y

Tackling Cyber Disinformation in Elections: Applying International Human Rights Law

Research Event

6 November 2019 - 5:30pm to 7:00pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

Susie Alegre, Barrister and Associate Tenant, Doughty Street Chambers
Evelyn Aswad, Professor of Law and the Herman G. Kaiser Chair in International Law, University of Oklahoma
Barbora Bukovská, Senior Director for Law and Policy, Article 19
Kate Jones, Director, Diplomatic Studies Programme, University of Oxford
Chair: Harriet Moynihan, Associate Fellow, International Law Programme, Chatham House

Cyber operations are increasingly used by political parties, their supporters and foreign states to influence electorates – from algorithms promoting specific messages to micro-targeting based on personal data and the creation of filter bubbles.
 
The risks of digital tools spreading disinformation and polarizing debate, as opposed to deepening democratic engagement, have been highlighted by concerns over cyber interference in the UK’s Brexit referendum, the 2016 US presidential elections and in Ukraine. 
 
While some governments are adopting legislation in an attempt to address some of these issues, for example Germany’s ‘NetzDG’ law and France’s ‘Law against the manipulation of information’, other countries have proposed an independent regulator as in the case of the UK’s Online Harms white paper. Meanwhile, the digital platforms, as the curators of content, are under increasing pressure to take their own measures to address data mining and manipulation in the context of elections. 

How do international human rights standards, for example on freedom of thought, expression and privacy, guide the use of digital technology in the electoral context? What practical steps can governments and technology actors take to ensure policies, laws and practices are in line with these fundamental standards? And with a general election looming in the UK, will these steps come soon enough?
 
This event brings together a wide range of stakeholders including civil society, the tech sector, legal experts and government, coincides with the publication of a Chatham House research paper on disinformation, elections and the human rights framework

Jacqueline Rowe

Programme Assistant, International Law Programme
020 7389 3287




y

Cyber, Sovereignty and Human Rights

Our work in this area explores how international law regulates cyber operations by states - such as electoral disinformation campaigns or attacks on critical infrastructure - and asks whether new rules are required. 

Rapid technological change raises urgent questions around equity, transparency, privacy and security. 

We are looking at the human rights dividend from new technologies as well as how international human rights law standards, for example on freedom of thought, expression and privacy, guide the use of digital technology in the electoral context.




y

‘Our Shared Humanity’ – The Legacy of Kofi Annan

23 October 2019

The ‘Our Shared Humanity’ conference explored Kofi Annan’s legacy for the future of global governance in the run-up to the UN’s 75th anniversary. This paper summarizes key points raised during the conference, and presents the substantive recommendations that emerged from the discussion.

2019-10-23-OurSharedHumanity.jpg

Kofi Annan meets with high-school students in Kabul, Afghanistan, in January 2002. Photo: Getty Images.

About the Conference

In the run-up to the UN’s 75th anniversary and almost a year after his death, Chatham House and the United Nations Association – UK (UNA-UK) held a two-day conference to explore Kofi Annan’s legacy in the context of the current period of global uncertainty.

The ‘Our Shared Humanity’ conference brought together a global and diverse group of individualsworking on peace and security, human rights and development issues to:

  • Reflect critically on Annan’s record, and capture lessons learned from his tenure as UN secretary-general, and his later work as a mediator and elder statesperson; and
  • Generate recommendations for current policymakers and influencers.

This paper summarizes key points raised during each session of the conference, and presents the substantive recommendations that emerged from the discussion.

In order to bring the conference themes to a wider audience, UNA-UK held a public event on the eve of the first day of the conference at Central Hall Westminster – where the UN had held its first ever meetings in 1946 – with speakers including Nane Annan, Sherrie Westin (president of global impact and philanthropy, Sesame Workshop), Amina Mohammed (current UN deputy secretary-general) and Mary Robinson (chair of The Elders and former UN High Commissioner for Human Rights).
 




y

Human Rights Priorities: An Agenda for Equality and Social Justice

Members Event

19 November 2019 - 6:00pm to 7:00pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Michelle Bachelet, United Nations High Commissioner for Human Rights

Chair: Ruma Mandal, Head, International Law Programme, Chatham House

Following just over one year in office, UN High Commissioner for Human Rights, Michelle Bachelet, outlines her ongoing priorities at a tumultuous time for fundamental rights protections worldwide.

She discusses the rights implications of climate change, gender inequality including the advancement of sexual and reproductive rights, the protection of vulnerable groups and the need to work closely with states, civil society and business to protect and advance human rights.

Department/project

Members Events Team




y

Sovereignty and Non-Intervention: The Application of International Law to State Cyberattacks

Research Event

4 December 2019 - 5:30pm to 7:00pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Douglas, Legal Director, GCHQ
Zhixiong Huang, Luojia Chair of International Law, Wuhan University
Nemanja Malisevic, Director of Digital Diplomacy, Microsoft
Harriet Moynihan, Associate Fellow, International Law Programme, Chatham House
Chair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House

International law applies to cyber operations – but views differ on exactly how. Does state-sponsored interference in another state's affairs using cyber means – for example,  disinformation campaigns in elections, disabling government websites, or disrupting transport systems – breach international law? If so, on what basis and how are the principles of sovereignty and non-intervention relevant? States are increasingly attributing cyber operations to other states and engaging in the debate on how international law applies, including circumstances that would justify countermeasures.

As states meet to debate these issues at the UN, the panel will explore how international law regulates cyberoperations by states, consider the prospects of progress at the UN, and assess the value of other initiatives.

