the Flow-induced reorganization of laminin-integrin networks within the endothelial basement membrane uncovered by proteomics By feedproxy.google.com Published On :: 2020-04-24 Eelke P. BéguinApr 24, 2020; 0:RA120.001964v1-mcp.RA120.001964Research Full Article
the Identification of an Unconventional Subpeptidome Bound to the Behcet's Disease-associated HLA-B*51:01 that is Regulated by Endoplasmic Reticulum Aminopeptidase 1 (ERAP1) By feedproxy.google.com Published On :: 2020-05-01 Liye ChenMay 1, 2020; 19:871-883Research Full Article
the Quantitative proteomics of human heart samples collected in vivo reveal the remodeled protein landscape of dilated left atrium without atrial fibrillation By feedproxy.google.com Published On :: 2020-04-14 Nora LinscheidApr 14, 2020; 0:RA119.001878v1-mcp.RA119.001878Research Full Article
the Immediate adaptation analysis implicates BCL6 as an EGFR-TKI combination therapy target in NSCLC By feedproxy.google.com Published On :: 2020-03-31 Yan Zhou TranMar 31, 2020; 0:RA120.002036v1-mcp.RA120.002036Research Full Article
the The Data Must Be Accessible to All By feedproxy.google.com Published On :: 2020-04-01 Lila M. GieraschApr 1, 2020; 19:569-570Editorial Full Article
the Quantitative Profiling of the Human Substantia Nigra Proteome from Laser-capture Microdissected FFPE Tissue By feedproxy.google.com Published On :: 2020-05-01 Eva GriesserMay 1, 2020; 19:839-851Research Full Article
the Rising to the challenge in the worst circumstances By feedproxy.google.com Published On :: Thu, 16 Apr 2020 14:28:47 +0000 In this era when we need to do everything possible to keep essential businesses operational, the people of the information security community have banded together in an inspirational effort to protect us all. Full Article Corporate coronavirus COVID-19 COVID-19 Cyber Threat Coalition CTI League Cyber Volunteers 19
the Following the money in a massive “sextortion” spam scheme By feedproxy.google.com Published On :: Wed, 22 Apr 2020 12:30:08 +0000 Cryptocurrency profits from sextortion spam funneled into wallets tied to other cybercrime and dark web market activity. Full Article SophosLabs Uncut
the Protecting the Cloud: Securing Windows Virtual Desktop By feedproxy.google.com Published On :: Fri, 24 Apr 2020 13:17:04 +0000 How to deploy and secure your virtual desktops with Sophos Intercept X and Sophos XG Firewall Full Article Cloud Cloud Security Intercept X Microsoft Azure XG Firewall XG Firewall v18
the Protecting the Cloud: Securing access to public cloud accounts By feedproxy.google.com Published On :: Tue, 05 May 2020 12:44:15 +0000 How Sophos Cloud Optix helps you secure access to your AWS, Azure and Google Cloud Platform accounts. Full Article Cloud Amazon Web Services AWS Azure Cloud Optix GCP Google cloud platform MFA Microsoft Azure public cloud
the Protecting the Cloud: Securing user remote access to AWS By feedproxy.google.com Published On :: Thu, 07 May 2020 13:19:27 +0000 How to create secure access to services hosted in AWS with Sophos XG Firewall. Full Article Cloud AWS XG Firewall XG Firewall v18
the Making the most of attending conferences By blogs.ams.org Published On :: Tue, 08 Oct 2019 16:54:02 +0000 In this blog by Julianne Vega, graduate student at University of Kentucky, Julianne tells us how to make the most of attending math conferences. If you are heading to a conference, challenge yourself! Your first conference may not be the … Continue reading → Full Article career advancement General Graduate School Uncategorized Undegraduates
the Mathematical light shines blindly on us By blogs.ams.org Published On :: Mon, 09 Dec 2019 18:57:58 +0000 By William Yslas Vélez Professor Emeritus University of Arizona “When I go to a Mexican restaurant I would gladly pay the musicians to stop playing.” John (not his real name) did not like the noise level. This statement came up … Continue reading → Full Article Changing Graduate Programs General Uncategorized
the A mathematician’s mission statement By blogs.ams.org Published On :: Thu, 23 Apr 2020 18:58:29 +0000 By Pamela E. Harris and Julianne Vega Companies and organizations are driven by their mission statements. These mission statements provide a concrete summary of what they value and what they work to achieve. Take for example the following mission statements: … Continue reading → Full Article career advancement General Uncategorized
the Learning During the Pandemic: What we wish our professors and mentors knew By blogs.ams.org Published On :: Tue, 05 May 2020 12:45:41 +0000 Student Authors: Mayleen Cortez, Brooke Keene-Gomez, Lucy Martinez, Amaury V. Miniño, Jenna Race, Kelemua Tesfaye, and Stephanie. Blog post compiled by Melissa Gutiérrez González, Pamela E. Harris, and Alicia Prieto Langarica. In this blog we center the voices of mathematics students as … Continue reading → Full Article career advancement General Going to graduate school graduation Uncategorized Undegraduates work life balance
the Strengthening Urban Preparedness and Resilience Against Biological Threats in Accra By feedproxy.google.com Published On :: Wed, 23 Jan 2019 17:40:01 +0000 Invitation Only Research Event 1 March 2019 - 10:30am to 2 March 2019 - 3:00pm Chatham House, London Capacity to contain and respond to biological threats varies considerably across the world. Yet such preparedness is vital for prevention, impact-reduction and resilience in the face of biological events, whether they be natural or deliberate outbreaks.Chatham House is conducting a series of meetings to strengthen urban preparedness for, and resilience against, biological threats in African countries. This meeting will examine the preparedness and prevention mechanisms in Accra, reviewing the comprehensiveness of city-level preparedness. This meeting will focus on the formation and implementation of city-level action plans in the context of preparedness for managing biological threats. It will also explore how local authorities are contributing to this effort with their knowledge and expertise.Attendance at this event is by invitation only. Department/project International Security Programme, Strengthening Urban Preparedness and Resilience against Biological Threats Nilza Amaral Project Manager, International Security Programme Email Full Article
the Cybersecurity in the Commonwealth: Building the Foundations of Effective National Responses in the Caribbean By feedproxy.google.com Published On :: Thu, 07 Feb 2019 14:20:01 +0000 Invitation Only Research Event 8 March 2019 - 9:00am to 5:30pm Bridgetown, Barbados Event participants Joyce Hakmeh, Cyber Research Fellow, International Security Department, Chatham House This workshop is the second in a series in the 'Implementing the Commonwealth Cybersecurity Agenda' project. The workshop aims to provide a multi-stakeholder pan-Commonwealth platform to discuss how to take the implementation of the 'Commonwealth Cyber Declaration' forward with a focus on the second pillar of the declaration – building the foundations of an effective national cybersecurity response with eight action points. As such, the workshop gathers different project implementers under the UK Foreign and Commonwealth Office’s Cyber Programme, in addition to other key relevant stakeholders from the global level, to explore ongoing initiatives which aim to deliver one or more of pillar two’s action points.The workshop addresses issues from a global perspective and a Commonwealth perspective and will include presentations from selected partners from different Commonwealth countries. Department/project International Security Programme Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email Full Article
Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email
the How Regulation Could Break the Internet: In Conversation with Andrew Sullivan By feedproxy.google.com Published On :: Mon, 29 Apr 2019 13:30:01 +0000 Research Event 19 June 2019 - 6:00pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Andrew Sullivan, President and CEO Internet SocietyChair: Emily Taylor, Associate Fellow, International Security Department, Chatham House; Editor, Journal of Cyber Policy Internet regulation is increasing around the world creating positive obligations on internet providers and exerting negative unintended consequences on the internet infrastructure. In some ways, most of this regulatory activity is justifiable. Governments are concerned about the increased risk that the use of the internet brings to societies. As a response, many governments have been enacting regulations as their main approach to dealing with these concerns. The main challenge is that most of the current regulations are either ill-defined or unworkable. On the one hand, several governments have established procedures that seek to analyze the impacts of new regulatory proposals before they were adopted. However, there hasn’t been enough attention aimed at analyzing regulations after they have been adopted and only a few have measures in place to evaluate the impacts of the procedures and practices that govern the regulatory process itself.On the other hand, much of the regulation creates unintended consequences to the internet itself. It undermines many of its fundamental properties and challenges the integrity and resiliency of its infrastructure. This event discusses current practices in internet-related regulation and the related challenges. Panellists will discuss how governments can enforce regulations that achieve their intended purpose while at the same time protecting the internet’s core infrastructure and its properties, including its openness, interoperability and global reach. Department/project International Security Programme, Internet Governance Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email Full Article
Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email
the The Implications of Drone Proliferation in Europe By feedproxy.google.com Published On :: Wed, 01 May 2019 10:55:01 +0000 Invitation Only Research Event 20 May 2019 - 9:30am to 21 May 2019 - 12:30pm Chatham House, London Several countries in Europe are currently developing, increasing or arming their drone capabilities. This increase in drone capability is taking place through procurement by individual states, bilateral projects – such as the French-German Future Combat Air Systems – and multinational efforts that include the development of the Eurodrone – a project by Germany, France, Italy and Spain – and the nEUROn which involves France, Greece, Italy, Spain, Sweden and Switzerland. In addition, the EU has recently approved the European Defence Fund which, along with funds for joint development of defence equipment and technology and for defence research, also includes direct funding to support the development of the Eurodrone. Other recent developments include the UK obtaining the MQ−9B SkyGuardian – an updated variant of the MQ-9 Reaper – and Germany signing a leasing agreement for the Israeli-made Heron TP. Also, in March 2019, the US State Department approved the sale of the MQ-9B SkyGuardian to Belgium and announced the provision of MQ-9 Reaper drones to the Netherlands. While the UK and France are the only countries in Europe so far to possess armed drones, Italy is on track to acquire armed drones in the near future. However, out of the European countries currently seeking to obtain unarmed drones – including Spain, Poland and Greece – only Switzerland has so far ruled out weaponizing its drones in the future. This Chatham House workshop will examine key issues pertaining to drone proliferation in Europe including: The risks and challenges of the increasing number and arming of drones. The risks for countries of not doing so in terms of geostrategic interests and the future battlefield.Opportunities for developing common standards on drone transfers and deployment across EU member states.Sharing and cooperation on drone use.What legal and policy implications might arise for European states as a result.With Brexit on the horizon, participants will also consider what impact this may have on future drone developments in Europe.Attendance at this event is by invitation only. Nilza Amaral Project Manager, International Security Programme Email Department/project International Security Programme, Policy Implications of Armed Drone Use Full Article
the Tackle the ‘Splinternet’ By feedproxy.google.com Published On :: Fri, 31 May 2019 14:57:47 +0000 12 June 2019 Marjorie Buchser Executive Director, Digital Society Initiative @Marjorie_BU LinkedIn Joyce Hakmeh Senior Research Fellow, International Security Programme; Co-Editor, Journal of Cyber Policy @joycehakmeh LinkedIn Competing governance visions are impairing efforts to regulate the digital space. To limit the spread of repressive models, policymakers in the West and elsewhere need to ensure the benefits of an open and well-run system are more widely communicated. 20150415GCIG-1.jpg The development of governance in a wide range of digital spheres – from cyberspace to internet infrastructure to emerging technologies such as artificial intelligence (AI) – is failing to match rapid advances in technical capabilities or the rise in security threats. This is leaving serious regulatory gaps, which means that instruments and mechanisms essential for protecting privacy and data, tackling cybercrime or establishing common ethical standards for AI, among many other imperatives, remain largely inadequate.A starting point for effective policy formation is to recognize the essential complexity of the digital landscape, and the consequent importance of creating a ‘common language’ for multiple stakeholders (including under-represented actors such as smaller and/or developing countries, civil society and non-for-profit organizations).The world’s evolving technological infrastructure is not a monolithic creation. In practice, it encompasses a highly diverse mix of elements – so-called ‘high-tech domains’,[1] hardware, systems, algorithms, protocols and standards – designed by a plethora of private companies, public bodies and non-profit organizations.[2] Varying cultural, economic and political assumptions have shaped where and which technologies have been deployed so far, and how they have been implemented.Perhaps the most notable trend is the proliferation of techno-national regimes and private-sector policy initiatives, reflecting often-incompatible doctrines in respect of privacy, openness, inclusion and state control. Beyond governments, the interests and ambitions of prominent multinationals (notably the so-called ‘GAFAM’ tech giants in the West, and their ‘BATX’ counterparts in China)[3] are significant factors feeding into this debate.Cyberspace and AI – two case studiesTwo particular case studies highlight the essential challenges that this evolving – and, in some respects, still largely unformed – policy landscape presents. The first relates to cyberspace. Since 1998, Russia has established itself as a strong voice in the cyberspace governance debate – calling for a better understanding, at the UN level, of ICT developments and their impact on international security.The country’s efforts were a precursor to the establishment in 2004 of a series of UN Groups of Governmental Experts (GGEs), aimed at strengthening the security of global information and telecommunications systems. These groups initially succeeded in developing common rules, norms and principles around some key issues. For example, the 2013 GGE meeting recognized that international law applies to the digital space and that its enforcement is essential for a secure, peaceful and accessible ICT environment.However, the GGE process stalled in 2017, primarily due to fundamental disagreements between countries on the right to self-defence and on the applicability of international humanitarian law to cyber conflicts. The breakdown in talks reflected, in particular, the divide between two principal techno-ideological blocs: one, led by the US, the EU and like-minded states, advocating a global and open approach to the digital space; the other, led mainly by Russia and China, emphasizing a sovereignty-and-control model.The divide was arguably entrenched in December 2018, with the passage of two resolutions at the UN General Assembly. A resolution sponsored by Russia created a working group to identify new norms and look into establishing regular institutional dialogue.At the same time, a US-sponsored resolution established a GGE tasked, in part, with identifying ways to promote compliance with existing cyber norms. Each resolution was in line with its respective promoter’s stance on cyberspace. While some observers considered these resolutions potentially complementary, others saw in them competing campaigns to cement a preferred model as the global norm. Outside the UN, there have also been dozens of multilateral and bilateral accords with similar objectives, led by diverse stakeholders.