problems in a complex adaptive system from different and sometimes competing perspectives, the programme of work involves the wider community of specialists who do not agree on what constitutes the problems of nuclear weapons nor on what are the desired solutions.

Different theories of deterrence, restraint and disarmament are tested. The initiative is international and inclusive, paying attention to gender, age and other aspects of diversity, and the network of MacArthur Grantees are given the opportunity to participate in the research, including in the writing of research papers, so that the complexity modelling can be tested against a wide range of approaches and hypotheses.

In addition, a Senior Reference Group will work alongside the programme, challenging its outcome and findings, and evaluating and guiding the direction of the research.

This project is supported by the MacArthur Foundation.




sec

Supporting NHS Cybersecurity During COVID-19 is Vital

2 April 2020

Joyce Hakmeh

Senior Research Fellow, International Security Programme; Co-Editor, Journal of Cyber Policy
The current crisis is an opportunity for the UK government to show agility in how it deals with cyber threats and how it cooperates with the private sector in creating cyber resilience.

2020-04-02-NHS-nurse-tech-cyber

Nurse uses a wireless electronic tablet to order medicines from the pharmacy at The Queen Elizabeth Hospital, Birmingham, England. Photo by Christopher Furlong/Getty Images.

The World Health Organization, US Department of Health and Human Services, and hospitals in Spain, France and the Czech Republic have all suffered cyberattacks during the ongoing COVID-19 crisis.

In the Czech Republic, a successful attack targeted a hospital with one of the country’s biggest COVID-19 testing laboratories, forcing its entire IT network to shut down, urgent surgical operations to be rescheduled, and patients to be moved to nearby hospitals. The attack also delayed dozens of COVID-19 test results and affected the hospital’s data transfer and storage, affecting the healthcare the hospital could provide.

In the UK, the National Health Service (NHS) is already in crisis mode, focused on providing beds and ventilators to respond to one of the largest peacetime threats ever faced. But supporting the health sector goes beyond increasing human resources and equipment capacity.

Health services ill-prepared

Cybersecurity support, both at organizational and individual level, is critical so health professionals can carry on saving lives, safely and securely. Yet this support is currently missing and the health services may be ill-prepared to deal with the aftermath of potential cyberattacks.

When the NHS was hit by the Wannacry ransomware attack in 2017 - one of the largest cyberattacks the UK has witnessed to date – it caused massive disruption, with at least 80 of the 236 trusts across England affected and thousands of appointments and operations cancelled. Fortunately, a ‘kill-switch’ activated by a cybersecurity researcher quickly brought it to a halt.

But the UK’s National Cyber Security Centre (NCSC), has been warning for some time against a cyber attack targeting national critical infrastructure sectors, including the health sector. A similar attack, known as category one (C1) attack, could cripple the UK with devastating consequences. It could happen and we should be prepared.

Although the NHS has taken measures since Wannacry to improve cybersecurity, its enormous IT networks, legacy equipment and the overlap between the operational and information technology (OT/IT) does mean mitigating current potential threats are beyond its ability.

And the threats have radically increased. More NHS staff with access to critical systems and patient health records are increasingly working remotely. The NHS has also extended its physical presence with new premises, such as the Nightingale hospital, potentially the largest temporary hospital in the world.

Radical change frequently means proper cybersecurity protocols are not put in place. Even existing cybersecurity processes had to be side-stepped because of the outbreak, such as the decision by NHS Digital to delay its annual cybersecurity audit until September. During this audit, health and care organizations submit data security and protection toolkits to regulators setting out their cybersecurity and cyber resilience levels.

The decision to delay was made to allow the NHS organizations to focus capacity on responding to COVID-19, but cybersecurity was highlighted as a high risk, and the importance of NHS and Social Care remaining resilient to cyberattacks was stressed.

The NHS is stretched to breaking point. Expecting it to be on top of its cybersecurity during these exceptionally challenging times is unrealistic, and could actually add to the existing risk.

Now is the time where new partnerships and support models should be emerging to support the NHS and help build its resilience. Now is the time where innovative public-private partnerships on cybersecurity should be formed.

