pli COVID-19: Economic Implications for Japan and the United States By www8.gsb.columbia.edu Published On :: Fri, 01 May 2020 00:00:00 -0400 Exploring the economic implications of COVID-19 on Japan and the US. Full Article
pli State Cyber Interventions Below the Threshold of the Use of Force: Challenges in the Application of International Law By feedproxy.google.com Published On :: Wed, 17 Apr 2019 10:45:01 +0000 Invitation Only Research Event 30 April 2019 - 10:00am to 4:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Chair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House Under what circumstances will a state-sponsored cyberattack on another state that falls below the threshold of the use of force be a breach of international law – for example, hacking into another state’s electoral databases, usurping inherently governmental functions such as parliamentary processes or an attack on another state’s financial system? In the dynamic field of state cyber operations, persistent, low-level cyberattacks are increasing, as are multilateral attempts to attribute the attacks to the states responsible. There is general agreement that international law applies to cyberspace but the question is how it applies and with what consequences. This meeting will bring together a small group of academics and practitioners to explore the application of international law to states’ cyber operations that interfere in the internal affairs of another state and which fall below the threshold of the use of force. What is the law on non-intervention in international law and how does it apply to states’ cyber activities? Does the Nicaragua case represent the best expression of the law in this area including the requirement of coercion? And are there any other principles of international law that are relevant? The meeting will also consider processes and procedures for agreeing on the law and best practices. The purpose of the meeting will be to inform a research paper by Chatham House. Attendance at this event is by invitation only. Event attributes Chatham House Rule Department/project International Law Programme Full Article
pli Sovereignty and Non-Intervention: The Application of International Law to State Cyberattacks By feedproxy.google.com Published On :: Fri, 01 Nov 2019 10:55:01 +0000 Research Event 4 December 2019 - 5:30pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Douglas, Legal Director, GCHQZhixiong Huang, Luojia Chair of International Law, Wuhan UniversityNemanja Malisevic, Director of Digital Diplomacy, MicrosoftHarriet Moynihan, Associate Fellow, International Law Programme, Chatham HouseChair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House International law applies to cyber operations – but views differ on exactly how. Does state-sponsored interference in another state's affairs using cyber means – for example, disinformation campaigns in elections, disabling government websites, or disrupting transport systems – breach international law? If so, on what basis and how are the principles of sovereignty and non-intervention relevant? States are increasingly attributing cyber operations to other states and engaging in the debate on how international law applies, including circumstances that would justify countermeasures.As states meet to debate these issues at the UN, the panel will explore how international law regulates cyberoperations by states, consider the prospects of progress at the UN, and assess the value of other initiatives.This event coincides with the launch of a Chatham House research paper which analyses how the principles of sovereignty and intervention apply in the context of cyberoperations, and considers a way forward for agreeing a common understanding of cyber norms.This event will bring together a broad group of actors, including policymakers, the private sector, legal experts and civil society, and will be followed by a drinks reception. Department/project International Law Programme, Cyber, Sovereignty and Human Rights Jacqueline Rowe Programme Assistant, International Law Programme 020 7389 3287 Email Full Article
pli The Application of International Law to State Cyberattacks: Sovereignty and Non-Intervention By feedproxy.google.com Published On :: Fri, 29 Nov 2019 16:56:12 +0000 2 December 2019 Hostile cyber operations by one state against another state are increasingly common. This paper analyzes the application of the sovereignty and non-intervention principles in relation to states’ cyber operations in another state below the threshold of the use of force. Read online Download PDF Harriet Moynihan Senior Research Fellow, International Law Programme @HarrietMoyniha9 2019-11-29-Intl-Law-Cyberattacks.jpg A computer hacked by a virus known as Petya. The Petya ransomware cyberattack hit computers of Russian and Ukrainian companies on 27 June 2017. Photo: Getty Images. SummaryThe vast majority of state-to-state cyberattacks consist of persistent, low-level intrusions that take place below the threshold of use of force. International law, including the principle of non-intervention in another state’s internal affairs and the principle of sovereignty, applies to these cyber operations.It is not clear whether any unauthorized cyber intrusion would violate the target state’s sovereignty, or whether there is a threshold in operation. While some would like to set limits by reference to effects of the cyber activity, at this time such limits are not reflected in customary international law. The assessment of whether sovereignty has been violated therefore has to be made on a case by case basis, if no other more specific rules of international law apply.In due course, further state practice and opinio iuris may give rise to an emerging cyber-specific understanding of sovereignty, just as specific rules deriving from the sovereignty principle have crystallized in other areas of international law.Before a principle of due diligence can be invoked in the cyber context, further work is needed by states to agree upon rules as to what might be expected of a state in this context.The principle of non-intervention applies to a state’s cyber operations as it does to other state activities. It consists of coercive behaviour by one state that deprives the target state of its free will in relation to the exercise of its sovereign functions in order to compel an outcome in, or conduct with respect to, a matter reserved to the target state.In practice, activities that contravene the non-intervention principle and activities that violates sovereignty will often overlap.In order to reach agreement on how international law applies to states’ cyber operations below the level of use of force, states should put their views on record, where possible giving examples of when they consider that an obligation may be breached, as states such as the UK, Australia, France and the Netherlands have done.Further discussion between states should focus on how the rules apply to practical examples of state-sponsored cyber operations. There is likely to be more commonality about specific applications of the law than there is about abstract principles.The prospects of a general treaty in this area are still far off. In due course, there may be benefit in considering limited rules, for example on due diligence and a prohibition on attacking critical infrastructure, before tackling broad principles. Department/project International Law Programme, Cyber, Sovereignty and Human Rights Full Article
pli Developments and Applications of Functional Protein Microarrays By feedproxy.google.com Published On :: 2020-04-17 Guan-Da SyuApr 17, 2020; 0:R120.001936v1-mcp.R120.001936Review Full Article
pli Immediate adaptation analysis implicates BCL6 as an EGFR-TKI combination therapy target in NSCLC By feedproxy.google.com Published On :: 2020-03-31 Yan Zhou TranMar 31, 2020; 0:RA120.002036v1-mcp.RA120.002036Research Full Article