[4]The second case study concerns AI. Emerging policy in this sector suffers from an absence of global standards and a proliferation of proposed regulatory models. The potential ability of AI to deliver unprecedented capabilities in so many areas of human activity – from automation and language applications to warfare – means that it has become an area of intense rivalry between governments seeking technical and ideological leadership of this field.China has by far the most ambitious programme. In 2017, its government released a three-step strategy for achieving global dominance in AI by 2030. Beijing aims to create an AI industry worth about RMB 1 trillion ($150 billion)[5] and is pushing for greater use of AI in areas ranging from military applications to the development of smart cities. Elsewhere, the US administration has issued an executive order on ‘maintaining American leadership on AI’.On the other side of the Atlantic, at least 15 European countries (including France, Germany and the UK) have set up national AI plans. Although these strategies are essential for the development of policy infrastructure, they are country-specific and offer little in terms of global coordination. Ominously, greater inclusion and cooperation are scarcely mentioned, and remain the least prioritized policy areas.[6]Competing multilateral frameworks on AI have also emerged. In April 2019, the European Commission published its ethics guidelines for trustworthy AI. Ministers from Nordic countries[7] recently issued their own declaration on collaboration in ‘AI in the Nordic-Baltic region’. And leaders of the G7 have committed to the ‘Charlevoix Common Vision for the Future of Artificial Intelligence’, which includes 12 guiding principles to ensure ‘human-centric AI’.More recently, OECD member countries adopted a set of joint recommendations on AI. While nations outside the OECD were welcomed into the coalition – with Argentina, Brazil and Colombia adhering to the OECD’s newly established principles – China, India and Russia have yet to join the discussion. Despite their global aspirations, these emerging groups remain largely G7-led or EU-centric, and again highlight the divide between parallel models. The importance of ‘swing states’No clear winner has emerged from among the competing visions for cyberspace and AI governance, nor indeed from the similar contests for doctrinal control in other digital domains. Concerns are rising that a so-called ‘splinternet’ may be inevitable – in which the internet fragments into separate open and closed spheres and cyber governance is similarly divided.Each ideological camp is trying to build a critical mass of support by recruiting undecided states to its cause. Often referred to as ‘swing states’, the targets of these overtures are still in the process of developing their digital infrastructure and determining which regulatory and ethical frameworks they will apply. Yet the policy choices made by these countries could have a major influence on the direction of international digital governance in the future.India offers a case in point. For now, the country seems to have chosen a versatile approach, engaging with actors on various sides of the policy debate, depending on the technology governance domain. On the one hand, its draft Personal Data Protection Bill mirrors principles in the EU’s General Data Protection Regulation (GDPR), suggesting a potential preference for the Western approach to data security.However, in 2018, India was the leading country in terms of internet shutdowns, with over 100 reported incidents.[8] India has also chosen to collaborate outside the principal ideological blocs, as evidenced by an AI partnership it has entered into with the UAE. At the UN level, India has taken positions that support both blocs, although more often favouring the sovereignty-and-control approach.Principles for rule-makingSovereign nations have asserted aspirations for technological dominance with little heed to the cross-border implications of their policies. This drift towards a digital infrastructure fragmented by national regulation has potentially far-reaching societal and political consequences – and implies an urgent need for coordinated rule-making at the international level.The lack of standards and enforcement mechanisms has created instability and increased vulnerabilities in democratic systems. In recent years, liberal democracies have been targeted by malevolent intrusions in their election systems and media sectors, and their critical infrastructure has come under increased threat. If Western nations cannot align around, and enforce, a normative framework that seeks to preserve individual privacy, openness and accountability through regulation, a growing number of governments may be drawn towards repressive forms of governance.To mitigate those risks, efforts to negotiate a rules-based international order for the digital space should keep several guiding principles in mind. One is the importance of developing joint standards, as well as the need for consistent messaging towards the emerging cohort of engaged ‘swing states’. Another is the need for persistence in ensuring that the political, civic and economic benefits associated with a more open and well-regulated digital sphere are made clear to governments and citizens everywhere.Countries advocating an open, free and secure model should take the lead in embracing and promoting a common affirmative model – one that draws on human rights principles (such as the rights to freedom of opinion, freedom of expression and privacy) and expands their applications to the digital space. Specific rules on cyberspace and technology use need to include pragmatic policy ideas and models of implementation. As this regulatory corpus develops, rules should be adapted to reflect informed consideration of economic and social priorities and attitudes, and to keep pace with what is possible technologically.[9]What needs to happenDemystifying the salient issues, consistent messaging and the creation of a common discourse are key to advancing a well-informed debate on global digital governance.The benefits associated with open and well-regulated digital governance should be clearly presented to all stakeholders. For example, the link between sustainable development, respect for human rights and a secure, free and open internet should take priority in the debate with developing countries.International norms need to be updated and reinterpreted to assert the primacy of non-harmful applications of technologies and digital interactions.This process should follow a multi-stakeholder approach to include under-represented actors, such as developing countries and civil society, and should adopt a gender-balanced approach.The design of rules, standards and norms needs to take into account the essentially transnational nature of digital technologies. Rules, standards and norms need to be applicable consistently across jurisdictions.Developing countries should be supported in building their digital infrastructure, and in increasing the capacity of governments and citizens to make informed policy decisions on technology.Notes[1] Including but not limited to AI and an associated group of digital technologies, such as the Internet of Things, big data, blockchain, quantum computing, advanced robotics, self-driving cars and other autonomous systems, additive manufacturing (i.e. 3D printing), social networks, the new generation of biotechnology, and genetic engineering.[2] O’Hara, K. and Hall, W. (2018), Four Internets: The Geopolitics of Digital Governance, Centre for International Governance Innovation, CIGI Paper No. 206, https://www.cigionline.org/publications/four-internets-geopolitics-digital-governance.[3] GAFAM = Google, Amazon, Facebook, Apple and Microsoft; BATX = Baidu, Alibaba, Tencent and Xiaomi.[4] Carnegie Endowment for International Peace (undated), ‘Cyber Norms Index’, https://carnegieendowment.org/publications/interactive/cybernorms (accessed 30 May 2019).[5] Future of Life Institute (undated), ‘AI Policy – China’, https://futureoflife.org/ai-policy-china?cn-reloaded=1.[6] Dutton, T. (2018), ‘Building an AI World: Report on National and Regional AI Strategies’, 6 December 2018, CIFAR, https://www.cifar.ca/cifarnews/2018/12/06/building-an-ai-world-report-on-national-and-regional-ai-strategies.[7] Including Denmark, Estonia, Finland, the Faroe Islands, Iceland, Latvia, Lithuania, Norway, Sweden and the Åland Islands.[8] Shahbaz, A. (2018), Freedom on the Net 2018: The Rise of Digital Authoritarianism, Freedom House, October 2018, https://freedomhouse.org/report/freedom-net/freedom-net-2018/rise-digital-authoritarianism.[9] Google White Paper (2018), Perspectives on Issues in AI Governance, https://www.blog.google/outreach-initiatives/public-policy/engaging-policy-stakeholders-issues-ai-governance/.This essay was produced for the 2019 edition of Chatham House Expert Perspectives – our annual survey of risks and opportunities in global affairs – in which our researchers identify areas where the current sets of rules, institutions and mechanisms for peaceful international cooperation are falling short, and present ideas for reform and modernization. Full Article
the The Destabilizing Danger of Cyberattacks on Missile Systems By feedproxy.google.com Published On :: Tue, 02 Jul 2019 08:40:06 +0000 2 July 2019 Dr Patricia Lewis Research Director, Conflict, Science & Transformation; Director, International Security Programme @PatriciaMary Dr Beyza Unal Senior Research Fellow, International Security Programme @beyzaunal Google Scholar ‘Left-of-launch’ attacks that aim to disable enemy missile systems may increase the chance of them being used, not least because the systems are so vulnerable. 2019-07-02-NKMissile.jpg This undated photo released by North Korea's news agency in March 2017 shows the launch of four ballistic missiles during a military drill at an undisclosed location in North Korea. Photo: STR/AFP/Getty Images. After President Trump decided to halt a missile attack on Iran in response to the downing of a US drone, it was revealed that the US had conducted cyberattacks on Iranian weapons systems to prevent Iran launching missiles against US assets in the region.This ‘left-of-launch’ strategy – the pre-emptive action to prevent an adversary launch missiles – has been part of the US missile defence strategy for some time now. President George W Bush asked the US military and intelligence community to infiltrate the supply chain of North Korean missiles. It was claimed that the US hacked the North Korean ballistic missile programme, causing a failed ballistic missile test, in 2012.It was not clear then – or now – whether these ‘left-of-launch’ cyberattacks aimed at North Korea were successful as described or whether they were primarily a bluff. But that is somewhat irrelevant; the belief in the possibility and the understanding of the potential impact of such cyber capabilities undermines North Korean or Iranian confidence in their abilities to launch their missiles. In times of conflict, loss of confidence in weapons systems may lead to escalation.In other words, the adversary may be left with no option but to take the chance to use these missiles or to lose them in a conflict setting. ‘Left of launch’ is a dangerous game. If it is based on a bluff, it could be called upon and lead to deterrence failure. If it is based on real action, then it could create an asymmetrical power struggle. If the attacker establishes false confidence in the power of a cyber weapon, then it might lead to false signalling and messaging.This is the new normal. The cat-and-mouse game has to be taken seriously, not least because missile systems are so vulnerable.There are several ways an offensive cyber operation against missile systems might work. These include exploiting missile designs, altering software or hardware, or creating clandestine pathways to the missile command and control systems.They can also be attacked in space, targeting space assets and their link to strategic systems.Most missile systems rely, at least in part, on digital information that comes from or via space-based or space-dependent assets such as: communication satellites; satellites that provide position, navigation and timing (PNT) information (for example GPS or Galileo); weather satellites to help predict flight paths, accurate targeting and launch conditions; and remote imagery satellites to assist with information and intelligence for the planning and targeting.Missile launches themselves depend on 1) the command and control systems of the missiles, 2) the way in which information is transmitted to the missile launch facilities and 3) the way in which information is transmitted to the missiles themselves in flight. All these aspects rely on space technology.In addition, the ground stations that transmit and receive data to and from satellites are also vulnerable to cyberattack – either through their known and unknown internet connectivity or through malicious use of flash drives that contain a deliberate cyber infection.Non-space-based communications systems that use cable and ground-to-air-to-ground masts are likewise under threat from cyberattacks that find their way in via internet connectivity, proximity interference or memory sticks. Human error in introducing connectivity via phones, laptops and external drives, and in clicking on malicious links in sophisticated phishing lures, is common in facilitating inadvertent connectivity and malware infection.All of these can create a military capacity able to interfere with missile launches. Malware might have been sitting on the missile command and control system for months or even years, remaining inactivated until a chosen time or by a trigger that sets in motion a disruption either to the launch or to the flight path of the missile. The country that launches the missile that either fails to launch or fails to reach the target may never know if this was the result of a design flaw, a common malfunction or a deliberate cyberattack.States with these capabilities must exercise caution: cyber offence manoeuvres may prevent the launch of missile attacks against US assets in the Middle East or in the Pacific regions, but they may also interfere with US missile launches in the future. Even, as has recently been revealed, US cyber weapons targeting an adversary may blow back and inadvertently infect US systems. Nobody is invulnerable. Full Article
