it Power Politics Could Impede Progress on Responsible Regulation of Cyberspace By feedproxy.google.com Published On :: Tue, 03 Dec 2019 14:34:13 +0000 3 December 2019 Harriet Moynihan Senior Research Fellow, International Law Programme @HarrietMoyniha9 A new Chatham House paper examines the prospects of countries reaching agreement on issues of sovereignty and non-intervention in cyberspace in the face of persistent, low-level, state-to-state cyber attacks. 2019-11-29-Intl-Law-Cyberattacks.jpg A computer hacked by a virus known as Petya. The Petya ransomware cyberattack hit computers of Russian and Ukrainian companies on 27 June 2017. Photo: Getty Images. In discussions to date about how international law applies in cyberspace, commentators have tended to focus their attention on how the rules on the use of force, or the law of armed conflict, apply to cyber activities conducted by states that give rise to physical damage, injury or death.But in practice, the vast majority of state cyberattacks fall below this threshold. Far more common are persistent, low-level attacks that may leave no physical trace but that are capable of doing significant damage to a state’s ability to control its systems, often at serious economic cost.Such cyber incursions might include network disruptions in the operation of another government’s websites; tampering with electoral infrastructure to change or undermine the result; or using cyber means to destabilize another state’s financial sector.For these kinds of cyber operation, the principle of sovereignty, and the principle of non-intervention in another state’s internal affairs, are the starting point.A UN Group of Government Experts (GGE) agreed in 2013 and 2015 that the principles in the UN Charter, including sovereignty and the prohibition on intervention in another state’s affairs, apply to states’ activities in cyberspace. The 2015 GGE also recommended eleven (non-binding) norms of responsible state behaviour in cyberspace.However, states have not yet reached agreement on how to apply these principles. Until recently, there has also been very little knowledge of what states actually do in cyberspace, as they usually conduct cyber operations covertly and have been reluctant to put their views on record.A new Chatham House research paper analyses the application of the principles of sovereignty and non-intervention to state cyberattacks that fall below the principle of use of force. As well as analysing the application of the law in this area, the paper also makes recommendations to governments on how they might best make progress in reaching agreement in this area.Existing rules or new rules?As the research paper makes clear, there is currently some debate, principally between countries in the West, about the extent to which sovereignty is a legally binding rule in the context of cyberspace and, if so, how it and the principle of non-intervention might apply in practice.In the last few years, certain states have put on record how they consider international law to apply to states’ activities in cyberspace, namely the UK, Australia, France and the Netherlands. While there may be some differences in their approaches, which are discussed in the paper, there also remains important common ground: namely, that existing international law already provides a solid framework for regulating states’ cyber activities, as it regulates every other domain of state-to-state activity.There is also an emerging trend for states to work together when attributing cyberattacks to hostile states, enabling them to call out malign cyber activity when it violates international law. (See, for example, the joint statements made in relation to the NotPetya cyber attack and malicious cyber activity attributed to the Russian government).However, other countries have questioned whether existing international law as it stands is capable of regulating states’ cyber interactions and have called for ‘new legal instruments’ in this area.This includes a proposal by the Shanghai Cooperation Organization (led by Russia and China) for an International Code of Conduct on Information Security, a draft of which was submitted to the UN in 2011 and 2015, without success. The UN has also formed a new Open-Ended Working Group (OEWG) under a resolution proposed by Russia to consider how international law applies to states’ activities in cyberspace.The resolution establishing the OEWG, which began work earlier this year, includes the possibility of the group ‘introducing changes to the rules, norms and principles of responsible behaviour of States’ agreed in the 2013 and 2015 GGE reports. In the OEWG discussions at the UN in September, several countries claimed that a new legal instrument was needed to fill the ‘legal vacuum’ (Cuba) or ‘the gap of ungoverned areas’ (Indonesia).It would be concerning if the hard-won consensus on the application of international law to cyberspace that has been reached at past GGEs started to unravel. In contrast to 2013 and 2015, the 2017 meeting failed to reach an agreement.On 9 December, a renewed GGE will meet in New York, but the existence of the OEWG exploring the same issues in a separate process reflects the fact that cyber norms have become an area of geopolitical rivalry.Aside from the application of international law, states are also adopting divergent approaches to the domestic regulation of cyberspace within their own territory. The emerging trend towards a ‘splinternet’ – i.e. between states that believe the internet should be global and open on the hand, and those that favour a ‘sovereignty and control’ model on the other – is also likely to make discussions at the GGE more challenging.Distinct from the international law concept of sovereignty is the notion of ‘cybersovereignty’, a term coined by China to describe the wide-ranging powers it assumes under domestic law to regulate its citizens’ access to the internet and personal data within its territory. This approach is catching on (as reflected in Russia’s recently enacted ‘Sovereign Internet Law’), with other authoritarian states likely to follow suit.The importance of non-state actorsIn parallel with regional and UN discussions on how international law applies, a number of initiatives by non-state actors have also sought to establish voluntary principles about responsible state behaviour in cyberspace.The Global Commission on the Stability of Cyberspace, a multi-stakeholder body that has proposed principles, norms and recommendations to guide responsible behaviour by all parties in cyberspace, recently published its final report. The Cybersecurity Tech Accord aims to promote collaboration between tech companies on stability and resilience in cyberspace. President Macron’s ‘Paris Call for Trust and Security in Cyberspace’ has to date received the backing of 67 states, 139 international and civil society organizations, and 358 private-sector organizations.It remains to be seen in the long term whether the parallel processes at the UN will work constructively together or be competitive. But notwithstanding the challenging geopolitical backdrop, the UN GGE meeting next week at the least offers states the opportunity to consolidate and build on the results of past meetings; to increase knowledge and discussion about how international law might apply; and to encourage more states to put their own views of these issues on the record. Full Article
it Glucocerebrosidases catalyze a transgalactosylation reaction that yields a newly-identified brain sterol metabolite, galactosylated cholesterol [Glycobiology and Extracellular Matrices] By feedproxy.google.com Published On :: 2020-04-17T00:06:05-07:00 β-Glucocerebrosidase (GBA) hydrolyzes glucosylceramide (GlcCer) to generate ceramide. Previously, we demonstrated that lysosomal GBA1 and nonlysosomal GBA2 possess not only GlcCer hydrolase activity, but also transglucosylation activity to transfer the glucose residue from GlcCer to cholesterol to form β-cholesterylglucoside (β-GlcChol) in vitro. β-GlcChol is a member of sterylglycosides present in diverse species. How GBA1 and GBA2 mediate β-GlcChol metabolism in the brain is unknown. Here, we purified and characterized sterylglycosides from rodent and fish brains. Although glucose is thought to be the sole carbohydrate component of sterylglycosides in vertebrates, structural analysis of rat brain sterylglycosides revealed the presence of galactosylated cholesterol (β-GalChol), in addition to β-GlcChol. Analyses of brain tissues from GBA2-deficient mice and GBA1- and/or GBA2-deficient Japanese rice fish (Oryzias latipes) revealed that GBA1 and GBA2 are responsible for β-GlcChol degradation and formation, respectively, and that both GBA1 and GBA2 are responsible for β-GalChol formation. Liquid chromatography–tandem MS revealed that β-GlcChol and β-GalChol are present throughout development from embryo to adult in the mouse brain. We found that β-GalChol expression depends on galactosylceramide (GalCer), and developmental onset of β-GalChol biosynthesis appeared to be during myelination. We also found that β-GlcChol and β-GalChol are secreted from neurons and glial cells in association with exosomes. In vitro enzyme assays confirmed that GBA1 and GBA2 have transgalactosylation activity to transfer the galactose residue from GalCer to cholesterol to form β-GalChol. This is the first report of the existence of β-GalChol in vertebrates and how β-GlcChol and β-GalChol are formed in the brain. Full Article
it COQ11 deletion mitigates respiratory deficiency caused by mutations in the gene encoding the coenzyme Q chaperone protein Coq10 [Lipids] By feedproxy.google.com Published On :: 2020-05-01T00:06:09-07:00 Coenzyme Q (Qn) is a vital lipid component of the electron transport chain that functions in cellular energy metabolism and as a membrane antioxidant. In the yeast Saccharomyces cerevisiae, coq1–coq9 deletion mutants are respiratory-incompetent, sensitive to lipid peroxidation stress, and unable to synthesize Q6. The yeast coq10 deletion mutant is also respiratory-deficient and sensitive to lipid peroxidation, yet it continues to produce Q6 at an impaired rate. Thus, Coq10 is required for the function of Q6 in respiration and as an antioxidant and is believed to chaperone Q6 from its site of synthesis to the respiratory complexes. In several fungi, Coq10 is encoded as a fusion polypeptide with Coq11, a recently identified protein of unknown function required for efficient Q6 biosynthesis. Because “fused” proteins are often involved in similar biochemical pathways, here we examined the putative functional relationship between Coq10 and Coq11 in yeast. We used plate growth and Seahorse assays and LC-MS/MS analysis to show that COQ11 deletion rescues respiratory deficiency, sensitivity to lipid peroxidation, and decreased Q6 biosynthesis of the coq10Δ mutant. Additionally, immunoblotting indicated that yeast coq11Δ mutants accumulate increased amounts of certain Coq polypeptides and display a stabilized CoQ synthome. These effects suggest that Coq11 modulates Q6 biosynthesis and that its absence increases mitochondrial Q6 content in the coq10Δcoq11Δ double mutant. This augmented mitochondrial Q6 content counteracts the respiratory deficiency and lipid peroxidation sensitivity phenotypes of the coq10Δ mutant. This study further clarifies the intricate connection between Q6 biosynthesis, trafficking, and function in mitochondrial metabolism. Full Article
