tac strataconf: The Future Is Graph Databases http://t.co/BVxOZwtoKS A Conversation with @EmilEifrem, founder of @Neo4J #strataconf By twitter.com Published On :: Tue, 11 Jun 2013 18:25:30 +0000 strataconf: The Future Is Graph Databases http://t.co/BVxOZwtoKS A Conversation with @EmilEifrem, founder of @Neo4J #strataconf Full Article
tac 4 Unique Growth Tactics for 2020 By feedproxy.google.com Published On :: Mon, 06 Jan 2020 19:00:28 +0000 Marketing tactics change constantly. Each year new tactics become more impactful, and old ones fade into obscurity. Sticking to the same tactics is stale for your current customers and potential customers, too. Instead of just running the same growth tactics for years on end, it’s time to make a switch in 2020. Here are four unique growth tactics […] The post 4 Unique Growth Tactics for 2020 appeared first on ReadWrite. Full Article Entrepreneurs Grow Hack Marketing ReadWrite Small Business Startups Tech Web web design acquisition growth growth hacks marketing PR
tac News24.com | Covid-19 wrap | China slams US after Trump virus 'attack' claim, India repatriation to begin and Poland, Syria postpone elections due to pandemic By www.news24.com Published On :: Thu, 07 May 2020 14:57:56 +0200 Here are the latest developments in the coronavirus crisis. Full Article
tac Slow Cooker Taco Soup By feedproxy.google.com Published On :: Wed, 06 May 2020 21:00:00 +0000 This slow cooker taco soup with ground beef is so easy — and SO GOOD! It's perfect for busy weeks with flexible cooking times for any schedule. Serve with tortilla chips, cilantro-lime rice, or cornbread. Continue reading "Slow Cooker Taco Soup" » Full Article Family-Friendly
tac News24.com | Police must heed call on tackling crime in Durban's city centre By www.news24.com Published On :: Wed, 29 Jan 2020 10:53:09 +0200 The author made sense in both the argument put forth as well as in accurately describing the actual policing festive season operations on the ground in the bustling and busy city centre of Durban. Full Article
tac After Paris Attacks, CIA Head Reignites Surveillance Debate By feedproxy.google.com Published On :: Mon, 16 Nov 2015 18:21:12 EST Just days after the attack in Paris, America’s top intelligence official suggested that recent leaks about classified surveillance programs were partially responsible. Full Article
tac 10 Quick Link Building Tactics For Beginners By feedproxy.google.com Published On :: Mon, 27 Apr 2020 15:47:15 +0000 Link building, according to a lot of digital marketers, is a very old and very traditional digital marketing method. However, just because it’s all that antiquated doesn’t mean it’s useless. In fact, we may consider link building as one of the most timeless yet most effective digital marketing strategies out there. Link Building: A Quick […] The post 10 Quick Link Building Tactics For Beginners appeared first on Dumb Little Man. Full Article Business Freelancing
tac Progress in tackling illegal logging slows as new trends offset effective reforms By feedproxy.google.com Published On :: Tue, 14 Jul 2015 13:32:40 +0000 15 July 2015 20150715IllegalLogging.jpg Photo: iStock Lire en français >阅读中国 >Efforts to address illegal logging and reduce the trade in illegal timber have borne fruit and prompted some positive reforms in producer countries, a new report from Chatham House has found. However, changes in the sector mean overall trade in illegal timber has not fallen in the last decade. EU and US policies designed to reduce demand for illegal timber have helped cut illegal imports to those markets. These reforms and the EU’s partnership agreements with producer countries have prompted improvements in forest governance and a fall in large-scale illegal timber production.But growth of demand in emerging markets means that the progressive policies of so-called ‘sensitive markets’ are now less influential. China is now the world’s largest importer and consumer of wood-based products, as well as a key processing hub. India, South Korea, and Vietnam are also growing markets. The increasing role of small-scale producers, whose activities often fall outside legal frameworks, and a rapid increase in illegal forest conversion, also present new challenges. Alison Hoare: 'The EU and US have spearheaded some progressive and effective reforms. However, the changing scale and nature of the problem demands more coordinated international action. To stop further deforestation and associated carbon emissions, and to help achieve global objectives for sustainable development, the EU and US need to maintain their leadership while other countries - especially China, Japan, India and South Korea - need to step up their efforts to tackle illegal logging.'The Chatham House report, which is based on the studies of 19 countries, which include key producers, consumers, or processors of timber, and is an update of a 2010 study found: Timber productionMore than 80 million m3 of timber was illegally produced in 2013 in the nine producer countries assessed, accounting for about one-third of their combined total production.An estimated 60% of this illegal timber is destined for these countries’ domestic markets.Small-scale producers are increasingly important – for example, in Cameroon, the DRC and Ghana, they account for an estimated 50, 90 and 70% respectively of annual timber production. The majority of this is illegal.For the nine producer countries, the area of forest under voluntary legality verification or sustainability certification schemes increased by nearly 80% between 2000 and 2013. Imports of illegal wood-based products In most of the consumer and producer countries assessed, the volume of illegal imports of wood-based products fell during the period 2000–13. The exceptions were China, and India and Vietnam where the volume of illegal imports more than doubled. As a proportion of the whole, illegal imports declined for nearly all countries. However, at the global level, the proportion of illegal timber imports remained steady at 10% - a result of the growth of the Chinese market. The EU and US The volumes of illegal imports into the UK, France and the Netherlands nearly halved over the period 2000-13, from just under 4 million m3 to 2 million m3. The volume of illegal imports into the US increased between 2000 and 2006, from around 5 to 9 million m3, and then declined to just under 6 million m3 in 2013. In 2013, more than 60% of illegal imports of wood-based products to the UK and US came from China.ChinaThe volume of illegal imports into China doubled between 2000 and 2013 from 17 to 33 million m3; but as a proportion of the whole illegal imports fell, from 26 to 17%. The volume of exports of wood-based products (legal and illegal) from the nine producer countries to China nearly tripled, from 12 million m3 in 2000 to 34 million m3 in 2013.The Chatham House report makes the following recommendations:The EU and US need to maintain and reinforce current efforts Other countries need to take stronger action – China in particular, but also India, Japan and South KoreaStrong international cooperation is needed to maintain & reinforce current efforts – the G20 could provide a forum to galvanise international actionProducer countries need to focus on strengthening efforts to tackle corruption, improving legality within the small-scale sector, and reforming land-use governance Alison Hoare: 'Developing countries are losing significant amounts of potential revenue from illegal logging, which is also causing the loss and degradation of forests, depleting livelihoods, and contributing to social conflict and corruption. Tackling illegal logging and strengthening forest governance are essential for achieving critical climate and development goals. Having seen the progress that can be made, it’s imperative that governments agree to work together to rise to new challenges and promote a more sustainable forest sector for the benefit of all.' Read the report >> Editor's notes For more information or to arrange interviews please contact: Alison Hoare, report author, Chatham House, +44 (0) 2073143651Amy Barry, Di:ga Communications, +44 (0) 7980 664397The report and associated infographics will be available to download from the project website and the Chatham House website from 15 July 2015. These findings are part of Chatham House’s Indicators of Illegal Logging and Related Trade project, which looks at consumer, producer and processing countries. Follow us on Twitter: @CH_logging External expert spokespeople available for comment: Téodyl Nkuintchua, Programmes Coordinator, Centre pour l’Environnement et le Développement, Cameroon, (+237) 674 37 96 43, Skype: teodyl Rod Taylor, Director, Forests, WWF International via Huma Khan, +1 202-203-8432 Approved quote: 'The report shows the progress made in keeping illegally-sourced wood out of Western markets, but also highlights the urgent need to focus more on emerging countries and informal markets. It also highlights the global problem of illegal forest clearing, and the need for new policy measures to help sound forest stewardship compete with the conversion of forests to other land-uses.' Ben Cashore, Professor of Environmental Governance and Political Science, Yale University, +1 203 432-3009 Mauricio Volvodic, Executive Director, Imaflora, Brazil, +55 19 3429 0810, +55 19 98157 2129 Chris Davies MP, Chair of the All Party Parliamentary Group on Forestry and Conservative MP for Brecon and Radnorshire, via Simon Francis, 020 7061 6252 Approved quote: 'While it is encouraging that illegal timber imports to the UK have halved, it is vital that we remove the market for illegally logged timber in the UK altogether. One way is to ensure we have a sustainable forestry and wood processing sector that can supply more of our timber needs. Government can aid this by enabling the sector to plant more trees now and in the future.' Full Article