This event coincides with the launch of a Chatham House research paper which analyses how the principles of sovereignty and intervention apply in the context of cyberoperations, and considers a way forward for agreeing a common understanding of cyber norms.

This event will bring together a broad group of actors, including policymakers, the private sector, legal experts and civil society, and will be followed by a drinks reception.

 

Jacqueline Rowe

Programme Assistant, International Law Programme
020 7389 3287




y

Security and Prosperity in Asia: The Role of International Law

1 November 2019

The 'Security and Prosperity in Asia' conference looked at the impact of international law in the Asia-Pacific with a focus on regional economic and security issues such as the South China Sea disputes.

Security and Prosperity in Asia Cover Image.jpg

Singapore skyline at sunset, 2016. Photo: Getty Images.

About the Conference

At a time of geopolitical uncertainty and with multilateralism under pressure, this conference brought together diverse actors to explore the evolving role of international law on critical security and economic issues in the Asia-Pacific. From trade agreements to deep-sea mining, cyberwarfare to territorial disputes, the breadth of the discussion illustrated the growing reach of international law in the region.

Hosted by the International Law Programme and the Asia-Pacific Programme at Chatham House on 27 March 2019, the conference focused on three themes: trade and investment, maritime security and governance, and emerging security challenges. What trends are emerging in terms of engagement with international law in the region, and how can international standards play a greater role in encouraging collaboration and reducing tensions? And, with the eastward shift in geopolitical power, how will Asia-Pacific states shape the future of international law?




y

Online Disinformation and Political Discourse: Applying a Human Rights Framework

6 November 2019

Although some digital platforms now have an impact on more people’s lives than does any one state authority, the international community has been slow to hold to account these platforms’ activities by reference to human rights law. This paper examines how human rights frameworks should guide digital technology.

Kate Jones

Associate Fellow, International Law Programme

2019-11-05-Disinformation.jpg

A man votes in Manhattan, New York City, during the US elections on 8 November 2016. Photo: Getty Images.

Summary

  • Online political campaigning techniques are distorting our democratic political processes. These techniques include the creation of disinformation and divisive content; exploiting digital platforms’ algorithms, and using bots, cyborgs and fake accounts to distribute this content; maximizing influence through harnessing emotional responses such as anger and disgust; and micro-targeting on the basis of collated personal data and sophisticated psychological profiling techniques. Some state authorities distort political debate by restricting, filtering, shutting down or censoring online networks.
  • Such techniques have outpaced regulatory initiatives and, save in egregious cases such as shutdown of networks, there is no international consensus on how they should be tackled. Digital platforms, driven by their commercial impetus to encourage users to spend as long as possible on them and to attract advertisers, may provide an environment conducive to manipulative techniques.
  • International human rights law, with its careful calibrations designed to protect individuals from abuse of power by authority, provides a normative framework that should underpin responses to online disinformation and distortion of political debate. Contrary to popular view, it does not entail that there should be no control of the online environment; rather, controls should balance the interests at stake appropriately.
  • The rights to freedom of thought and opinion are critical to delimiting the appropriate boundary between legitimate influence and illegitimate manipulation. When digital platforms exploit decision-making biases in prioritizing bad news and divisive, emotion-arousing information, they may be breaching these rights. States and digital platforms should consider structural changes to digital platforms to ensure that methods of online political discourse respect personal agency and prevent the use of sophisticated manipulative techniques.
  • The right to privacy includes a right to choose not to divulge your personal information, and a right to opt out of trading in and profiling on the basis of your personal data. Current practices in collecting, trading and using extensive personal data to ‘micro-target’ voters without their knowledge are not consistent with this right. Significant changes are needed.
  • Data protection laws should be implemented robustly, and should not legitimate extensive harvesting of personal data on the basis of either notional ‘consent’ or the data handler’s commercial interests. The right to privacy should be embedded in technological design (such as by allowing the user to access all information held on them at the click of a button); and political parties should be transparent in their collection and use of personal data, and in their targeting of messages. Arguably, the value of personal data should be shared with the individuals from whom it derives.
  • The rules on the boundaries of permissible content online should be set by states, and should be consistent with the right to freedom of expression. Digital platforms have had to rapidly develop policies on retention or removal of content, but those policies do not necessarily reflect the right to freedom of expression, and platforms are currently not well placed to take account of the public interest. Platforms should be far more transparent in their content regulation policies and decision-making, and should develop frameworks enabling efficient, fair, consistent internal complaints and content monitoring processes. Expertise on international human rights law should be integral to their systems.
  • The right to participate in public affairs and to vote includes the right to engage in public debate. States and digital platforms should ensure an environment in which all can participate in debate online and are not discouraged from standing for election, from participating or from voting by online threats or abuse.




y

The Application of International Law to State Cyberattacks: Sovereignty and Non-Intervention

2 December 2019

Hostile cyber operations by one state against another state are increasingly common. This paper analyzes the application of the sovereignty and non-intervention principles in relation to states’ cyber operations in another state below the threshold of the use of force. 

Harriet Moynihan

Senior Research Fellow, International Law Programme

2019-11-29-Intl-Law-Cyberattacks.jpg

A computer hacked by a virus known as Petya. The Petya ransomware cyberattack hit computers of Russian and Ukrainian companies on 27 June 2017. Photo: Getty Images.