it Certain ortho-hydroxylated brominated ethers are promiscuous kinase inhibitors that impair neuronal signaling and neurodevelopmental processes [Cell Biology] By feedproxy.google.com Published On :: 2020-05-01T00:06:09-07:00 The developing nervous system is remarkably sensitive to environmental signals, including disruptive toxins, such as polybrominated diphenyl ethers (PBDEs). PBDEs are an environmentally pervasive class of brominated flame retardants whose neurodevelopmental toxicity mechanisms remain largely unclear. Using dissociated cortical neurons from embryonic Rattus norvegicus, we found here that chronic exposure to 6-OH–BDE-47, one of the most prevalent hydroxylated PBDE metabolites, suppresses both spontaneous and evoked neuronal electrical activity. On the basis of our previous work on mitogen-activated protein kinase (MAPK)/extracellular signal-related kinase (ERK) (MEK) biology and our observation that 6-OH–BDE-47 is structurally similar to kinase inhibitors, we hypothesized that certain hydroxylated PBDEs mediate neurotoxicity, at least in part, by impairing the MEK–ERK axis of MAPK signal transduction. We tested this hypothesis on three experimental platforms: 1) in silico, where modeling ligand–protein docking suggested that 6-OH–BDE-47 is a promiscuous ATP-competitive kinase inhibitor; 2) in vitro in dissociated neurons, where 6-OH–BDE-47 and another specific hydroxylated BDE metabolite similarly impaired phosphorylation of MEK/ERK1/2 and activity-induced transcription of a neuronal immediate early gene; and 3) in vivo in Drosophila melanogaster, where developmental exposures to 6-OH–BDE-47 and a MAPK inhibitor resulted in offspring displaying similarly increased frequency of mushroom-body β–lobe midline crossing, a metric of axonal guidance. Taken together, our results support that certain ortho-hydroxylated PBDE metabolites are promiscuous kinase inhibitors and can cause disruptions of critical neurodevelopmental processes, including neuronal electrical activity, pre-synaptic functions, MEK–ERK signaling, and axonal guidance. Full Article
it A Quantitative Tri-fluorescent Yeast Two-hybrid System: From Flow Cytometry to In cellula Affinities By feedproxy.google.com Published On :: 2020-04-01 David CluetApr 1, 2020; 19:701-715Technological Innovation and Resources Full Article
it Tandem Mass Tag Approach Utilizing Pervanadate BOOST Channels Delivers Deeper Quantitative Characterization of the Tyrosine Phosphoproteome By feedproxy.google.com Published On :: 2020-04-01 Xien Yu ChuaApr 1, 2020; 19:730-743Technological Innovation and Resources Full Article
it Integrative Metabolic Pathway Analysis Reveals Novel Therapeutic Targets in Osteoarthritis By feedproxy.google.com Published On :: 2020-04-01 Beatriz RochaApr 1, 2020; 19:574-588Research Full Article
it Modulation of natural HLA-B*27:05 ligandome by ankylosing spondylitis-associated endoplasmic reticulum aminopeptidase 2 (ERAP2) By feedproxy.google.com Published On :: 2020-04-07 Elena LorenteApr 7, 2020; 0:RA120.002014v1-mcp.RA120.002014Research Full Article
it HIGD2A is required for assembly of the COX3 module of human mitochondrial complex IV By feedproxy.google.com Published On :: 2020-04-21 Daniella H HockApr 21, 2020; 0:RA120.002076v1-mcp.RA120.002076Research Full Article
it Flow-induced reorganization of laminin-integrin networks within the endothelial basement membrane uncovered by proteomics By feedproxy.google.com Published On :: 2020-04-24 Eelke P. BéguinApr 24, 2020; 0:RA120.001964v1-mcp.RA120.001964Research Full Article
it Seminal Plasma Proteome as an Indicator of Sperm Dysfunction and Low Sperm Motility By feedproxy.google.com Published On :: 2020-04-20 Yunlei LiApr 20, 2020; 0:RA120.002017v1-mcp.RA120.002017Research Full Article
it Investigation of inter- and intra-tumoral heterogeneity of glioblastoma using TOF-SIMS By feedproxy.google.com Published On :: 2020-04-06 Samvel K GularyanApr 6, 2020; 0:RA120.001986v1-mcp.RA120.001986Research Full Article
it Human Hepatocyte Nuclear Factor 4-{alpha} Encodes Isoforms with Distinct Transcriptional Functions By feedproxy.google.com Published On :: 2020-05-01 Élie LambertMay 1, 2020; 19:808-827Research Full Article
it Quantitative proteomics of human heart samples collected in vivo reveal the remodeled protein landscape of dilated left atrium without atrial fibrillation By feedproxy.google.com Published On :: 2020-04-14 Nora LinscheidApr 14, 2020; 0:RA119.001878v1-mcp.RA119.001878Research Full Article
it Arginine in C9ORF72 Dipolypeptides Mediates Promiscuous Proteome Binding and Multiple Modes of Toxicity By feedproxy.google.com Published On :: 2020-04-01 Mona RadwanApr 1, 2020; 19:640-654Research Full Article
it A cross-linking mass spectrometry approach defines protein interactions in yeast mitochondria By feedproxy.google.com Published On :: 2020-04-24 Andreas LindenApr 24, 2020; 0:RA120.002028v1-mcp.RA120.002028Research Full Article
it Characterization of signaling pathways associated with pancreatic {beta}-cell adaptive flexibility in compensation of obesity-linked diabetes in db/db mice By feedproxy.google.com Published On :: 2020-04-07 Taewook KangApr 7, 2020; 0:RA119.001882v1-mcp.RA119.001882Research Full Article
it Discovery of a Redox Thiol Switch: Implications for Cellular Energy Metabolism By feedproxy.google.com Published On :: 2020-05-01 Xing-Huang GaoMay 1, 2020; 19:852-870Research Full Article
it Selection of features with consistent profiles improves relative protein quantification in mass spectrometry experiments By feedproxy.google.com Published On :: 2020-03-31 Tsung-Heng TsaiMar 31, 2020; 0:RA119.001792v1-mcp.RA119.001792Research Full Article
it Quantitative Profiling of the Human Substantia Nigra Proteome from Laser-capture Microdissected FFPE Tissue By feedproxy.google.com Published On :: 2020-05-01 Eva GriesserMay 1, 2020; 19:839-851Research Full Article
it Compliance Checklists No Longer Required at Initial Manuscript Submission By feedproxy.google.com Published On :: 2020-04-01 Alma L. BurlingameApr 1, 2020; 19:571-571Editorial Full Article
it Improving Identification of In-organello Protein-Protein Interactions Using an Affinity-enrichable, Isotopically Coded, and Mass Spectrometry-cleavable Chemical Crosslinker By feedproxy.google.com Published On :: 2020-04-01 Karl A. T. MakepeaceApr 1, 2020; 19:624-639Research Full Article
it MaxQuant software for ion mobility enhanced shotgun proteomics By feedproxy.google.com Published On :: 2020-03-10 Nikita PrianichnikovMar 10, 2020; 0:TIR119.001720v1-mcp.TIR119.001720Technological Innovation and Resources Full Article
it An Improved Boosting to Amplify Signal with Isobaric Labeling (iBASIL) Strategy for Precise Quantitative Single-cell Proteomics By feedproxy.google.com Published On :: 2020-05-01 Chia-Feng TsaiMay 1, 2020; 19:828-838Research Full Article
it Acquiring and Analyzing Data Independent Acquisition Proteomics Experiments without Spectrum Libraries By feedproxy.google.com Published On :: 2020-04-20 Lindsay K PinoApr 20, 2020; 0:P119.001913v1-mcp.P119.001913Perspective Full Article
it A Compact Quadrupole-Orbitrap Mass Spectrometer with FAIMS Interface Improves Proteome Coverage in Short LC Gradients By feedproxy.google.com Published On :: 2020-04-01 Dorte B. Bekker-JensenApr 1, 2020; 19:716-729Technological Innovation and Resources Full Article
it Proximity Dependent Biotinylation: Key Enzymes and Adaptation to Proteomics Approaches By feedproxy.google.com Published On :: 2020-05-01 Payman Samavarchi-TehraniMay 1, 2020; 19:757-773Review Full Article
it LockBit ransomware borrows tricks to keep up with REvil and Maze By feedproxy.google.com Published On :: Fri, 24 Apr 2020 13:03:38 +0000 Recently-adopted techniques advance LockBit to a major ransomware player...for now. Full Article SophosLabs Uncut data breach exfiltration I/O Completion Ports IOCP LockBit Ransomware UAC Bypass User Account Control
it A New Type of Learning Community By blogs.ams.org Published On :: Wed, 05 Feb 2020 13:42:16 +0000 Setting high standards is expected from all educators. Yet, I think I may have taken this to an extreme in my 2019 spring senior seminar course in algebraic combinatorics. Students walked in to class, got a copy of the syllabus … Continue reading → Full Article career advancement General Journals and Publications Uncategorized Undegraduates
it Cybersecurity in the Commonwealth: Building the Foundations of Effective National Responses in the Caribbean By feedproxy.google.com Published On :: Thu, 07 Feb 2019 14:20:01 +0000 Invitation Only Research Event 8 March 2019 - 9:00am to 5:30pm Bridgetown, Barbados Event participants Joyce Hakmeh, Cyber Research Fellow, International Security Department, Chatham House This workshop is the second in a series in the 'Implementing the Commonwealth Cybersecurity Agenda' project. The workshop aims to provide a multi-stakeholder pan-Commonwealth platform to discuss how to take the implementation of the 'Commonwealth Cyber Declaration' forward with a focus on the second pillar of the declaration – building the foundations of an effective national cybersecurity response with eight action points. As such, the workshop gathers different project implementers under the UK Foreign and Commonwealth Office’s Cyber Programme, in addition to other key relevant stakeholders from the global level, to explore ongoing initiatives which aim to deliver one or more of pillar two’s action points.The workshop addresses issues from a global perspective and a Commonwealth perspective and will include presentations from selected partners from different Commonwealth countries. Department/project International Security Programme Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email Full Article
Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email