tac Risk of serious cyber attacks on nuclear facilities underestimated, says new report By feedproxy.google.com Published On :: Fri, 09 Oct 2015 15:22:30 +0000 2 October 2015 20150930CyberSecurity.jpg Workers at the Wolsong nuclear power plant participate in an anti-cyber attack exercise, Gyeongju, South Korea. Photo: Getty Images. The risk of a serious cyber attack on civil nuclear infrastructure is growing, as facilities become ever more reliant on digital systems and make increasing use of commercial ‘off-the-shelf’ software, according to a major new report from Chatham House.Cyber Security at Civil Nuclear Facilities: Understanding the Risks is the result of an 18-month study that draws on in-depth interviews with 30 leading industry practitioners based in more than eight countries. It found that the trend to digitization, when combined with a lack of executive-level awareness of the risks involved, means that nuclear plant personnel may not realize the full extent of their cyber vulnerability and are thus inadequately prepared to deal with potential attacks. Specific findings include: The conventional belief that all nuclear facilities are ‘air gapped’ (isolated from the public internet) is a myth. The commercial benefits of internet connectivity mean that a number of nuclear facilities now have VPN connections installed, which facility operators are sometimes unaware of.Search engines can readily identify critical infrastructure components with such connections.Even where facilities are air gapped, this safeguard can be breached with nothing more than a flash drive.Supply chain vulnerabilities mean that equipment used at a nuclear facility risks compromise at any stage.A lack of training, combined with communication breakdowns between engineers and security personnel, means that nuclear plant personnel often lack an understanding of key cyber security procedures.Reactive rather than proactive approaches to cyber security contribute to the possibility that a nuclear facility might not know of a cyber attack until it is already substantially under way.In the light of these risks, the report outlines a blend of policy and technical measures that will be required to counter the threats and meet the challenges. Recommendations include:Developing guidelines to measure cyber security risk in the nuclear industry, including an integrated risk assessment that takes both security and safety measures into account.Engaging in robust dialogue with engineers and contractors to raise awareness of the cyber security risk, including the dangers of setting up unauthorized internet connections.Implementing rules, where not already in place, to promote good IT hygiene in nuclear facilities (for example to forbid the use of personal devices) and enforcing rules where they do exist.Improving disclosure by encouraging anonymous information sharing and the establishment of industrial CERTs (Computer Emergency Response Team).Encouraging universal adoption of regulatory standards. Editor's notes Cyber Security at Civil Nuclear Facilities: Understanding the Risks, written by Caroline Baylon with Roger Brunt and David Livingstone, is embargoed until Monday 5 October 2015.Caroline Baylon is the research associate in science, technology and cyber security at Chatham House. Roger Brunt was appointed the UK government's regulator for security in the civil nuclear industry as the director of the Office for Civil Nuclear Security after retiring from the British Army in 2004. David Livingstone is an associate fellow at Chatham House, where he has participated in a broad range of projects on national-level risk management, cyber security, counterterrorism, serious organized crime, nuclear security and space security.Fore more information, or to request an interview with the authors, contact the press office Contacts Press Office +44 (0)20 7957 5739 Email Full Article
tac Tackling Toxic Air Pollution in Cities By feedproxy.google.com Published On :: Mon, 28 Oct 2019 16:15:01 +0000 Members Event 27 November 2019 - 6:00pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Camilla Hodgson, Environment Reporter, Financial TimesDr Benjamin Barratt, Senior Lecturer in Chinese Environment, KCLDr Susannah Stanway MBChB MSc FRCP MD, Consultant in Medical Oncology Royal Marsden NHS Foundation TrustElliot Treharne, Head of Air Quality, Greater London AuthorityChair: Rob Yates, Head, Centre on Global Health Security, Chatham House Air pollution has been classified as a cancer-causing agent with evidence showing an increased risk of lung cancer associated with increasing levels of exposure to outdoor air pollution and particulate matter.Air pollution is also known to increase risks for other diseases, especially respiratory and heart diseases, and studies show that levels of exposure to air pollution have increased significantly in some parts of the world - mostly in rapidly industrializing countries with large populations.In coordination with London Global Cancer Week partner organizations, this event outlines the evidence linking air pollution and cancer rates in London and other major cities.Panellists provide a 360° picture of the impact of the rising incidence of cancer across the world, the challenges the cancer pandemic poses to the implementation of universal health coverage and the existing UK contribution to strengthening capacity in cancer management and research in developing countries. Department/project Global Health Programme Members Events Team Email Full Article
tac Asfari Forum: The Role of Civil Society in Tackling Sectarian and Interfaith Conflicts in the MENA Region By feedproxy.google.com Published On :: Fri, 16 Oct 2015 11:00:01 +0000 Invitation Only Research Event 12 November 2015 - 2:00pm to 5:15pm Chatham House, London Meeting Summarypdf | 102.9 KB This roundtable will explore the role of and the challenges faced by both the international community and local civil society in countering sectarian narratives in the Middle East and North Africa region. Speakers will draw on their experiences working with communities in Iraq, Lebanon, Syria, and Egypt to discuss potential contributions that can be made at the local, national, and international level in tackling the root causes of religious division and facilitating positive community relations.This inaugural Asfari Forum is sponsored by the Asfari Foundation.Attendance at this event is by invitation only. Event attributes Chatham House Rule Department/project Middle East and North Africa Programme Full Article
tac Exploring the Obstacles and Opportunities for Expanded UK-Latin American Trade and Investment By feedproxy.google.com Published On :: Thu, 27 Feb 2020 12:40:01 +0000 Invitation Only Research Event 14 January 2020 - 8:30am to 11:00am Chatham House | 10 St James's Square | London | SW1Y 4LE Trade and investment between the UK and Latin America is woefully underdeveloped. Latin America’s agricultural powerhouses Brazil and Argentina only accounted for a total of 1.6% of the UK’s agricultural market across eight sectors in 2018, all of those areas in which Argentina and Brazil have substantial comparative advantages. Conversely, UK exports to the large Latin American economies remain far below their potential. To cite a few examples, in 2018 in the electrical equipment sector, the UK only exported $95.7 million of those products to Brazil, making the ninth largest economy in the world only the 42nd export market for those goods from the UK; Mexico only imported $91.4 million of UK-made electrical goods, placing it directly behind Brazil as UK’s market for those goods.As we look to the future, any improvement to the relationship will depend on two factors: 1) how the UK leaves the EU and 2) whether Latin American agricultural producers can improve their environmental practices and can meet the production standards established by the EU and likely maintained by a potential post-Brexit Britain.In the first meeting of the working group, Chatham House convened a range of policymakers, practitioners and academics to explore this topic in depth, identify the key issues driving this trend, and begin to consider how improvements might best be made. Subsequent meetings will focus on specific sectors in commerce and investment.We would like to thank BTG Pactual, Cairn Energy plc, Diageo, Equinor, Fresnillo Management Services, HSBC Holdings plc and Wintershall Dea for their generous support of the Latin America Initiative. Event attributes Chatham House Rule Department/project US and the Americas Programme, Latin America Initiative US and Americas Programme Email Full Article
tac Undercurrents: Episode 21 - EU-US Relations after the Midterms, and Tackling the Illegal Wildlife Trade in Africa By feedproxy.google.com Published On :: Fri, 09 Nov 2018 00:00:00 +0000 Full Article
tac Stacey Abrams: Democracy and the Politics of Identity By feedproxy.google.com Published On :: Wed, 06 Mar 2019 00:00:00 +0000 Full Article
tac Undercurrents: Episode 33 - Chinese Millennials, and Attacks on Infrastructure in Gaza By feedproxy.google.com Published On :: Thu, 16 May 2019 00:00:00 +0100 Full Article
tac Tackling Toxic Air Pollution in Cities By feedproxy.google.com Published On :: Wed, 27 Nov 2019 00:00:00 +0000 Full Article