Summary

  • The vast majority of state-to-state cyberattacks consist of persistent, low-level intrusions that take place below the threshold of use of force. International law, including the principle of non-intervention in another state’s internal affairs and the principle of sovereignty, applies to these cyber operations.
  • It is not clear whether any unauthorized cyber intrusion would violate the target state’s sovereignty, or whether there is a threshold in operation. While some would like to set limits by reference to effects of the cyber activity, at this time such limits are not reflected in customary international law. The assessment of whether sovereignty has been violated therefore has to be made on a case by case basis, if no other more specific rules of international law apply.
  • In due course, further state practice and opinio iuris may give rise to an emerging cyber-specific understanding of sovereignty, just as specific rules deriving from the sovereignty principle have crystallized in other areas of international law.
  • Before a principle of due diligence can be invoked in the cyber context, further work is needed by states to agree upon rules as to what might be expected of a state in this context.
  • The principle of non-intervention applies to a state’s cyber operations as it does to other state activities. It consists of coercive behaviour by one state that deprives the target state of its free will in relation to the exercise of its sovereign functions in order to compel an outcome in, or conduct with respect to, a matter reserved to the target state.
  • In practice, activities that contravene the non-intervention principle and activities that violates sovereignty will often overlap.
  • In order to reach agreement on how international law applies to states’ cyber operations below the level of use of force, states should put their views on record, where possible giving examples of when they consider that an obligation may be breached, as states such as the UK, Australia, France and the Netherlands have done.
  • Further discussion between states should focus on how the rules apply to practical examples of state-sponsored cyber operations. There is likely to be more commonality about specific applications of the law than there is about abstract principles.
  • The prospects of a general treaty in this area are still far off. In due course, there may be benefit in considering limited rules, for example on due diligence and a prohibition on attacking critical infrastructure, before tackling broad principles.




y

Power Politics Could Impede Progress on Responsible Regulation of Cyberspace

3 December 2019

Harriet Moynihan

Senior Research Fellow, International Law Programme
A new Chatham House paper examines the prospects of countries reaching agreement on issues of sovereignty and non-intervention in cyberspace in the face of persistent, low-level, state-to-state cyber attacks.

2019-11-29-Intl-Law-Cyberattacks.jpg

A computer hacked by a virus known as Petya. The Petya ransomware cyberattack hit computers of Russian and Ukrainian companies on 27 June 2017. Photo: Getty Images.

In discussions to date about how international law applies in cyberspace, commentators have tended to focus their attention on how the rules on the use of force, or the law of armed conflict, apply to cyber activities conducted by states that give rise to physical damage, injury or death.

But in practice, the vast majority of state cyberattacks fall below this threshold. Far more common are persistent, low-level attacks that may leave no physical trace but that are capable of doing significant damage to a state’s ability to control its systems, often at serious economic cost.

Such cyber incursions might include network disruptions in the operation of another government’s websites; tampering with electoral infrastructure to change or undermine the result; or using cyber means to destabilize another state’s financial sector.

For these kinds of cyber operation, the principle of sovereignty, and the principle of non-intervention in another state’s internal affairs, are the starting point.

A UN Group of Government Experts (GGE) agreed in 2013 and 2015 that the principles in the UN Charter, including sovereignty and the prohibition on intervention in another state’s affairs, apply to states’ activities in cyberspace. The 2015 GGE also recommended eleven (non-binding) norms of responsible state behaviour in cyberspace.

However, states have not yet reached agreement on how to apply these principles. Until recently, there has also been very little knowledge of what states actually do in cyberspace, as they usually conduct cyber operations covertly and have been reluctant to put their views on record.

A new Chatham House research paper analyses the application of the principles of sovereignty and non-intervention to state cyberattacks that fall below the principle of use of force. As well as analysing the application of the law in this area, the paper also makes recommendations to governments on how they might best make progress in reaching agreement in this area.

Existing rules or new rules?

As the research paper makes clear, there is currently some debate, principally between countries in the West, about the extent to which sovereignty is a legally binding rule in the context of cyberspace and, if so, how it and the principle of non-intervention might apply in practice.

In the last few years, certain states have put on record how they consider international law to apply to states’ activities in cyberspace, namely the UK, Australia, France and the Netherlands. While there may be some differences in their approaches, which are discussed in the paper, there also remains important common ground: namely, that existing international law already provides a solid framework for regulating states’ cyber activities, as it regulates every other domain of state-to-state activity.

There is also an emerging trend for states to work together when attributing cyberattacks to hostile states, enabling them to call out malign cyber activity when it violates international law. (See, for example, the joint statements made in relation to the NotPetya cyber attack and malicious cyber activity attributed to the Russian government).

However, other countries have questioned whether existing international law as it stands is capable of regulating states’ cyber interactions and have called for ‘new legal instruments’ in this area.

This includes a proposal by the Shanghai Cooperation Organization (led by Russia and China) for an International Code of Conduct on Information Security, a draft of which was submitted to the UN in 2011 and 2015, without success. The UN has also formed a new Open-Ended Working Group (OEWG) under a resolution proposed by Russia to consider how international law applies to states’ activities in cyberspace.

The resolution establishing the OEWG, which began work earlier this year, includes the possibility of the group ‘introducing changes to the rules, norms and principles of responsible behaviour of States’ agreed in the 2013 and 2015 GGE reports. In the OEWG discussions at the UN in September, several countries claimed that a new legal instrument was needed to fill the ‘legal vacuum’ (Cuba) or ‘the gap of ungoverned areas’ (Indonesia).

It would be concerning if the hard-won consensus on the application of international law to cyberspace that has been reached at past GGEs started to unravel. In contrast to 2013 and 2015, the 2017 meeting failed to reach an agreement.

On 9 December, a renewed GGE will meet in New York, but the existence of the OEWG exploring the same issues in a separate process reflects the fact that cyber norms have become an area of geopolitical rivalry.