pli Discovery of a Redox Thiol Switch: Implications for Cellular Energy Metabolism By feedproxy.google.com Published On :: 2020-05-01 Xing-Huang GaoMay 1, 2020; 19:852-870Research Full Article
pli Compliance Checklists No Longer Required at Initial Manuscript Submission By feedproxy.google.com Published On :: 2020-04-01 Alma L. BurlingameApr 1, 2020; 19:571-571Editorial Full Article
pli An Improved Boosting to Amplify Signal with Isobaric Labeling (iBASIL) Strategy for Precise Quantitative Single-cell Proteomics By feedproxy.google.com Published On :: 2020-05-01 Chia-Feng TsaiMay 1, 2020; 19:828-838Research Full Article
pli The Implications of Drone Proliferation in Europe By feedproxy.google.com Published On :: Wed, 01 May 2019 10:55:01 +0000 Invitation Only Research Event 20 May 2019 - 9:30am to 21 May 2019 - 12:30pm Chatham House, London Several countries in Europe are currently developing, increasing or arming their drone capabilities. This increase in drone capability is taking place through procurement by individual states, bilateral projects – such as the French-German Future Combat Air Systems – and multinational efforts that include the development of the Eurodrone – a project by Germany, France, Italy and Spain – and the nEUROn which involves France, Greece, Italy, Spain, Sweden and Switzerland. In addition, the EU has recently approved the European Defence Fund which, along with funds for joint development of defence equipment and technology and for defence research, also includes direct funding to support the development of the Eurodrone. Other recent developments include the UK obtaining the MQ−9B SkyGuardian – an updated variant of the MQ-9 Reaper – and Germany signing a leasing agreement for the Israeli-made Heron TP. Also, in March 2019, the US State Department approved the sale of the MQ-9B SkyGuardian to Belgium and announced the provision of MQ-9 Reaper drones to the Netherlands. While the UK and France are the only countries in Europe so far to possess armed drones, Italy is on track to acquire armed drones in the near future. However, out of the European countries currently seeking to obtain unarmed drones – including Spain, Poland and Greece – only Switzerland has so far ruled out weaponizing its drones in the future. This Chatham House workshop will examine key issues pertaining to drone proliferation in Europe including: The risks and challenges of the increasing number and arming of drones. The risks for countries of not doing so in terms of geostrategic interests and the future battlefield.Opportunities for developing common standards on drone transfers and deployment across EU member states.Sharing and cooperation on drone use.What legal and policy implications might arise for European states as a result.With Brexit on the horizon, participants will also consider what impact this may have on future drone developments in Europe.Attendance at this event is by invitation only. Nilza Amaral Project Manager, International Security Programme Email Department/project International Security Programme, Policy Implications of Armed Drone Use Full Article
pli Tackle the ‘Splinternet’ By feedproxy.google.com Published On :: Fri, 31 May 2019 14:57:47 +0000 12 June 2019 Marjorie Buchser Executive Director, Digital Society Initiative @Marjorie_BU LinkedIn Joyce Hakmeh Senior Research Fellow, International Security Programme; Co-Editor, Journal of Cyber Policy @joycehakmeh LinkedIn Competing governance visions are impairing efforts to regulate the digital space. To limit the spread of repressive models, policymakers in the West and elsewhere need to ensure the benefits of an open and well-run system are more widely communicated. 20150415GCIG-1.jpg The development of governance in a wide range of digital spheres – from cyberspace to internet infrastructure to emerging technologies such as artificial intelligence (AI) – is failing to match rapid advances in technical capabilities or the rise in security threats. This is leaving serious regulatory gaps, which means that instruments and mechanisms essential for protecting privacy and data, tackling cybercrime or establishing common ethical standards for AI, among many other imperatives, remain largely inadequate.A starting point for effective policy formation is to recognize the essential complexity of the digital landscape, and the consequent importance of creating a ‘common language’ for multiple stakeholders (including under-represented actors such as smaller and/or developing countries, civil society and non-for-profit organizations).The world’s evolving technological infrastructure is not a monolithic creation. In practice, it encompasses a highly diverse mix of elements – so-called ‘high-tech domains’,[1] hardware, systems, algorithms, protocols and standards – designed by a plethora of private companies, public bodies and non-profit organizations.[2] Varying cultural, economic and political assumptions have shaped where and which technologies have been deployed so far, and how they have been implemented.Perhaps the most notable trend is the proliferation of techno-national regimes and private-sector policy initiatives, reflecting often-incompatible doctrines in respect of privacy, openness, inclusion and state control. Beyond governments, the interests and ambitions of prominent multinationals (notably the so-called ‘GAFAM’ tech giants in the West, and their ‘BATX’ counterparts in China)[3] are significant factors feeding into this debate.Cyberspace and AI – two case studiesTwo particular case studies highlight the essential challenges that this evolving – and, in some respects, still largely unformed – policy landscape presents. The first relates to cyberspace. Since 1998, Russia has established itself as a strong voice in the cyberspace governance debate – calling for a better understanding, at the UN level, of ICT developments and their impact on international security.The country’s efforts were a precursor to the establishment in 2004 of a series of UN Groups of Governmental Experts (GGEs), aimed at strengthening the security of global information and telecommunications systems. These groups initially succeeded in developing common rules, norms and principles around some key issues. For example, the 2013 GGE meeting recognized that international law applies to the digital space and that its enforcement is essential for a secure, peaceful and accessible ICT environment.However, the GGE process stalled in 2017, primarily due to fundamental disagreements between countries on the right to self-defence and on the applicability of international humanitarian law to cyber conflicts. The breakdown in talks reflected, in particular, the divide between two principal techno-ideological blocs: one, led by the US, the EU and like-minded states, advocating a global and open approach to the digital space; the other, led mainly by Russia and China, emphasizing a sovereignty-and-control model.The divide was arguably entrenched in December 2018, with the passage of two resolutions at the UN General Assembly. A resolution sponsored by Russia created a working group to identify new norms and look into establishing regular institutional dialogue.At the same time, a US-sponsored resolution established a GGE tasked, in part, with identifying ways to promote compliance with existing cyber norms. Each resolution was in line with its respective promoter’s stance on cyberspace. While some observers considered these resolutions potentially complementary, others saw in them competing campaigns to cement a preferred model as the global norm. Outside the UN, there have also been dozens of multilateral and bilateral accords with similar objectives, led by diverse stakeholders.