tac Tackling Toxic Air Pollution in Cities By feedproxy.google.com Published On :: Mon, 28 Oct 2019 16:15:01 +0000 Members Event 27 November 2019 - 6:00pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Camilla Hodgson, Environment Reporter, Financial TimesDr Benjamin Barratt, Senior Lecturer in Chinese Environment, KCLDr Susannah Stanway MBChB MSc FRCP MD, Consultant in Medical Oncology Royal Marsden NHS Foundation TrustElliot Treharne, Head of Air Quality, Greater London AuthorityChair: Rob Yates, Head, Centre on Global Health Security, Chatham House Air pollution has been classified as a cancer-causing agent with evidence showing an increased risk of lung cancer associated with increasing levels of exposure to outdoor air pollution and particulate matter.Air pollution is also known to increase risks for other diseases, especially respiratory and heart diseases, and studies show that levels of exposure to air pollution have increased significantly in some parts of the world - mostly in rapidly industrializing countries with large populations.In coordination with London Global Cancer Week partner organizations, this event outlines the evidence linking air pollution and cancer rates in London and other major cities.Panellists provide a 360° picture of the impact of the rising incidence of cancer across the world, the challenges the cancer pandemic poses to the implementation of universal health coverage and the existing UK contribution to strengthening capacity in cancer management and research in developing countries. Department/project Global Health Programme Members Events Team Email Full Article
tac Tackling Toxic Air Pollution in Cities By feedproxy.google.com Published On :: Mon, 28 Oct 2019 16:15:01 +0000 Members Event 27 November 2019 - 6:00pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Camilla Hodgson, Environment Reporter, Financial TimesDr Benjamin Barratt, Senior Lecturer in Chinese Environment, KCLDr Susannah Stanway MBChB MSc FRCP MD, Consultant in Medical Oncology Royal Marsden NHS Foundation TrustElliot Treharne, Head of Air Quality, Greater London AuthorityChair: Rob Yates, Head, Centre on Global Health Security, Chatham House Air pollution has been classified as a cancer-causing agent with evidence showing an increased risk of lung cancer associated with increasing levels of exposure to outdoor air pollution and particulate matter.Air pollution is also known to increase risks for other diseases, especially respiratory and heart diseases, and studies show that levels of exposure to air pollution have increased significantly in some parts of the world - mostly in rapidly industrializing countries with large populations.In coordination with London Global Cancer Week partner organizations, this event outlines the evidence linking air pollution and cancer rates in London and other major cities.Panellists provide a 360° picture of the impact of the rising incidence of cancer across the world, the challenges the cancer pandemic poses to the implementation of universal health coverage and the existing UK contribution to strengthening capacity in cancer management and research in developing countries. Department/project Global Health Programme Members Events Team Email Full Article
tac La fragmentación como hilo conductor By feedproxy.google.com Published On :: Wed, 15 Jan 2020 12:32:02 +0000 Source La Nacion URL https://www.lanacion.com.ar/el-mundo/la-fragmentacion-como-hilo-conductor-nid231... Release date 22 December 2019 Expert Dr Christopher Sabatini In the news type Op-ed Hide date on homepage Full Article
tac It’s unlikely Latin America is at risk of an Iranian proxy attack. However . . . By feedproxy.google.com Published On :: Wed, 15 Jan 2020 12:32:39 +0000 Source The Miami Herald URL https://www.miamiherald.com/opinion/op-ed/article239105468.html Release date 10 January 2020 Expert Dr Christopher Sabatini In the news type Op-ed Hide date on homepage Full Article
tac Iran attack: Who are the winners and losers in the crisis? By feedproxy.google.com Published On :: Tue, 21 Jan 2020 14:30:37 +0000 Source BBC URL https://www.bbc.co.uk/news/world-middle-east-51012268 Release date 09 January 2020 Expert Dr Sanam Vakil In the news type Op-ed Hide date on homepage Full Article
tac These Iraqi militias are attacking protesters and getting away with it. Here’s why. By feedproxy.google.com Published On :: Tue, 21 Jan 2020 14:31:50 +0000 Source The Washington Post URL https://www.washingtonpost.com/politics/2019/11/18/these-iraqi-militias-are-atta... Release date 18 November 2019 Expert Dr Renad Mansour In the news type Op-ed Hide date on homepage Full Article
tac Global Governance: Tackling Economic Nationalism – Japan-UK Partnership Perspectives By feedproxy.google.com Published On :: Tue, 21 Jan 2020 14:15:01 +0000 Invitation Only Research Event 20 February 2020 - 4:30pm to 21 February 2020 - 4:45pm Tokyo, Japan Agendadocx | 223.79 KB Event participants Dr Robin Niblett CMG, Director, Chatham House Toshiro Mutoh, Honorary Chairman, Daiwa Institute of Research; CEO, Tokyo Organising Committee of the Olympic and Paralympic GameJosé Manuel Barroso, Senior Adviser, Chatham House; President of the European Commission (2004-14); Prime Minister of Portugal (2002-04)Akihiko Tanaka, President, National Graduate Institute for Policy Studies This conference will be the fifth in an annual conference series exploring global geopolitical and geoeconomic trends and their respective influences on Japan and the UK.This conference will be held in partnership with the Daiwa Institute of Research.Attendance at this event is by invitation only. Department/project Asia-Pacific Programme, Geopolitics and Governance, Trade, Investment and Economics Lucy Ridout Programme Administrator, Asia-Pacific Programme +44 (0) 207 314 2761 Email Full Article
tac CBD News: Covering some 22 per cent of the world's land surface, mountains are home to spectacular landscapes, a wide variety of ecosystems, a great diversity of species, and distinctive human communities, with approximately 955 million people, or 13 By www.cbd.int Published On :: Fri, 11 Dec 2015 00:00:00 GMT Full Article
tac CBD News: Covering some 22 per cent of the world's land surface, mountains are home to spectacular landscapes, a wide variety of ecosystems, and a great diversity of species. By www.cbd.int Published On :: Fri, 09 Dec 2016 00:00:00 GMT Full Article
tac CBD News: The science body under the Convention on Biological Diversity (CBD) meets this week to discuss a wide array of biodiversity-related issues critical for achieving the 2030 Agenda for Sustainable Development and tackling climate change. These dis By www.cbd.int Published On :: Mon, 11 Dec 2017 00:00:00 GMT Full Article
tac CBD News: On 12 April, Sir David Attenborough joins the head of the UN's Convention on Biological Diversity and a panel from government, business and civil society to discuss how to mobilise global action to tackle what is said to be the greatest thre By www.cbd.int Published On :: Wed, 11 Apr 2018 00:00:00 GMT Full Article
tac CBD News: The film highlights the importance of nature in tackling climate change, calling for the need to protect, restore and fund nature and mobilizing attention to scale nature-based solutions. By www.youtube.com Published On :: Fri, 20 Sep 2019 00:00:00 GMT Full Article
tac How relationship app Relish tackles health and wellbeing digitally By www.techworld.com Published On :: Tue, 05 May 2020 10:34:00 GMT The relationship wellness app is seeing a significant uptick in interest as couples are locked down together during the COVID-19 pandemic Full Article
tac Fly ash geopolymer concrete: Significantly enhanced resistance to extreme alkali attack By www.eurekalert.org Published On :: Wed, 06 May 2020 00:00:00 EDT (University of Johannesburg) Fly ash generated by coal-fired power stations is a global environmental headache, creating groundwater and air pollution from vast landfills and ash dams. The waste product can be repurposed into geopolymer concrete, such as precast heat-cured structural elements for buildings. However, a critical durability problem has been low resistance to extreme alkali attack. UJ researchers found that high temperature heat-treatment at 200 degrees Celsius can halve this harmful mechanism in fly ash geopolymer concretes. Full Article
tac Arctic Edmontosaurus lives again -- a new look at the 'caribou of the Cretaceous' By www.eurekalert.org Published On :: Wed, 06 May 2020 00:00:00 EDT (Perot Museum of Nature and Science) Published in PLOS ONE today, a study by an international team from the Perot Museum of Nature and Science in Dallas and Hokkaido University in Japan further explores the proliferation of the most commonly occurring duck-billed dinosaur of the ancient Arctic as the genus Edmontosaurus. The findings reinforce that the hadrosaurs -- dubbed 'caribou of the Cretaceous' -- had a geographical distribution of approximately 60 degrees of latitude, spanning the North American West from Alaska to Colorado. Full Article
tac Fossil reveals evidence of 200-million-year-old 'squid' attack By www.eurekalert.org Published On :: Wed, 06 May 2020 00:00:00 EDT (University of Plymouth) Researchers say a fossil found on the Jurassic coast of southern England in the 19th century demonstrates the world's oldest known example of a squid-like creature attacking its prey. Full Article
tac Leading European computing society releases statement on COVID contact tracing By www.eurekalert.org Published On :: Thu, 07 May 2020 00:00:00 EDT (Association for Computing Machinery) Today, the ACM Europe Technology Policy Committee (Europe TPC) of the world's largest society of computing professionals, the Association for Computing Machinery (ACM), has released detailed principles and practices for the development and deployment of 'contact tracing' technology intended to track and arrest the spread of COVID-19. Full Article