Aside from the application of international law, states are also adopting divergent approaches to the domestic regulation of cyberspace within their own territory. The emerging trend towards a ‘splinternet’ – i.e. between states that believe the internet should be global and open on the hand, and those that favour a ‘sovereignty and control’ model on the other  – is also likely to make discussions at the GGE more challenging.

Distinct from the international law concept of sovereignty is the notion of ‘cybersovereignty’, a term coined by China to describe the wide-ranging powers it assumes under domestic law to regulate its citizens’ access to the internet and personal data within its territory. This approach is catching on (as reflected in Russia’s recently enacted ‘Sovereign Internet Law’), with other authoritarian states likely to follow suit.

The importance of non-state actors

In parallel with regional and UN discussions on how international law applies, a number of initiatives by non-state actors have also sought to establish voluntary principles about responsible state behaviour in cyberspace.

The Global Commission on the Stability of Cyberspace, a multi-stakeholder body that has proposed principles, norms and recommendations to guide responsible behaviour by all parties in cyberspace, recently published its final report. The Cybersecurity Tech Accord  aims to promote collaboration between tech companies on stability and resilience in cyberspace. President Macron’s ‘Paris Call for Trust and Security in Cyberspace’ has to date received the backing of 67 states, 139 international and civil society organizations, and 358 private-sector organizations.

It remains to be seen in the long term whether the parallel processes at the UN will work constructively together or be competitive. But notwithstanding the challenging geopolitical backdrop, the UN GGE meeting next week at the least offers states the opportunity to consolidate and build on the results of past meetings; to increase knowledge and discussion about how international law might apply; and to encourage more states to put their own views of these issues on the record.




y

Seventy Years of the Geneva Conventions: What of the Future?

24 March 2020

Seventy years after the adoption of the Geneva Conventions, there are challenges that remain to be addressed. This briefing takes three pertinent examples, and discusses possibilities for addressing them.

Emanuela-Chiara Gillard

Associate Fellow, International Law Programme

GettyImages-913468402.jpg

Rescue of the wounded in Duma city by Syrian Red Crescent paramedics, 2 February 2018. Photo: Samer Bouidani/NurPhoto/Getty

Summary

  • The 70th anniversary of the adoption of the 1949 Geneva Conventions was commemorated in 2019. But violations of the Conventions and of the 1977 Additional Protocols are widespread.
  • Contemporary conflicts have been marked by violations of some of the foundational rules of international humanitarian law (IHL) relating to the protection of the wounded and sick and of providers of medical assistance.
  • A further area of IHL that has come under strain and scrutiny are the rules regulating humanitarian relief operations and their application to sieges and blockades.
  • War has a huge impact on children, and the treatment of children in armed conflict is another area of the law that requires further attention.
  • In the current political climate, it is unlikely that new treaties will be negotiated to address emerging issues or uncertainties in the law.
  • Other measures must be explored, including the adoption of domestic measures to implement existing law; support for processes that interpret the law; and initiatives to promote compliance with the law by organized armed groups.
  • One overarching challenge is the interplay between IHL and counterterrorism measures. It can undermine the protections set out in IHL, and hinder principled humanitarian action and activities to promote compliance with the law by organized armed groups.




y

12-LOX catalyzes the oxidation of 2-arachidonoyl-lysolipids in platelets generating eicosanoid-lysolipids that are attenuated by iPLA2{gamma} knockout [Signal Transduction]

The canonical pathway of eicosanoid production in most mammalian cells is initiated by phospholipase A2-mediated release of arachidonic acid, followed by its enzymatic oxidation resulting in a vast array of eicosanoid products. However, recent work has demonstrated that the major phospholipase in mitochondria, iPLA2γ (patatin-like phospholipase domain containing 8 (PNPLA8)), possesses sn-1 specificity, with polyunsaturated fatty acids at the sn-2 position generating polyunsaturated sn-2-acyl lysophospholipids. Through strategic chemical derivatization, chiral chromatographic separation, and multistage tandem MS, here we first demonstrate that human platelet-type 12-lipoxygenase (12-LOX) can directly catalyze the regioselective and stereospecific oxidation of 2-arachidonoyl-lysophosphatidylcholine (2-AA-LPC) and 2-arachidonoyl-lysophosphatidylethanolamine (2-AA-LPE). Next, we identified these two eicosanoid-lysophospholipids in murine myocardium and in isolated platelets. Moreover, we observed robust increases in 2-AA-LPC, 2-AA-LPE, and their downstream 12-LOX oxidation products, 12(S)-HETE-LPC and 12(S)-HETE-LPE, in calcium ionophore (A23187)-stimulated murine platelets. Mechanistically, genetic ablation of iPLA2γ markedly decreased the calcium-stimulated production of 2-AA-LPC, 2-AA-LPE, and 12-HETE-lysophospholipids in mouse platelets. Importantly, a potent and selective 12-LOX inhibitor, ML355, significantly inhibited the production of 12-HETE-LPC and 12-HETE-LPE in activated platelets. Furthermore, we found that aging is accompanied by significant changes in 12-HETE-LPC in murine serum that were also markedly attenuated by iPLA2γ genetic ablation. Collectively, these results identify previously unknown iPLA2γ-initiated signaling pathways mediated by direct 12-LOX oxidation of 2-AA-LPC and 2-AA-LPE. This oxidation generates previously unrecognized eicosanoid-lysophospholipids that may serve as biomarkers for age-related diseases and could potentially be used as targets in therapeutic interventions.