Similar to the economic package from the UK chancellor and innovative thinking on ventilator production, the government should oversee a scheme calling on the large cybersecurity capacity within the private sector to step in and assist the NHS. This support can be delivered in many different ways, but it must be mobilized swiftly.

The NCSC for instance has led the formation of the Cyber Security Information Sharing Partnership (CiSP)— a joint industry and UK government initiative to exchange cyber threat information confidentially in real time with the aim of reducing the impact of cyberattacks on UK businesses.

CiSP comprises organizations vetted by NCSC which go through a membership process before being able to join. These members could conduct cybersecurity assessment and penetration testing for NHS organizations, retrospectively assisting in implementing key security controls which may have been overlooked.

They can also help by making sure NHS remote access systems are fully patched and advising on sensible security systems and approved solutions. They can identify critical OT and legacy systems and advise on their security.

The NCSC should continue working with the NHS to enhance provision of public comprehensive guidance on cyber defence and response to potential attack. This would show they are on top of the situation, projecting confidence and reassurance.

It is often said in every crisis lies an opportunity. This is an opportunity for the UK government to show agility in how it deals with cyber threats and how it cooperates with the private sector in creating cyber resilience.

It is an opportunity to lead a much-needed cultural change showing cybersecurity should never be an afterthought.




sec

Mapping prostate cancer lesions pre/post unsuccessful salvage lymph node dissection using repeat PSMA-PET

Introduction: The aim of this study was to analyze patterns of persistent versus recurrent or new PET lesions in a selected patient cohort with PSA persistence following salvage lymph node dissection (SLND) and pre/post procedure prostate-specific membrane antigen ligand positron emission tomography (PSMA-PET). Material and Methods: 16 patients were included in this multicenter study. Inclusion criteria were: a) PSMA-PET performed for biochemical recurrence before SLND (pre-SLND PET) and b) repeat PSMA-PET performed for persistently elevated PSA level (≥0.1 ng/mL) ≥6 weeks after SLND (post-SLND PET). Image analysis was performed by three independent nuclear medicine physicians applying the molecular imaging TNM system PROMISE. Lesions were confirmed by histopathology, presence on correlative CT/MRI/bone scan or PSA response after focal therapy. Results: post-SLND PET identified PCa-lesions in 88% (14/16) of patients with PSA persistence after SLND. Median PSA was 1.2 ng/mL (IQR, 0.6-2.8 ng/mL). Disease was confined to the pelvis in 56% of patients (9/16) and most of these men had common iliac (6/16, 38%) and internal iliac lymph node metastases (6/16, 38%). Extrapelvic disease was detected in 31% of patients (5/16). In pre- and post-SLND PET comparison, 10/16 had at least one lesion already detected at baseline (63% PET persistence); 4/16 had new lesions only (25% PET recurrence); 2 had no disease on post-SLND PET. All validated regions (11 regions in 9 patients) were true positive. 9/14 (64%) patients underwent repeat local therapies after SLND (7/14 radiotherapy, 2/14 surgery). Conclusion: SLND of pelvic nodal metastases was often not complete according to PSMA-PET. About two thirds of patients had PET positive nodal disease after SLND already seen on pre-SLND PSMA-PET. Notably, about one quarter of patients had new lesions, not detected by pre-surgical PSMA-PET.




sec

Flare phenomenon in O-(2-[18F]-Fluoroethyl)-L-Tyrosine PET after resection of gliomas