it Transparency and Accountability for Drone Use: European Approaches By feedproxy.google.com Published On :: Thu, 07 Mar 2019 17:35:01 +0000 Invitation Only Research Event 11 March 2019 - 9:30am to 12 March 2019 - 12:30pm Chatham House With increased use of military drones in recent years there have also been many calls for greater transparency and accountability with regards to drone operations.This would allow for greater public understanding, particularly as the complex nature of military operations today intensifies difficulties in sustaining perceptions of the legitimate use of force.For example, in Europe, leading states rely on the US for drone platforms and for the infrastructure - such as military communication networks - that enable those operations, while the US also relies on airbases in European states to operate its drone programme.In addition, with reports that the US is loosening the rules on the use of drones, it is important to understand how European approaches to transparency and accountability may be affected by these developments.This workshop focuses on how European states can facilitate transparency to ensure accountability for drone use, as well as what the limits might be, considering both the complexity of military operations today and the need for achieving operational goals.With the US easing restrictions on export controls, the discussion also considers the role of regulation in ensuring accountability and prospects for developing common standards.Attendance at this event is by invitation only. Nilza Amaral Project Manager, International Security Programme Email Department/project International Security Programme, Policy Implications of Armed Drone Use Full Article
it How Regulation Could Break the Internet: In Conversation with Andrew Sullivan By feedproxy.google.com Published On :: Mon, 29 Apr 2019 13:30:01 +0000 Research Event 19 June 2019 - 6:00pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Andrew Sullivan, President and CEO Internet SocietyChair: Emily Taylor, Associate Fellow, International Security Department, Chatham House; Editor, Journal of Cyber Policy Internet regulation is increasing around the world creating positive obligations on internet providers and exerting negative unintended consequences on the internet infrastructure. In some ways, most of this regulatory activity is justifiable. Governments are concerned about the increased risk that the use of the internet brings to societies. As a response, many governments have been enacting regulations as their main approach to dealing with these concerns. The main challenge is that most of the current regulations are either ill-defined or unworkable. On the one hand, several governments have established procedures that seek to analyze the impacts of new regulatory proposals before they were adopted. However, there hasn’t been enough attention aimed at analyzing regulations after they have been adopted and only a few have measures in place to evaluate the impacts of the procedures and practices that govern the regulatory process itself.On the other hand, much of the regulation creates unintended consequences to the internet itself. It undermines many of its fundamental properties and challenges the integrity and resiliency of its infrastructure. This event discusses current practices in internet-related regulation and the related challenges. Panellists will discuss how governments can enforce regulations that achieve their intended purpose while at the same time protecting the internet’s core infrastructure and its properties, including its openness, interoperability and global reach. Department/project International Security Programme, Internet Governance Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email Full Article
Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email
it Cyber Insurance for Civil Nuclear Facilities: Risks and Opportunities By feedproxy.google.com Published On :: Wed, 08 May 2019 15:21:25 +0000 8 May 2019 This paper sets out a roadmap for how organizations in the civil nuclear sector can explore their options and review their cyber risk exposure. Read online Download PDF Éireann Leverett Senior Risk Researcher, University of Cambridge GettyImages-667179424.jpg The control room inside the Paks nuclear power plant in Hungary, 10 April 2017. Photo: Getty Images Civil nuclear facilities and organizations hold sensitive information on security clearances, national security, health and safety, nuclear regulatory issues and international inspection obligations. The sensitivity and variety of such data mean that products tailored for insuring the civil nuclear industry have evolved independently and are likely to continue to do so.‘Air-gaps’ – measures designed to isolate computer systems from the internet – need to be continually maintained for industrial systems. Yet years of evidence indicate that proper maintenance of such protections is often lacking (mainly because very real economic drivers exist that push users towards keeping infrastructure connected). Indeed, even when air-gaps are maintained, security breaches can still occur.Even if a particular organization has staff that are highly trained, ready and capable of handling a technological accident, hacking attack or incidence of insider sabotage, it still has to do business and/or communicate with other organizations that may not have the essentials of cybersecurity in place.Regardless of whether the choice is made to buy external insurance or put aside revenues in preparation for costly incidents, the approach to cyber risk calculation should be the same. Prevention is one part of the equation, but an organization will also need to consider the resources and contingency measures available to it should prevention strategies fail. Can it balance the likelihood of a hacker’s success against the maximum cost to the organization, and put aside enough capital and manpower to get it through a crisis?All civil nuclear facilities should consider the establishment of computer security incident response (CSIR) teams as a relevant concern, if such arrangements are not already in place. The existence of a CSIR team will be a prerequisite for any facility seeking to obtain civil nuclear cyber insurance.Preventing attacks such as those involving phishing and ransomware requires good cyber hygiene practices throughout the workforce. Reducing an organization’s ‘time to recovery’ takes training and dedication. Practising the necessary tasks in crisis simulations greatly reduces the likelihood of friction and the potential for error in a crisis. Department/project International Security Programme, Cyber and Nuclear Security Full Article
it Cybersecurity of NATO’s Space-based Strategic Assets By feedproxy.google.com Published On :: Tue, 25 Jun 2019 15:38:20 +0000 1 July 2019 Almost all modern military engagements rely on space-based assets, but cyber vulnerabilities can undermine confidence in the performance of strategic systems. This paper will evaluate the threats, vulnerabilities and consequences of cyber risks to strategic systems. Read online Download PDF Dr Beyza Unal Senior Research Fellow, International Security Programme @beyzaunal Google Scholar 2019-06-25-Space-Cybersecurity.jpg The radar domes of RAF Menwith Hill, reported to be the biggest spy base in the world, dominate the skyline on 30 October 2007 in Harrogate, UK. Photo: Getty Images SummaryAll satellites depend on cyber technology including software, hardware and other digital components. Any threat to a satellite’s control system or available bandwidth poses a direct challenge to national critical assets.NATO’s missions and operations are conducted in the air, land, cyber and maritime domains. Space-based architecture is fundamental to the provision of data and services in each of these contexts. The critical dependency on space has resulted in new cyber risks that disproportionately affect mission assurance. Investing in mitigation measures and in the resilience of space systems for the military is key to achieving protection in all domains.Almost all modern military engagements rely on space-based assets. During the US-led invasion of Iraq in 2003, 68 per cent of US munitions were guided utilizing space-based means (including laser-, infrared- and satellite-guided munitions); up sharply from 10 per cent in 1990–91, during the first Gulf war. In 2001, 60 per cent of the weapons used by the US in Afghanistan were precision-guided munitions, many of which had the capability to use information provided by space-based assets to correct their own positioning to hit a target.NATO does not own satellites. It owns and operates a few terrestrial elements, such as satellite communications anchor stations and terminals. It requests access to products and services – such as space weather reports and satellite overflight reports provided via satellite reconnaissance advance notice systems – but does not have direct access to satellites: it is up to individual NATO member states to determine whether they allow access.Cyber vulnerabilities undermine confidence in the performance of strategic systems. As a result, rising uncertainty in information and analysis continues to impact the credibility of deterrence and strategic stability. Loss of trust in technology also has implications for determining the source of a malicious attack (attribution), strategic calculus in crisis decision-making and may increase the risk of misperception. Department/project International Security Programme, Cyber and Space Full Article
it Cybersecurity by Design in Civil Nuclear Power Plants By feedproxy.google.com Published On :: Tue, 23 Jul 2019 17:34:51 +0000 24 July 2019 Cyberattacks are increasingly challenging critical national infrastructure. This paper considers the security by design approach for civil nuclear power plants and analyses areas of risk and opportunities for the nuclear industry. Read online Download PDF Dr Beyza Unal Senior Research Fellow, International Security Programme @beyzaunal Google Scholar Roger Brunt Managing Director, Grosmont Howe Ltd 2019-07-24-NuclearPlant.jpg An employee climbs into the cooling tower of the third and fourth unit at Mochovce nuclear power plant in Slovakia on 2 July 2019. Photo: Getty Images SummaryThe application of ‘security by design’ in nuclear new builds could provide operators with the opportunity to establish a robust and resilient security architecture at the beginning of a nuclear power plant’s life cycle. This will enhance the protection of the plant and reduce the need for costly security improvements during its operating life.Security by design cannot fully protect a nuclear power plant from rapidly evolving cyberattacks, which expose previously unsuspected or unknown vulnerabilities.Careful design of security systems and architecture can – and should – achieve levels of protection that exceed current norms and expectations. However, the sourcing of components from a global supply chain means that the integrity of even the most skilfully designed security regime cannot be guaranteed without exhaustive checks of its components.Security by design may well include a requirement for a technical support organization to conduct quality assurance of cyber defences and practices, and this regime should be endorsed by a facility’s executive board and continued at regular intervals after the new build facility has been commissioned.Given the years it takes to design, plan and build a new nuclear power plant, it is important to recognize that from the point of ‘design freeze’ onwards, the operator will be building in vulnerabilities, as technology continues to evolve rapidly while construction fails to keep pace with it. Security by design cannot be a panacea, but it is an important factor in the establishment of a robust nuclear security – and cybersecurity – culture. Department/project International Security Programme, Cyber and Nuclear Security Full Article