the Cyber Governance in the Commonwealth: Towards Stability and Responsible State Behaviour in Cyberspace By feedproxy.google.com Published On :: Mon, 05 Aug 2019 14:05:02 +0000 Invitation Only Research Event 7 October 2019 - 10:30am to 5:30pm Addis Ababa, Ethiopia This roundtable is part of a series under the project, 'Implementing the Commonwealth Cybersecurity Agenda', funded by the UK Foreign and Commonwealth Office (FCO). The roundtable aims to provide a multi-stakeholder, pan-Commonwealth platform to discuss how to implement the Commonwealth Cyber Declaration with a focus on its third pillar 'To promote stability in cyberspace through international cooperation'.In particular, the roundtable focuses on points 3 and 4 of the third pillar which revolve around the commitment to promote frameworks for stability in cyberspace including the applicability of international law, agreed voluntary norms of responsible state behaviour and the development and implementation of confidence-building measures consistent with the 2015 report of the UNGGE. The workshop also focuses on the commitment to advance discussions on how existing international law, including the Charter of the United Nations and applicable international humanitarian law, applies in cyberspace.The roundtable addresses the issue of global cyber governance from a Commonwealth perspective and will also include a discussion around the way forward, the needed capacity of the different Commonwealth countries and the cooperation between its members for better cyber governance.Participants include UNGGE members from Commonwealth countries in addition to representatives to the UN Open-Ended Working Group from African countries as well as members from academia, civil society and industry. Department/project International Security Programme Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email Full Article
Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email
the Human Control Is Essential to the Responsible Use of Military Neurotechnology By feedproxy.google.com Published On :: Wed, 07 Aug 2019 15:09:10 +0000 8 August 2019 Yasmin Afina Research Assistant, International Security Programme @afinayasmin LinkedIn The military importance of AI-connected brain–machine interfaces is growing. Steps must be taken to ensure human control at all times over these technologies. 2019-08-08-BABWIB.jpg A model of a human brain is displayed at an exhibition in Lisbon, Portugal. Photo: Getty Images. Technological progress in neurotechnology and its military use is proceeding apace. As early as the 1970s, brain-machine interfaces have been the subject of study. By 2014, the UK’s Ministry of Defence was arguing that the development of artificial devices, such as artificial limbs, is ‘likely to see refinement of control to provide… new ways to connect the able-bodied to machines and computers.’ Today, brain-machine interface technology is being investigated around the world, including in Russia, China and South Korea.Recent developments in the private sector are producing exciting new capabilities for people with disabilities and medical conditions. In early July, Elon Musk and Neuralink presented their ‘high-bandwidth’ brain-machine interface system, with small and flexible electrode threads packaged into a small device containing custom chips and to be inserted and implanted into the user’s brain for medical purposes.In the military realm, in 2018, the United States’ Defense Advanced Research Projects Agency (DARPA) put out a call for proposals to investigate the potential of nonsurgical brain-machine interfaces to allow soldiers to ‘interact regularly and intuitively with artificially intelligent, semi-autonomous and autonomous systems in a manner currently not possible with conventional interfaces’. DARPA further highlighted the need for these interfaces to be bidirectional – where information is sent both from brain to machine (neural recording) and from machine to brain (neural stimulation) – which will eventually allow machines and humans to learn from each other.This technology may provide soldiers and commanders with a superior level of sensory sensitivity and the ability to process a greater amount of data related to their environment at a faster pace, thus enhancing situational awareness. These capabilities will support military decision-making as well as targeting processes.Neural recording will also enable the obtention of a tremendous amount of data from operations, including visuals, real-time thought processes and emotions. These sets of data may be used for feedback and training (including for virtual wargaming and for machine learning training), as well as for investigatory purposes. Collected data will also feed into research that may help researchers understand and predict human intent from brain signals – a tremendous advantage from a military standpoint.Legal and ethical considerationsThe flip side of these advancements is the responsibilities they will impose and the risks and vulnerabilities of the technology as well as legal and ethical considerations.The primary risk would be for users to lose control over the technology, especially in a military context; hence a fail-safe feature is critical for humans to maintain ultimate control over decision-making. Despite the potential benefits of symbiosis between humans and AI, users must have the unconditional possibility to override these technologies should they believe it is appropriate and necessary for them to do so.This is important given the significance of human control over targeting, as well as strategic and operational decision-making. An integrated fail-safe in brain-machine interfaces may in fact allow for a greater degree of human control over critical, time-sensitive decision-making. In other words, in the event of incoming missiles alert, while the AI may suggest a specific course of action, users must be able to decide in a timely manner whether to execute it or not.Machines can learn from coded past experiences and decisions, but humans also use gut feelings to make life and death decisions. A gut feeling is a human characteristic that is not completely transferable, as it relies on both rational and emotional traits – and is part of the ‘second-brain’ and the gut-brain axis which is currently poorly understood. It is however risky to take decisions solely on gut feelings or solely on primary brain analysis—therefore, receiving a comprehensive set of data via an AI-connected brain-machine interface may help to verify and evaluate the information in a timely manner, and complement decision-making processes. However, these connections and interactions would have to be much better understood than the current state of knowledge. Fail-safe features are necessary to ensure compliance with the law, including international humanitarian law and international human rights law. As a baseline, human control must be used to 1) define areas where technology may or may not be trusted and to what extent, and 2) ensure legal, political and ethical accountability, responsibility and explainability at all times. Legal and ethical considerations must be taken into account from as early as the design and conceptualizing stage of these technologies, and oversight must be ensured across the entirety of the manufacturing supply chain. The second point raises the need to further explore and clarify whether existing national, regional and international legal, political and ethical frameworks are sufficient to cover the development and use of these technologies. For instance, there is value in assessing to what extent AI-connected brain-machine interfaces will affect the assessment of the mental element in war crimes and their human rights implications.In addition, these technologies need to be highly secure and invulnerable to cyber hacks. Neural recording and neural stimulation will be directly affecting brain processes in humans and if an adversary has the ability to connect to a human brain, steps need to be taken to ensure that memory and personality could not be damaged.Future questionsMilitary applications of technological progress in neurotechnology is inevitable, and their implications cannot be ignored. There is an urgent need for policymakers to understand the fast-developing neurotechnical capabilities, develop international standards and best practices – and, if necessary, new and dedicated legal instruments – to frame the use of these technologies.Considering the opportunities that brain-machine interfaces may present in the realms of security and defence, inclusive, multi-stakeholder discussions and negotiations leading to the development of standards must include the following considerations:What degree of human control would be desirable, at what stage and by whom? To what extent could human users be trusted with their own judgment in decision-making processes?How could algorithmic and human biases, the cyber security and vulnerabilities of these technologies and the quality of data be factored into these discussions?How can ethical and legal considerations be incorporated into the design stage of these technologies?How can it be ensured that humans cannot be harmed in the process, either inadvertently or deliberately?Is there a need for a dedicated international forum to discuss the military applications of neurotechnology? How could these discussions be integrated to existing international processes related to emerging military applications of technological progress, such as the Convention on Certain Conventional Weapons (CCW) Group of Governmental Experts on Lethal Autonomous Weapons Systems? Full Article
the The Future of EU–US Cooperation in Space Traffic Management and Space Situational Awareness By feedproxy.google.com Published On :: Mon, 19 Aug 2019 10:09:54 +0000 29 August 2019 As more space activities develop, there is an increasing requirement for comprehensive space situational awareness (SSA). This paper provides an overview of the current landscape in SSA and space traffic management as well as possible scenarios for EU–US cooperation in this area. Read online Download PDF Alexandra Stickings Research Fellow for Space Policy and Security, RUSI 2019-08-19-SpaceTrafficManagement.jpg Deployment of the NanoRacks-Remove Debris Satellite from the International Space Station. Photo: Getty Images. SummarySpace situational awareness (SSA) and space traffic management (STM) are essential for sustainable near-Earth orbit. International cooperation in SSA and STM is vital with the growing number of satellite operators and the increasingly complex space environment.The various definitions of SSA and STM are ambiguous. Understanding the activities that fall under each term can better assist in finding areas for cooperation and collaboration.SSA has historically been a military activity, leading to an incomplete public catalogue of its use and barriers to sharing information with other states and the commercial sector. The rise in private space actors has increased the number of commercial STM providers and, with plans in the US to move responsibility for STM to civilian control, there will likely be more opportunities for international collaboration, particularly through the EU Space Surveillance and Tracking (SST) programme.Individual EU member states possess developed STM capabilities, but overall these are still some way behind those of allies such as the US. Further investment in STM infrastructure and programmes is required for the EU and individual European states to be an essential partner to the US and add value to the global effort.There are worldwide challenges, both political and technical, to providing STM coverage, which may lead to a lack of collaboration and gaps in understanding of activities in orbit. Existing sensors have limitations in terms of the size of objects that can be detected and the precision with which their movements can be predicted. These capability gaps represent opportunities for the EU to contribute.The EU can build on its tradition of support for openness and civil society by creating a system that fosters an environment of cooperation and collaboration involving industry, commercial STM providers and the wider international community.Although collaboration in STM is vital, the EU should also aim to tackle issues within the wider definition of SSA including space weather, intelligence and the security of ground stations.The EU is well placed to become a global leader in SSA and STM. However, it needs to take into consideration the current political and technical landscape when making decisions regarding investment in capabilities and the pursuit of international partnerships. Department/project International Security Programme, Cyber and Space Full Article
the Who’s Afraid of Huawei? Understanding the 5G Security Concerns By feedproxy.google.com Published On :: Fri, 06 Sep 2019 09:55:03 +0000 9 September 2019 Emily Taylor Associate Fellow, International Security Programme @etaylaw LinkedIn Emily Taylor examines the controversy around the Chinese tech giant’s mobile broadband equipment and the different approaches taken by Western countries. 2019-09-06-Huawei.jpg Huawei's Ox Horn campus in Dongguan, China. Photo: Getty Images. As countries move towards the fifth generation of mobile broadband, 5G, the United States has been loudly calling out Huawei as a security threat. It has employed alarmist rhetoric and threatened to limit trade and intelligence sharing with close allies that use Huawei in their 5G infrastructure.While some countries such as Australia have adopted a hard line against Huawei, others like the UK have been more circumspect, arguing that the risks of using the firm’s technology can be mitigated without forgoing the benefits.So, who is right, and why have these close allies taken such different approaches?The risksLong-standing concerns relating to Huawei are plausible. There are credible allegations that it has benefitted from stolen intellectual property, and that it could not thrive without a close relationship with the Chinese state.Huawei hotly denies allegations that users are at risk of its technology being used for state espionage, and says it would resist any order to share information with the Chinese government. But there are questions over whether it could really resist China’s stringent domestic legislation, which compels companies to share data with the government. And given China’s track record of using cyberattacks to conduct intellectual property theft, there may be added risks of embedding a Chinese provider into critical communications infrastructure.In addition, China’s rise as a global technological superpower has been boosted by the flow of financial capital through government subsidies, venture and private equity, which reveal murky boundaries between the state and private sector for domestic darlings. Meanwhile, the Belt and Road initiative has seen generous investment by China in technology infrastructure across Africa, South America and Asia.There’s no such thing as a free lunch or a free network – as Sri Lanka discovered when China assumed shares in a strategic port in return for debt forgiveness; or Mexico when a 1% interest loan for its 4G network came on the condition that 80% of the funding was spent with Huawei.Aside from intelligence and geopolitical concerns, the quality of Huawei’s products represents a significant cyber risk, one that has received less attention than it deserves.On top of that, 5G by itself will significantly increase the threat landscape from a cybersecurity perspective. The network layer will be more intelligent and adaptable through the use of software and cloud services. The number of network antennae will increase by a factor of 20, and many will be poorly secured ‘things’; there is no need for a backdoor if you have any number of ‘bug doors’.Finally, the US is threatening to limit intelligence sharing with its closest allies if they adopt Huawei. So