Purpose: PET using O-(2-[18F]Fluoroethyl)-L-tyrosine (18F-FET) is useful to detect residual tumor tissue after glioma resection. Recent animal experiments detected reactive changes of 18F-FET uptake at the rim of the resection cavity within the first two weeks after resection of gliomas. In the present study, we evaluated pre- and postoperative 18F-FET PET scans of glioma patients with particular emphasis on the identification of reactive changes after surgery. Methods: Forty-three patients with cerebral gliomas (9 low-grade, 34 high-grade; 9 primary tumors, 34 recurrent tumors) who had preoperative (time before surgery, median 23 d, range 6-44 d) and postoperative 18F-FET-PET (time after surgery, median 14, range 5–28 d) were included. PET scans (20-40 min p.i.) were evaluated visually for complete or incomplete resection (CR, IR) and compared with MRI. Changes of 18F-FET-uptake in residual tumor were evaluated by tumor-to-brain ratios (TBRmax) and in the vicinity of the resection cavity by maximum lesion-to-brain ratios (LBRmax). Results: Visual analysis of 18F-FET PET scans revealed CR in 16/43 patients and IR in the remaining patients. PET results were concordant with MRI in 69% of the patients. LBRmax of 18F-FET uptake in the vicinity of the resection cavity was significantly higher compared with preoperative values (1.59 ± 0.36 versus 1.14 ± 0.17; n = 43, p<0.001). In 11 patients (26%) a "flare phenomenon" was observed with a considerable increase of 18F-FET uptake compared with preoperative values in either the residual tumor (n = 5) or in areas remote from tumor in the preoperative PET scan (n = 6) (2.92 ± 1.24 versus 1.62 ± 0.75; p<0.001). Further follow-up in five patients showed decreasing 18F-FET uptake in the flare areas in four and progress in one case. Conclusion: Our study confirms that 18F-FET PET provides valuable information for assessing the success of glioma resection. Postoperative reactive changes at the rim of the resection cavity appear to be mild. However, in 23 % of the patients, a postoperative "flare phenomenon" was observed that warrants further investigation.




sec

Secrecy, spies and the global South: intelligence studies beyond the 'Five Eyes' alliance

6 November 2019 , Volume 95, Number 6

Zakia Shiraz and Richard J. Aldrich

The study of secrecy and spies remain subjects dominated by Anglo-American experiences. In recent years there has been some effort to refocus the lens of research upon ‘intelligence elsewhere’, including the global South. This is partly because of intense interest in the Arab Spring and ‘managed democracy’, placing a wider range of secret services under the spotlight. However, the approach to research is still dominated by concepts and methods derived from studying the English-speaking states of the ‘Five Eyes’ alliance and their European outriders. This article calls for a re-examination of research strategies for Intelligence Studies and for those theorizing surveillance, suggesting that both fields have much to learn from area studies and development studies, especially in the realm of research practice and ethics. If the growing number of academics specializing in intelligence genuinely wish to move forward and examine the global South they will need to rethink their tool-kit and learn from other disciplines. We suggest there is a rich tradition to draw upon.




sec

The UK, US and Mauritius: Decolonization, Security, Chagos and the ICJ

Invitation Only Research Event

30 January 2020 - 8:15am to 9:15am

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Professor Philippe Sands QC, Professor of Law, UCL 
Richard Burt, Managing Partner, McLarty Associates
Chair: Dr Leslie Vinjamuri, Director, US and Americas Programme; Dean, Queen Elizabeth II Academy, Chatham House

The Chagos archipelago in the Indian Ocean has garnered media attention recently after the UK failed to abide by a UN deadline to return the islands to Mauritius. The US has landed in the middle of the dispute as a 1965 agreement with the UK has allowed the US to establish a military base on one of the islands, Diego Garcia, which has since become instrumental in US missions in the Asia-Pacific and the Middle East. 

In February 2019, an Advisory Opinion of the International Court of Justice (ICJ) found that the Chagos archipelago was unlawfully dismembered from Mauritius, in violation of the right to self-determination and that the United Kingdom is under an obligation to end its administration of the Chagos archipelago ‘as rapidly as possible’. The UN General Assembly subsequently voted overwhelmingly in favour of the UK leaving the islands by the end of November 2019 and the right of the former residents who were removed by the UK to return. The UK does not accept the ICJ and UN rulings and argues that the islands are needed to protect Britain from security threats while Mauritius has made clear the base can remain.

Professor Philippe Sands QC, professor of law at University College London and lead counsel for Mauritius on the ICJ case on Legal Consequences of the Separation of the Chagos archipelago from Mauritius in 1965, will be joining Ambassador Richard Burt, US chief negotiator in the Strategic Arms Reduction Talks with the former Soviet Union for a discussion on the fate of the archipelago including the future of the military base and the right of return of former residents.  