tac Bolton’s Attack on the International Criminal Court May Backfire By feedproxy.google.com Published On :: Thu, 20 Sep 2018 11:48:10 +0000 20 September 2018 Dr Max du Plessis SC Associate Fellow, International Law Programme The US national security advisor’s recent threats look damaging but they may in fact strengthen support for the ICC from other states. 2018-09-20-Bolton.jpg John Bolton speaks to the Federalist Society on 10 September. Photo: Getty Images. On 10 September, US National Security Advisor John Bolton used his first major speech since joining the White House to attack the International Criminal Court’s (ICC) potential investigation of American personnel in Afghanistan. The ‘American patriots’, as Bolton describes them, are being investigated for potential torture and ill-treatment of detainees, mostly in 2003 and 2004, during the United States-led invasion of the country.Bolton has a long history of opposition to the ICC. Although the US signed the ICC Statute under president Bill Clinton, it was ‘unsigned’ by Bolton, then an under-secretary of state in the George W Bush administration.And when the court first opened its doors in 2002, Bolton helped secure, in what he described on 10 September as one of his ‘proudest achievements’, around 100 bilateral agreements with other countries to prevent them from delivering US personnel to the ICC. Those agreements were often extracted under pressure, with the US threatening to cut off military and other aid to countries that refused to sign.In recent years under the Obama administration, relations between the US and the ICC improved, and the US offered help and support to the court. Bolton’s attack is aimed at reversing those gains – with measures aimed directly at the court and its staff.These include: (i) negotiating ‘even more binding, bilateral agreements to prohibit nations from surrendering US persons to the ICC’; (ii) banning ICC judges and prosecutors from entering the US, sanctioning their funds in the US financial system and prosecuting them in the US criminal courts (and doing the ‘same for any company or state that assists an ICC investigation of Americans’); and (iii) ‘taking note if any countries cooperate with ICC investigations of the United States and its allies, and remember[ing] that cooperation when setting US foreign assistance, military assistance and intelligence sharing levels’.These are serious threats – they would potentially undermine the work of a court that is designed to prosecute the world’s worst crimes. The ICC prosecutor and its judges would be barred entry from the US to attend to vital work of the court.Some of that work, ironically, is at the behest of the US. For instance, two of the UN Security Council’s referrals to the ICC, one in relation to atrocities committed in Sudan, the other in respect of the crimes committed by Muammar Gaddafi in Libya, were referred with US support. Also, the meetings of the ICC Assembly of States Parties are held each year at UN headquarters in New York. Those meetings may have to be held elsewhere if the ICC judges and staff are under threat of arrest.In the case of the potential torture linked to operations in Afghanistan, the ICC has not been acting on its own initiative in investigating. For example, the Center for Constitutional Rights submitted ‘victim’s representations’ to the ICC on behalf of two of their clients, Sharqawi Al Hajj and Guled Hassan Duran, emphasizing the importance of an ICC investigation of US officials for serious crimes arising out of post-9/11 detention and interrogations.According to the center, both Al Hajj and Duran were detained by the CIA in black sites or 'proxy-detention' by other countries, tormented and tortured.Although the US is not a party to the ICC Statute, Afghanistan is, and therefore the court has jurisdiction over US nationals who allegedly committed atrocities in Afghanistan. And it should be noted that the investigation includes pursuing any atrocities committed by the Taliban and Afghan security forces during the same period.So the basis for attacking the work of the ICC based on this is shaky, and Bolton’s threats raise a number of important international law questions going forward. For one, they may be unlawful retaliatory steps, given that the US has obligations to accord at least some privileges and immunities to judges and other personnel of the ICC under the 1947 UN Headquarters Agreement between the UN and US. Counter-measures might be considered by member states of the ICC, either alone, or collectively. In this regard, Bolton’s comments about the EU will not go unnoticed: he suggests Europe is a region where ‘the global governance dogma is strong’. The US may yet come to learn just how strong that ‘dogma’ is.With US abstention from the ICC, the opening remains for Europe and other regions to position themselves at the heart of the international criminal justice regime, thereby – as in response to the US attitude towards climate change – building a network of partnerships with other like-minded nations to compensate for US disengagement.Further, while the ICC has many critics, and could be improved as an institution, Bolton’s speech may have the effect of galvanizing support for the world’s first permanent international criminal court. That could be a good thing for the court, which is sorely in need of support for its work.Whatever concerns states may have about the ICC, they may be outweighed by a mutual desire to stand up to perceived bullying by the Trump administration, in favour of the international rule of law. Full Article
tac Tackling Cyber Disinformation in Elections: Applying International Human Rights Law By feedproxy.google.com Published On :: Wed, 18 Sep 2019 10:30:02 +0000 Research Event Tackling Cyber Disinformation in Elections: Applying International Human Rights Law 6 November 2019 - 5:30pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Susie Alegre, Barrister and Associate Tenant, Doughty Street ChambersEvelyn Aswad, Professor of Law and the Herman G. Kaiser Chair in International Law, University of OklahomaBarbora Bukovská, Senior Director for Law and Policy, Article 19Kate Jones, Director, Diplomatic Studies Programme, University of OxfordChair: Harriet Moynihan, Associate Fellow, International Law Programme, Chatham House Register Interest Cyber operations are increasingly used by political parties, their supporters and foreign states to influence electorates – from algorithms promoting specific messages to micro-targeting based on personal data and the creation of filter bubbles. The risks of digital tools spreading disinformation and polarizing debate, as opposed to deepening democratic engagement, have been highlighted by concerns over cyber interference in the UK’s Brexit referendum, the 2016 US presidential elections and in Ukraine. While some governments are adopting legislation in an attempt to address some of these issues, for example Germany’s ‘NetzDG’ law and France’s ‘Law against the manipulation of information’, other countries have proposed an independent regulator as in the case of the UK’s Online Harms white paper. Meanwhile, the digital platforms, as the curators of content, are under increasing pressure to take their own measures to address data mining and manipulation in the context of elections. How do international human rights standards, for example on freedom of thought, expression and privacy, guide the use of digital technology in the electoral context? What practical steps can governments and technology actors take to ensure policies, laws and practices are in line with these fundamental standards? And with a general election looming in the UK, will these steps come soon enough? This event brings together a wide range of stakeholders including civil society, the tech sector, legal experts and government, coincides with the publication of a Chatham House research paper on disinformation, elections and the human rights framework. Jacqueline Rowe Programme Assistant, International Law Programme 020 7389 3287 Email Department/project International Law Programme, Cyber, Sovereignty and Human Rights, Rights, Accountability and Justice Full Article
tac Sovereignty and Non-Intervention: The Application of International Law to State Cyberattacks By feedproxy.google.com Published On :: Fri, 01 Nov 2019 10:55:01 +0000 Research Event 4 December 2019 - 5:30pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Douglas, Legal Director, GCHQZhixiong Huang, Luojia Chair of International Law, Wuhan UniversityNemanja Malisevic, Director of Digital Diplomacy, MicrosoftHarriet Moynihan, Associate Fellow, International Law Programme, Chatham HouseChair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House International law applies to cyber operations – but views differ on exactly how. Does state-sponsored interference in another state's affairs using cyber means – for example, disinformation campaigns in elections, disabling government websites, or disrupting transport systems – breach international law? If so, on what basis and how are the principles of sovereignty and non-intervention relevant? States are increasingly attributing cyber operations to other states and engaging in the debate on how international law applies, including circumstances that would justify countermeasures.As states meet to debate these issues at the UN, the panel will explore how international law regulates cyberoperations by states, consider the prospects of progress at the UN, and assess the value of other initiatives.This event coincides with the launch of a Chatham House research paper which analyses how the principles of sovereignty and intervention apply in the context of cyberoperations, and considers a way forward for agreeing a common understanding of cyber norms.This event will bring together a broad group of actors, including policymakers, the private sector, legal experts and civil society, and will be followed by a drinks reception. Department/project International Law Programme, Cyber, Sovereignty and Human Rights Jacqueline Rowe Programme Assistant, International Law Programme 020 7389 3287 Email Full Article