y

Glucocerebrosidases catalyze a transgalactosylation reaction that yields a newly-identified brain sterol metabolite, galactosylated cholesterol [Glycobiology and Extracellular Matrices]

β-Glucocerebrosidase (GBA) hydrolyzes glucosylceramide (GlcCer) to generate ceramide. Previously, we demonstrated that lysosomal GBA1 and nonlysosomal GBA2 possess not only GlcCer hydrolase activity, but also transglucosylation activity to transfer the glucose residue from GlcCer to cholesterol to form β-cholesterylglucoside (β-GlcChol) in vitro. β-GlcChol is a member of sterylglycosides present in diverse species. How GBA1 and GBA2 mediate β-GlcChol metabolism in the brain is unknown. Here, we purified and characterized sterylglycosides from rodent and fish brains. Although glucose is thought to be the sole carbohydrate component of sterylglycosides in vertebrates, structural analysis of rat brain sterylglycosides revealed the presence of galactosylated cholesterol (β-GalChol), in addition to β-GlcChol. Analyses of brain tissues from GBA2-deficient mice and GBA1- and/or GBA2-deficient Japanese rice fish (Oryzias latipes) revealed that GBA1 and GBA2 are responsible for β-GlcChol degradation and formation, respectively, and that both GBA1 and GBA2 are responsible for β-GalChol formation. Liquid chromatography–tandem MS revealed that β-GlcChol and β-GalChol are present throughout development from embryo to adult in the mouse brain. We found that β-GalChol expression depends on galactosylceramide (GalCer), and developmental onset of β-GalChol biosynthesis appeared to be during myelination. We also found that β-GlcChol and β-GalChol are secreted from neurons and glial cells in association with exosomes. In vitro enzyme assays confirmed that GBA1 and GBA2 have transgalactosylation activity to transfer the galactose residue from GalCer to cholesterol to form β-GalChol. This is the first report of the existence of β-GalChol in vertebrates and how β-GlcChol and β-GalChol are formed in the brain.




y

Deletion of fatty acid transport protein 2 (FATP2) in the mouse liver changes the metabolic landscape by increasing the expression of PPAR{alpha}-regulated genes [Lipids]

Fatty acid transport protein 2 (FATP2) is highly expressed in the liver, small intestine, and kidney, where it functions in both the transport of exogenous long-chain fatty acids and the activation of very-long-chain fatty acids. Here, using a murine model, we investigated the phenotypic impacts of deleting FATP2, followed by a transcriptomic analysis using unbiased RNA-Seq to identify concomitant changes in the liver transcriptome. WT and FATP2-null (Fatp2−/−) mice (5 weeks) were maintained on a standard chow diet for 6 weeks. The Fatp2−/− mice had reduced weight gain, lowered serum triglyceride, and increased serum cholesterol levels and attenuated dietary fatty acid absorption. Transcriptomic analysis of the liver revealed 258 differentially expressed genes in male Fatp2−/− mice and a total of 91 in female Fatp2−/− mice. These genes mapped to the following gene ontology categories: fatty acid degradation, peroxisome biogenesis, fatty acid synthesis, and retinol and arachidonic acid metabolism. Targeted RT-quantitative PCR verified the altered expression of selected genes. Of note, most of the genes with increased expression were known to be regulated by peroxisome proliferator–activated receptor α (PPARα), suggesting that FATP2 activity is linked to a PPARα-specific proximal ligand. Targeted metabolomic experiments in the Fatp2−/− liver revealed increases of total C16:0, C16:1, and C18:1 fatty acids; increases in lipoxin A4 and prostaglandin J2; and a decrease in 20-hydroxyeicosatetraenoic acid. We conclude that the expression of FATP2 in the liver broadly affects the metabolic landscape through PPARα, indicating that FATP2 provides an important role in liver lipid metabolism through its transport or activation activities.




y

Determination of globotriaosylceramide analogs in the organs of a mouse model of Fabry disease [Lipids]

Fabry disease is a heritable lipid disorder caused by the low activity of α-galactosidase A and characterized by the systemic accumulation of globotriaosylceramide (Gb3). Recent studies have reported a structural heterogeneity of Gb3 in Fabry disease, including Gb3 isoforms with different fatty acids and Gb3 analogs with modifications on the sphingosine moiety. However, Gb3 assays are often performed only on the selected Gb3 isoforms. To precisely determine the total Gb3 concentration, here we established two methods for determining both Gb3 isoforms and analogs. One was the deacylation method, involving Gb3 treatment with sphingolipid ceramide N-deacylase, followed by an assay of the deacylated products, globotriaosylsphingosine (lyso-Gb3) and its analogs, by ultra-performance LC coupled to tandem MS (UPLC-MS/MS). The other method was a direct assay established in the present study for 37 Gb3 isoforms and analogs/isoforms by UPLC-MS/MS. Gb3s from the organs of symptomatic animals of a Fabry disease mouse model were mainly Gb3 isoforms and two Gb3 analogs, such as Gb3(+18) containing the lyso-Gb3(+18) moiety and Gb3(−2) containing the lyso-Gb3(−2) moiety. The total concentrations and Gb3 analog distributions determined by the two methods were comparable. Gb3(+18) levels were high in the kidneys (24% of total Gb3) and the liver (13%), and we observed Gb3(−2) in the heart (10%) and the kidneys (5%). These results indicate organ-specific expression of Gb3 analogs, insights that may lead to a deeper understanding of the pathophysiology of Fabry disease.




y

MtrP, a putative methyltransferase in Corynebacteria, is required for optimal membrane transport of trehalose mycolates [Lipids]