why would any country even consider using Huawei in their 5G infrastructure?Different situationsThe truth is that not every country is free to manoeuvre; 5G technology will sit on top of existing mobile infrastructure.Australia and the US can afford to take a hard line: their national infrastructure has been largely Huawei-free since 2012. However, the Chinese firm is deeply embedded in other countries’ existing structures – for example, in the UK, Huawei has provided telecommunications infrastructure since 2005. Even if the UK decided tomorrow to ditch Huawei, it cannot just rip up existing 4G infrastructure. To do so would cost a fortune, risk years of delay in the adoption of 5G and limit competition in 5G provisioning.As a result, the UK has adopted a pragmatic approach resulting from years of oversight and analysis of Huawei equipment, during which it has never found evidence of malicious Chinese state cyber activity through Huawei.At the heart of this process is the Huawei Cyber Security Evaluation Centre, which was founded in 2010 as a confidence-building measure. Originally criticized for ‘effectively policing itself’, as it was run and staffed entirely by Huawei, the governance has now been strengthened, with the National Cyber Security Centre chairing its oversight board.The board’s 2019 report makes grim reading, highlighting ‘serious and system defects in Huawei’s software engineering and cyber security competence’. But it does not accuse the company of serving as a platform for state-sponsored surveillance.Similar evidence-based policy approaches are emerging in other countries like Norway and Italy. They offer flexibility for governments, for example by limiting access to some contract competition through legitimate and transparent means, such as security reviews during procurement. The approaches also raise security concerns (both national and cyber) to a primary issue when awarding contracts – something that was not always done in the past, when price was the key driver.The UK is also stressing the need to manage risk and increase vendor diversity in the ecosystem to avoid single points of failure. A further approach that is beginning to emerge is to draw a line between network ‘core’ and ‘periphery’ components, excluding some providers from the more sensitive ‘core’. The limited rollouts of 5G in the UK so far have adopted multi-provider strategies, and only one has reportedly not included Huawei kit.Managing the risks to cyber security and national security will become more complex in a 5G environment. In global supply chains, bans based on the nationality of the provider offer little assurance. For countries that have already committed to Huawei in the past, and who may not wish to be drawn into an outright trade war with China, these moderate approaches offer a potential way forward. Full Article
the Who Runs the Internet: Internet Consolidation and Control By feedproxy.google.com Published On :: Tue, 12 Nov 2019 13:35:01 +0000 Research Event 10 December 2019 - 6:00pm to 7:15pm Chatham House, London Event participants Andrew Sullivan, President and CEO, Internet SocietyJennifer Cobbe, Research Associate, Department of Computer Science and Technology, University of CambridgeJesse Sowell, Assistant Professor, Department of International Affairs, Bush School of Government and Public Service, Texas A&M UniversityChair: Emily Taylor, Associate Fellow, International Security, Chatham House, Editor, Journal of Cyber Policy In recent years, there has been a growing debate around the influence of a few large internet technology companies on the internet’s infrastructure and over the popular applications and social media platforms that we use every day.The internet which was once widely viewed as a collective platform for limitless, permissionless innovation, competition and growth, is now increasingly viewed as a consolidated environment dominated by a few. Such market dominance threatens to undermine the internet’s fundamental benefits as a distributed network in which no single entity has control. The panel examines the risks of consolidation throughout the internet’s technology stack such as the impact on complex supply chains that support applications, including cloud provisions, ‘as a service’.It also explores the potential benefits, for example, when building out essential infrastructure to support faster and cheaper internet services in developing economies, consolidation can create economies of scale that bring the resource-intensive building blocks of the internet economy within the reach of new start-ups and innovators.The panel provides an interdisciplinary perspective exploring the relationship between consolidation and evolutions in the internet infrastructure as well as unpacking its policy implications.This event supports a special issue of the Journal of Cyber Policy as part of a collaboration between Chatham House and the Internet Society which explores the impact of the consolidation on the internet’s fundamental architecture. Department/project International Security Programme Nilza Amaral Project Manager, International Security Programme Email Full Article
the Building LGBTIQ+ Inclusivity in the Armed Forces, 20 Years After the Ban Was Lifted By feedproxy.google.com Published On :: Thu, 16 Jan 2020 12:27:18 +0000 16 January 2020 Will Davies Army Chief of General Staff Research Fellow, International Security Programme @williamhldavies LinkedIn Change was slow to come but progress has since been swift. Not only can a continuing focus on inclusivity benefit service people and the organization, it is also an essential element of a values-based foreign policy. 2020-01-16-Westminster.jpg Crew members from HMS Westminster march through Admiralty Arch as they exercise their freedom of the city in August 2019 in London. Photo: Getty Images. The new UK government will conduct a review of foreign, security and defence policy in 2020. If the UK decides to use values as a framework for foreign policy this needs to be reflected in its armed forces. One area where this is essential is continuing to deepen inclusivity for LGBTIQ+ personnel, building on the progress made since the ban on their service was lifted in 2000.I witnessed the ban first-hand as a young officer in the British Army in 1998. As the duty officer I visited soldiers being held in the regimental detention cells to check all was well. One day a corporal, who I knew, was there awaiting discharge from the army having been convicted of being gay. On the one hand, here was service law in action, which was officially protecting the army’s operational effectiveness and an authority not to be questioned at my level. On the other, here was an excellent soldier in a state of turmoil and public humiliation. How extreme this seems now.On 12 January 2000 Tony Blair’s Labour government announced an immediate lifting of the ban for lesbian, gay and bisexual personnel (LGB) and introduced a new code of conduct for personal relationships. (LGB is the term used by the armed forces to describe those personnel who had been banned prior to 2000.) This followed a landmark ruling in a case taken to the European Court of Human Rights in 1999 by four LGB ex-service personnel – supported by Stonewall – who had been dismissed from service for their sexuality.Up to that point the Ministry of Defence's long-held position had been that LGB personnel had a negative impact on the morale and cohesion of a unit and damaged operational effectiveness. Service personnel were automatically dismissed if it was discovered they were LGB, even though homosexuality had been decriminalized in the UK by 1967.Proof that the armed forces had been lagging behind the rest of society was confirmed by the positive response to the change among service personnel, despite a handful of vocal political and military leaders who foresaw negative impacts. The noteworthy service of LGBTIQ+ people in Iraq and Afghanistan only served to debunk any residual myths.Twenty years on, considerable progress has been made and my memories from 1998 now seem alien. This is a story to celebrate – however in the quest for greater inclusivity there is always room for improvement.Defence Minister Johnny Mercer last week apologized following recent calls from campaign group Liberty for a fuller apology. In December 2019, the Ministry of Defence announced it was putting in place a scheme to return medals stripped from veterans upon their discharge.The armed forces today have a range of inclusivity measures to improve workplace culture including assessments of workplace climate and diversity networks supported by champions drawn from senior leadership.But assessing the actual lived experience for LGBTIQ+ people is challenging due to its subjectivity. This has not been helped by low participation in the 2015 initiative to encourage people to declare confidentially their sexual orientation, designed to facilitate more focused and relevant policies. As of 1 October 2019, only 20.3 per cent of regular service people had declared a sexual orientation.A measure of positive progress is the annual Stonewall Workplace Equality Index, the definitive benchmarking tool for employers to measure their progress on LGBTIQ+ inclusion in the workplace; 2015 marked the first year in which all three services were placed in the top 100 employers in the UK and in 2019 the Royal Navy, British Army and Royal Air Force were placed 15th=, 51st= and 68th respectively.Nevertheless, LGBTIQ+ service people and those in other protected groups still face challenges. The 2019 Ministry of Defence review of inappropriate behaviour in the armed forces, the Wigston Report, concluded there is an unacceptable level of sexual harassment, bullying and discrimination. It found that 26-36% of LGBTIQ+ service people have experienced negative comments or conduct at work because of their sexual orientation.The Secretary of State for Defence accepted the report’s 36 recommendations on culture, incident reporting, training and a more effective complaints system. Pivotal to successful implementation will be a coherent strategy driven by fully engaged leaders.Society is also expecting ever higher standards, particularly in public bodies. The armed forces emphasise their values and standards, including ‘respect for others’, as defining organisational characteristics; individuals are expected to live by them. Only in a genuinely inclusive environment can an individual thrive and operate confidently within a team.The armed forces also recognize as a priority the need to connect to and reflect society more closely in order to attract and retain talent from across all of society. The armed forces’ active participation in UK Pride is helping to break down barriers in this area.In a post-Brexit world, the UK’s values, support for human rights and reputation for fairness are distinctive strengths that can have an impact on the world stage and offer a framework for future policy. The armed forces must continue to push and promote greater inclusivity in support. When operating overseas with less liberal regimes, this will be sensitive and require careful handling; however it will be an overt manifestation of a broader policy and a way to communicate strong and consistent values over time.The armed forces were damagingly behind the times 20 years ago. But good progress has been made since. Inclusion initiatives must continue to be pushed to bring benefits to the individual and the organization as well as demonstrate a values-based foreign policy. Full Article
the A World Without the NPT Redux By feedproxy.google.com Published On :: Tue, 21 Jan 2020 13:35:01 +0000 Invitation Only Research Event 10 February 2020 - 3:00pm to 4:30pm Chatham House Event participants Dr Joseph Pilat, Los Alamos National Laboratory and Woodrow Wilson International Center for ScholarsChair: Dr Patricia Lewis, Research Director, International Security Programme, Chatham House In the late 1980s, with the 1995 decision on the future of the nuclear Non-Proliferation Treaty (NPT) looming, Joseph Pilat wrote an essay on "A World without the NPT?" which was published in The International Nuclear Non-Proliferation Regime in the 1990s, edited by John Simpson (Cambridge, England: Cambridge University Press, 1986). In this piece, the speaker attempted to think through the effects of a limited or no agreement on extension to the treaty and regime, to nuclear non-proliferation, arms control and energy and to the broader geopolitical landscape. The purpose was not a prediction, but a cautionary tale of the value of the treaty.Now, nearly 25 years after indefinite extension and 50 years after the NPT's entry into force, the treaty and the regime are facing serious challenges. In this roundtable meeting, the speaker will revisit the questions he addressed thirty years ago. Department/project International Security Programme Ana Alecsandru Email Full Article
the The Commonwealth Cyber Declaration: Achievements and Way Forward By feedproxy.google.com Published On :: Thu, 23 Jan 2020 11:20:01 +0000 Invitation Only Research Event 4 February 2020 - 9:15am to 5:30pm Chatham House, London Agendapdf | 149.42 KB In April 2018, the Commonwealth Heads of Government Meeting (CHOGM), held in London, saw the creation and the adoption of the Commonwealth Cyber Declaration. The declaration outlines the framework for a concerted effort to advance cybersecurity practices to promote a safe and prosperous cyberspace for Commonwealth citizens, businesses and societies. The conference will aim to provide an overview on the progress made on cybersecurity in the Commonwealth since the declaration was announced in 2018. In addition, it will examine future challenges and potential solutions going forward.This conference is part of the International Security Programme's project on Implementing the Commonwealth Cybersecurity Agenda and will convene a range of senior Commonwealth representatives as well as a selection of civil society and industry stakeholders. This project aims to develop a pan-Commonwealth platform to take the Commonwealth Cyber Declaration forward by means of a holistic, inclusive and representative approach.Please see below meeting summaries from previous events on Cybersecurity in the Commonwealth: A cyberspace that supports economic and social rights online (London)Build the foundations of an effective national cybersecurity response (Barbados)Promote stability in cyberspace through international cooperation (Addis Ababa)Attendance at this event is by invitation only. Department/project International Security Programme Esther Naylor Research Assistant, International Security Programme +44 (0)20 7314 3628 Email Full Article
the The Smart Peace Initiative: An Integrated and Adaptive Approach to Building Peace By feedproxy.google.com Published On :: Tue, 11 Feb 2020 10:55:01 +0000 Invitation Only Research Event 12 May 2020 - 10:00am to 11:30amAdd to CalendariCalendar Outlook Google Yahoo Smart Peace brings together global expertise in conflict analysis and research, peacebuilding and mediation programming, and behavioural science and evaluation. Together, Smart Peace partners are developing integrated and adaptive peace initiatives, working with local partners to prevent and resolve complex and intractable conflicts in Central African Republic, Myanmar and northern Nigeria. This roundtable is an opportunity for Smart Peace partners to share the Smart Peace concept, approach and objectives, and experiences of the first phases of programme implementation. Roundtable discussions among participants from policy, practice and research communities will inform future priorities and planning for Smart Peace learning, advocacy and communication. Smart Peace partners include Conciliation Resources, Behavioural Insights Team, The Centre for Humanitarian Dialogue, Chatham House, ETH Zurich, International Crisis Group and The Asia Foundation. Nilza Amaral Project Manager, International Security Programme Email Department/project International Security Programme, Smart Peace Full Article