tac The Application of International Law to State Cyberattacks: Sovereignty and Non-Intervention By feedproxy.google.com Published On :: Fri, 29 Nov 2019 16:56:12 +0000 2 December 2019 Hostile cyber operations by one state against another state are increasingly common. This paper analyzes the application of the sovereignty and non-intervention principles in relation to states’ cyber operations in another state below the threshold of the use of force. Read online Download PDF Harriet Moynihan Senior Research Fellow, International Law Programme @HarrietMoyniha9 2019-11-29-Intl-Law-Cyberattacks.jpg A computer hacked by a virus known as Petya. The Petya ransomware cyberattack hit computers of Russian and Ukrainian companies on 27 June 2017. Photo: Getty Images. SummaryThe vast majority of state-to-state cyberattacks consist of persistent, low-level intrusions that take place below the threshold of use of force. International law, including the principle of non-intervention in another state’s internal affairs and the principle of sovereignty, applies to these cyber operations.It is not clear whether any unauthorized cyber intrusion would violate the target state’s sovereignty, or whether there is a threshold in operation. While some would like to set limits by reference to effects of the cyber activity, at this time such limits are not reflected in customary international law. The assessment of whether sovereignty has been violated therefore has to be made on a case by case basis, if no other more specific rules of international law apply.In due course, further state practice and opinio iuris may give rise to an emerging cyber-specific understanding of sovereignty, just as specific rules deriving from the sovereignty principle have crystallized in other areas of international law.Before a principle of due diligence can be invoked in the cyber context, further work is needed by states to agree upon rules as to what might be expected of a state in this context.The principle of non-intervention applies to a state’s cyber operations as it does to other state activities. It consists of coercive behaviour by one state that deprives the target state of its free will in relation to the exercise of its sovereign functions in order to compel an outcome in, or conduct with respect to, a matter reserved to the target state.In practice, activities that contravene the non-intervention principle and activities that violates sovereignty will often overlap.In order to reach agreement on how international law applies to states’ cyber operations below the level of use of force, states should put their views on record, where possible giving examples of when they consider that an obligation may be breached, as states such as the UK, Australia, France and the Netherlands have done.Further discussion between states should focus on how the rules apply to practical examples of state-sponsored cyber operations. There is likely to be more commonality about specific applications of the law than there is about abstract principles.The prospects of a general treaty in this area are still far off. In due course, there may be benefit in considering limited rules, for example on due diligence and a prohibition on attacking critical infrastructure, before tackling broad principles. Department/project International Law Programme, Cyber, Sovereignty and Human Rights Full Article
tac Large-scale Identification of N-linked Intact Glycopeptides in Human Serum using HILIC Enrichment and Spectral Library Search By feedproxy.google.com Published On :: 2020-04-01 Qingbo ShuApr 1, 2020; 19:672-689Research Full Article
tac Tackle the ‘Splinternet’ By feedproxy.google.com Published On :: Fri, 31 May 2019 14:57:47 +0000 12 June 2019 Marjorie Buchser Executive Director, Digital Society Initiative @Marjorie_BU LinkedIn Joyce Hakmeh Senior Research Fellow, International Security Programme; Co-Editor, Journal of Cyber Policy @joycehakmeh LinkedIn Competing governance visions are impairing efforts to regulate the digital space. To limit the spread of repressive models, policymakers in the West and elsewhere need to ensure the benefits of an open and well-run system are more widely communicated. 20150415GCIG-1.jpg The development of governance in a wide range of digital spheres – from cyberspace to internet infrastructure to emerging technologies such as artificial intelligence (AI) – is failing to match rapid advances in technical capabilities or the rise in security threats. This is leaving serious regulatory gaps, which means that instruments and mechanisms essential for protecting privacy and data, tackling cybercrime or establishing common ethical standards for AI, among many other imperatives, remain largely inadequate.A starting point for effective policy formation is to recognize the essential complexity of the digital landscape, and the consequent importance of creating a ‘common language’ for multiple stakeholders (including under-represented actors such as smaller and/or developing countries, civil society and non-for-profit organizations).The world’s evolving technological infrastructure is not a monolithic creation. In practice, it encompasses a highly diverse mix of elements – so-called ‘high-tech domains’,[1] hardware, systems, algorithms, protocols and standards – designed by a plethora of private companies, public bodies and non-profit organizations.[2] Varying cultural, economic and political assumptions have shaped where and which technologies have been deployed so far, and how they have been implemented.Perhaps the most notable trend is the proliferation of techno-national regimes and private-sector policy initiatives, reflecting often-incompatible doctrines in respect of privacy, openness, inclusion and state control. Beyond governments, the interests and ambitions of prominent multinationals (notably the so-called ‘GAFAM’ tech giants in the West, and their ‘BATX’ counterparts in China)[3] are significant factors feeding into this debate.Cyberspace and AI – two case studiesTwo particular case studies highlight the essential challenges that this evolving – and, in some respects, still largely unformed – policy landscape presents. The first relates to cyberspace. Since 1998, Russia has established itself as a strong voice in the cyberspace governance debate – calling for a better understanding, at the UN level, of ICT developments and their impact on international security.The country’s efforts were a precursor to the establishment in 2004 of a series of UN Groups of Governmental Experts (GGEs), aimed at strengthening the security of global information and telecommunications systems. These groups initially succeeded in developing common rules, norms and principles around some key issues. For example, the 2013 GGE meeting recognized that international law applies to the digital space and that its enforcement is essential for a secure, peaceful and accessible ICT environment.However, the GGE process stalled in 2017, primarily due to fundamental disagreements between countries on the right to self-defence and on the applicability of international humanitarian law to cyber conflicts. The breakdown in talks reflected, in particular, the divide between two principal techno-ideological blocs: one, led by the US, the EU and like-minded states, advocating a global and open approach to the digital space; the other, led mainly by Russia and China, emphasizing a sovereignty-and-control model.The divide was arguably entrenched in December 2018, with the passage of two resolutions at the UN General Assembly. A resolution sponsored by Russia created a working group to identify new norms and look into establishing regular institutional dialogue.At the same time, a US-sponsored resolution established a GGE tasked, in part, with identifying ways to promote compliance with existing cyber norms. Each resolution was in line with its respective promoter’s stance on cyberspace. While some observers considered these resolutions potentially complementary, others saw in them competing campaigns to cement a preferred model as the global norm. Outside the UN, there have also been dozens of multilateral and bilateral accords with similar objectives, led by diverse stakeholders.[4]The second case study concerns AI. Emerging policy in this sector suffers from an absence of global standards and a proliferation of proposed regulatory models. The potential ability of AI to deliver unprecedented capabilities in so many areas of human activity – from automation and language applications to warfare – means that it has become an area of intense rivalry between governments seeking technical and ideological leadership of this field.China has by far the most ambitious programme. In 2017, its government released a three-step strategy for achieving global dominance in AI by 2030. Beijing aims to create an AI industry worth about RMB 1 trillion ($150 billion)[5] and is pushing for greater use of AI in areas ranging from military applications to the development of smart cities. Elsewhere, the US administration has issued an executive order on ‘maintaining American leadership on AI’.On the other side of the Atlantic, at least 15 European countries (including France, Germany and the UK) have set up national AI plans. Although these strategies are essential for the development of policy infrastructure, they are country-specific and offer little in terms of global coordination. Ominously, greater inclusion and cooperation are scarcely mentioned, and remain the least prioritized policy areas.