[4]The second case study concerns AI. Emerging policy in this sector suffers from an absence of global standards and a proliferation of proposed regulatory models. The potential ability of AI to deliver unprecedented capabilities in so many areas of human activity – from automation and language applications to warfare – means that it has become an area of intense rivalry between governments seeking technical and ideological leadership of this field.China has by far the most ambitious programme. In 2017, its government released a three-step strategy for achieving global dominance in AI by 2030. Beijing aims to create an AI industry worth about RMB 1 trillion ($150 billion)[5] and is pushing for greater use of AI in areas ranging from military applications to the development of smart cities. Elsewhere, the US administration has issued an executive order on ‘maintaining American leadership on AI’.On the other side of the Atlantic, at least 15 European countries (including France, Germany and the UK) have set up national AI plans. Although these strategies are essential for the development of policy infrastructure, they are country-specific and offer little in terms of global coordination. Ominously, greater inclusion and cooperation are scarcely mentioned, and remain the least prioritized policy areas.[6]Competing multilateral frameworks on AI have also emerged. In April 2019, the European Commission published its ethics guidelines for trustworthy AI. Ministers from Nordic countries[7] recently issued their own declaration on collaboration in ‘AI in the Nordic-Baltic region’. And leaders of the G7 have committed to the ‘Charlevoix Common Vision for the Future of Artificial Intelligence’, which includes 12 guiding principles to ensure ‘human-centric AI’.More recently, OECD member countries adopted a set of joint recommendations on AI. While nations outside the OECD were welcomed into the coalition – with Argentina, Brazil and Colombia adhering to the OECD’s newly established principles – China, India and Russia have yet to join the discussion. Despite their global aspirations, these emerging groups remain largely G7-led or EU-centric, and again highlight the divide between parallel models. The importance of ‘swing states’No clear winner has emerged from among the competing visions for cyberspace and AI governance, nor indeed from the similar contests for doctrinal control in other digital domains. Concerns are rising that a so-called ‘splinternet’ may be inevitable – in which the internet fragments into separate open and closed spheres and cyber governance is similarly divided.Each ideological camp is trying to build a critical mass of support by recruiting undecided states to its cause. Often referred to as ‘swing states’, the targets of these overtures are still in the process of developing their digital infrastructure and determining which regulatory and ethical frameworks they will apply. Yet the policy choices made by these countries could have a major influence on the direction of international digital governance in the future.India offers a case in point. For now, the country seems to have chosen a versatile approach, engaging with actors on various sides of the policy debate, depending on the technology governance domain. On the one hand, its draft Personal Data Protection Bill mirrors principles in the EU’s General Data Protection Regulation (GDPR), suggesting a potential preference for the Western approach to data security.However, in 2018, India was the leading country in terms of internet shutdowns, with over 100 reported incidents.[8] India has also chosen to collaborate outside the principal ideological blocs, as evidenced by an AI partnership it has entered into with the UAE. At the UN level, India has taken positions that support both blocs, although more often favouring the sovereignty-and-control approach.Principles for rule-makingSovereign nations have asserted aspirations for technological dominance with little heed to the cross-border implications of their policies. This drift towards a digital infrastructure fragmented by national regulation has potentially far-reaching societal and political consequences – and implies an urgent need for coordinated rule-making at the international level.The lack of standards and enforcement mechanisms has created instability and increased vulnerabilities in democratic systems. In recent years, liberal democracies have been targeted by malevolent intrusions in their election systems and media sectors, and their critical infrastructure has come under increased threat. If Western nations cannot align around, and enforce, a normative framework that seeks to preserve individual privacy, openness and accountability through regulation, a growing number of governments may be drawn towards repressive forms of governance.To mitigate those risks, efforts to negotiate a rules-based international order for the digital space should keep several guiding principles in mind. One is the importance of developing joint standards, as well as the need for consistent messaging towards the emerging cohort of engaged ‘swing states’. Another is the need for persistence in ensuring that the political, civic and economic benefits associated with a more open and well-regulated digital sphere are made clear to governments and citizens everywhere.Countries advocating an open, free and secure model should take the lead in embracing and promoting a common affirmative model – one that draws on human rights principles (such as the rights to freedom of opinion, freedom of expression and privacy) and expands their applications to the digital space. Specific rules on cyberspace and technology use need to include pragmatic policy ideas and models of implementation. As this regulatory corpus develops, rules should be adapted to reflect informed consideration of economic and social priorities and attitudes, and to keep pace with what is possible technologically.[9]What needs to happenDemystifying the salient issues, consistent messaging and the creation of a common discourse are key to advancing a well-informed debate on global digital governance.The benefits associated with open and well-regulated digital governance should be clearly presented to all stakeholders. For example, the link between sustainable development, respect for human rights and a secure, free and open internet should take priority in the debate with developing countries.International norms need to be updated and reinterpreted to assert the primacy of non-harmful applications of technologies and digital interactions.This process should follow a multi-stakeholder approach to include under-represented actors, such as developing countries and civil society, and should adopt a gender-balanced approach.The design of rules, standards and norms needs to take into account the essentially transnational nature of digital technologies. Rules, standards and norms need to be applicable consistently across jurisdictions.Developing countries should be supported in building their digital infrastructure, and in increasing the capacity of governments and citizens to make informed policy decisions on technology.Notes[1] Including but not limited to AI and an associated group of digital technologies, such as the Internet of Things, big data, blockchain, quantum computing, advanced robotics, self-driving cars and other autonomous systems, additive manufacturing (i.e. 3D printing), social networks, the new generation of biotechnology, and genetic engineering.[2] O’Hara, K. and Hall, W. (2018), Four Internets: The Geopolitics of Digital Governance, Centre for International Governance Innovation, CIGI Paper No. 206, https://www.cigionline.org/publications/four-internets-geopolitics-digital-governance.