the POSTPONED: Working Towards Cyber Resilience in the GCC: Opportunities and Challenges By feedproxy.google.com Published On :: Fri, 14 Feb 2020 14:10:01 +0000 Invitation Only Research Event 12 March 2020 - 9:00am to 5:00pm Muscat, Oman The GCC states have invested significantly in cybersecurity and have made large strides in protecting governments, businesses and individuals from cyber threats, with the aim of delivering on their ambitious national strategies and future visions. However, several challenges to cybersecurity and cyber resilience in the region persist, putting those ambitious plans at risk.These challenges include the uneven nature of cybersecurity protections, the incomplete implementation of cybersecurity strategies and regulations, and the issues around international cooperation. Such challenges mean that GCC states need to focus on the more difficult task of cyber resilience, in addition to the simpler initial stages of cybersecurity capacity-building, to ensure they harness the true potential of digital technologies and mitigate associated threats.Set against this background, this workshop will explore opportunities and challenges to cyber resilience in the GCC focusing on four main pillars:1. Cyber resilience: in concept and in practice2. Building an effective cybersecurity capacity3. The potential of regional and international cooperation to cyber resilience4. Deterrence and disruption: different approachesThis event will be held in collaboration with the Arab Regional Cybersecurity Centre (ARCC) and OMAN CERT.PLEASE NOTE THIS EVENT IS POSTPONED UNTIL FURTHER NOTICE. Event attributes Chatham House Rule Department/project International Security Programme Esther Naylor Research Assistant, International Security Programme +44 (0)20 7314 3628 Email Full Article
the Deterrence Perspectives in the 21st Century By feedproxy.google.com Published On :: Fri, 28 Feb 2020 09:36:23 +0000 The aim of this project is to provide a space to explore creative/disruptive ideas in order to make headway on perspectives concerning deterrence. This will encourage ‘responsible disruption’ in the nuclear field. Concerns about transatlantic security are high following the US 2018 Nuclear Posture Review and its interpretation of the Russian doctrine, the demise of the Intermediate Range Nuclear Forces Treaty (INF), the uncertainty surrounding the potential extension of the New Strategic Arms Reduction Treaty (New START), and Russian deployment of Avangard hypersonic, nuclear-capable missile systems.Emerging technologies, especially quantum technologies, jeopardize the reliability of existing encryption measures. Some of the most sophisticated cyber attacks are already assisted by artificial intelligence. The possibility that nuclear weapons systems can be interfered with both during conflict and peacetime by these technologies, without the knowledge of the possessor state, raises questions on the reliability and integrity of these systems, with implications for military decision-making, particularly to deterrence policy.These issues and more indicate the changes in the security landscape that have a bearing on the future of nuclear deterrence.This project is supported by the Hiroshima Prefecture and Government of Ireland. Latest (1) Research paper Perspectives on Nuclear Deterrence in the 21st Century 20 April 2020 Research & Publications (1) Research paper Perspectives on Nuclear Deterrence in the 21st Century 20 April 2020 Full Article
the Understanding NATO Obligations Under the NPT By feedproxy.google.com Published On :: Fri, 28 Feb 2020 09:50:48 +0000 The objective of the project is to understand Alliance obligations within the framework of nuclear non-proliferation and disarmament treaties. Examining obligations under the Treaty on the Non-Proliferation of Nuclear Weapons (NPT), and exploring new approaches that NATO could adopt to reconcile strategic stability with nuclear disarmament policies which could be introduced at the 2020 NPT Review Conference (RevCon).The project facilitates the reconciliation of different positions in advance of the RevCon by providing a platform for stakeholders to communicate their respective positions and engage in constructive dialogue. Key research findings and contemporary analysis will be disseminated to officials and the policy community.Through dialogue and research, the project aims to reduce polarisation in the nuclear field and consequently lay a foundation for increased collaboration during the discussions. It also provides a unique opportunity for NATO countries to explore specific new approaches, including in relation to identifying and analysing relevant geopolitical conditions for nuclear disarmament measures that will inform their inputs into the RevCon and related policy framework discussions.This project is supported by the Carnegie Corporation of New York. Full Article
the Nuclear Weapons: Innovative Approaches for the Complex International Security Environment By feedproxy.google.com Published On :: Fri, 28 Feb 2020 10:09:26 +0000 This programme of work addresses the conundrum of nuclear weapons as a wicked problem in a complex adaptive system. Understanding the complexity and the wickedness of the situation allows analysts and strategic planners to approach these complex and intractable issues in new and transformative ways – with a better chance of coping or succeeding and reducing the divisions between experts.Using complexity theory, a complex adaptive system representing the international system and its interaction with the environment can be represented through an interactive visualization tool that will aid thought processes and policy decision-making. Until recently, analysts did not have the tools to be able to create models that could represent the complexity of the international system and the role that nuclear weapons play. Now that these tools are available, analysts should use them to enable decision-makers to gain insights into the range of possible outcomes from a set of possible actions.This programme builds on work by Chatham House on cyber security and artificial intelligence (AI) in the nuclear/strategic realms.In order to approach nuclear weapons as wicked problems in a complex adaptive system from different and sometimes competing perspectives, the programme of work involves the wider community of specialists who do not agree on what constitutes the problems of nuclear weapons nor on what are the desired solutions.Different theories of deterrence, restraint and disarmament are tested. The initiative is international and inclusive, paying attention to gender, age and other aspects of diversity, and the network of MacArthur Grantees are given the opportunity to participate in the research, including in the writing of research papers, so that the complexity modelling can be tested against a wide range of approaches and hypotheses.In addition, a Senior Reference Group will work alongside the programme, challenging its outcome and findings, and evaluating and guiding the direction of the research.This project is supported by the MacArthur Foundation. Full Article
the POSTPONED: What Impact of Sovereignty in the Internet? By feedproxy.google.com Published On :: Mon, 02 Mar 2020 11:15:01 +0000 Research Event 26 March 2020 - 6:00pm to 7:00pm Chatham House Event participants Konstantinos Komaitis, Senior Director, Policy Development & Strategy, Internet SocietyGregory Asmolov, Leverhulme Early Career Fellow Russia Institute, King’s College LondonFurther speakers to be announced.Chair: Joyce Hakmeh, Senior Research Fellow, International Security Programme, Chatham House and Co-Editor of the Journal of Cyber Policy. Several governments have been moving towards a stronger sovereignty narrative when it comes to the internet with some trying to impose borders in cyberspace to extend their physical borders in cyberspace. From attempts to create isolatable domestic internets to data localization laws and to increased calls for sovereignty in the digital space, all these approaches are raising concerns regarding the fate of the internet.While the impact of these approaches varies and the motivations behind them are arguably different too, all governments have been working towards the pursuit of greater technological independence and in some instances greater control.The panellists will discuss the impact that these approaches have on the internet. They will address the question of whether the era of an 'open web' is drawing to an end and whether these territorialization efforts lead to a fragmentation of the internet, making a 'splinternet' inevitable?This event is being organized with the kind support of DXC Technology.This event will be followed by a reception. PLEASE NOTE THIS EVENT IS POSTPONED UNTIL FURTHER NOTICE. Department/project International Security Programme, Internet Governance Esther Naylor Research Assistant, International Security Programme +44 (0)20 7314 3628 Email Full Article
the Is the GCC Cyber Resilient? By feedproxy.google.com Published On :: Mon, 09 Mar 2020 14:58:35 +0000 9 March 2020 How would the states of the Gulf Cooperation Council (GCC) respond to a serious cyber incident? This could be a global ransomware event, a critical infrastructure incident targeted at the energy sector, or an attack on government departments. This paper examines cyber resilience in the states of the GCC. Read online Download PDF Joyce Hakmeh Senior Research Fellow, International Security Programme; Co-Editor, Journal of Cyber Policy @joycehakmeh LinkedIn James Shires Assistant Professor at the Institute for Security and Global Affairs, University of Leiden GettyImages-1052280468.jpg Saudi nationals attend the Gitex 2018 exhibition at the Dubai World Trade Center in Dubai on 16 October 2018. Photo: Getty Images. SummaryGCC states seek to be leaders in digital innovation, but this leaves them vulnerable to an increasing range of cyberthreats. Governments have invested significantly in cybersecurity but these measures have been unevenly implemented, makingit difficult for these states to be resilient against a large-scale cyber incident.Strategies, structures and processes (‘approaches’) for achieving cyber resilience can be conceptualized along a scale from centralized to distributed: centralized approaches maintain decision-making power in a single body, while distributed ones disperse power over many sites.Centralized approaches provide more resilience against unwanted influence, while distributed approaches provide more resilience against intrusions into infrastructure. The GCC states have so far prioritized centralized over distributed cyber resilience, seeking internet and social media control over sustainable network recovery.GCC governments should make a sustainable commitment to cyber resilience that provides clear guidance to organizations and makes best use of emerging cybersecurity structures. This may involve further engagement with international initiatives and partners to increase cyber resilience.Given limited resources, GCC governments should rebalance their efforts from centralized towards distributed approaches to resilience.GCC governments should examine the impact of relevant new technologies, discussing openly the risks of these technologies and appropriate solutions. Department/project Middle East and North Africa Programme, International Security Programme Full Article
the Perspectives on Nuclear Deterrence in the 21st Century By feedproxy.google.com Published On :: Sun, 19 Apr 2020 19:32:28 +0000 20 April 2020 Nuclear deterrence theory, with its roots in the Cold War era, may not account for all eventualities in the 21st century. Researchers at Chatham House have worked with eight experts to produce this collection of essays examining four contested themes in contemporary policymaking on deterrence. Read online Download PDF Dr Beyza Unal Senior Research Fellow, International Security Programme @beyzaunal Google Scholar Yasmin Afina Research Assistant, International Security Programme @afinayasmin LinkedIn Dr Patricia Lewis Research Director, Conflict, Science & Transformation; Director, International Security Programme @PatriciaMary Dr John Borrie Associate Fellow, International Security Programme Google Scholar Dr Jamie Shea Associate Fellow, International Security Programme LinkedIn Peter Watkins Associate Fellow, International Security Programme LinkedIn Dr Maria Rost Rublee Associate Professor of International Relations, Monash University Cristina Varriale Research Fellow in Proliferation and Nuclear Policy, RUSI Dr Tanya Ogilvie-White Adjunct Senior Fellow, Griffith Asia Institute, Griffith University Dr Andrew Futter Associate Professor of International Politics, University of Leicester Christine Parthemore Chief Executive Officer, Council on Strategic Risks (CSR) 2020-04-20-NuclearDeterrence.jpeg Royal Navy Vanguard Class submarine HMS Vigilant returning to HMNB Clyde after extended deployment. The four Vanguard-class submarines form the UK's strategic nuclear deterrent force. Photo: Ministry of Defence. SummaryThis collection of essays explores, from the perspectives of eight experts, four areas of deterrence theory and policymaking: the underlying assumptions that shape deterrence practice; the enduring value of extended deterrence; the impact of emerging technologies; and the ‘blurring’ of the lines between conventional and nuclear weapons.Nuclear deterrence theory, with its roots in the Cold War era, may not account for all eventualities in security and defence in the 21st century, given the larger number of nuclear actors in a less binary geopolitical context. It is clear that a number of present factors challenge the overall credibility of ‘classical’ nuclear deterrence, meaning that in-depth analysis is now needed.Uncertainty as to the appetite to maintain the current nuclear weapons policy architecture looms large in discussions and concerns on global and regional security. The demise of the Intermediate-Range Nuclear Forces Treaty, doubts over the potential extension of the New Strategic Arms Reduction Treaty, heightened regional tensions in Northeast and South Asia, together with the current and likely future risks and challenges arising from global technological competition, making it all the more urgent to examine long-held assumptions in the real-world context.Extended deterrence practices differ from region to region, depending on the domestic and regional landscape. Increased focus on diplomatic capabilities to reduce risks and improve the long-term outlook at regional level, including by spearheading new regional arms-control initiatives, may be a viable way forward. Addressing the bigger picture – notably including, on the Korean peninsula, Pyongyang’s own threat perception – and the links between conventional and nuclear missile issues will need to remain prominent if long-term and concrete changes are to take hold.Most states have long held nuclear weapons to be ‘exceptional’: their use would represent a dramatic escalation of a conflict that must never be attained. Latterly, however, some officials and scholars have made the case that the impact of the use of a low-yield nuclear weapon would not be entirely distinct from that of a large-scale conventional attack. This blurring of lines between conventional and nuclear deterrence strips nuclear weapons of their exceptional nature, in a context in which states are faced with diverse, complex and concurrent threats from multiple potential adversaries that are able to synchronize non-military and military options, up to and including nuclear forces. The use of nuclear weapons risks becoming a ‘new normal’, potentially reducing the threshold for use – to cyberattacks, for example. This has direct implications for discussions around strategic stability. While emerging technologies may offer tremendous opportunities in the modernization of nuclear weapons, they also present major risks and destabilizing challenges. Artificial intelligence, automation, and other developments in the cyber sphere affect dynamics on both the demand and supply sides of the nuclear deterrence equation. States and alliance such as NATO must adapt their deterrence thinking in light of these technological developments, and define their primary purpose and priorities in this shifting security context. Resilience planning, adaptation to the evolving security environment, threat anticipation, and consistent crisis management and incident response – as well as thinking about the mitigation measures necessary to prevent conflict escalation should deterrence fail – will all be critical in upholding nuclear deterrence as both policy and practice. Department/project International Security Programme, Deterrence Perspectives in the 21st Century Full Article