Attendance at this event is by invitation only. 

Event attributes

Chatham House Rule

Department/project

US and Americas Programme




sec

The Central African Republic: Security, Development and Responding to the Humanitarian Situation

Invitation Only Research Event

3 February 2020 - 2:00pm to 3:00pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Denise Brown, United Nations Deputy Special Representative of the Secretary-General, Resident and Humanitarian Coordinator in the Central African Republic
Chair: Ben Shepherd, Consulting Fellow, Africa Programme, Chatham House

With two-thirds of the country’s population estimated to be in need of humanitarian aid and one-quarter either internally displaced or living as refugees in neighbouring countries, the Central African Republic (CAR) continues to face serious and complex humanitarian challenges. The country’s forthcoming presidential elections scheduled for December 2020 risk inflaming CAR’s volatile security situation particularly with the return of former leader, François Bozizé, ousted by the Séléka rebel coalition leader, Michel Djotodia, who has also returned from exile.

At this event, Denise Brown will discuss CAR’s current security, humanitarian and development situations and the role of actors such as the United Nations Multidimensional Integrated Stabilization Mission in the Central African Republic (MINUSCA). She will also discuss prospects for much-needed governance reform and reconciliation.

Attendance at this event is by invitation only. 

Event attributes

Chatham House Rule

Hanna Desta

Programme Assistant, Africa Programme




sec

Webinar: Implications of the COVID-19 Pandemic for Food Security and Resilience in Africa

Research Event

23 April 2020 - 1:00pm to 2:00pm

Event participants

Dr Arif Husain, Chief Economist and Director of Research, Assessment and Monitoring, United Nations World Food Programme
Respondent: Dr Leena Koni Hoffmann, Associate Fellow, Africa Programme, Chatham House
Chair: Professor Tim Benton, Research Director, Emerging Risks; Director, Energy, Environment and Resources Programme, Chatham House
Dr Arif Husain gives his assessment of the potential impact that the COVID-19 pandemic will have on food security in Africa and what can be done to prevent a food security emergency.
 
Linked to the immediate public health consequences of the COVID-19 pandemic are those of economic and food security, particularly significant for low- and middle-income countries. Currently more than 821 million people globally go hungry, with 100 million of those suffering acute hunger, and this will worsen if the evolving economic emergency becomes a food security emergency.
 
Sub-Saharan African countries rely on trade for food security and for revenue; they imported more than 40 million tons of cereal from around the world in 2018, according to the World Food Programme (WFP). The region faces stark new challenges due to the pandemic.

This event launches the WFP paper COVID-19: Potential impact on the world’s poorest people.

Department/project

Hanna Desta

Programme Assistant, Africa Programme




sec

Blistering1 Modulates Penicillium expansum Virulence Via Vesicle-mediated Protein Secretion [Research]

The blue mold fungus, Penicillium expansum, is a postharvest apple pathogen that contributes to food waste by rotting fruit and by producing harmful mycotoxins (e.g. patulin). To identify genes controlling pathogen virulence, a random T-DNA insertional library was created from wild-type P. expansum strain R19. One transformant, T625, had reduced virulence in apples, blistered mycelial hyphae, and a T-DNA insertion that abolished transcription of the single copy locus in which it was inserted. The gene, Blistering1, encodes a protein with a DnaJ domain, but otherwise has little homology outside the Aspergillaceae, a family of fungi known for producing antibiotics, mycotoxins, and cheese. Because protein secretion is critical for these processes and for host infection, mass spectrometry was used to monitor proteins secreted into liquid media during fungal growth. T625 failed to secrete a set of enzymes that degrade plant cell walls, along with ones that synthesize the three final biosynthetic steps of patulin. Consequently, the culture broth of T625 had significantly reduced capacity to degrade apple tissue and contained 30 times less patulin. Quantitative mass spectrometry of 3,282 mycelial proteins revealed that T625 had altered cellular networks controlling protein processing in the endoplasmic reticulum, protein export, vesicle-mediated transport, and endocytosis. T625 also had reduced proteins controlling mRNA surveillance and RNA processing. Transmission electron microscopy of hyphal cross sections confirmed that T625 formed abnormally enlarged endosomes or vacuoles. These data reveal that Blistering1 affects internal and external protein processing involving vesicle-mediated transport in a family of fungi with medical, commercial, and agricultural importance.