[6]Competing multilateral frameworks on AI have also emerged. In April 2019, the European Commission published its ethics guidelines for trustworthy AI. Ministers from Nordic countries[7] recently issued their own declaration on collaboration in ‘AI in the Nordic-Baltic region’. And leaders of the G7 have committed to the ‘Charlevoix Common Vision for the Future of Artificial Intelligence’, which includes 12 guiding principles to ensure ‘human-centric AI’.More recently, OECD member countries adopted a set of joint recommendations on AI. While nations outside the OECD were welcomed into the coalition – with Argentina, Brazil and Colombia adhering to the OECD’s newly established principles – China, India and Russia have yet to join the discussion. Despite their global aspirations, these emerging groups remain largely G7-led or EU-centric, and again highlight the divide between parallel models. The importance of ‘swing states’No clear winner has emerged from among the competing visions for cyberspace and AI governance, nor indeed from the similar contests for doctrinal control in other digital domains. Concerns are rising that a so-called ‘splinternet’ may be inevitable – in which the internet fragments into separate open and closed spheres and cyber governance is similarly divided.Each ideological camp is trying to build a critical mass of support by recruiting undecided states to its cause. Often referred to as ‘swing states’, the targets of these overtures are still in the process of developing their digital infrastructure and determining which regulatory and ethical frameworks they will apply. Yet the policy choices made by these countries could have a major influence on the direction of international digital governance in the future.India offers a case in point. For now, the country seems to have chosen a versatile approach, engaging with actors on various sides of the policy debate, depending on the technology governance domain. On the one hand, its draft Personal Data Protection Bill mirrors principles in the EU’s General Data Protection Regulation (GDPR), suggesting a potential preference for the Western approach to data security.However, in 2018, India was the leading country in terms of internet shutdowns, with over 100 reported incidents.[8] India has also chosen to collaborate outside the principal ideological blocs, as evidenced by an AI partnership it has entered into with the UAE. At the UN level, India has taken positions that support both blocs, although more often favouring the sovereignty-and-control approach.Principles for rule-makingSovereign nations have asserted aspirations for technological dominance with little heed to the cross-border implications of their policies. This drift towards a digital infrastructure fragmented by national regulation has potentially far-reaching societal and political consequences – and implies an urgent need for coordinated rule-making at the international level.The lack of standards and enforcement mechanisms has created instability and increased vulnerabilities in democratic systems. In recent years, liberal democracies have been targeted by malevolent intrusions in their election systems and media sectors, and their critical infrastructure has come under increased threat. If Western nations cannot align around, and enforce, a normative framework that seeks to preserve individual privacy, openness and accountability through regulation, a growing number of governments may be drawn towards repressive forms of governance.To mitigate those risks, efforts to negotiate a rules-based international order for the digital space should keep several guiding principles in mind. One is the importance of developing joint standards, as well as the need for consistent messaging towards the emerging cohort of engaged ‘swing states’. Another is the need for persistence in ensuring that the political, civic and economic benefits associated with a more open and well-regulated digital sphere are made clear to governments and citizens everywhere.Countries advocating an open, free and secure model should take the lead in embracing and promoting a common affirmative model – one that draws on human rights principles (such as the rights to freedom of opinion, freedom of expression and privacy) and expands their applications to the digital space. Specific rules on cyberspace and technology use need to include pragmatic policy ideas and models of implementation. As this regulatory corpus develops, rules should be adapted to reflect informed consideration of economic and social priorities and attitudes, and to keep pace with what is possible technologically.[9]What needs to happenDemystifying the salient issues, consistent messaging and the creation of a common discourse are key to advancing a well-informed debate on global digital governance.The benefits associated with open and well-regulated digital governance should be clearly presented to all stakeholders. For example, the link between sustainable development, respect for human rights and a secure, free and open internet should take priority in the debate with developing countries.International norms need to be updated and reinterpreted to assert the primacy of non-harmful applications of technologies and digital interactions.This process should follow a multi-stakeholder approach to include under-represented actors, such as developing countries and civil society, and should adopt a gender-balanced approach.The design of rules, standards and norms needs to take into account the essentially transnational nature of digital technologies. Rules, standards and norms need to be applicable consistently across jurisdictions.Developing countries should be supported in building their digital infrastructure, and in increasing the capacity of governments and citizens to make informed policy decisions on technology.Notes[1] Including but not limited to AI and an associated group of digital technologies, such as the Internet of Things, big data, blockchain, quantum computing, advanced robotics, self-driving cars and other autonomous systems, additive manufacturing (i.e. 3D printing), social networks, the new generation of biotechnology, and genetic engineering.[2] O’Hara, K. and Hall, W. (2018), Four Internets: The Geopolitics of Digital Governance, Centre for International Governance Innovation, CIGI Paper No. 206, https://www.cigionline.org/publications/four-internets-geopolitics-digital-governance.[3] GAFAM = Google, Amazon, Facebook, Apple and Microsoft; BATX = Baidu, Alibaba, Tencent and Xiaomi.[4] Carnegie Endowment for International Peace (undated), ‘Cyber Norms Index’, https://carnegieendowment.org/publications/interactive/cybernorms (accessed 30 May 2019).[5] Future of Life Institute (undated), ‘AI Policy – China’, https://futureoflife.org/ai-policy-china?cn-reloaded=1.[6] Dutton, T. (2018), ‘Building an AI World: Report on National and Regional AI Strategies’, 6 December 2018, CIFAR, https://www.cifar.ca/cifarnews/2018/12/06/building-an-ai-world-report-on-national-and-regional-ai-strategies.[7] Including Denmark, Estonia, Finland, the Faroe Islands, Iceland, Latvia, Lithuania, Norway, Sweden and the Åland Islands.[8] Shahbaz, A. (2018), Freedom on the Net 2018: The Rise of Digital Authoritarianism, Freedom House, October 2018, https://freedomhouse.org/report/freedom-net/freedom-net-2018/rise-digital-authoritarianism.[9] Google White Paper (2018), Perspectives on Issues in AI Governance, https://www.blog.google/outreach-initiatives/public-policy/engaging-policy-stakeholders-issues-ai-governance/.This essay was produced for the 2019 edition of Chatham House Expert Perspectives – our annual survey of risks and opportunities in global affairs – in which our researchers identify areas where the current sets of rules, institutions and mechanisms for peaceful international cooperation are falling short, and present ideas for reform and modernization. Full Article
tac The Destabilizing Danger of Cyberattacks on Missile Systems By feedproxy.google.com Published On :: Tue, 02 Jul 2019 08:40:06 +0000 2 July 2019 Dr Patricia Lewis Research Director, Conflict, Science & Transformation; Director, International Security Programme @PatriciaMary Dr Beyza Unal Senior Research Fellow, International Security Programme @beyzaunal Google Scholar ‘Left-of-launch’ attacks that aim to disable enemy missile systems may increase the chance of them being used, not least because the systems are so vulnerable. 