[3] GAFAM = Google, Amazon, Facebook, Apple and Microsoft; BATX = Baidu, Alibaba, Tencent and Xiaomi.[4] Carnegie Endowment for International Peace (undated), ‘Cyber Norms Index’, https://carnegieendowment.org/publications/interactive/cybernorms (accessed 30 May 2019).[5] Future of Life Institute (undated), ‘AI Policy – China’, https://futureoflife.org/ai-policy-china?cn-reloaded=1.[6] Dutton, T. (2018), ‘Building an AI World: Report on National and Regional AI Strategies’, 6 December 2018, CIFAR, https://www.cifar.ca/cifarnews/2018/12/06/building-an-ai-world-report-on-national-and-regional-ai-strategies.[7] Including Denmark, Estonia, Finland, the Faroe Islands, Iceland, Latvia, Lithuania, Norway, Sweden and the Åland Islands.[8] Shahbaz, A. (2018), Freedom on the Net 2018: The Rise of Digital Authoritarianism, Freedom House, October 2018, https://freedomhouse.org/report/freedom-net/freedom-net-2018/rise-digital-authoritarianism.[9] Google White Paper (2018), Perspectives on Issues in AI Governance, https://www.blog.google/outreach-initiatives/public-policy/engaging-policy-stakeholders-issues-ai-governance/.This essay was produced for the 2019 edition of Chatham House Expert Perspectives – our annual survey of risks and opportunities in global affairs – in which our researchers identify areas where the current sets of rules, institutions and mechanisms for peaceful international cooperation are falling short, and present ideas for reform and modernization. Full Article
pli Policy Implications of Armed Drone Use By feedproxy.google.com Published On :: Thu, 01 Aug 2019 13:15:02 +0000 This project brings together experts on the use of armed drones, including current and former military officials, academia, think-tanks and NGOs, to discuss and exchange perspectives based on their different experiences, with the aim of sharing knowledge and increasing understanding on these issues, and to inform and provide input into the European debate. With the increased use of armed drones in recent years, ethical and legal concerns have been raised in regard to civilian casualties, secrecy and lack of transparency and accountability for drone strikes.This project brings together experts on the use of armed drones, including current and former military officials, academia, think-tanks and NGOs, to discuss and exchange perspectives based on their different experiences, with the aim of sharing knowledge and increasing understanding on these issues, and to inform and provide input into the European debate. The experts explore the issues and controversies surrounding the use of drones outside formal armed conflict and study the broader policy implications in detail, particularly with regards to what this means for the UK and other European countries.Building on the findings from the workshops, this project will hold a simulation exercise to stress test critical areas of concern around the use of armed drones that are relevant for the UK and other EU member states.The discussions and the simulation exercise will provide opportunities for policy input on areas of mutual concern and feed into practical policy recommendations on the use of armed drones.This project builds on previous work on armed drones by the International Security Department and is funded by the Open Society Foundations. Past events (2) Research Event The Implications of Drone Proliferation in Europe 20 May 2019 Research Event Transparency and Accountability for Drone Use: European Approaches 11 March 2019 More on Policy Implications of Armed Drone Use Full Article
pli AI-driven Personalization in Digital Media: Political and Societal Implications By feedproxy.google.com Published On :: Mon, 02 Dec 2019 12:18:52 +0000 2 December 2019 The fallout from disinformation and online manipulation strategies have alerted Western democracies to the novel, nuanced vulnerabilities of our information society. This paper outlines the implications of the adoption of AI by the the legacy media, as well as by the new media, focusing on personalization. Download PDF Sophia Ignatidou Academy Associate, International Security Programme @SophiaIgnatidou LinkedIn 2019-12-02-AI-Driven-Personalization-small.jpg The Reuters and other news apps seen on an iPhone, 29 January 2019. Photo: Getty Images. SummaryMachine learning (ML)-driven personalization is fast expanding from social media to the wider information space, encompassing legacy media, multinational conglomerates and digital-native publishers: however, this is happening within a regulatory and oversight vacuum that needs to be addressed as a matter of urgency.Mass-scale adoption of personalization in communication has serious implications for human rights, societal resilience and political security. Data protection, privacy and wrongful discrimination, as well as freedom of opinion and of expression, are some of the areas impacted by this technological transformation.Artificial intelligence (AI) and its ML subset are novel technologies that demand novel ways of approaching oversight, monitoring and analysis. Policymakers, regulators, media professionals and engineers need to be able to conceptualize issues in an interdisciplinary way that is appropriate for sociotechnical systems.Funding needs to be allocated to research into human–computer interaction in information environments, data infrastructure, technology market trends, and the broader impact of ML systems within the communication sector.Although global, high-level ethical frameworks for AI are welcome, they are no substitute for domain- and context-specific codes of ethics. Legacy media and digital-native publishers need to overhaul their editorial codes to make them fit for purpose in a digital ecosystem transformed by ML. Journalistic principles need to be reformulated and refined in the current informational context in order to efficiently inform the ML models built for personalized communication.Codes of ethics will not by themselves be enough, so current regulatory and legislative frameworks as they relate to media need to be reassessed. Media regulators need to develop their in-house capacity for thorough research and monitoring into ML systems, and – when appropriate –proportionate sanctions for actors found to be employing such systems towards malign ends. Collaboration with data protection authorities, competition authorities and national electoral commissions is paramount for preserving the integrity of elections and of a political discourse grounded on democratic principles.Upskilling senior managers and editorial teams is fundamental if media professionals are to be able to engage meaningfully and effectively with data scientists and AI engineers. Department/project International Security Programme, Internet Governance Full Article
pli Webinar: Implications of the COVID-19 Pandemic for African Economies and Development By feedproxy.google.com Published On :: Wed, 15 Apr 2020 10:10:01 +0000 Research Event 21 April 2020 - 4:30pm to 5:30pm Event participants Dr Hafez Ghanem, Vice President for Africa, World BankChair: Elizabeth Donnelly, Deputy Director, Africa Programme, Chatham House Dr Hafez Ghanem discusses the implications of the COVID-19 pandemic for African economies and their development and poverty reduction efforts, and assesses the priorities and obstacles for establishing a comprehensive response to the crisis. While the acute strain placed on health systems by the COVID-19 pandemic is already in evidence, the long-term economic fallout from the crisis is yet to fully manifest. For Africa it is the economic impact that may leave the most enduring legacy: from the direct expense of measures to treat, detect and reduce the spread of the virus; to the indirect costs of domestic lockdown measures, global supply chain disruptions and plummeting commodity prices. As decision-makers globally start to plan for the scale of this economic shock, strategizing in and on Africa to meet the challenge will require unprecedented planning and commitment - and will need to be matched by support from international partners to enable long-term recovery. Department/project Africa Programme, Inclusive Economic Growth, Governance and Technology Hanna Desta Programme Assistant, Africa Programme Email Full Article