it Cyber Governance in the Commonwealth: Towards Stability and Responsible State Behaviour in Cyberspace By feedproxy.google.com Published On :: Mon, 05 Aug 2019 14:05:02 +0000 Invitation Only Research Event 7 October 2019 - 10:30am to 5:30pm Addis Ababa, Ethiopia This roundtable is part of a series under the project, 'Implementing the Commonwealth Cybersecurity Agenda', funded by the UK Foreign and Commonwealth Office (FCO). The roundtable aims to provide a multi-stakeholder, pan-Commonwealth platform to discuss how to implement the Commonwealth Cyber Declaration with a focus on its third pillar 'To promote stability in cyberspace through international cooperation'.In particular, the roundtable focuses on points 3 and 4 of the third pillar which revolve around the commitment to promote frameworks for stability in cyberspace including the applicability of international law, agreed voluntary norms of responsible state behaviour and the development and implementation of confidence-building measures consistent with the 2015 report of the UNGGE. The workshop also focuses on the commitment to advance discussions on how existing international law, including the Charter of the United Nations and applicable international humanitarian law, applies in cyberspace.The roundtable addresses the issue of global cyber governance from a Commonwealth perspective and will also include a discussion around the way forward, the needed capacity of the different Commonwealth countries and the cooperation between its members for better cyber governance.Participants include UNGGE members from Commonwealth countries in addition to representatives to the UN Open-Ended Working Group from African countries as well as members from academia, civil society and industry. Department/project International Security Programme Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email Full Article
Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email
it Human Control Is Essential to the Responsible Use of Military Neurotechnology By feedproxy.google.com Published On :: Wed, 07 Aug 2019 15:09:10 +0000 8 August 2019 Yasmin Afina Research Assistant, International Security Programme @afinayasmin LinkedIn The military importance of AI-connected brain–machine interfaces is growing. Steps must be taken to ensure human control at all times over these technologies. 2019-08-08-BABWIB.jpg A model of a human brain is displayed at an exhibition in Lisbon, Portugal. Photo: Getty Images. Technological progress in neurotechnology and its military use is proceeding apace. As early as the 1970s, brain-machine interfaces have been the subject of study. By 2014, the UK’s Ministry of Defence was arguing that the development of artificial devices, such as artificial limbs, is ‘likely to see refinement of control to provide… new ways to connect the able-bodied to machines and computers.’ Today, brain-machine interface technology is being investigated around the world, including in Russia, China and South Korea.Recent developments in the private sector are producing exciting new capabilities for people with disabilities and medical conditions. In early July, Elon Musk and Neuralink presented their ‘high-bandwidth’ brain-machine interface system, with small and flexible electrode threads packaged into a small device containing custom chips and to be inserted and implanted into the user’s brain for medical purposes.In the military realm, in 2018, the United States’ Defense Advanced Research Projects Agency (DARPA) put out a call for proposals to investigate the potential of nonsurgical brain-machine interfaces to allow soldiers to ‘interact regularly and intuitively with artificially intelligent, semi-autonomous and autonomous systems in a manner currently not possible with conventional interfaces’. DARPA further highlighted the need for these interfaces to be bidirectional – where information is sent both from brain to machine (neural recording) and from machine to brain (neural stimulation) – which will eventually allow machines and humans to learn from each other.This technology may provide soldiers and commanders with a superior level of sensory sensitivity and the ability to process a greater amount of data related to their environment at a faster pace, thus enhancing situational awareness. These capabilities will support military decision-making as well as targeting processes.Neural recording will also enable the obtention of a tremendous amount of data from operations, including visuals, real-time thought processes and emotions. These sets of data may be used for feedback and training (including for virtual wargaming and for machine learning training), as well as for investigatory purposes. Collected data will also feed into research that may help researchers understand and predict human intent from brain signals – a tremendous advantage from a military standpoint.Legal and ethical considerationsThe flip side of these advancements is the responsibilities they will impose and the risks and vulnerabilities of the technology as well as legal and ethical considerations.The primary risk would be for users to lose control over the technology, especially in a military context; hence a fail-safe feature is critical for humans to maintain ultimate control over decision-making. Despite the potential benefits of symbiosis between humans and AI, users must have the unconditional possibility to override these technologies should they believe it is appropriate and necessary for them to do so.This is important given the significance of human control over targeting, as well as strategic and operational decision-making. An integrated fail-safe in brain-machine interfaces may in fact allow for a greater degree of human control over critical, time-sensitive decision-making. In other words, in the event of incoming missiles alert, while the AI may suggest a specific course of action, users must be able to decide in a timely manner whether to execute it or not.Machines can learn from coded past experiences and decisions, but humans also use gut feelings to make life and death decisions. A gut feeling is a human characteristic that is not completely transferable, as it relies on both rational and emotional traits – and is part of the ‘second-brain’ and the gut-brain axis which is currently poorly understood. It is however risky to take decisions solely on gut feelings or solely on primary brain analysis—therefore, receiving a comprehensive set of data via an AI-connected brain-machine interface may help to verify and evaluate the information in a timely manner, and complement decision-making processes. However, these connections and interactions would have to be much better understood than the current state of knowledge. Fail-safe features are necessary to ensure compliance with the law, including international humanitarian law and international human rights law. As a baseline, human control must be used to 1) define areas where technology may or may not be trusted and to what extent, and 2) ensure legal, political and ethical accountability, responsibility and explainability at all times. Legal and ethical considerations must be taken into account from as early as the design and conceptualizing stage of these technologies, and oversight must be ensured across the entirety of the manufacturing supply chain. The second point raises the need to further explore and clarify whether existing national, regional and international legal, political and ethical frameworks are sufficient to cover the development and use of these technologies. For instance, there is value in assessing to what extent AI-connected brain-machine interfaces will affect the assessment of the mental element in war crimes and their human rights implications.In addition, these technologies need to be highly secure and invulnerable to cyber hacks. Neural recording and neural stimulation will be directly affecting brain processes in humans and if an adversary has the ability to connect to a human brain, steps need to be taken to ensure that memory and personality could not be damaged.Future questionsMilitary applications of technological progress in neurotechnology is inevitable, and their implications cannot be ignored. There is an urgent need for policymakers to understand the fast-developing neurotechnical capabilities, develop international standards and best practices – and, if necessary, new and dedicated legal instruments – to frame the use of these technologies.Considering the opportunities that brain-machine interfaces may present in the realms of security and defence, inclusive, multi-stakeholder discussions and negotiations leading to the development of standards must include the following considerations:What degree of human control would be desirable, at what stage and by whom? To what extent could human users be trusted with their own judgment in decision-making processes?How could algorithmic and human biases, the cyber security and vulnerabilities of these technologies and the quality of data be factored into these discussions?How can ethical and legal considerations be incorporated into the design stage of these technologies?How can it be ensured that humans cannot be harmed in the process, either inadvertently or deliberately?Is there a need for a dedicated international forum to discuss the military applications of neurotechnology? How could these discussions be integrated to existing international processes related to emerging military applications of technological progress, such as the Convention on Certain Conventional Weapons (CCW) Group of Governmental Experts on Lethal Autonomous Weapons Systems? Full Article