Pathogenic bacteria of the genera Mycobacterium and Corynebacterium cause severe human diseases such as tuberculosis (Mycobacterium tuberculosis) and diphtheria (Corynebacterium diphtheriae). The cells of these species are surrounded by protective cell walls rich in long-chain mycolic acids. These fatty acids are conjugated to the disaccharide trehalose on the cytoplasmic side of the bacterial cell membrane. They are then transported across the membrane to the periplasm where they act as donors for other reactions. We have previously shown that transient acetylation of the glycolipid trehalose monohydroxycorynomycolate (hTMCM) enables its efficient transport to the periplasm in Corynebacterium glutamicum and that acetylation is mediated by the membrane protein TmaT. Here, we show that a putative methyltransferase, encoded at the same genetic locus as TmaT, is also required for optimal hTMCM transport. Deletion of the C. glutamicum gene NCgl2764 (Rv0224c in M. tuberculosis) abolished acetyltrehalose monocorynomycolate (AcTMCM) synthesis, leading to accumulation of hTMCM in the inner membrane and delaying its conversion to trehalose dihydroxycorynomycolate (h2TDCM). Complementation with NCgl2764 normalized turnover of hTMCM to h2TDCM. In contrast, complementation with NCgl2764 derivatives mutated at residues essential for methyltransferase activity failed to rectify the defect, suggesting that NCgl2764/Rv0224c encodes a methyltransferase, designated here as MtrP. Comprehensive analyses of the individual mtrP and tmaT mutants and of a double mutant revealed strikingly similar changes across several lipid classes compared with WT bacteria. These findings indicate that both MtrP and TmaT have nonredundant roles in regulating AcTMCM synthesis, revealing additional complexity in the regulation of trehalose mycolate transport in the Corynebacterineae.




y

COQ11 deletion mitigates respiratory deficiency caused by mutations in the gene encoding the coenzyme Q chaperone protein Coq10 [Lipids]

Coenzyme Q (Qn) is a vital lipid component of the electron transport chain that functions in cellular energy metabolism and as a membrane antioxidant. In the yeast Saccharomyces cerevisiae, coq1–coq9 deletion mutants are respiratory-incompetent, sensitive to lipid peroxidation stress, and unable to synthesize Q6. The yeast coq10 deletion mutant is also respiratory-deficient and sensitive to lipid peroxidation, yet it continues to produce Q6 at an impaired rate. Thus, Coq10 is required for the function of Q6 in respiration and as an antioxidant and is believed to chaperone Q6 from its site of synthesis to the respiratory complexes. In several fungi, Coq10 is encoded as a fusion polypeptide with Coq11, a recently identified protein of unknown function required for efficient Q6 biosynthesis. Because “fused” proteins are often involved in similar biochemical pathways, here we examined the putative functional relationship between Coq10 and Coq11 in yeast. We used plate growth and Seahorse assays and LC-MS/MS analysis to show that COQ11 deletion rescues respiratory deficiency, sensitivity to lipid peroxidation, and decreased Q6 biosynthesis of the coq10Δ mutant. Additionally, immunoblotting indicated that yeast coq11Δ mutants accumulate increased amounts of certain Coq polypeptides and display a stabilized CoQ synthome. These effects suggest that Coq11 modulates Q6 biosynthesis and that its absence increases mitochondrial Q6 content in the coq10Δcoq11Δ double mutant. This augmented mitochondrial Q6 content counteracts the respiratory deficiency and lipid peroxidation sensitivity phenotypes of the coq10Δ mutant. This study further clarifies the intricate connection between Q6 biosynthesis, trafficking, and function in mitochondrial metabolism.




y

AIG1 and ADTRP are endogenous hydrolases of fatty acid esters of hydroxy fatty acids (FAHFAs) in mice [Metabolism]

Fatty acid esters of hydroxy fatty acids (FAHFAs) are a newly discovered class of signaling lipids with anti-inflammatory and anti-diabetic properties. However, the endogenous regulation of FAHFAs remains a pressing but unanswered question. Here, using MS-based FAHFA hydrolysis assays, LC-MS–based lipidomics analyses, and activity-based protein profiling, we found that androgen-induced gene 1 (AIG1) and androgen-dependent TFPI-regulating protein (ADTRP), two threonine hydrolases, control FAHFA levels in vivo in both genetic and pharmacologic mouse models. Tissues from mice lacking ADTRP (Adtrp-KO), or both AIG1 and ADTRP (DKO) had higher concentrations of FAHFAs particularly isomers with the ester bond at the 9th carbon due to decreased FAHFA hydrolysis activity. The levels of other lipid classes were unaltered indicating that AIG1 and ADTRP specifically hydrolyze FAHFAs. Complementing these genetic studies, we also identified a dual AIG1/ADTRP inhibitor, ABD-110207, which is active in vivo. Acute treatment of WT mice with ABD-110207 resulted in elevated FAHFA levels, further supporting the notion that AIG1 and ADTRP activity control endogenous FAHFA levels. However, loss of AIG1/ADTRP did not mimic the changes associated with pharmacologically administered FAHFAs on extent of upregulation of FAHFA levels, glucose tolerance, or insulin sensitivity in mice, indicating that therapeutic strategies should weigh more on FAHFA administration. Together, these findings identify AIG1 and ADTRP as the first endogenous FAHFA hydrolases identified and provide critical genetic and chemical tools for further characterization of these enzymes and endogenous FAHFAs to unravel their physiological functions and roles in health and disease.




y

Certain ortho-hydroxylated brominated ethers are promiscuous kinase inhibitors that impair neuronal signaling and neurodevelopmental processes [Cell Biology]