2019-07-02-NKMissile.jpg This undated photo released by North Korea's news agency in March 2017 shows the launch of four ballistic missiles during a military drill at an undisclosed location in North Korea. Photo: STR/AFP/Getty Images. After President Trump decided to halt a missile attack on Iran in response to the downing of a US drone, it was revealed that the US had conducted cyberattacks on Iranian weapons systems to prevent Iran launching missiles against US assets in the region.This ‘left-of-launch’ strategy – the pre-emptive action to prevent an adversary launch missiles – has been part of the US missile defence strategy for some time now. President George W Bush asked the US military and intelligence community to infiltrate the supply chain of North Korean missiles. It was claimed that the US hacked the North Korean ballistic missile programme, causing a failed ballistic missile test, in 2012.It was not clear then – or now – whether these ‘left-of-launch’ cyberattacks aimed at North Korea were successful as described or whether they were primarily a bluff. But that is somewhat irrelevant; the belief in the possibility and the understanding of the potential impact of such cyber capabilities undermines North Korean or Iranian confidence in their abilities to launch their missiles. In times of conflict, loss of confidence in weapons systems may lead to escalation.In other words, the adversary may be left with no option but to take the chance to use these missiles or to lose them in a conflict setting. ‘Left of launch’ is a dangerous game. If it is based on a bluff, it could be called upon and lead to deterrence failure. If it is based on real action, then it could create an asymmetrical power struggle. If the attacker establishes false confidence in the power of a cyber weapon, then it might lead to false signalling and messaging.This is the new normal. The cat-and-mouse game has to be taken seriously, not least because missile systems are so vulnerable.There are several ways an offensive cyber operation against missile systems might work. These include exploiting missile designs, altering software or hardware, or creating clandestine pathways to the missile command and control systems.They can also be attacked in space, targeting space assets and their link to strategic systems.Most missile systems rely, at least in part, on digital information that comes from or via space-based or space-dependent assets such as: communication satellites; satellites that provide position, navigation and timing (PNT) information (for example GPS or Galileo); weather satellites to help predict flight paths, accurate targeting and launch conditions; and remote imagery satellites to assist with information and intelligence for the planning and targeting.Missile launches themselves depend on 1) the command and control systems of the missiles, 2) the way in which information is transmitted to the missile launch facilities and 3) the way in which information is transmitted to the missiles themselves in flight. All these aspects rely on space technology.In addition, the ground stations that transmit and receive data to and from satellites are also vulnerable to cyberattack – either through their known and unknown internet connectivity or through malicious use of flash drives that contain a deliberate cyber infection.Non-space-based communications systems that use cable and ground-to-air-to-ground masts are likewise under threat from cyberattacks that find their way in via internet connectivity, proximity interference or memory sticks. Human error in introducing connectivity via phones, laptops and external drives, and in clicking on malicious links in sophisticated phishing lures, is common in facilitating inadvertent connectivity and malware infection.All of these can create a military capacity able to interfere with missile launches. Malware might have been sitting on the missile command and control system for months or even years, remaining inactivated until a chosen time or by a trigger that sets in motion a disruption either to the launch or to the flight path of the missile. The country that launches the missile that either fails to launch or fails to reach the target may never know if this was the result of a design flaw, a common malfunction or a deliberate cyberattack.States with these capabilities must exercise caution: cyber offence manoeuvres may prevent the launch of missile attacks against US assets in the Middle East or in the Pacific regions, but they may also interfere with US missile launches in the future. Even, as has recently been revealed, US cyber weapons targeting an adversary may blow back and inadvertently infect US systems. Nobody is invulnerable. Full Article
tac EU–US Cooperation on Tackling Disinformation By feedproxy.google.com Published On :: Tue, 17 Sep 2019 15:23:58 +0000 3 October 2019 Disinformation, as the latest iteration of propaganda suitable for a digitally interconnected world, shows no signs of abating. This paper provides a holistic overview of the current state of play and outlines how EU and US cooperation can mitigate disinformation in the future. Read online Download PDF Sophia Ignatidou Academy Associate, International Security Programme @SophiaIgnatidou LinkedIn 2019-09-19-FakeNews.jpg A congressional staff member displays print outs of social media posts during a hearing before the House Select Intelligence Committee 1 November 2017 in Washington, DC. Photo: Getty Images. EU and US cooperation on tackling disinformation needs to be grounded in an international human rights framework in order to bridge the differences of both parties and include other countries facing this challenge.The disinformation debate needs to be reformulated to cover systemic issues rather than merely technical or security concerns. A lag in regulatory development has led to systemic vulnerabilities. In this context, policymakers need to push for more evidence-based analysis, which is only attainable if technology companies engage in honest debate and allow meaningful access to data – as determined by government appointed researchers rather than the companies themselves – taking into account and respecting users’ privacy.Data governance needs to be the focus of attempts to tackle disinformation. Data’s implications for information, market and power asymmetries, feed into and exacerbate the problem.Policymakers should focus on regulating the distribution of online content rather than the subject matter itself, which may have implications for freedom of speech.Disinformation is mainly the result of inefficient gatekeeping of highly extractive digital companies. The old gatekeepers, journalists and their respective regulators, need to be actively engaged in devising the new regulatory framework.Legacy media need to urgently consider the issue of ‘strategic silence’ and avoid being co-opted by political actors aiming to manipulate the accelerated, reactive news cycle by engaging in divisive ‘clickbait’ rhetoric verging on disinformation and propaganda. When strategic silence is not an option, contextual analysis is fundamental. The EU delegation should assist the coordination of EU–US efforts to tackle disinformation by drawing on the work and expertise at the G7 Rapid Response Mechanism (RRM), the Transatlantic Commission on Election Integrity (TCEI), the European Centre of Excellence for Countering Hybrid Threats (Hybrid CoE), the High-level Panel on Digital Cooperation, and work with the International Telecommunication Union (ITU) to foster a long-term interdisciplinary forum to harness technological innovation to protect and support democracy from threats such as disinformation.The EU and US must avoid rushed regulation that may condone enhanced surveillance or vilify journalism that scrutinizes those in power in the name of security. Department/project International Security Programme, Internet Governance Full Article
tac Pre-treatment 18F-FDG PET/CT Radiomics predict local recurrence in patients treated with stereotactic radiotherapy for early-stage non-small cell lung cancer: a multicentric study By jnm.snmjournals.org Published On :: 2019-12-05T10:37:41-08:00 Purpose: The aim of this retrospective multicentric study was to develop and evaluate a prognostic FDG PET/CT radiomics signature in early-stage non-small cell lung cancer (NSCLC) patients treated with stereotactic radiotherapy (SBRT). Material and Methods: Patients from 3 different centers (n = 27, 29 and 8) were pooled to constitute the training set, whereas the patients from a fourth center (n = 23) were used as the testing set. The primary endpoint was local control (LC). The primary tumour was semi-automatically delineated in the PET images using the Fuzzy locally adaptive Bayesian algorithm, and manually in the low-dose CT images. A total of 184 IBSI-compliant radiomic features were extracted. Seven clinical and treatment parameters were included. We used ComBat to harmonize radiomic features extracted from the four institutions relying on different PET/CT scanners. In the training set, variables found significant in the univariate analysis were fed into a multivariate regression model and models were built by combining independent prognostic factors. Results: Median follow-up was 21.1 (1.7 – 63.4) and 25.5 (7.7 – 57.8) months in training and testing sets respectively. In univariate analysis, none of the clinical variables, 2 PET and 2 CT features were significantly predictive of LC. The best predictive models in the training set were obtained by combining one feature from PET, namely information correlation 2 (IC2) and one from CT (Flatness), reaching a sensitivity of 100% and a specificity of 96%. Another model combining 2 PET features (IC2 and Strength), reached sensitivity of 100% and specificity of 88%, both with an undefined hazard ratio (HR) (p<0.001). The latter model obtained an accuracy of 0.91 (sensitivity 100%, specificity 81%), with a HR undefined (P = 0.023) in the testing set, however other models relying on CT radiomics features only or the combination of PET and CT features failed to validate in the testing set. Conclusion: We showed that two radiomic features derived from FDG PET were independently associated with LC in patients with NSCLC undergoing SBRT and could be combined in an accurate predictive model. This model could provide local relapse-related information and could be helpful in clinical decision-making. Full Article