it The Future of EU–US Cooperation in Space Traffic Management and Space Situational Awareness By feedproxy.google.com Published On :: Mon, 19 Aug 2019 10:09:54 +0000 29 August 2019 As more space activities develop, there is an increasing requirement for comprehensive space situational awareness (SSA). This paper provides an overview of the current landscape in SSA and space traffic management as well as possible scenarios for EU–US cooperation in this area. Read online Download PDF Alexandra Stickings Research Fellow for Space Policy and Security, RUSI 2019-08-19-SpaceTrafficManagement.jpg Deployment of the NanoRacks-Remove Debris Satellite from the International Space Station. Photo: Getty Images. SummarySpace situational awareness (SSA) and space traffic management (STM) are essential for sustainable near-Earth orbit. International cooperation in SSA and STM is vital with the growing number of satellite operators and the increasingly complex space environment.The various definitions of SSA and STM are ambiguous. Understanding the activities that fall under each term can better assist in finding areas for cooperation and collaboration.SSA has historically been a military activity, leading to an incomplete public catalogue of its use and barriers to sharing information with other states and the commercial sector. The rise in private space actors has increased the number of commercial STM providers and, with plans in the US to move responsibility for STM to civilian control, there will likely be more opportunities for international collaboration, particularly through the EU Space Surveillance and Tracking (SST) programme.Individual EU member states possess developed STM capabilities, but overall these are still some way behind those of allies such as the US. Further investment in STM infrastructure and programmes is required for the EU and individual European states to be an essential partner to the US and add value to the global effort.There are worldwide challenges, both political and technical, to providing STM coverage, which may lead to a lack of collaboration and gaps in understanding of activities in orbit. Existing sensors have limitations in terms of the size of objects that can be detected and the precision with which their movements can be predicted. These capability gaps represent opportunities for the EU to contribute.The EU can build on its tradition of support for openness and civil society by creating a system that fosters an environment of cooperation and collaboration involving industry, commercial STM providers and the wider international community.Although collaboration in STM is vital, the EU should also aim to tackle issues within the wider definition of SSA including space weather, intelligence and the security of ground stations.The EU is well placed to become a global leader in SSA and STM. However, it needs to take into consideration the current political and technical landscape when making decisions regarding investment in capabilities and the pursuit of international partnerships. Department/project International Security Programme, Cyber and Space Full Article
it Examining Measures to Mitigate Cyber Vulnerabilities of Space-based Strategic Assets By feedproxy.google.com Published On :: Tue, 03 Sep 2019 08:45:02 +0000 Invitation Only Research Event 30 October 2019 - 9:30am to 4:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Beyza Unal, Senior Research Fellow, International Security Department, Chatham HousePatricia Lewis, Research Director, International Security Department, Chatham House Strategic systems that depend on space-based assets, such as command, control and communication, early warning systems, weapons systems and weapons platforms, are essential for conducting successful NATO operations and missions. Given the increasing dependency on such systems, the alliance and key member states would therefore benefit from an in-depth analysis of possible mitigation and resilience measures.This workshop is part of the International Security Department’s (ISD) project on space security and the vulnerability of strategic assets to cyberattacks, which includes a recently published report. This project aims to create resilience in NATO and key NATO member states, building the capacity of key policymakers and stakeholders to respond with effective policies and procedures. This workshop will focus on measures to mitigate the cyber vulnerabilities of NATO’s space-dependent strategic assets. Moreover, participants will discuss the type of resilience measures and mechanisms required.Attendance at this event is by invitation only. Department/project International Security Programme Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email Full Article
Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email
it Who’s Afraid of Huawei? Understanding the 5G Security Concerns By feedproxy.google.com Published On :: Fri, 06 Sep 2019 09:55:03 +0000 9 September 2019 Emily Taylor Associate Fellow, International Security Programme @etaylaw LinkedIn Emily Taylor examines the controversy around the Chinese tech giant’s mobile broadband equipment and the different approaches taken by Western countries. 2019-09-06-Huawei.jpg Huawei's Ox Horn campus in Dongguan, China. Photo: Getty Images. As countries move towards the fifth generation of mobile broadband, 5G, the United States has been loudly calling out Huawei as a security threat. It has employed alarmist rhetoric and threatened to limit trade and intelligence sharing with close allies that use Huawei in their 5G infrastructure.While some countries such as Australia have adopted a hard line against Huawei, others like the UK have been more circumspect, arguing that the risks of using the firm’s technology can be mitigated without forgoing the benefits.So, who is right, and why have these close allies taken such different approaches?The risksLong-standing concerns relating to Huawei are plausible. There are credible allegations that it has benefitted from stolen intellectual property, and that it could not thrive without a close relationship with the Chinese state.Huawei hotly denies allegations that users are at risk of its technology being used for state espionage, and says it would resist any order to share information with the Chinese government. But there are questions over whether it could really resist China’s stringent domestic legislation, which compels companies to share data with the government. And given China’s track record of using cyberattacks to conduct intellectual property theft, there may be added risks of embedding a Chinese provider into critical communications infrastructure.In addition, China’s rise as a global technological superpower has been boosted by the flow of financial capital through government subsidies, venture and private equity, which reveal murky boundaries between the state and private sector for domestic darlings. Meanwhile, the Belt and Road initiative has seen generous investment by China in technology infrastructure across Africa, South America and Asia.There’s no such thing as a free lunch or a free network – as Sri Lanka discovered when China assumed shares in a strategic port in return for debt forgiveness; or Mexico when a 1% interest loan for its 4G network came on the condition that 80% of the funding was spent with Huawei.Aside from intelligence and geopolitical concerns, the quality of Huawei’s products represents a significant cyber risk, one that has received less attention than it deserves.On top of that, 5G by itself will significantly increase the threat landscape from a cybersecurity perspective. The network layer will be more intelligent and adaptable through the use of software and cloud services. The number of network antennae will increase by a factor of 20, and many will be poorly secured ‘things’; there is no need for a backdoor if you have any number of ‘bug doors’.Finally, the US is threatening to limit intelligence sharing with its closest allies if they adopt Huawei. So why would any country even consider using Huawei in their 5G infrastructure?Different situationsThe truth is that not every country is free to manoeuvre; 5G technology will sit on top of existing mobile infrastructure.Australia and the US can afford to take a hard line: their national infrastructure has been largely Huawei-free since 2012. However, the Chinese firm is deeply embedded in other countries’ existing structures – for example, in the UK, Huawei has provided telecommunications infrastructure since 2005. Even if the UK decided tomorrow to ditch Huawei, it cannot just rip up existing 4G infrastructure. To do so would cost a fortune, risk years of delay in the adoption of 5G and limit competition in 5G provisioning.As a result, the UK has adopted a pragmatic approach resulting from years of oversight and analysis of Huawei equipment, during which it has never found evidence of malicious Chinese state cyber activity through Huawei.At the heart of this process is the Huawei Cyber Security Evaluation Centre, which was founded in 2010 as a confidence-building measure. Originally criticized for ‘effectively policing itself’, as it was run and staffed entirely by Huawei, the governance has now been strengthened, with the National Cyber Security Centre chairing its oversight board.The board’s 2019 report makes grim reading, highlighting ‘serious and system defects in Huawei’s software engineering and cyber security competence’. But it does not accuse the company of serving as a platform for state-sponsored surveillance.Similar evidence-based policy approaches are emerging in other countries like Norway and Italy. They offer flexibility for governments, for example by limiting access to some contract competition through legitimate and transparent means, such as security reviews during procurement. The approaches also raise security concerns (both national and cyber) to a primary issue when awarding contracts – something that was not always done in the past, when price was the key driver.The UK is also stressing the need to manage risk and increase vendor diversity in the ecosystem to avoid single points of failure. A further approach that is beginning to emerge is to draw a line between network ‘core’ and ‘periphery’ components, excluding some providers from the more sensitive ‘core’. The limited rollouts of 5G in the UK so far have adopted multi-provider strategies, and only one has reportedly not included Huawei kit.Managing the risks to cyber security and national security will become more complex in a 5G environment. In global supply chains, bans based on the nationality of the provider offer little assurance. For countries that have already committed to Huawei in the past, and who may not wish to be drawn into an outright trade war with China, these moderate approaches offer a potential way forward. Full Article