sec

Quantitative Profiling of the Human Substantia Nigra Proteome from Laser-capture Microdissected FFPE Tissue [Research]

Laser-capture microdissection (LCM) allows the visualization and isolation of morphologically distinct subpopulations of cells from heterogeneous tissue specimens. In combination with formalin-fixed and paraffin-embedded (FFPE) tissue it provides a powerful tool for retrospective and clinically relevant studies of tissue proteins in a healthy and diseased context. We first optimized the protocol for efficient LCM analysis of FFPE tissue specimens. The use of SDS containing extraction buffer in combination with the single-pot solid-phase-enhanced sample preparation (SP3) digest method gave the best results regarding protein yield and protein/peptide identifications. Microdissected FFPE human substantia nigra tissue samples (~3,000 cells) were then analyzed, using tandem mass tag (TMT) labeling and LC-MS/MS, resulting in the quantification of >5,600 protein groups. Nigral proteins were classified and analyzed by abundance, showing an enrichment of extracellular exosome and neuron-specific gene ontology (GO) terms among the higher abundance proteins. Comparison of microdissected samples with intact tissue sections, using a label-free shotgun approach, revealed an enrichment of neuronal cell type markers, such as tyrosine hydroxylase and alpha-synuclein, as well as proteins annotated with neuron-specific GO terms. Overall, this study provides a detailed protocol for laser-capture proteomics using FFPE tissue and demonstrates the efficiency of LCM analysis of distinct cell subpopulations for proteomic analysis using low sample amounts.




sec

The Secretome Profiling of a Pediatric Airway Epithelium Infected with hRSV Identified Aberrant Apical/Basolateral Trafficking and Novel Immune Modulating (CXCL6, CXCL16, CSF3) and Antiviral (CEACAM1) Proteins [Research]

The respiratory epithelium comprises polarized cells at the interface between the environment and airway tissues. Polarized apical and basolateral protein secretions are a feature of airway epithelium homeostasis. Human respiratory syncytial virus (hRSV) is a major human pathogen that primarily targets the respiratory epithelium. However, the consequences of hRSV infection on epithelium secretome polarity and content remain poorly understood. To investigate the hRSV-associated apical and basolateral secretomes, a proteomics approach was combined with an ex vivo pediatric human airway epithelial (HAE) model of hRSV infection (data are available via ProteomeXchange and can be accessed at https://www.ebi.ac.uk/pride/ with identifier PXD013661). Following infection, a skewing of apical/basolateral abundance ratios was identified for several individual proteins. Novel modulators of neutrophil and lymphocyte activation (CXCL6, CSF3, SECTM1 or CXCL16), and antiviral proteins (BST2 or CEACAM1) were detected in infected, but not in uninfected cultures. Importantly, CXCL6, CXCL16, CSF3 were also detected in nasopharyngeal aspirates (NPA) from hRSV-infected infants but not healthy controls. Furthermore, the antiviral activity of CEACAM1 against RSV was confirmed in vitro using BEAS-2B cells. hRSV infection disrupted the polarity of the pediatric respiratory epithelial secretome and was associated with immune modulating proteins (CXCL6, CXCL16, CSF3) never linked with this virus before. In addition, the antiviral activity of CEACAM1 against hRSV had also never been previously characterized. This study, therefore, provides novel insights into RSV pathogenesis and endogenous antiviral responses in pediatric airway epithelium.




sec

Cyber security expert issues dire warning over vulnerability of key infrastructure

Data theft and cybercrime is a major source of funding for Islamic State which is likely to have secretly planted insiders "around the world" in positions where critical data could be extracted and exploited, a leading cyber security expert has warned.




sec

Taxpayer records exposed by serious ATO, myGov security flaw

Taxpayer says he was hung up on twice by call centre staff when trying to report the issue.




sec

Australian public service failing to share information: Public Sector Data Management report