the Iran Crisis: The Impact on Oil Markets By feedproxy.google.com Published On :: Tue, 14 Jan 2020 09:00:23 +0000 14 January 2020 Professor Paul Stevens Distinguished Fellow, Energy, Environment and Resources Programme The assassination of Qassem Soleimani has exacerbated the sensitivity of oil markets to political events and brought geopolitics back into global oil prices. 2020-01-14-Hormuz.jpg Satellite image of the Strait of Hormuz. Photo: Getty Images. The assassination of General Qassem Soleimani has created much speculation about the possible impact on oil markets and – although any impact will very much depend upon what happens next in terms of political and military responses – theoretically the potential exists for Iran to seriously destabilize oil markets, raising oil prices.Arguably, it would be in Iran’s interest to do so. It would certainly hurt Trump’s possibility of a second term if higher prices were to last for some time as the 2020 presidential election gets underway. And it would also help shore up Iran’s failing economy. The assassination did initially cause oil prices to rise by a few dollars before quickly falling back, and the missile attacks by Iran produced a similar response. However, direct action by Iran to raise prices – for example by trying to close the Strait of Hormuz – is unlikely.Around one-fifth of the world's oil supplies passes through the Strait of Hormuz, a narrow choke point between Iran and the Arabian Peninsula. Closing it would invite serious military action by the Americans and many of its allies who, so far, have been rather lukewarm over Trump’s actions. It would also possibly limit Iran’s own oil exports.Similarly, overt attacks on American allies in the region such as Saudi Arabia and the UAE would probably invite too heavy a reaction, although this is uncertain given the lack of response after the alleged Iranian attacks on Abqaiq and Khurais in mid-September.Indirect action by Iran to affect oil supplies is much more likely as they have many options by using their proxies to affect others’ oil production. This is especially true for Iraq, which is now an important source of global oil supply as Iraqi exports in 2019 averaged 3.53 million barrels per day (Mb/d), a significant amount.Iraq’s future production has already been damaged as international oil companies are withdrawing staff for safety reasons, anticipating potential attacks by both Iraqi and Iranian sources. It is now very unlikely that the crucial ‘common seawater supply project’ being run by Exxon – essential for expanding production capacity – will go ahead in the near future.However, one important consequence of the assassination that has attracted little attention is that it has almost fully restored the role of geopolitics into the determination of oil prices. Up to 2014, geopolitics played a key role in determining oil prices in the paper markets where perceptions and expectations ruled.Prices determined in these markets – NYMEX in New York, ICE in London and other lesser futures markets throughout the world – then influence wet barrel markets where real barrels of oil are traded. In 2014, the world was so oversupplied with real oil barrels that the oil price collapsed – the price of Brent crude fell from $110.72 on 23 May to $46.44 eight months later. Thereafter, little if any attention was given to geopolitical events, and geopolitics became marginalized in the determination of crude oil prices.This began to change in 2019. The market remained physically over-supplied but events in the Gulf began to attract attention. In June, there were a series of attacks on oil tankers close to the Gulf, followed by attacks on Saudi Arabia’s Abqaiq processing facility and the Khurais oil field in September.The Americans claimed these attacks were launched by Iran, but no convincing evidence for the claim was provided. Both attacks produced an initial price response but it was surprisingly limited and short-lived. However, it did suggest that geopolitics might be creeping back into influencing oil prices.This became ever more noticeable in the third and fourth quarters as rumours regarding the trade talks between China and US clearly began to affect price – talks going well meant higher oil demand, and prices rose; talks going badly meant lower oil demand, and prices fell.Meanwhile, the oil market showed signs of tightening towards the end of 2019. Although there was much cheating on the OPEC+ agreement that was trying to restrain production and protect prices, the OPEC meeting last December saw both Iraq and Nigeria agreeing to restrain production. US stock levels also began to fall in December and the futures markets began to price in a tightening market towards the end of 2020. Significantly, the tighter the market appears, the greater attention is paid to the level of spare producing capacity.Just before the attack on Abqaiq, the International Energy Agency (IEA) estimated there was 3.5 Mb/d spare capacity in OPEC which, historically, is quite comfortable. However, 2.5 of this was estimated to be in Saudi Arabia, so how much of this spare capacity still existed after the Abqaiq attack?The Saudis claimed the Abqaiq capacity was quickly restored but technical experts greeted this with considerable skepticism, not least because the Abqaiq equipment was highly specialized. If spare capacity is tight, this makes the oil price vulnerable to geopolitical scares and rumours, real or imagined. Although the assassination of General Soleimani has exacerbated the sensitivity of oil markets to geopolitical events, this becomes irrelevant if a serious shooting war starts in the region. Saudi Arabia, the UAE and Iraq’s oil infrastructure remains highly vulnerable to attack either directly by Iran or one of its many proxies, suggesting oil prices will become increasingly volatile but, at the same time, benefit from a rising geopolitical premium. Full Article
the The Struggle for the State in Syria By feedproxy.google.com Published On :: Tue, 14 Jan 2020 10:50:01 +0000 Research Event 11 March 2020 - 9:00am to 6:30pm Chatham House | 10 St James's Square | London | SW1Y 4LE This conference brings together policymakers, experts, academics and civil society leaders to explore the current condition of the state in Syria. It examines the structure, interrelations and importance of the regime’s core institutions and their interactions with international actors. It also highlights the regime’s different approaches in dealing with state institutions and non-state actors.The speakers discuss governance dynamics in north-western Syria and the east Euphrates region and will analyse governance variations between regions within the regime-controlled areas after the dramatic changes in 2018 and 2019.The conference also aims to evaluate the possibility for Syrians to move from a regime-led state to one that is accountable to its citizens and is governed by the rule of law. Event attributes Livestream Department/project Middle East and North Africa Programme, Syria from Within Reni Zhelyazkova Programme Coordinator, Middle East and North Africa Programme +44 (0)20 7314 3624 Email Full Article
Reni Zhelyazkova Programme Coordinator, Middle East and North Africa Programme +44 (0)20 7314 3624 Email
the Synergy in North Africa: Furthering Cooperation By feedproxy.google.com Published On :: Mon, 20 Jan 2020 15:57:54 +0000 21 January 2020 Discussions of North African integration have evoked ideas of a shared identity and a common destiny in the region. However, recent attempts to build regional blocs in North Africa have been unsuccessful. This paper examines the benefits of a ‘synergistic’ approach to North African cooperation. Read online Download PDF in English Download PDF in Arabic Dr Mohammed Masbah Associate Fellow, Middle East and North Africa Programme @MasbahMohammed LinkedIn Google Scholar Mohamed El Dahshan Associate Fellow, Middle East and North Africa Programme @eldahshan LinkedIn Google Scholar 2020-01-21-Market.jpg A Tunisian vendor poses as he sells white truffles at a market in the town of Ben Guerdane, 40km west of the Libyan border, in February 2016. Photo: Getty Images. SummaryNorth African integration is not a new idea. However, countries in the region have so far struggled to form a cohesive bloc with deep political, economic and social ties. Political instability has effectively deprioritized North African integration. A focus on thematic (political, economic and security) ‘synergies’ may provide a better framework for cooperation than seeking opportunities for all-encompassing ‘deep’ and ‘comprehensive’ integration.Governments of North Africa dedicate considerable resources to domestic security. Much of their efforts are conducted at the national-level and directed towards threats from terrorists, insurgents and militias. Improved security cooperation would achieve better outcomes and economies of scale, including efforts to tackle human trafficking.A new generation of jihadis has emerged in North Africa since 2011. Nearly 27 per cent of the 30,000 fighters who travelled to Syria are from the Maghreb. While government counterterrorism operations have been effective, countries have failed to address the root causes of radicalization.Border economies have suffered as a consequence of a security focus on terrorism and smuggling, which has rendered many previously accepted cross-border trade activities illegal. States have struggled to provide alternative livelihoods for those who have lost this source of income. Border forces tend to lack the right combination of capacity, training and equipment to secure borders and often resort to heavy-handed tactics.New thinking is required to develop a more human-centric and proactive approach to migration issues in the region, which continues to witness huge flows of migrants. The migration policy of Morocco, introduced through legislation in 2014, could be a model for North Africa.The countries of North Africa have varying economic profiles, ranging from economically diverse Morocco to oil-and-gas-dependant Libya. However, they all face similar challenges including unemployment (particularly among the young), poor public-service delivery, low FDI levels, an oversized public sector, ineffective tax collection, and high informality.Fostering entrepreneurship and the development of small and medium-sized enterprises (SMEs) are priorities for North African countries, particularly regarding job creation. Regulatory cooperation – such as harmonizing SME definitions, legislation and support institutions – across North Africa is an obvious area where further integration would encourage the development of start-ups and small businesses.With the advent of the fourth industrial revolution, North African governments must address their technological gaps and work to improve public–private cooperation. In some sectors, such as the fintech industry, North African countries can build upon nascent synergies that have developed organically, such as those of start-up incubators and angel investors that work across the region.Renewables, particularly solar energy production, are a promising development for North Africa. While regional initiatives, such as Desertec, have stalled due to political differences between countries, the sector has witnessed exponential growth in Tunisia, Egypt and Morocco, where the involvement of the private sector has proved successful. Department/project Middle East and North Africa Programme, North Africa Dialogues Full Article
the Conflict and the Water Crisis in Iraq By feedproxy.google.com Published On :: Mon, 24 Feb 2020 13:15:01 +0000 Invitation Only Research Event 9 March 2020 - 9:00am to 10:30am Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Dr Azzam Alwash, Founder & CEO, Nature IraqPeter Schwartzstein, Independent Journalist; Non-Resident Fellow, Centre for Climate SecurityDiscussant: Dr Jehan Baban, Founder & President, The Iraqi Environment and Health Society-UKChair: Dr Glada Lahn, Senior Research Fellow, Energy, Environment and Resources Department, Chatham House Water is a critical issue for Iraq’s future stability and prosperity. Only a few decades ago, the country was one of the most fertile in the region, with two major rivers flowing through it. Today, national and transboundary pollution, mismanagement, and debilitating cycles of conflict have contributed to a situation where only half of current water needs are being met, and where an 80% reduction in the flow of water down the Tigris and Euphrates rivers has led to the loss of millions of acres of formerly productive land and the displacement of rural communities.Water scarcity can be a driver of violence and conflict. Tribal conflicts over water sources have erupted sporadically in the south and the contamination of municipal water which led to the hospitalization of some 118,000 citizens was a trigger for the large-scale protests in Basra in late 2018. Without concerted action by national and local governments, companies and international agencies, the situation will only worsen as higher temperatures and reduced rainfall drive rural-to-urban migration and increase the risk of drought, food insecurity and water-related diseases.At this roundtable, part of the Chatham House Iraq Initiative, experts will discuss the domestic, regional and international factors that continue to exacerbate the water crisis in Iraq, and propose solutions, including technical innovation, public sector capacity-building and greater international cooperation, that might contribute to effective state-building, build resilience to the effects of climate change and reduce the risk of further conflict. Event attributes Chatham House Rule Department/project Middle East and North Africa Programme, Iraq Initiative Georgia Cooke Project Manager, Middle East and North Africa Programme +44 (0)20 7957 5740 Email Full Article