it How Is New Technology Driving Geopolitical Relations? By feedproxy.google.com Published On :: Mon, 16 Sep 2019 14:20:01 +0000 Research Event 22 October 2019 - 6:00pm to 7:00pm Chatham House, London Event participants Rt Hon Baroness Neville-Jones DCMG, Minister of State for Security and Counter Terrorism (2010-11)Jamie Condliffe, Editor, DealBook Newsletter and Writer, Bits Tech Newsletter, The New York TimesJamie Saunders, Partner, Wychwood Partners LLP; Visiting Professor, University College LondonChair: Dr Patricia Lewis, Research Director, International Security Department, Chatham House New technology such as 5G, artificial intelligence, nanotechnology and robotics have become, now more than ever, intertwined with geopolitical, economic and trade interests. Leading powers are using new technology to exert power and influence and to shape geopolitics more generally.The ongoing race between the US and China around 5G technology is a case in point. Amid these tensions, the impact on developing countries is not sufficiently addressed.Arguably, the existing digital divide will increase leading developing countries to the early, if not hasty, adoption of new technology for fear of lagging behind. This could create opportunities but will also pose risks.This panel discusses how new technology is changing the geopolitical landscape. It also discusses the role that stakeholders, including governments, play in the creation of standards for new technologies and what that means for its deployment in key markets technically and financially.Finally, the panel looks at the issue from the perspective of developing countries, addressing the choices that have to be made in terms of affordability, development priorities and security concerns.This event was organized with the kind support of DXC Technology. Department/project International Security Programme Nicole Darabian Research Assistant, Cyber Policy, International Security Department Email Full Article
it AI-driven Personalization in Digital Media: Political and Societal Implications By feedproxy.google.com Published On :: Mon, 02 Dec 2019 12:18:52 +0000 2 December 2019 The fallout from disinformation and online manipulation strategies have alerted Western democracies to the novel, nuanced vulnerabilities of our information society. This paper outlines the implications of the adoption of AI by the the legacy media, as well as by the new media, focusing on personalization. Download PDF Sophia Ignatidou Academy Associate, International Security Programme @SophiaIgnatidou LinkedIn 2019-12-02-AI-Driven-Personalization-small.jpg The Reuters and other news apps seen on an iPhone, 29 January 2019. Photo: Getty Images. SummaryMachine learning (ML)-driven personalization is fast expanding from social media to the wider information space, encompassing legacy media, multinational conglomerates and digital-native publishers: however, this is happening within a regulatory and oversight vacuum that needs to be addressed as a matter of urgency.Mass-scale adoption of personalization in communication has serious implications for human rights, societal resilience and political security. Data protection, privacy and wrongful discrimination, as well as freedom of opinion and of expression, are some of the areas impacted by this technological transformation.Artificial intelligence (AI) and its ML subset are novel technologies that demand novel ways of approaching oversight, monitoring and analysis. Policymakers, regulators, media professionals and engineers need to be able to conceptualize issues in an interdisciplinary way that is appropriate for sociotechnical systems.Funding needs to be allocated to research into human–computer interaction in information environments, data infrastructure, technology market trends, and the broader impact of ML systems within the communication sector.Although global, high-level ethical frameworks for AI are welcome, they are no substitute for domain- and context-specific codes of ethics. Legacy media and digital-native publishers need to overhaul their editorial codes to make them fit for purpose in a digital ecosystem transformed by ML. Journalistic principles need to be reformulated and refined in the current informational context in order to efficiently inform the ML models built for personalized communication.Codes of ethics will not by themselves be enough, so current regulatory and legislative frameworks as they relate to media need to be reassessed. Media regulators need to develop their in-house capacity for thorough research and monitoring into ML systems, and – when appropriate –proportionate sanctions for actors found to be employing such systems towards malign ends. Collaboration with data protection authorities, competition authorities and national electoral commissions is paramount for preserving the integrity of elections and of a political discourse grounded on democratic principles.Upskilling senior managers and editorial teams is fundamental if media professionals are to be able to engage meaningfully and effectively with data scientists and AI engineers. Department/project International Security Programme, Internet Governance Full Article
it Trump’s Threat to Target Iran’s Cultural Heritage Is Illegal and Wrong By feedproxy.google.com Published On :: Tue, 07 Jan 2020 13:57:57 +0000 7 January 2020 Héloïse Goodley Army Chief of General Staff Research Fellow (2018–19), International Security Targeting cultural property is rightly prohibited under the 1954 Hague Convention. 2020-01-07-Trump.jpg Donald Trump at Mar-a-Lago in December. Photo: Getty Images As tensions escalate in the Middle East, US President Donald Trump has threatened to strike targets in Iran should they seek to retaliate over the killing of Qassem Soleimani. According to the president’s tweet, these sites includes those that are ‘important to Iran and Iranian culture’.Defense Secretary Mark Esper was quick on Monday to rule out any such action and acknowledged that the US would ‘follow the laws of armed conflict’. But Trump has not since commented further on the matter.Any move to target Iranian cultural heritage could constitute a breach of the international laws protecting cultural property. Attacks on cultural sites are deemed unlawful under two United Nations conventions; the 1954 Hague Convention for the Protection of Cultural Property during Armed Conflict, and the 1972 UNESCO World Heritage Convention for the Protection of the World Cultural and Natural Heritage.These have established deliberate attacks on cultural heritage (when not militarily necessary) as a war crime under the Rome Statute of the International Criminal Court in recognition of the irreparable damage that the loss of cultural heritage can have locally, regionally and globally.These conventions were established in the aftermath of the Second World War, in reaction to the legacy of the massive destruction of cultural property that took place, including the intense bombing of cities, and systematic plunder of artworks across Europe. The conventions recognize that damage to the cultural property of any people means ‘damage to the cultural heritage of all mankind’. The intention of these is to establish a new norm whereby protecting culture and history – that includes cultural and historical property – is as important as safeguarding people.Such historical sites are important not simply as a matter of buildings and statues, but rather for their symbolic significance in a people’s history and identity. Destroying cultural artefacts is a direct attack on the identity of the population that values them, erasing their memories and historical legacy. Following the heavy bombing of Dresden during the Second World War, one resident summed up the psychological impact of such destruction in observing that ‘you expect people to die, but you don’t expect the buildings to die’.Targeting sites of cultural significance isn’t just an act of intimidation during conflict. It can also have a lasting effect far beyond the cessation of violence, hampering post-conflict reconciliation and reconstruction, where ruins or the absence of previously significant cultural monuments act as a lasting physical reminder of hostilities.For example, during the Bosnian War in the 1990s, the Old Bridge in Mostar represented a symbol of centuries of shared cultural heritage and peaceful co-existence between the Serbian and Croat communities. The bridge’s destruction in 1993 at the height of the civil war and the temporary cable bridge which took its place acted as a lasting reminder of the bitter hostilities, prompting its reconstruction a decade later as a mark of the reunification of the ethnically divided town.More recently, the destruction of cultural property has been a feature of terrorist organizations, such as the Taliban’s demolition of the 1,700-year-old Buddhas of Bamiyan in 2001, eliciting international condemnation. Similarly, in Iraq in 2014 following ISIS’s seizure of the city of Mosul, the terrorist group set about systematically destroying a number of cultural sites, including the Great Mosque of al-Nuri with its leaning minaret, which had stood since 1172. And in Syria, the ancient city of Palmyra was destroyed by ISIS in 2015, who attacked its archaeological sites with bulldozers and explosives.Such violations go beyond destruction: they include the looting of archaeological sites and trafficking of cultural objects, which are used to finance terrorist activities, which are also prohibited under the 1954 Hague Convention.As a war crime, the destruction of cultural property has been successfully prosecuted in the International Criminal Court, which sentenced Ahmad Al-Faqi Al-Mahdi to nine years in jail in 2016 for his part in the destruction of the Timbuktu mausoleums in Mali. Mahdi led members of Al-Qaeda in the Islamic Maghreb to destroy mausoleums and monuments of cultural and religious importance in Timbuktu, irreversibly erasing what the chief prosecutor described as ‘the embodiment of Malian history captured in tangible form from an era long gone’.Targeting cultural property is prohibited under customary international humanitarian law, not only by the Hague Convention. But the Convention sets out detailed regulations for protection of such property, and it has taken some states a lot of time to provide for these.Although the UK was an original signatory to the 1954 Hague Convention, it did not ratify it until 2017, introducing into law the Cultural Property (Armed Conflicts) Act 2017, and setting up the Cultural Protection Fund to safeguard heritage of international importance threatened by conflict in countries across the Middle East and North Africa.Ostensibly, the UK’s delay in ratifying the convention lay in concerns over the definition of key terms and adequate criminal sanctions, which were addressed in the Second Protocol in 1999. However, changing social attitudes towards the plunder of antiquities, and an alarming increase in the use of cultural destruction as a weapon of war by extremist groups to eliminate cultures that do not align with their own ideology, eventually compelled the UK to act.In the US, it is notoriously difficult to get the necessary majority for the approval of any treaty in the Senate; for the Hague Convention, approval was achieved in 2008, following which the US ratified the Convention in 2009.Destroying the buildings and monuments which form the common heritage of humanity is to wipe out the physical record of who we are. People are people within a place, and they draw meaning about who they are from their surroundings. Religious buildings, historical sites, works of art, monuments and historic artefacts all tell the story of who we are and how we got here. We have a responsibility to protect them. Full Article