pli Webinar: Implications of the COVID-19 Pandemic for Food Security and Resilience in Africa By feedproxy.google.com Published On :: Wed, 15 Apr 2020 10:15:01 +0000 Research Event 23 April 2020 - 1:00pm to 2:00pm Event participants Dr Arif Husain, Chief Economist and Director of Research, Assessment and Monitoring, United Nations World Food ProgrammeRespondent: Dr Leena Koni Hoffmann, Associate Fellow, Africa Programme, Chatham HouseChair: Professor Tim Benton, Research Director, Emerging Risks; Director, Energy, Environment and Resources Programme, Chatham House Dr Arif Husain gives his assessment of the potential impact that the COVID-19 pandemic will have on food security in Africa and what can be done to prevent a food security emergency. Linked to the immediate public health consequences of the COVID-19 pandemic are those of economic and food security, particularly significant for low- and middle-income countries. Currently more than 821 million people globally go hungry, with 100 million of those suffering acute hunger, and this will worsen if the evolving economic emergency becomes a food security emergency. Sub-Saharan African countries rely on trade for food security and for revenue; they imported more than 40 million tons of cereal from around the world in 2018, according to the World Food Programme (WFP). The region faces stark new challenges due to the pandemic.This event launches the WFP paper COVID-19: Potential impact on the world’s poorest people. Department/project Africa Programme Hanna Desta Programme Assistant, Africa Programme Email Full Article
pli Webinar: Implications of the COVID-19 Pandemic for African Elections and Democracy By feedproxy.google.com Published On :: Fri, 01 May 2020 15:10:01 +0000 Research Event 6 May 2020 - 2:30pm to 3:30pm Event participants Dr Christopher Fomunyoh, Senior Associate and Regional Director for Central and West Africa, National Democratic Institute (NDI)Chair: Elizabeth Donnelly, Deputy Director, Africa Programme, Chatham House 2020 was anticipated to be a year of landmark elections across Africa, including general elections scheduled in Somalia and Ethiopia – countries at critical junctures in their transitions to electoral democracy – as well as a re-run of annulled presidential elections in Malawi. The COVID-19 pandemic has created new challenges for African countries seeking to hold elections or further democratization – including the practicalities of adapting containment measures to electoral processes in the context of strained financial and logistical resources. It may also be used as a pretext for the pursuit of repressive legislation and constitutional amendments to preclude elections or bolster authoritarianism, compounded by new constraints on accountability mechanisms such as election observation missions. At this event, Dr Christopher Fomunyoh discusses the likely impact of the COVID-19 pandemic on elections and democracy in various African countries, as well as responses and measures to meet the multifaceted challenges posed. Department/project Africa Programme, Elections and political systems Hanna Desta Programme Assistant, Africa Programme Email Full Article
pli The Challenge of Classifying Metastatic Cell Properties by Molecular Profiling Exemplified with Cutaneous Melanoma Cells and Their Cerebral Metastasis from Patient Derived Mouse Xenografts [Research] By feedproxy.google.com Published On :: 2020-03-01T00:05:26-08:00 The prediction of metastatic properties from molecular analyses still poses a major challenge. Here we aimed at the classification of metastasis-related cell properties by proteome profiling making use of cutaneous and brain-metastasizing variants from single melanomas sharing the same genetic ancestry. Previous experiments demonstrated that cultured cells derived from these xenografted variants maintain a stable phenotype associated with a differential metastatic behavior: The brain metastasizing variants produce more spontaneous micro-metastases than the corresponding cutaneous variants. Four corresponding pairs of cutaneous and metastatic cells were obtained from four individual patients, resulting in eight cell-lines presently investigated. Label free proteome profiling revealed significant differences between corresponding pairs of cutaneous and cerebellar metastases from the same patient. Indeed, each brain metastasizing variant expressed several apparently metastasis-associated proteomic alterations as compared with the corresponding cutaneous variant. Among the differentially expressed proteins we identified cell adhesion molecules, immune regulators, epithelial to mesenchymal transition markers, stem cell markers, redox regulators and cytokines. Similar results were observed regarding eicosanoids, considered relevant for metastasis, such as PGE2 and 12-HETE. Multiparametric morphological analysis of cells also revealed no characteristic alterations associated with the cutaneous and brain metastasis variants. However, no correct classification regarding metastatic potential was yet possible with the present data. We thus concluded that molecular profiling is able to classify cells according to known functional categories but is not yet able to predict relevant cell properties emerging from networks consisting of many interconnected molecules. The presently observed broad diversity of molecular patterns, irrespective of restricting to one tumor type and two main classes of metastasis, highlights the important need to develop meta-analysis strategies to predict cell properties from molecular profiling data. Such base knowledge will greatly support future individualized precision medicine approaches. Full Article
pli Compliance Checklists No Longer Required at Initial Manuscript Submission [Editorials] By feedproxy.google.com Published On :: 2020-04-01T00:05:32-07:00 Full Article
pli Discovery of a Redox Thiol Switch: Implications for Cellular Energy Metabolism [Research] By feedproxy.google.com Published On :: 2020-05-01T00:05:26-07:00 The redox-based modifications of cysteine residues in proteins regulate their function in many biological processes. The gas molecule H2S has been shown to persulfidate redox sensitive cysteine residues resulting in an H2S-modified proteome known as the sulfhydrome. Tandem Mass Tags (TMT) multiplexing strategies for large-scale proteomic analyses have become increasingly prevalent in detecting cysteine modifications. Here we developed a TMT-based proteomics approach for selectively trapping and tagging cysteine persulfides in the cellular proteomes. We revealed the natural protein sulfhydrome of two human cell lines, and identified insulin as a novel substrate in pancreatic beta cells. Moreover, we showed that under oxidative stress conditions, increased H2S can target enzymes involved in energy metabolism by switching specific cysteine modifications to persulfides. Specifically, we discovered a Redox Thiol Switch, from protein S-glutathioinylation to S-persulfidation (RTSGS). We propose that the RTSGS from S-glutathioinylation to S-persulfidation is a potential mechanism to fine tune cellular energy metabolism in response to different levels of oxidative stress. Full Article