the Lebanon Is Paying the Cost of Its Dysfunctional Politics By feedproxy.google.com Published On :: Wed, 26 Feb 2020 05:27:10 +0000 26 February 2020 Nadim Shehadi Associate Fellow, Middle East and North Africa Programme @Confusezeus A series of fights to political stalemate have led its economy to the brink and cut it off from its natural economic partners in the Gulf. 2020-02-25-Leb1.jpg Protests against economic conditions and government inaction turned violent in January. Photo: Getty Images. To understand Lebanon’s financial collapse, look to its politics.The country has been deeply damaged by an increasingly dysfunctional political system. A series of compromises have alienated it from its main markets in the Gulf and strangled its economy; anyone that has glanced at fluctuations in Lebanese bank deposits over the last 10 years can see the correlation.Imagine if Boris Johnson or Donald Trump were obliged to form joint governments with Jeremy Corbyn or Bernie Sanders. The result would be paralysis and lack of accountability as each party pulls the country in opposite directions and blames the other for the state of limbo. This has been the state of affairs in Lebanon since the Doha agreement of 2008. That agreement followed an 18-month siege that paralyzed Beirut and an attack on the city by Hezbollah’s ‘black shirts’. The Doha formula imposed governments of national unity between Prime Minister Saad Hariri’s pro-Saudi camp and Hezbollah’s pro-Iran camp and their respective internal allies.The pattern was set: each period of subsequent paralysis was followed by further compromise as the tug of war pulled the country away from its principal economic partners, the Arab Gulf states, with the regional balance of power tilting towards Hezbollah. It was not supposed to be like this. The Baabda Declaration in June 2012, reached after a process of national dialogue, was meant to secure Lebanon’s neutrality in regional conflicts, with both sides promising to hold back on external alliances and coexist despite difference over major regional issues like the war in Syria, the standoff between the US and Iran or relations with Israel or the Gulf states.This has worn away. The Baabda declaration itself became a sham when Hezbollah inserted itself into the war in Syria in support of the Assad regime and overtly got involved in Iraq and Yemen as an Iranian proxy. This was followed by Saudi opposition to concessions by Hariri that led to the election of General Michel Aoun, an ally of Hezbollah, as president in October 2016; again, after a political paralysis that lasted 29 months with no active government and no head of state. The Saudis were also furious when President Aoun’s son-in-law, Foreign Minister Gebran Bassil, abstained from condemning the burning of the Saudi embassy in Tehran at an Arab League meeting in Cairo in January 2016, citing the need to preserve national unity.Fearing that he was simply providing Hezbollah with protection in the guise of compromise, the Saudis pressured Hariri to resign in November 2017 during a trip to Riyadh, but he later challenged that by retracting on his resignation when back in Beirut. Lebanon was caught between two sides, and as the regional conflict intensified from tension to open confrontation, neutrality was no longer an option.Gulf connectionsAn estimated 350,000 Lebanese expats live and work in Saudi Arabia, the UAE, Qatar and Kuwait. These countries are also the main clients for Lebanese contractors, consultants and advertising companies, some of which have offices there. The domestic tourism industry relies heavily on Arab Gulf visitors and they are a principal source of foreign investments especially in the real estate sector.Lebanon also enjoyed a certain degree of political and economic protection from the US and the Gulf, and Hezbollah benefited indirectly from that protection, as it also shielded it to a certain degree from sanctions.The deterioration of relations meant that the country was cut off by its Gulf partners. This was manifested in travel bans for Gulf Cooperation Council (GCC) nationals to Lebanon and a decrease in investments and bank deposits, as well as a decrease in remittances from Lebanese expats, partly because of economic crisis in the Gulf countries themselves.Saudi Arabia withdrew $4 billion of aid to the Lebanese army and internal security forces, and no aid or deposits were forthcoming as the economic and financial situation deteriorated. The costs to the Lebanese economy include the opportunity cost created by the annual threat of war with Israel, after which trips are cancelled and projects postponed. Hezbollah also controls a section of Beirut port where it pays no duty or taxes. Add to that the economic fallout from the war in Syria, such as the impact on exports, the inflow of refugees and the cost of Hezbollah’s involvement.The burden of these political factors is difficult to estimate but it constitutes the ransom that the Lebanese economy bears as a cost of the compromise. This is not to absolve Lebanese politicians from corruption or bankers of mismanagement but to add that political factors cannot be ignored.The cumulative cost and economic impact of being cut off from its main economic partner eventually bankrupted the country. The fiscal and financial aspects, with Lebanon’s inability to service its debt, are but a reflection of these political factors. In the long run, the key to avoiding complete collapse is to restore relations with the GCC and free Lebanon from that very costly grip. Full Article
the Unpacking the role of religion in political transnationalism: the case of the Shi'a Iraqi diaspora since 2003 By feedproxy.google.com Published On :: Wed, 04 Mar 2020 12:58:04 +0000 4 March 2020 , Volume 96, Number 2 Oula Kadhum Read Online This article explores the role of religion in political transnationalism using the case of the Shi'a Iraqi diaspora since 2003. The article focuses on three areas that capture important trends in Shi'a transnationalism and their implications for transnational Shi'a identity politics. These include Shi'a diasporic politics, transnational Shi'a civic activism, and the cultural production of Iraqi Shi'a identity through pilgrimages, rituals and new practices. It is argued that understanding Shi'a Islam and identity formation requires adopting a transnational lens. The evolution of Shi'a Islam is not only a result of the dictates of the Shi'a clerical centres, and how they influence Shi'a populations abroad, but also the transnational interrelationships and links to holy shrine cities, Shi'i national and international politics, humanitarianism and commemorations and rituals. The article demonstrates that Shi'a political transnationalism is unexceptional in that it echoes much of the literature on diasporic politics and development where diaspora involve themselves from afar in the politics and societies of their countries of origin. At the same time, it shows the exceptionalism of Shi'a diasporic movements, in that their motivations and mobilizations are contributing to the reification of sectarian geographical and social borders, creating a transnationalism that is defined by largely Shi'a networks, spaces, actors and causes. The case of Shi'a political transnationalism towards Iraq shows that this is increasing the distance between Shi'is and Iraq's other communities, simultaneously fragmenting Iraq's national unity while deepening Shi'a identity and politics both nationally and supra-nationally. Full Article
the POSTPONED: The Development of Libyan Armed Groups since 2014: Community Dynamics and Economic Interests By feedproxy.google.com Published On :: Wed, 04 Mar 2020 14:15:01 +0000 Invitation Only Research Event 18 March 2020 - 9:00am to 10:30am Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Abdul Rahman Alageli, Associate Fellow, MENA Programme, Chatham HouseEmaddedin Badi, Non-Resident Scholar, Middle East InstituteTim Eaton, Senior Research Fellow, MENA Programme Chatham HouseValerie Stocker, Independent Researcher Since the overthrow of the regime of Muammar Gaddafi in 2011, Libya’s multitude of armed groups have followed a range of paths. While many of these have gradually demobilized, others have remained active, and others have expanded their influence. In the west and south of the country, armed groups have used their state affiliation to co-opt the state and professionals from the state security apparatus into their ranks.In the east, the Libyan Arab Armed Forces projects a nationalist narrative yet is ultimately subservient to its leader, Field Marshal Khalifa Haftar. Prevailing policy narratives presuppose that the interests of armed actors are distinct from those of the communities they claim to represent. Given the degree to which most armed groups are embedded in local society, however, successful engagement will need to address the fears, grievances and desires of the surrounding communities, even while the development of armed groups’ capacities dilutes their accountability to those communities.This roundtable will discuss the findings of a forthcoming Chatham House research paper, ‘The Development of Libyan Armed Groups Since 2014: Community Dynamics and Economic Interests’, which presents insights from over 200 interviews of armed actors and members of local communities and posits how international policymakers might seek to curtail the continued expansion of the conflict economy.PLEASE NOTE THIS EVENT IS POSTPONED UNTIL FURTHER NOTICE. Event attributes Chatham House Rule Department/project Middle East and North Africa Programme, Countering Conflict Economies in MENA, Libya’s Conflict Economy Georgia Cooke Project Manager, Middle East and North Africa Programme +44 (0)20 7957 5740 Email Full Article
the Is the GCC Cyber Resilient? By feedproxy.google.com Published On :: Mon, 09 Mar 2020 14:58:35 +0000 9 March 2020 How would the states of the Gulf Cooperation Council (GCC) respond to a serious cyber incident? This could be a global ransomware event, a critical infrastructure incident targeted at the energy sector, or an attack on government departments. This paper examines cyber resilience in the states of the GCC. Read online Download PDF Joyce Hakmeh Senior Research Fellow, International Security Programme; Co-Editor, Journal of Cyber Policy @joycehakmeh LinkedIn James Shires Assistant Professor at the Institute for Security and Global Affairs, University of Leiden GettyImages-1052280468.jpg Saudi nationals attend the Gitex 2018 exhibition at the Dubai World Trade Center in Dubai on 16 October 2018. Photo: Getty Images. SummaryGCC states seek to be leaders in digital innovation, but this leaves them vulnerable to an increasing range of cyberthreats. Governments have invested significantly in cybersecurity but these measures have been unevenly implemented, makingit difficult for these states to be resilient against a large-scale cyber incident.Strategies, structures and processes (‘approaches’) for achieving cyber resilience can be conceptualized along a scale from centralized to distributed: centralized approaches maintain decision-making power in a single body, while distributed ones disperse power over many sites.Centralized approaches provide more resilience against unwanted influence, while distributed approaches provide more resilience against intrusions into infrastructure. The GCC states have so far prioritized centralized over distributed cyber resilience, seeking internet and social media control over sustainable network recovery.GCC governments should make a sustainable commitment to cyber resilience that provides clear guidance to organizations and makes best use of emerging cybersecurity structures. This may involve further engagement with international initiatives and partners to increase cyber resilience.Given limited resources, GCC governments should rebalance their efforts from centralized towards distributed approaches to resilience.GCC governments should examine the impact of relevant new technologies, discussing openly the risks of these technologies and appropriate solutions. Department/project Middle East and North Africa Programme, International Security Programme Full Article
the The Development of Libyan Armed Groups Since 2014: Community Dynamics and Economic Interests By feedproxy.google.com Published On :: Mon, 16 Mar 2020 17:25:16 +0000 17 March 2020 This paper explores armed group–community relations in Libya and the sources of revenue that have allowed armed groups to grow in power and influence. It draws out the implications for policy and identifies options for mitigating conflict dynamics. Read online Download PDF Tim Eaton Senior Research Fellow, Middle East and North Africa Programme @el_khawaga LinkedIn Abdul Rahman Alageli Associate Fellow, Middle East and North Africa Programme @abdulrahmanlyf Emadeddin Badi Policy Leader Fellow, School of Transnational Governance, European University Institute Mohamed Eljarh Co-founder and CEO, Libya Outlook Valerie Stocker Researcher Amru_24-2_13.jpg Fighters of the UN-backed Government of National Accord patrol in Ain Zara suburb in Tripoli, February 2020. Photo: Amru Salahuddien SummaryLibya’s multitude of armed groups have followed a range of paths since the emergence of a national governance split in 2014. Many have gradually demobilized, others have remained active, and others have expanded their influence. However, the evolution of the Libyan security sector in this period remains relatively understudied. Prior to 2011, Libya’s internal sovereignty – including the monopoly on force and sole agency in international relations – had been personally vested in the figure of Muammar Gaddafi. After his death, these elements of sovereignty reverted to local communities, which created armed organizations to fill that central gap. National military and intelligence institutions that were intended to protect the Libyan state have remained weak, with their coherence undermined further by the post-2014 governance crisis and ongoing conflict. As a result, the most effective armed groups have remained localized in nature; the exception is the Libyan Arab Armed Forces (LAAF), which has combined and amalgamated locally legitimate forces under a central command.In the west and south of the country, the result of these trends resembles a kind of inversion of security sector reform (SSR) and disarmament, demobilization and reintegration (DDR): the armed groups have used their state affiliation to co-opt the state and professionals from the state security apparatus into their ranks; and have continued to arm, mobilize and integrate themselves into the state’s security apparatus without becoming subservient to it. In the eastern region, the LAAF projects a nationalist narrative yet is ultimately subservient to its leader, Field Marshal Khalifa Haftar. The LAAF has co-opted social organizations to dominate political and economic decision-making.The LAAF has established a monopoly over the control of heavy weapons and the flow of arms in eastern Libya, and has built alliances with armed groups in the east. Armed groups in the south have been persuaded to join the LAAF’s newly established command structure. The LAAF’s offensive on the capital, which started in April 2019, represents a serious challenge to armed groups aligned with the Tripoli-based Government of National Accord (GNA). The fallout from the war will be a challenge to the GNA or any future government, as groups taking part in the war will expect to be rewarded. SSR is thus crucial in the short term: if the GNA offers financial and technical expertise and resources, plus legal cover, to armed groups under its leadership, it will increase the incentive for armed groups to be receptive to its plans for reform.Prevailing policy narratives presuppose that the interests of armed actors are distinct from those of the communities they claim to represent. Given the degree to which most armed groups are embedded in local society, however, successful engagement will necessarily rely on addressing the fears, grievances and desires of the surrounding communities. Yet the development of armed groups’ capacities, along with their increasing access to autonomous means of generating revenue, has steadily diluted their accountability to local communities. This process is likely to be accelerated by the ongoing violence around Tripoli.Communities’ relationship to armed groups varies