it Building LGBTIQ+ Inclusivity in the Armed Forces, 20 Years After the Ban Was Lifted By feedproxy.google.com Published On :: Thu, 16 Jan 2020 12:27:18 +0000 16 January 2020 Will Davies Army Chief of General Staff Research Fellow, International Security Programme @williamhldavies LinkedIn Change was slow to come but progress has since been swift. Not only can a continuing focus on inclusivity benefit service people and the organization, it is also an essential element of a values-based foreign policy. 2020-01-16-Westminster.jpg Crew members from HMS Westminster march through Admiralty Arch as they exercise their freedom of the city in August 2019 in London. Photo: Getty Images. The new UK government will conduct a review of foreign, security and defence policy in 2020. If the UK decides to use values as a framework for foreign policy this needs to be reflected in its armed forces. One area where this is essential is continuing to deepen inclusivity for LGBTIQ+ personnel, building on the progress made since the ban on their service was lifted in 2000.I witnessed the ban first-hand as a young officer in the British Army in 1998. As the duty officer I visited soldiers being held in the regimental detention cells to check all was well. One day a corporal, who I knew, was there awaiting discharge from the army having been convicted of being gay. On the one hand, here was service law in action, which was officially protecting the army’s operational effectiveness and an authority not to be questioned at my level. On the other, here was an excellent soldier in a state of turmoil and public humiliation. How extreme this seems now.On 12 January 2000 Tony Blair’s Labour government announced an immediate lifting of the ban for lesbian, gay and bisexual personnel (LGB) and introduced a new code of conduct for personal relationships. (LGB is the term used by the armed forces to describe those personnel who had been banned prior to 2000.) This followed a landmark ruling in a case taken to the European Court of Human Rights in 1999 by four LGB ex-service personnel – supported by Stonewall – who had been dismissed from service for their sexuality.Up to that point the Ministry of Defence's long-held position had been that LGB personnel had a negative impact on the morale and cohesion of a unit and damaged operational effectiveness. Service personnel were automatically dismissed if it was discovered they were LGB, even though homosexuality had been decriminalized in the UK by 1967.Proof that the armed forces had been lagging behind the rest of society was confirmed by the positive response to the change among service personnel, despite a handful of vocal political and military leaders who foresaw negative impacts. The noteworthy service of LGBTIQ+ people in Iraq and Afghanistan only served to debunk any residual myths.Twenty years on, considerable progress has been made and my memories from 1998 now seem alien. This is a story to celebrate – however in the quest for greater inclusivity there is always room for improvement.Defence Minister Johnny Mercer last week apologized following recent calls from campaign group Liberty for a fuller apology. In December 2019, the Ministry of Defence announced it was putting in place a scheme to return medals stripped from veterans upon their discharge.The armed forces today have a range of inclusivity measures to improve workplace culture including assessments of workplace climate and diversity networks supported by champions drawn from senior leadership.But assessing the actual lived experience for LGBTIQ+ people is challenging due to its subjectivity. This has not been helped by low participation in the 2015 initiative to encourage people to declare confidentially their sexual orientation, designed to facilitate more focused and relevant policies. As of 1 October 2019, only 20.3 per cent of regular service people had declared a sexual orientation.A measure of positive progress is the annual Stonewall Workplace Equality Index, the definitive benchmarking tool for employers to measure their progress on LGBTIQ+ inclusion in the workplace; 2015 marked the first year in which all three services were placed in the top 100 employers in the UK and in 2019 the Royal Navy, British Army and Royal Air Force were placed 15th=, 51st= and 68th respectively.Nevertheless, LGBTIQ+ service people and those in other protected groups still face challenges. The 2019 Ministry of Defence review of inappropriate behaviour in the armed forces, the Wigston Report, concluded there is an unacceptable level of sexual harassment, bullying and discrimination. It found that 26-36% of LGBTIQ+ service people have experienced negative comments or conduct at work because of their sexual orientation.The Secretary of State for Defence accepted the report’s 36 recommendations on culture, incident reporting, training and a more effective complaints system. Pivotal to successful implementation will be a coherent strategy driven by fully engaged leaders.Society is also expecting ever higher standards, particularly in public bodies. The armed forces emphasise their values and standards, including ‘respect for others’, as defining organisational characteristics; individuals are expected to live by them. Only in a genuinely inclusive environment can an individual thrive and operate confidently within a team.The armed forces also recognize as a priority the need to connect to and reflect society more closely in order to attract and retain talent from across all of society. The armed forces’ active participation in UK Pride is helping to break down barriers in this area.In a post-Brexit world, the UK’s values, support for human rights and reputation for fairness are distinctive strengths that can have an impact on the world stage and offer a framework for future policy. The armed forces must continue to push and promote greater inclusivity in support. When operating overseas with less liberal regimes, this will be sensitive and require careful handling; however it will be an overt manifestation of a broader policy and a way to communicate strong and consistent values over time.The armed forces were damagingly behind the times 20 years ago. But good progress has been made since. Inclusion initiatives must continue to be pushed to bring benefits to the individual and the organization as well as demonstrate a values-based foreign policy. Full Article
it A World Without the NPT Redux By feedproxy.google.com Published On :: Tue, 21 Jan 2020 13:35:01 +0000 Invitation Only Research Event 10 February 2020 - 3:00pm to 4:30pm Chatham House Event participants Dr Joseph Pilat, Los Alamos National Laboratory and Woodrow Wilson International Center for ScholarsChair: Dr Patricia Lewis, Research Director, International Security Programme, Chatham House In the late 1980s, with the 1995 decision on the future of the nuclear Non-Proliferation Treaty (NPT) looming, Joseph Pilat wrote an essay on "A World without the NPT?" which was published in The International Nuclear Non-Proliferation Regime in the 1990s, edited by John Simpson (Cambridge, England: Cambridge University Press, 1986). In this piece, the speaker attempted to think through the effects of a limited or no agreement on extension to the treaty and regime, to nuclear non-proliferation, arms control and energy and to the broader geopolitical landscape. The purpose was not a prediction, but a cautionary tale of the value of the treaty.Now, nearly 25 years after indefinite extension and 50 years after the NPT's entry into force, the treaty and the regime are facing serious challenges. In this roundtable meeting, the speaker will revisit the questions he addressed thirty years ago. Department/project International Security Programme Ana Alecsandru Email Full Article
it The Smart Peace Initiative: An Integrated and Adaptive Approach to Building Peace By feedproxy.google.com Published On :: Tue, 11 Feb 2020 10:55:01 +0000 Invitation Only Research Event 12 May 2020 - 10:00am to 11:30amAdd to CalendariCalendar Outlook Google Yahoo Smart Peace brings together global expertise in conflict analysis and research, peacebuilding and mediation programming, and behavioural science and evaluation. Together, Smart Peace partners are developing integrated and adaptive peace initiatives, working with local partners to prevent and resolve complex and intractable conflicts in Central African Republic, Myanmar and northern Nigeria. This roundtable is an opportunity for Smart Peace partners to share the Smart Peace concept, approach and objectives, and experiences of the first phases of programme implementation. Roundtable discussions among participants from policy, practice and research communities will inform future priorities and planning for Smart Peace learning, advocacy and communication. Smart Peace partners include Conciliation Resources, Behavioural Insights Team, The Centre for Humanitarian Dialogue, Chatham House, ETH Zurich, International Crisis Group and The Asia Foundation. Nilza Amaral Project Manager, International Security Programme Email Department/project International Security Programme, Smart Peace Full Article