tac Nigeria’s Political Leaders Need to Win Trust to Tackle COVID-19 By feedproxy.google.com Published On :: Thu, 23 Apr 2020 16:00:22 +0000 23 April 2020 Elizabeth Donnelly Deputy Director, Africa Programme @LizzyDonn Idayat Hassan Director, Centre for Democracy and Development COVID-19 will require Nigeria's government to rely on already stretched communities and informal institutions. But there is a yawning gap in trust and accountability between citizens and the state in Nigeria – the crisis will force the state to attempt to bridge this divide. 2020-04-23-Nigeria-News-Coronavirus News stand in Lagos, Nigeria on April 12, 2020. Photo by PIUS UTOMI EKPEI/AFP via Getty Images. Nigeria is better placed than many to respond to the arrival of the coronavirus disease. In 2014, it successfully contained a deadly Ebola virus outbreak and the country’s current score on the Epidemic Preparedness Index (38.9 per cent) is higher than the African and global averages.But the outbreak is compounding Nigeria’s numerous pre-existing crises. It was already grappling with a Lassa fever outbreak that has claimed more than one hundred lives in 2020, the aftermath of recession, and conflict and insecurity within its borders.Effective leadership to build confidence will be vital. However, President Muhammadu Buhari has made few appearances, delivering his first speech on Nigeria’s response more than one month after the country’s first recorded case. And the indefinite suspension of meetings of the Federal Executive Council has raised questions on the efficacy of the response.Extended lockdown imposedThe recent loss of President Buhari’s steadfast chief of staff Abba Kyari as a result of contracting COVID-19 is a further significant setback for the presidency. But the administration has established a presidential task force to develop a national strategy and an extended lockdown has been imposed on the most affected states – Lagos, Ogun and the Federal Capital Territory of Abuja. The country has also closed national borders and is expanding testing capacity to 1,500 per day.However, when Nigeria’s first case was recorded on February 27 it was state governments that initially took action – shutting schools, closing state borders and imposing lockdowns. Going forwards, the 36 state governments will have a key role to play although their governance capacity and commitment varies widely.The federal government has released $2.7 million to support the Nigeria Centre for Disease Control (NCDC), and promised an additional $18 million – but this falls well short of the estimated $330 million needed to tackle the coronavirus disease in Nigeria. The government is looking to its private sector to help make up the difference. The country’s finances are under severe pressure with Nigerian crude oil – the main source of government revenue and foreign exchange reserves – selling for as low as $12 or $13 a barrel (with production costs of around $22 per barrel), and a debt servicing to revenue ratio of more than 50 per cent even before the oil price crash.Facing its second recession in four years, with -3.4 per cent GDP growth forecast by the IMF, the country has little economic resilience. Nigeria will not be able to sustain restrictions on its 81.15 million-strong workforce, 83.2 per cent of which operate in the informal sector. One area at particular risk is food security, as the pandemic is disrupting farming, supply chains and trade. By building on past benefit programmes, the federal government is providing cash and distributing food to vulnerable households, but this important effort is being hampered by poor communication, inefficiencies and a lack of transparency – longstanding challenges in many aspects of public service delivery in Nigeria.In the absence of a reliable social safety net, Nigerians trust and rely on their families, communities and the informal economy to see them through difficult times. It is these informal mechanisms that lend Nigeria its oft-referenced resilience, which has enabled society to function and continue while a largely disconnected political class has focused on self-enrichment.It is through these traditional channels that the government will need to deliver information, support, testing and treatment. But without high levels of trust, the administration may find it difficult to do so. Many Nigerians initially considered the pandemic a hoax, some describing it as a ‘rich man’s disease’, while others see it as another conspiracy by politicians to loot the treasury.Lockdown measures have also heightened tensions across the country. Some citizens are rebelling and in one instance burned down a police station in response to the closure of mosques in Katsina state. Marking a further breakdown in the relationship between the population and its leaders, the Nigerian National Human Rights Commission (NHRC) recently reported security services enforcing the lockdown have extrajudicially killed 18 people, while, so far, COVID-19 has killed 25 people in Nigeria.Mitigating the spread and worst consequences of the virus will depend on the state rebuilding trust with its citizens through effective communication and action. It is particularly important that the community mechanisms of support are protected as they come under growing pressure as communities become increasingly affected by the virus.The stark choice facing most Nigerians – between risking starvation and risking contagion – means a sustained lockdown is not a tenable option. People will choose to go to work. This will especially be the case as people grow weary of measures imposed upon them by a state that the vast majority of the population believe does not serve or care for them.Having largely ignored the needs of Nigeria’s citizens for decades, the political class face an uphill battle in building trust with the population. Earning this trust is not only crucial for the struggle against COVID-19 but also for Nigeria’s longer-term progress and system of political governance. Full Article
tac Large-scale Identification of N-linked Intact Glycopeptides in Human Serum using HILIC Enrichment and Spectral Library Search [Research] By feedproxy.google.com Published On :: 2020-04-01T00:05:32-07:00 Large-scale identification of N-linked intact glycopeptides by liquid chromatography coupled with tandem mass spectrometry (LC-MS/MS) in human serum is challenging because of the wide dynamic range of serum protein abundances, the lack of a complete serum N-glycan database and the existence of proteoforms. In this regard, a spectral library search method was presented for the identification of N-linked intact glycopeptides from N-linked glycoproteins in human serum with target-decoy and motif-specific false discovery rate (FDR) control. Serum proteins were firstly separated into low-abundance and high-abundance proteins by acetonitrile (ACN) precipitation. After digestion, the N-linked intact glycopeptides were enriched by hydrophilic interaction liquid chromatography (HILIC) and a portion of the enriched N-linked intact glycopeptides were processed by Peptide-N-Glycosidase F (PNGase F) to generate N-linked deglycopeptides. Both N-linked intact glycopeptides and deglycopeptides were analyzed by LC-MS/MS. From N-linked deglycopeptides data sets, 764 N-linked glycoproteins, 1699 N-linked glycosites and 3328 unique N-linked deglycopeptides were identified. Four types of N-linked glycosylation motifs (NXS/T/C/V, X=P) were used to recognize the N-linked deglycopeptides. The spectra of these N-linked deglycopeptides were utilized for N-linked deglycopeptides library construction and identification of N-linked intact glycopeptides. A database containing 739 N-glycan masses was constructed and utilized during spectral library search for the identification of N-linked intact glycopeptides. In total, 526 N-linked glycoproteins, 1036 N-linked glycosites, 22,677 N-linked intact glycopeptides and 738 N-glycan masses were identified under 1% FDR, representing the most in-depth serum N-glycoproteome identified by LC-MS/MS at N-linked intact glycopeptide level. Full Article
tac Identity fraudsters attack Tax Office at least 11,000 times in one year By www.smh.com.au Published On :: Tue, 03 Nov 2015 13:55:23 GMT The ATO has been targeted more than 11,000 times by identity fraudsters attempting to steal tax refunds in 2014-15. Full Article
tac Australia vulnerable to a cyber-attack disaster By www.smh.com.au Published On :: Fri, 13 Nov 2015 06:06:57 GMT Australian government agencies and organisations are increasingly vulnerable to a major cyber attack yet security has not evolved in more than 20 years, according to an international cybercrime expert. Full Article
tac Call for a cyber security reserve corps to help fight major attacks By www.smh.com.au Published On :: Mon, 15 Aug 2016 14:15:00 GMT Experienced volunteers would help fight major online threats to governments, private industry and civil institutions. Full Article
tac ATO fumes after cyber criminals attack myGov portal during last days of Tax Time 2016 By www.smh.com.au Published On :: Thu, 03 Nov 2016 13:15:00 GMT Tensions emerge between Tax Office and Human Services after hackers take down myGov Full Article
tac Metabolic phospholipid labeling of intact bacteria enables a fluorescence assay that detects compromised outer membranes By feedproxy.google.com Published On :: 2020-03-10 Inga NilssonMar 10, 2020; 0:jlr.RA120000654v1-jlr.RA120000654Research Articles Full Article
tac Episode Ten - The Internet of Tacobots (IoTB): F8, chatbots, HTC 10 & Kindle Oasis By play.acast.com Published On :: Fri, 15 Apr 2016 11:15:40 GMT Producer Chris dives in this week to discuss the HTC 10 release, and why it's difficult to get excited about good mobile phones. Then Techworld.com editor Charlotte Jee chats Facebook chatbots and other F8 news (12:30). Finally, editor at Digitalartsonline.co.uk Neil Bennett jumps in to discuss the new Amazon e-reader (31:00) Kindle Oasis and why everyone is kicking off about the price. See acast.com/privacy for privacy and opt-out information. Full Article