The developing nervous system is remarkably sensitive to environmental signals, including disruptive toxins, such as polybrominated diphenyl ethers (PBDEs). PBDEs are an environmentally pervasive class of brominated flame retardants whose neurodevelopmental toxicity mechanisms remain largely unclear. Using dissociated cortical neurons from embryonic Rattus norvegicus, we found here that chronic exposure to 6-OH–BDE-47, one of the most prevalent hydroxylated PBDE metabolites, suppresses both spontaneous and evoked neuronal electrical activity. On the basis of our previous work on mitogen-activated protein kinase (MAPK)/extracellular signal-related kinase (ERK) (MEK) biology and our observation that 6-OH–BDE-47 is structurally similar to kinase inhibitors, we hypothesized that certain hydroxylated PBDEs mediate neurotoxicity, at least in part, by impairing the MEK–ERK axis of MAPK signal transduction. We tested this hypothesis on three experimental platforms: 1) in silico, where modeling ligand–protein docking suggested that 6-OH–BDE-47 is a promiscuous ATP-competitive kinase inhibitor; 2) in vitro in dissociated neurons, where 6-OH–BDE-47 and another specific hydroxylated BDE metabolite similarly impaired phosphorylation of MEK/ERK1/2 and activity-induced transcription of a neuronal immediate early gene; and 3) in vivo in Drosophila melanogaster, where developmental exposures to 6-OH–BDE-47 and a MAPK inhibitor resulted in offspring displaying similarly increased frequency of mushroom-body β–lobe midline crossing, a metric of axonal guidance. Taken together, our results support that certain ortho-hydroxylated PBDE metabolites are promiscuous kinase inhibitors and can cause disruptions of critical neurodevelopmental processes, including neuronal electrical activity, pre-synaptic functions, MEK–ERK signaling, and axonal guidance.




y

The testis-specific LINC component SUN3 is essential for sperm head shaping during mouse spermiogenesis [Cell Biology]

Sperm head shaping is a key event in spermiogenesis and is tightly controlled via the acrosome–manchette network. Linker of nucleoskeleton and cytoskeleton (LINC) complexes consist of Sad1 and UNC84 domain–containing (SUN) and Klarsicht/ANC-1/Syne-1 homology (KASH) domain proteins and form conserved nuclear envelope bridges implicated in transducing mechanical forces from the manchette to sculpt sperm nuclei into a hook-like shape. However, the role of LINC complexes in sperm head shaping is still poorly understood. Here we assessed the role of SUN3, a testis-specific LINC component harboring a conserved SUN domain, in spermiogenesis. We show that CRISPR/Cas9-generated Sun3 knockout male mice are infertile, displaying drastically reduced sperm counts and a globozoospermia-like phenotype, including a missing, mislocalized, or fragmented acrosome, as well as multiple defects in sperm flagella. Further examination revealed that the sperm head abnormalities are apparent at step 9 and that the sperm nuclei fail to elongate because of the absence of manchette microtubules and perinuclear rings. These observations indicate that Sun3 deletion likely impairs the ability of the LINC complex to transduce the cytoskeletal force to the nuclear envelope, required for sperm head elongation. We also found that SUN3 interacts with SUN4 in mouse testes and that the level of SUN4 proteins is drastically reduced in Sun3-null mice. Altogether, our results indicate that SUN3 is essential for sperm head shaping and male fertility, providing molecular clues regarding the underlying pathology of the globozoospermia-like phenotype.




y

Bulletin updated at 00:00 HKT 10/May/2020

General Situation:
A trough of low pressure will edge towards the coast of Guangdong today and linger over the region in the following couple of days. There will be thundery showers over Guangdong. With the anticyclone aloft strengthening in the middle and latter parts of this week, the weather over southern China will improve and it will be hot.

Date/Month: 10/05 (Sunday)
Wind: South force 3.
Weather: Sunny intervals and a few showers. Isolated thunderstorms later.
Temp range: 28 - 32 C
R.H. range: 65 - 95 per Cent

Date/Month: 11/05 (Monday)
Wind: South force 2 to 3.
Weather: Mainly cloudy with occasional showers and a few squally thunderstorms.
Temp range: 26 - 30 C
R.H. range: 70 - 95 per Cent

Date/Month: 12/05 (Tuesday)
Wind: Light winds force 2.
Weather: Mainly cloudy with a few showers and thunderstorms.
Temp range: 25 - 29 C
R.H. range: 70 - 95 per Cent

Date/Month: 13/05 (Wednesday)
Wind: Southeast force 3.
Weather: Sunny intervals and one or two showers.
Temp range: 26 - 30 C
R.H. range: 65 - 90 per Cent

Date/Month: 14/05 (Thursday)
Wind: Southeast force 3.
Weather: Sunny periods.
Temp range: 26 - 31 C
R.H. range: 60 - 85 per Cent

Date/Month: 15/05 (Friday)
Wind: South to southeast force 3.
Weather: Sunny periods.
Temp range: 27 - 32 C
R.H. range: 60 - 85 per Cent

Date/Month: 16/05 (Saturday)
Wind: South force 3.
Weather: Sunny periods.
Temp range: 27 - 32 C
R.H. range: 60 - 85 per Cent

Date/Month: 17/05 (Sunday)
Wind: South force 3 to 4.
Weather: Sunny periods.
Temp range: 28 - 32 C
R.H. range: 70 - 90 per Cent

Date/Month: 18/05 (Monday)
Wind: South force 3 to 4.
Weather: Sunny periods and isolated showers.
Temp range: 28 - 32 C
R.H. range: 70 - 90 per Cent

Sea surface temperature at 2 P.M. 09/05/2020 at North Point was 25 degrees C.
Soil temperatures at 7 A.M. 09/05/2020 at Hong Kong Observatory :
0.5 M below surface was 27.6 degrees C
1.0 M below surface was 26.4 degrees C




y

WYSIWYG Web Builder 7.0 released!