it POSTPONED: Working Towards Cyber Resilience in the GCC: Opportunities and Challenges By feedproxy.google.com Published On :: Fri, 14 Feb 2020 14:10:01 +0000 Invitation Only Research Event 12 March 2020 - 9:00am to 5:00pm Muscat, Oman The GCC states have invested significantly in cybersecurity and have made large strides in protecting governments, businesses and individuals from cyber threats, with the aim of delivering on their ambitious national strategies and future visions. However, several challenges to cybersecurity and cyber resilience in the region persist, putting those ambitious plans at risk.These challenges include the uneven nature of cybersecurity protections, the incomplete implementation of cybersecurity strategies and regulations, and the issues around international cooperation. Such challenges mean that GCC states need to focus on the more difficult task of cyber resilience, in addition to the simpler initial stages of cybersecurity capacity-building, to ensure they harness the true potential of digital technologies and mitigate associated threats.Set against this background, this workshop will explore opportunities and challenges to cyber resilience in the GCC focusing on four main pillars:1. Cyber resilience: in concept and in practice2. Building an effective cybersecurity capacity3. The potential of regional and international cooperation to cyber resilience4. Deterrence and disruption: different approachesThis event will be held in collaboration with the Arab Regional Cybersecurity Centre (ARCC) and OMAN CERT.PLEASE NOTE THIS EVENT IS POSTPONED UNTIL FURTHER NOTICE. Event attributes Chatham House Rule Department/project International Security Programme Esther Naylor Research Assistant, International Security Programme +44 (0)20 7314 3628 Email Full Article
it Cyber Security and Nuclear Weapons By feedproxy.google.com Published On :: Fri, 28 Feb 2020 09:15:20 +0000 This project aims to improve resilience in NATO’s nuclear weapons systems against cyber threats. Cyber security is a vital part of the national and international strategic infrastructure and weapons systems. The increasing cyber capabilities of countries such as China, Russia and North Korea put the North Atlantic Treaty Organization’s (NATO’s) nuclear systems - capabilities that include nuclear command, control and communication, weapons systems and early warning systems - in danger.There is an urgent need to study and address cyber challenges to nuclear assets within NATO and in key NATO countries. Greater awareness of the potential threats and vulnerabilities is key to improving preparedness and mitigating the risks of a cyber-attack on NATO nuclear weapons systems.Chatham House produces research responding to the need for information on enhancing cybersecurity for command, control and communications. This project constitutes the beginning of the second phase of the Cyber Security of Nuclear Weapons Systems: Threats, Vulnerabilities and Consequences, a report published in January 2018 in partnership with the Stanley Foundation.The project responds to the need both for more public information on cyber risks in NATO’s nuclear mission, and to provide policy-driven research to shape and inform nuclear policy within NATO member states and the Nuclear Planning Group.This project is supported by the Ploughshares Fund and the Stanley Foundation. Full Article
it Nuclear Weapons: Innovative Approaches for the Complex International Security Environment By feedproxy.google.com Published On :: Fri, 28 Feb 2020 10:09:26 +0000 This programme of work addresses the conundrum of nuclear weapons as a wicked problem in a complex adaptive system. Understanding the complexity and the wickedness of the situation allows analysts and strategic planners to approach these complex and intractable issues in new and transformative ways – with a better chance of coping or succeeding and reducing the divisions between experts.Using complexity theory, a complex adaptive system representing the international system and its interaction with the environment can be represented through an interactive visualization tool that will aid thought processes and policy decision-making. Until recently, analysts did not have the tools to be able to create models that could represent the complexity of the international system and the role that nuclear weapons play. Now that these tools are available, analysts should use them to enable decision-makers to gain insights into the range of possible outcomes from a set of possible actions.This programme builds on work by Chatham House on cyber security and artificial intelligence (AI) in the nuclear/strategic realms.In order to approach nuclear weapons as wicked problems in a complex adaptive system from different and sometimes competing perspectives, the programme of work involves the wider community of specialists who do not agree on what constitutes the problems of nuclear weapons nor on what are the desired solutions.Different theories of deterrence, restraint and disarmament are tested. The initiative is international and inclusive, paying attention to gender, age and other aspects of diversity, and the network of MacArthur Grantees are given the opportunity to participate in the research, including in the writing of research papers, so that the complexity modelling can be tested against a wide range of approaches and hypotheses.In addition, a Senior Reference Group will work alongside the programme, challenging its outcome and findings, and evaluating and guiding the direction of the research.This project is supported by the MacArthur Foundation. Full Article
it Supporting NHS Cybersecurity During COVID-19 is Vital By feedproxy.google.com Published On :: Thu, 02 Apr 2020 12:09:33 +0000 2 April 2020 Joyce Hakmeh Senior Research Fellow, International Security Programme; Co-Editor, Journal of Cyber Policy @joycehakmeh LinkedIn The current crisis is an opportunity for the UK government to show agility in how it deals with cyber threats and how it cooperates with the private sector in creating cyber resilience. 2020-04-02-NHS-nurse-tech-cyber Nurse uses a wireless electronic tablet to order medicines from the pharmacy at The Queen Elizabeth Hospital, Birmingham, England. Photo by Christopher Furlong/Getty Images. The World Health Organization, US Department of Health and Human Services, and hospitals in Spain, France and the Czech Republic have all suffered cyberattacks during the ongoing COVID-19 crisis.In the Czech Republic, a successful attack targeted a hospital with one of the country’s biggest COVID-19 testing laboratories, forcing its entire IT network to shut down, urgent surgical operations to be rescheduled, and patients to be moved to nearby hospitals. The attack also delayed dozens of COVID-19 test results and affected the hospital’s data transfer and storage, affecting the healthcare the hospital could provide.In the UK, the National Health Service (NHS) is already in crisis mode, focused on providing beds and ventilators to respond to one of the largest peacetime threats ever faced. But supporting the health sector goes beyond increasing human resources and equipment capacity.Health services ill-preparedCybersecurity support, both at organizational and individual level, is critical so health professionals can carry on saving lives, safely and securely. Yet this support is currently missing and the health services may be ill-prepared to deal with the aftermath of potential cyberattacks.When the NHS was hit by the Wannacry ransomware attack in 2017 - one of the largest cyberattacks the UK has witnessed to date – it caused massive disruption, with at least 80 of the 236 trusts across England affected and thousands of appointments and operations cancelled. Fortunately, a ‘kill-switch’ activated by a cybersecurity researcher quickly brought it to a halt.But the UK’s National Cyber Security Centre (NCSC), has been warning for some time against a cyber attack targeting national critical infrastructure sectors, including the health sector. A similar attack, known as category one (C1) attack, could cripple the UK with devastating consequences. It could happen and we should be prepared.Although the NHS has taken measures since Wannacry to improve cybersecurity, its enormous IT networks, legacy equipment and the overlap between the operational and information technology (OT/IT) does mean mitigating current potential threats are beyond its ability.And the threats have radically increased. More NHS staff with access to critical systems and patient health records are increasingly working remotely. The NHS has also extended its physical presence with new premises, such as the Nightingale hospital, potentially the largest temporary hospital in the world.Radical change frequently means proper cybersecurity protocols are not put in place. Even existing cybersecurity processes had to be side-stepped because of the outbreak, such as the decision by NHS Digital to delay its annual cybersecurity audit until September. During this audit, health and care organizations submit data security and protection toolkits to regulators setting out their cybersecurity and cyber resilience levels.The decision to delay was made to allow the NHS organizations to focus capacity on responding to COVID-19, but cybersecurity was highlighted as a high risk, and the importance of NHS and Social Care remaining resilient to cyberattacks was stressed.The NHS is stretched to breaking point. Expecting it to be on top of its cybersecurity during these exceptionally challenging times is unrealistic, and could actually add to the existing risk.Now is the time where new partnerships and support models should be emerging to support the NHS and help build its resilience. Now is the time where innovative public-private partnerships on cybersecurity should be formed.Similar to the economic package from the UK chancellor and innovative thinking on ventilator production, the government should oversee a scheme calling on the large cybersecurity capacity within the private sector to step in and assist the NHS. This support can be delivered in many different ways, but it must be mobilized swiftly.The NCSC for instance has led the formation of the Cyber Security Information Sharing Partnership (CiSP)— a joint industry and UK government initiative to exchange cyber threat information confidentially in real time with the aim of reducing the impact of cyberattacks on UK businesses.CiSP comprises organizations vetted by NCSC which go through a membership process before being able to join. These members could conduct cybersecurity assessment and penetration testing for NHS organizations, retrospectively assisting in implementing key security controls which may have been overlooked.They can also help by making sure NHS remote access systems are fully patched and advising on sensible security systems and approved solutions. They can identify critical OT and legacy systems and advise on their security.The NCSC should continue working with the NHS to enhance provision of public comprehensive guidance on cyber defence and response to potential attack. This would show they are on top of the situation, projecting confidence and reassurance.It is often said in every crisis lies an opportunity. This is an opportunity for the UK government to show agility in how it deals with cyber threats and how it cooperates with the private sector in creating cyber resilience.It is an opportunity to lead a much-needed cultural change showing cybersecurity should never be an afterthought. Full Article