pli An Improved Boosting to Amplify Signal with Isobaric Labeling (iBASIL) Strategy for Precise Quantitative Single-cell Proteomics [Research] By feedproxy.google.com Published On :: 2020-05-01T00:05:26-07:00 Mass spectrometry (MS)-based proteomics has great potential for overcoming the limitations of antibody-based immunoassays for antibody-independent, comprehensive, and quantitative proteomic analysis of single cells. Indeed, recent advances in nanoscale sample preparation have enabled effective processing of single cells. In particular, the concept of using boosting/carrier channels in isobaric labeling to increase the sensitivity in MS detection has also been increasingly used for quantitative proteomic analysis of small-sized samples including single cells. However, the full potential of such boosting/carrier approaches has not been significantly explored, nor has the resulting quantitation quality been carefully evaluated. Herein, we have further evaluated and optimized our recent boosting to amplify signal with isobaric labeling (BASIL) approach, originally developed for quantifying phosphorylation in small number of cells, for highly effective analysis of proteins in single cells. This improved BASIL (iBASIL) approach enables reliable quantitative single-cell proteomics analysis with greater proteome coverage by carefully controlling the boosting-to-sample ratio (e.g. in general <100x) and optimizing MS automatic gain control (AGC) and ion injection time settings in MS/MS analysis (e.g. 5E5 and 300 ms, respectively, which is significantly higher than that used in typical bulk analysis). By coupling with a nanodroplet-based single cell preparation (nanoPOTS) platform, iBASIL enabled identification of ~2500 proteins and precise quantification of ~1500 proteins in the analysis of 104 FACS-isolated single cells, with the resulting protein profiles robustly clustering the cells from three different acute myeloid leukemia cell lines. This study highlights the importance of carefully evaluating and optimizing the boosting ratios and MS data acquisition conditions for achieving robust, comprehensive proteomic analysis of single cells. Full Article
pli The mitochondrial protein PGAM5 suppresses energy consumption in brown adipocytes by repressing expression of uncoupling protein 1 [Metabolism] By feedproxy.google.com Published On :: 2020-04-24T06:08:45-07:00 Accumulating evidence suggests that brown adipose tissue (BAT) is a potential therapeutic target for managing obesity and related diseases. PGAM family member 5, mitochondrial serine/threonine protein phosphatase (PGAM5), is a protein phosphatase that resides in the mitochondria and regulates many biological processes, including cell death, mitophagy, and immune responses. Because BAT is a mitochondria-rich tissue, we have hypothesized that PGAM5 has a physiological function in BAT. We previously reported that PGAM5-knockout (KO) mice are resistant to severe metabolic stress. Importantly, lipid accumulation is suppressed in PGAM5-KO BAT, even under unstressed conditions, raising the possibility that PGAM5 deficiency stimulates lipid consumption. However, the mechanism underlying this observation is undetermined. Here, using an array of biochemical approaches, including quantitative RT-PCR, immunoblotting, and oxygen consumption assays, we show that PGAM5 negatively regulates energy expenditure in brown adipocytes. We found that PGAM5-KO brown adipocytes have an enhanced oxygen consumption rate and increased expression of uncoupling protein 1 (UCP1), a protein that increases energy consumption in the mitochondria. Mechanistically, we found that PGAM5 phosphatase activity and intramembrane cleavage are required for suppression of UCP1 activity. Furthermore, utilizing a genome-wide siRNA screen in HeLa cells to search for regulators of PGAM5 cleavage, we identified a set of candidate genes, including phosphatidylserine decarboxylase (PISD), which catalyzes the formation of phosphatidylethanolamine at the mitochondrial membrane. Taken together, these results indicate that PGAM5 suppresses mitochondrial energy expenditure by down-regulating UCP1 expression in brown adipocytes and that its phosphatase activity and intramembrane cleavage are required for UCP1 suppression. Full Article
pli Latin America: Shifting Political Dynamics and the Implications for the Global System By feedproxy.google.com Published On :: Mon, 09 Sep 2019 13:20:01 +0000 Corporate Members Event Nominees Breakfast Briefing Partners and Major Corporates 26 September 2019 - 8:00am to 9:15am Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Christopher Sabatini, Senior Research Fellow for Latin America, US and the Americas Programme, Chatham House In the past 12 months, a series of highly-anticipated elections throughout Latin America have demonstrated that deep political shifts are underway. This has occurred at a time when economic growth across the region is slowing and a number of countries face growing social crises. How will these political shifts and social challenges affect growth and foreign direct investment (FDI)?Christopher Sabatini will outline how the shifting political dynamics across the region have, and will, continue to influence trade and investment in the coming months and years across the continent and what regional developments mean for the international community in light of Brexit, global trade tensions and the rise of China and other emerging powers. How can businesses and governments provide a platform to overcome mutual obstacles faced by Latin American investors? What impact have Chinese development projects had in Latin America? And are medium and small economies in Latin America vulnerable to a global trade war?This event is only open to Major Corporate Member and Partner organizations of Chatham House. If you would like to register your interest, please RSVP to Linda Bedford. We will contact you to confirm your attendance.To enable as open a debate as possible, this event will be held under the Chatham House Rule. Members Events Team Email Full Article
pli Immediate adaptation analysis implicates BCL6 as an EGFR-TKI combination therapy target in NSCLC [Research] By feedproxy.google.com Published On :: 2020-03-31T09:35:18-07:00 Drug resistance is a major obstacle to curative cancer therapies, and increased understanding of the molecular events contributing to resistance would enable better prediction of therapy response, as well as contribute to new targets for combination therapy. Here we have analyzed the early molecular response to epidermal growth factor receptor (EGFR) inhibition using RNA sequencing data covering 13 486 genes and mass spectrometry data covering 10 138 proteins. This analysis revealed a massive response to EGFR inhibition already within the first 24 hours, including significant regulation of hundreds of genes known to control downstream signaling, such as transcription factors, kinases, phosphatases and ubiquitin E3-ligases. Importantly, this response included upregulation of key genes in multiple oncogenic signaling pathways that promote proliferation and survival, such as ERBB3, FGFR2, JAK3 and BCL6, indicating an early adaptive response to EGFR inhibition. Using a library of more than 500 approved and experimental compounds in a combination therapy screen, we could show that several kinase inhibitors with targets including JAK3 and FGFR2 increased the response to EGFR inhibitors. Further, we investigated the functional impact of BCL6 upregulation in response to EGFR inhibition using siRNA-based silencing of BCL6. Proteomics profiling revealed that BCL6 inhibited transcription of multiple target genes including p53, resulting in reduced apoptosis which implicates BCL6 upregulation as a new EGFR inhibitor treatment escape mechanism. Finally, we demonstrate that combined treatment targeting both EGFR and BCL6 act synergistically in killing lung cancer cells. In conclusion, or data indicates that multiple different adaptive mechanisms may act in concert to blunt the cellular impact of EGFR inhibition, and we suggest BCL6 as a potential target for EGFR inhibitor-based combination therapy. Full Article