across different areas of the country, reflecting the social, political, economic and security environment:Despite their clear preference for a more formal, state-controlled security sector, Tripoli’s residents broadly accept the need for the presence of armed groups to provide security. The known engagement of the capital’s four main armed groups in criminal activity is a trade-off that many residents seem able to tolerate, providing that overt violence remains low. Nonetheless, there is a widespread view that the greed of Tripoli’s armed groups has played a role in stoking the current conflict.In the east, many residents appear to accept (or even welcome) the LAAF’s expansion beyond the security realm, provided that it undertakes these roles effectively. That said, such is the extent of LAAF control that opposition to the alliance comes at a high price.In the south, armed groups draw heavily on social legitimacy, acting as guardians of tribal zones of influence and defenders of their respective communities against outside threats, while also at times stoking local conflicts. Social protections continue to hold sway, meaning that accountability within communities is also limited.To varying extents since 2014, Libya’s armed groups have developed networks that enmesh political and business stakeholders in revenue-generation models:Armed groups in Tripoli have compensated for reduced financial receipts from state budgets by cultivating unofficial and illicit sources of income. They have also focused on infiltrating state institutions to ensure access to state budgets and contracts dispersed in the capital.In the east of the country, the LAAF has developed a long-term strategy to dominate the security, political and economic spheres through the establishment of a quasi-legal basis for receiving funds from Libya’s rival state authorities. It has supplemented this with extensive intervention in the private sector. External patronage supports military operations, but also helps to keep this financial system, based on unsecured debt, afloat.In the south, limited access to funds from the central state has spurred armed groups to become actively involved in the economy. This has translated into the taxation of movement and the imposition of protection fees, particularly on informal (and often illicit) activity.Without real commitment from international policymakers to enforcing the arms embargo and protecting the economy from being weaponized, Libya will be consigned to sustained conflict, further fragmentation and potential economic collapse. Given the likely absence of a political settlement in the short term, international policymakers should seek to curtail the continued expansion of the conflict economy by reducing armed groups’ engagement in economic life.In order to reduce illicit activities, international policymakers should develop their capacity to identify and target chokepoints along illicit supply chains, with a focus on restraining activities and actors in closest proximity to violence. Targeted sanctions against rent maximizers (both armed and unarmed) is likely to be the most effective strategy. More effective investigation and restraint of conflict economy actors will require systemic efforts to improve transparency and enhance the institutional capacity of anti-corruption authorities. International policymakers should also support the development of tailored alternative livelihoods that render conflict economy activities less attractive. Department/project Middle East and North Africa Programme, Chaos States, Countering Conflict Economies in MENA, Libya’s Conflict Economy Full Article
the Webinar: How is the MENA Region Dealing with the COVID-19 Outbreak? By feedproxy.google.com Published On :: Thu, 26 Mar 2020 10:40:01 +0000 Research Event 2 April 2020 - 12:30pm to 1:30pm Event participants Omar Dewachi, Associate Professor of Medical Anthropology, Department of Anthropology, Rutgers UniversityTin Hinane El Kadi, Associate Fellow, MENA Programme, Chatham HouseModerator: Sanam Vakil, Deputy Head & Senior Research Fellow, MENA Programme, Chatham House At this webinar, part of the Chatham House MENA Programme Online Event Series, experts will explore how the coronavirus pandemic is impacting the economy, state-society relations and healthcare throughout the Middle East and North Africa. How are governments handling this crisis and what measures have they put in place to stop the spread of the virus? Why are some governments withholding information about the number of cases? What has the response from the public been so far? How is this affecting the region and how does it compare to the global picture?The event will be held on the record. Department/project Middle East and North Africa Programme Reni Zhelyazkova Programme Coordinator, Middle East and North Africa Programme +44 (0)20 7314 3624 Email Full Article
Reni Zhelyazkova Programme Coordinator, Middle East and North Africa Programme +44 (0)20 7314 3624 Email
the Webinar: Can the Justice and Development Party Still Absorb Popular Anger in Morocco? By feedproxy.google.com Published On :: Tue, 31 Mar 2020 13:50:01 +0000 Webinar Research Event 8 April 2020 - 1:00pm to 2:00pm Event participants Mohammed Masbah, Director, Moroccan Institute for Policy Analysis; Associate Fellow, MENA Programme, Chatham HouseModerator: Lina Khatib, Director, MENA Programme, Chatham House Ever since independence, the Moroccan monarchy has used political parties to legitimize the country’s authoritarian political process and structure, and to absorb social and political anger. The palace puts successive governments and other elected institutions, such as local and regional councils, at the frontline of public blame, and replaces them once they fail this function.In a recent article, MENA Programme Associate Fellow, Mohammed Masbah, examines how the Moroccan monarchy has used this strategy with the ruling Justice and Development Party (PJD) so that the palace remains the centre of political power, while the PJD – and other political parties before it– takes responsibility for coping with the mounting socio-economic crisis.In this webinar, part of the Chatham House project on The Future of the State in the Middle East and North Africa, the article’s author will discuss the risks this approach presents for the long-term stability of Morocco and what reforms are needed to increase citizens’ dwindling confidence in the political process.You can express your interest in attending by following this link. You will receive a Zoom confirmation email should your registration be successful. Department/project Middle East and North Africa Programme, The Future of the State in the Middle East Full Article
the Webinar: The Environmental Crisis in the MENA Region – Impacts and Mitigation By feedproxy.google.com Published On :: Thu, 02 Apr 2020 13:40:01 +0000 Research Event 16 April 2020 - 11:30am to 12:30pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Glada Lahn, Senior Research Fellow, Energy, Environment and Resources Programme, Chatham HouseGreg Shapland, Associate Fellow, Middle East and North Africa Programme, Chatham House Moderator: Sanam Vakil, Deputy Director and Senior Research Fellow, Middle East and North Africa Programme, Chatham House The event will be livestreamed on the MENA Programme Facebook page.Climate and environmental issues have largely been marginalized in discussions about the Middle East and North Africa region and yet are critical to peace and security. In this webinar, experts will explore mounting pressures including those related to water (reduced, less reliable and more polluted sources), extreme temperatures, air pollution, land degradation and sea-level rise. Panelists will discuss the potential impact of worsening environmental conditions and what the region's governments can do to protect the health and livelihoods of their peoples.This webinar is part of the Chatham House MENA Programme's Online Event Series and will be held on the record. Department/project Middle East and North Africa Programme Reni Zhelyazkova Programme Coordinator, Middle East and North Africa Programme +44 (0)20 7314 3624 Email Full Article
Reni Zhelyazkova Programme Coordinator, Middle East and North Africa Programme +44 (0)20 7314 3624 Email
the Can Morocco Effectively Handle the COVID-19 Crisis? By feedproxy.google.com Published On :: Mon, 06 Apr 2020 09:10:24 +0000 6 April 2020 Dr Mohammed Masbah Associate Fellow, Middle East and North Africa Programme @MasbahMohammed LinkedIn Google Scholar Anna Jacobs Senior Research Assistant, Brookings Doha Center The Moroccan government is capitalizing on a burst of unity, social solidarity and public support in the face of a crisis. However, if it fails to effectively mitigate the public health and economic impacts of the COVID-19 pandemic, this spirit of solidarity and cooperation will not last long. GettyImages-1208907580.jpg A general view of empty stores during curfew as a precaution against the new type of coronavirus (COVID-19) in Rabat, Morocco on 1 April 2020. Photo by Jalal Morchidi/Anadolu Agency via Getty Images. In Morocco, the COVID-19 pandemic has increased public trust in government, but people still have doubts about the effectiveness of the healthcare system. According to a recent study conducted by the Moroccan Institute for Policy Analysis (MIPA), the majority of Moroccans surveyed are generally satisfied with the measures taken by the government to battle the coronavirus. However, the same survey also shows that Moroccans do not have confidence in the healthcare sector’s ability to respond to this pandemic.The positive perceptions of the government’s response can be explained by the swift and strict measures enacted. King Mohammed VI held a high-level meeting with the prime minister, the minister of health, and top security officials on 17 March and a few days later, on 20 March, the Moroccan government declared a state of health emergency and began to implement aggressive measures to contain the virus.This has included closing airports, schools, mosques, cafés and shops – with the exception of food markets – preventing large gatherings, as well as strict guidelines to ensure social distancing. As of 2 April, nearly 5000 people have been arrested for violating the state of health emergency.In order to address urgent medical needs and to mitigate the economic impact of the pandemic, the King ordered the creation of an emergency fund, raising more than 32.7 billion Moroccan Dirhams ($3.2 billion). The Ministry of Finance will begin to make cash transfers to vulnerable citizens, and especially those who have lost their jobs. However, the stipulations surrounding these cash transfers will be decided in the coming weeks.Updates about the virus are communicated daily by the Ministry of Health, despite growing criticism of its communication strategy. As of 4 April, Moroccan authorities have confirmed 883 cases and 58 deaths.Call for national unityIn times like these, there is a call for unity in the face of a national and global crisis, and opposition groups such as Adl wal Ihssan and Rif activists have expressed their support for government measures and have encouraged people to follow the new guidelines and restrictions. However, despite calls to release political prisoners, Moroccan authorities have not indicated that they will do so. This is a missed opportunity vis-à-vis the opposition because it could have served as a way to further strengthen national unity during the crisis.These are all promising signs and point to what is likely to be a short-term burst in unity and institutional trust. However, the institutional weaknesses in governance and the healthcare system have not disappeared, which is why this increase in institutional trust should be taken with a grain of salt.Public trust issuesThis pandemic poses tremendous challenges for governments across the globe, and this holds especially true for states in the Middle East and North Africa region, where citizens do not approve of government performance and do not trust key state institutions. The 2019 Arab Barometer survey found that Moroccans do not trust most of the country’s political institutions (notably the parliament and the Council of Ministers) and the level of satisfaction with the government’s performance remains extremely low.On the public health front, as shown in two of MIPA’s recent surveys, trust in the healthcare system is also very low. Around three-quarters of those surveyed do not trust Moroccan hospitals, highlighting the acute structural problems in the healthcare system. In fact, there is a stark divide between private and public healthcare, as well as a huge gap in access to healthcare facilities between urban and rural areas. Most of the country’s hospitals and doctors are located in major urban areas and the only three laboratories with capabilities for COVID-19 testing are located in Rabat and Casablanca, but even there, testing capacity is very limited.Similar to other countries, there could be a major shortage of doctors and medical equipment throughout Morocco. So far, the Ministry of Finance has said that 2 billion dirhams of the emergency fund will go towards purchasing medical equipment such as beds, ventilators, tests, prevention kits and radiology equipment, but the timeline remains unclear.A vulnerable economyThere is significant concern about the medium- and long-term economic impact of the virus. Two of the country’s key economic sectors have already been hit hard: agriculture and tourism. The agricultural sector was already struggling due to the impact of drought, while the coronavirus pandemic is likely to impact Morocco’s tourism industry not just this year, but well into 2021. In terms of government response, the emergency fund is a strong start, but questions surrounding the management of these funds have already been raised.The most vulnerable parts of the population have been affected by the economic crisis because of the country’s bulging informal sector – in which most people work - and a very weak private sector. In fact, two-thirds of the workforce are not covered by a pension plan, almost half of the working population does not currently benefit from medical coverage and there is no social care system for vulnerable parts of the population. As of 1 April, more than 700,000 workers have lost their jobs.Moving forward?Even if public perceptions of the government’s response are positive at the moment, this is most likely a short-term surge that should not be taken for granted. Despite the efforts made by the government, Morocco’s health system is not equipped to handle this crisis. Even with the new measures that have been implemented, if the spread of the virus gets out of control, more funds, more doctors, and more equipment will be needed. Given the structural weaknesses of the healthcare system, this will be an uphill battle.Moreover, even if the government manages to mitigate the public health impact, the economic consequences will be dire—especially in the tourism industry—and will severely hurt those workers in the informal sector who are living without a safety net. In Morocco, this category represents most of the working population.This crisis highlights that the Moroccan government must urgently tackle its large portfolio of unfinished reforms, notably in healthcare, the economy, and labour rights. So far, the government is capitalizing on the spirit of unity, social solidarity and public support. The future trajectory of the pandemic and the effectiveness of governance will determine if this spirit of solidarity will last. If the government fails to effectively mitigate the public health and economic impacts of this pandemic, this solidarity and cooperation will not last long. Full Article