A report has revealed stunning examples of public service inefficiency when it comes to releasing and managing data.




sec

Slack's secret sauce: how it became the fastest growing business app ever

Slack has launched its Asia-Pacific headquarters in Melbourne. We caught up with Ali Rayl, head of customer experience.




sec

Recruitment drive for cyber security specialists will bring challenges for government

Fear government's cyber security recruitment drive will lead to job cuts.




sec

Call for a cyber security reserve corps to help fight major attacks

Experienced volunteers would help fight major online threats to governments, private industry and civil institutions.




sec

Australia's Cyber Security Strategy: weaknesses, yes, but we're improving

The online world changes so fast it was always going to be tough to design a four-year strategy.




sec

Quirk's integrity questioned over failure to release "secret" IT report

Opposition councillors have called Brisbane's Lord Mayor Graham Quirk secretive and accused him of putting his integrity at stake over the failure to release an external review into the now terminated $122 million IT contact with Technology One.




sec

Cyber security threat: Is Australia's power grid safe from hackers?

Cyber attacks have labelled the number one threat to power and utility companies worldwide, a new EY report has found.




sec

Secrets and Spies: UK Intelligence Accountability After Iraq and Snowden

20 January 2020

How can democratic governments hold intelligence and security agencies to account when what they do is largely secret? Jamie Gaskarth explores how intelligence professionals view accountability in the context of 21st century politics. 

Jamie Gaskarth

Senior Lecturer, University of Birmingham

Using the UK as a case study, this book provides the first systematic exploration of how accountability is understood inside the secret world. It is based on new interviews with current and former UK intelligence practitioners, as well as extensive research into the performance and scrutiny of the UK intelligence machinery.

The result is the first detailed analysis of how intelligence professionals view their role, what they feel keeps them honest, and how far external overseers impact on their work.

The UK gathers material that helps inform global decisions on such issues as nuclear proliferation, terrorism, transnational crime, and breaches of international humanitarian law. On the flip side, the UK was a major contributor to the intelligence failures leading to the Iraq war in 2003, and its agencies were complicit in the widely discredited U.S. practices of torture and 'rendition' of terrorism suspects. UK agencies have come under greater scrutiny since those actions, but it is clear that problems remain.

Secrets and Spies is the result of a British Academy funded project (SG151249) on intelligence accountability.

Open society is increasingly defended by secret means. For this reason, oversight has never been more important. This book offers a new exploration of the widening world of accountability for UK intelligence, encompassing informal as well as informal mechanisms. It substantiates its claims well, drawing on an impressive range of interviews with senior figures. This excellent book offers both new information and fresh interpretations. It will have a major impact.

Richard Aldrich, Professor of International Security, University of Warwick, UK

Gaskarth’s novel approach, interpreting interviews with senior figures from the intelligence world, brings fresh insight on a significant yet contested topic. He offers an impressively holistic account of intelligence accountability—both formal and informal—and, most interestingly of all, of how those involved understand it. This is essential reading for those wanting to know what accountability means and how it is enacted.

Rory Cormac, Professor of International Relations, University of Nottingham

About the author

Jamie Gaskarth is senior lecturer at the University of Birmingham, where he teaches strategy and decision-making. His research looks at the ethical dilemmas of leadership and accountability in intelligence, foreign policy, and defence. He is author/editor or co-editor of six books and served on the Academic Advisory panel for the 2015 UK National Security Strategy and Strategic Defence and Security Review.

Available now: Buying options

Insights: Critical Thinking on International Affairs

Department/project




sec

Episode 28 - The Internet of Gamescom (IoG) Blackberry security and plane hacks

David Price is in the host chair this week and is joined by Lewis Painter, staff writer at PC Advisor and Macworld UK to discuss all the news coming out of Gamescom, including No Man's Sky, Metal Gear, Final Fantasy and Battlefield. Henry Burrell, staff writer at PC Advisor and Macworld UK jumps in to chat Blackberry and its trumped up security claims (15:00). Finally, Charlotte Jee, editor at Techworld.com talks about hacking planes, trains and automobiles (26:30).  


See acast.com/privacy for privacy and opt-out information.