pli Developments and Applications of Functional Protein Microarrays [Review] By feedproxy.google.com Published On :: 2020-04-17T09:38:19-07:00 Protein microarrays are crucial tools in the study of proteins in an unbiased, high-throughput manner, as they allow for characterization of up to thousands of individually purified proteins in parallel. The adaptability of this technology has enabled its use in a wide variety of applications, including the study of proteome-wide molecular interactions, analysis of post-translational modifications, identification of novel drug targets, and examination of pathogen-host interactions. In addition, the technology has also been shown to be useful in profiling antibody specificity, as well as in the discovery of novel biomarkers, especially for autoimmune diseases and cancers. In this review, we will summarize the developments that have been made in protein microarray technology in both in basic and translational research over the past decade. We will also introduce a novel membrane protein array, the GPCR-VirD array, and discuss the future directions of functional protein microarrays. Full Article
pli The Changing Nature of Russia’s Military Strategy and Its Tactical Application By feedproxy.google.com Published On :: Mon, 14 Oct 2019 10:15:01 +0000 Invitation Only Research Event 12 November 2019 - 4:00pm to 5:30pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Oscar Jonsson, Director, Stockholm Free World Forum (Frivärld)Mathieu Boulègue, Research Fellow, Russia and Eurasia Programme, Chatham HouseChair: Alice Billon-Galland, Research Associate, Europe Programme, Chatham House Russia’s military strategy is increasingly blurring the boundaries between war and peace. As the nature of warfare changes, the Kremlin is adapting its strategies to pursue conflict, especially through non-military means - below the threshold of armed violence. Russian military tactics are often mistaken for strategy in the West. Oscar Jonson, author of The Russian Understanding of War, will talk through this debate and explore how the Russian leadership now understands military strategy in the context of modern warfare. Mathieu Boulègue will address the more operational aspects of contemporary warfare for Russia, notably grey zone operations. Department/project Russia and Eurasia Programme Anna Morgan Administrator, Ukraine Forum +44 (0)20 7389 3274 Email Full Article
pli Russia's Imperial Nostalgia: Implications for the West By feedproxy.google.com Published On :: Thu, 16 Jan 2020 14:50:01 +0000 Invitation Only Research Event 31 January 2020 - 11:00am to 12:30pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Sergei Medvedev, Professor, Faculty of Social Sciences, Higher School of Economics (Moscow) Vladimir Putin’s goal of restoring Russia’s status as a great power has led to an aggressive foreign policy and confrontation with its immediate neighbours as well as Western countries.Sergei Medvedev, author of The Return of the Russian Leviathan, will discuss the forces shaping Russian politics and society today as well as how a nostalgia for empire – still widespread in contemporary Russia - has shaped Moscow’s foreign policy.Attendance at this event is by invitation only. Event attributes Chatham House Rule Department/project Russia and Eurasia Programme, Russian Foreign Policy, The Drivers of Russian Foreign Policy Anna Morgan Administrator, Ukraine Forum +44 (0)20 7389 3274 Email Full Article
pli Crimea’s Occupation Exemplifies the Threat of Attacks on Cultural Heritage By feedproxy.google.com Published On :: Tue, 04 Feb 2020 14:24:47 +0000 4 February 2020 Kateryna Busol Robert Bosch Stiftung Academy Fellow, Russia and Eurasia Programme @KaterynaBusol LinkedIn Societies, courts and policymakers should have a clearer awareness that assaults against cultural heritage constitute a creeping encroachment on a people’s identity, endangering its very survival. 2020-02-04-Bakhchysarai.jpg 'The destructive reconstruction of the 16th-century Bakhchysarai Palace is being conducted by a team with no experience of cultural sites, in a manner that erodes its authenticity and historical value.' Photo: Getty Images. Violations against cultural property – such as archaeological treasures, artworks, museums or historical sites – can be no less detrimental to the survival of a nation than the physical persecution of its people. These assaults on heritage ensure the hegemony of some nations and distort the imprint of other nations in world history, sometimes to the point of eradication.As contemporary armed conflicts in Syria, Ukraine and Yemen demonstrate, cultural property violations are not only a matter of the colonial past; they continue to be perpetrated, often in new, intricate ways.Understandably, from a moral perspective, it is more often the suffering of persons, rather than any kind of ‘cultural’ destruction, that receives the most attention from humanitarian aid providers, the media or the courts. Indeed, the extent of the damage caused by an assault on cultural property is not always immediately evident, but the result can be a threat to the survival of a people. This is strikingly exemplified by what is currently happening in Crimea.Ukraine’s Crimean peninsula has been occupied by Russia since February 2014, meaning that, under international law, the two states have been involved in an international armed conflict for the last six years.While much attention has been paid to the alleged war crimes perpetrated by the occupying power, reports by international organizations and the International Criminal Court (ICC) have been less vocal on the issue of cultural property in Crimea. Where they do raise it, they tend to confine their findings to the issue of misappropriation.However, as part of its larger policy of the annexation and Russification of the peninsula and its history, Russia has gone far beyond misappropriation.Crimean artefacts have been transferred to Russia – without security justification or Ukrainian authorization as required by the international law of occupation – to be showcased at exhibitions celebrating Russia’s own cultural heritage. In 2016, the Tretyakov Gallery in Moscow staged its record-breaking Aivazovsky exhibition, which included 38 artworks from the Aivazovsky Museum in the Crimean town of Feodosia.Other ‘cultural’ violations in the region include numerous unsanctioned archaeological excavations, whose findings are often unlawfully exported to Russia or end up on the black market.There is also the example of Russia’s plan to establish a museum of Christianity in Ukraine’s UNESCO World Heritage site, the Ancient City of Tauric Chersonese. This is an indication of Russia’s policy of asserting itself as a bastion of Orthodox Christianity and culture in the Slavic world, with Crimea as one of the centres.The harmful effects of Russia’s destructive cultural property policy can be seen in the situation of the Crimean Tatars, Ukraine’s indigenous Muslim people. Already depleted by a Stalin-ordered deportation in 1944 and previously repressed by the Russian Empire, the Crimean Tatars are now facing the destruction of much of the remainder of their heritage.For example, Muslim burial grounds have been demolished to build the Tavrida Highway, which leads to the newly built Kerch Bridge connecting the peninsula to Russia.The destructive reconstruction of the 16th-century Bakhchysarai Palace – the only remaining complete architectural ensemble of the indigenous people, included in the UNESCO World Heritage Tentative List – is another