We are pleased to announce a major new release with more than 150 new features and improvements!




y

WYSIWYG Web Builder 7.5 available now!

WYSIWYG Web Builder 7.5 is a major update with more than 50 new features and improvements (compared to version 7.2.1). Our christmas gift to you!




y

WYSIWYG Web Builder 8.0 released!

We are pleased to announce a major new release with more than 150 new features and improvements!




y

WYSIWYG Web Builder 8.5 available now!

WYSIWYG Web Builder 8.5 is a major update with more than 50 new features and improvements (compared to version 8.2.1).




y

WYSIWYG Web Builder 9.0 released!

We are pleased to announce a major new release with more than 150 new features and improvements!




y

WYSIWYG Web Builder 9.1 update

WYSIWYG Web Builder 9.1 fixes known problems, adds new features and includes other improvements.




y

WYSIWYG Web Builder 9.2 update

WYSIWYG Web Builder 9.2 fixes known problems, adds new features and includes other improvements.




y

WYSIWYG Web Builder 9.3 update

WYSIWYG Web Builder 9.3 fixes known problems, adds new features and includes other improvements.




y

WYSIWYG Web Builder 9.4 update

WYSIWYG Web Builder 9.4 fixes known problems, adds new features and includes other improvements.




y

WYSIWYG Web Builder 10.0 released!

We are pleased to announce a major new release with more than 100 new features and improvements!




y

WYSIWYG Web Builder 10.1 update

WYSIWYG Web Builder 10.1 fixes known problems, adds new features and includes other improvements.




y

WYSIWYG Web Builder 10.2 update

WYSIWYG Web Builder 10.2 fixes known problems, adds new features and includes other improvements.




y

WYSIWYG Web Builder 10.3 update

WYSIWYG Web Builder 10.3 fixes known problems, adds new features and includes other improvements.




y

WYSIWYG Web Builder 10.4 update

WYSIWYG Web Builder 10.4 fixes known problems, adds new features and includes other improvements.




y

WYSIWYG Web Builder 11.0 released!

We are pleased to announce a major new release with more than 150 new features and improvements!




y

WYSIWYG Web Builder 12.0 released!

We are pleased to announce a major new release with more than 125 new features and improvements!




y

A Quantitative Tri-fluorescent Yeast Two-hybrid System: From Flow Cytometry to In cellula Affinities

David Cluet
Apr 1, 2020; 19:701-715
Technological Innovation and Resources




y

Phenotypic Adaption of Pseudomonas aeruginosa by Hacking Siderophores Produced by Other Microorganisms

Quentin Perraud
Apr 1, 2020; 19:589-607
Research




y

Tandem Mass Tag Approach Utilizing Pervanadate BOOST Channels Delivers Deeper Quantitative Characterization of the Tyrosine Phosphoproteome

Xien Yu Chua
Apr 1, 2020; 19:730-743
Technological Innovation and Resources




y

Integrative Metabolic Pathway Analysis Reveals Novel Therapeutic Targets in Osteoarthritis

Beatriz Rocha
Apr 1, 2020; 19:574-588
Research




y

The DNA sensor cGAS is decorated by acetylation and phosphorylation modifications in the context of immune signaling

Bokai Song
Apr 28, 2020; 0:RA120.001981v1-mcp.RA120.001981
Research




y

Modulation of natural HLA-B*27:05 ligandome by ankylosing spondylitis-associated endoplasmic reticulum aminopeptidase 2 (ERAP2)

Elena Lorente
Apr 7, 2020; 0:RA120.002014v1-mcp.RA120.002014
Research




y

HIGD2A is required for assembly of the COX3 module of human mitochondrial complex IV

Daniella H Hock
Apr 21, 2020; 0:RA120.002076v1-mcp.RA120.002076
Research




y

Chemical Genetics of AGC-kinases Reveals Shared Targets of Ypk1, Protein Kinase A and Sch9

Michael Plank
Apr 1, 2020; 19:655-671
Research




y

Characterization of Prenylated C-terminal Peptides Using a Thiopropyl-based Capture Technique and LC-MS/MS

James A. Wilkins
Apr 13, 2020; 0:RA120.001944v1-mcp.RA120.001944
Research




y

Flow-induced reorganization of laminin-integrin networks within the endothelial basement membrane uncovered by proteomics

Eelke P. Béguin
Apr 24, 2020; 0:RA120.001964v1-mcp.RA120.001964
Research




y

Seminal Plasma Proteome as an Indicator of Sperm Dysfunction and Low Sperm Motility

Yunlei Li
Apr 20, 2020; 0:RA120.002017v1-mcp.RA120.002017
Research




y

Cell Cycle Profiling Reveals Protein Oscillation, Phosphorylation, and Localization Dynamics

Patrick Herr
Apr 1, 2020; 19:608-623
Research




y

Proteaphagy in mammalian cells can function independent of ATG5/ATG7

Tatjana Goebel
Apr 16, 2020; 0:RA120.001983v1-mcp.RA120.001983
Research




y

Investigation of inter- and intra-tumoral heterogeneity of glioblastoma using TOF-SIMS

Samvel K Gularyan
Apr 6, 2020; 0:RA120.001986v1-mcp.RA120.001986
Research