example of how the very identity of the Crimean Tatars is being threatened. This reconstruction is being conducted by a team with no experience of cultural sites, in a manner that erodes its authenticity and historical value – which is precisely as Russia intends.There is a solid body of international and domestic law covering Russia’s treatment of Crimea’s cultural property.Under the 1954 Hague Convention for the Protection of Cultural Property in the Event of Armed Conflict – ratified by both Ukraine and Russia – the occupying power must facilitate the safeguarding efforts of the national authorities in occupied territories. States parties must prevent any vandalism or misappropriation of cultural property, and, according to the first protocol of the convention, the occupying power is required to prevent any export of artefacts from the occupied territory.The 1907 Hague Regulations and the 1949 Fourth Geneva Convention confirm that the authentic domestic legislation continues to apply in occupied territories. This leaves Russia with no excuse for non-compliance with Ukraine’s cultural property laws and imposing its own rules unless absolutely necessary.Besides, both Ukrainian and Russian criminal codes penalise pillage in occupied territory, as well as unsanctioned archaeological excavations. As an occupying power, Russia must not just abstain from such wrongdoings in Crimea, but also duly investigate and prosecute the alleged misconduct.The clarity of the international legal situation demonstrates that no exhibitions in continental Russia and no archaeological excavations which are not sanctioned by Ukraine can be justified. Likewise, any renovation or use of cultural sites, especially those on permanent or tentative UNESCO lists, must only be conducted pursuant to consultancy with and approval of the Ukrainian authorities.But the resonance of the Crimean case goes beyond law and touches on issues of the very survival of a people. The Soviet deportation of the Crimean Tatars in 1944 did not only result in the deaths of individuals. Their footprints in Crimea have been gradually erased by baseless treason charges, the long exile of the indigenous community from their native lands and ongoing persecution.First the Soviet Union and now Russia have targeted the Crimean Tatars’ cultural heritage to undermine their significance in the general historical narrative, making attempts to preserve or celebrate this culture seem futile. Russia is thus imposing its own historical and political hegemony at the expense of the Crimean Tatar and Ukrainian layers of Crimean history.As exemplified by occupied Crimea, the manipulation and exploitation of cultural heritage can serve an occupying power’s wider policies of appropriating history and asserting its own dominance. Domestic cultural property proceedings are challenging due to the lack of access to the occupied territory, but they should still be pursued.More effort is needed in the following areas: case prioritization; informing the documenters of alleged violations about the spectrum of cultural property crimes; developing domestic investigative and prosecutorial capacity, including by involving foreign expert consultancy; more proactively seeking bilateral and multilateral cooperation in art crime cases; liaising with auction houses (to track down objects originating from war-affected areas) and museums (to prevent the exhibition of the artefacts from occupied territories).When possible, cultural property crimes should also be reported to the ICC.Additionally, more international – public, policy, media and jurisprudential – attention to such violations is needed. Societies, courts and policymakers should have a clearer awareness that assaults against cultural heritage constitute a creeping encroachment on a people’s identity, endangering its very survival. Full Article
pli Hepatic PLIN5 signals via SIRT1 to promote autophagy and prevent inflammation during fasting [Research Articles] By feedproxy.google.com Published On :: 2020-03-01T00:06:33-08:00 Lipid droplets (LDs) are energy-storage organelles that are coated with hundreds of proteins, including members of the perilipin (PLIN) family. PLIN5 is highly expressed in oxidative tissues, including the liver, and is thought to play a key role in uncoupling LD accumulation from lipotoxicity; however, the mechanisms behind this action are incompletely defined. We investigated the role of hepatic PLIN5 in inflammation and lipotoxicity in a murine model under both fasting and refeeding conditions and in hepatocyte cultures. PLIN5 ablation with antisense oligonucleotides triggered a pro-inflammatory response in livers from mice only under fasting conditions. Similarly, PLIN5 mitigated lipopolysaccharide- or palmitic acid-induced inflammatory responses in hepatocytes. During fasting, PLIN5 was also required for the induction of autophagy, which contributed to its anti-inflammatory effects. The ability of PLIN5 to promote autophagy and prevent inflammation were dependent upon signaling through sirtuin 1 (SIRT1), which is known to be activated in response to nuclear PLIN5 under fasting conditions. Taken together, these data show that PLIN5 signals via SIRT1 to promote autophagy and prevent FA-induced inflammation as a means to maintain hepatocyte homeostasis during periods of fasting and FA mobilization. Full Article
pli Lipid rafts as signaling hubs in cancer cell survival/death and invasion: implications in tumor progression and therapy [Thematic Reviews] By feedproxy.google.com Published On :: 2020-05-01T00:05:27-07:00 Cholesterol/sphingolipid-rich membrane domains, known as lipid rafts or membrane rafts, play a critical role in the compartmentalization of signaling pathways. Physical segregation of proteins in lipid rafts may modulate the accessibility of proteins to regulatory or effector molecules. Thus, lipid rafts serve as sorting platforms and hubs for signal transduction proteins. Cancer cells contain higher levels of intracellular cholesterol and lipid rafts than their normal non-tumorigenic counterparts. Many signal transduction processes involved in cancer development (insulin-like growth factor system and phosphatidylinositol 3-kinase-AKT) and metastasis [cluster of differentiation (CD)44] are dependent on or modulated by lipid rafts. Additional proteins playing an important role in several malignant cancers (e.g., transmembrane glycoprotein mucin 1) are also being detected in association with lipid rafts, suggesting a major role of lipid rafts in tumor progression. Conversely, lipid rafts also serve as scaffolds for the recruitment and clustering of Fas/CD95 death receptors and downstream signaling molecules leading to cell death-promoting raft platforms. The partition of death receptors and downstream signaling molecules in aggregated lipid rafts has led to the formation of the so-called cluster of apoptotic signaling molecule-enriched rafts, or CASMER, which leads to apoptosis amplification and can be pharmacologically modulated. These death-promoting rafts can be viewed as a linchpin from which apoptotic signals are launched. In this review, we discuss the involvement of lipid rafts in major signaling processes in cancer cells, including cell survival, cell death, and metastasis, and we consider the potential of lipid raft modulation as a promising target in cancer therapy. Full Article
pli Problem Notes for SAS®9 - 60332: A SAS 9.4 installation in Update mode notifies you about unwritable files in the "SASHome\SASWebApplicationServer" directory By feedproxy.google.com Published On :: Wed, 6 May 2020 14:49:04 EST When you run SAS Deployment Wizard to install or update SAS 9.4 software, the file system is examined. If any files that the wizard needs to delete are found to be locked, they are reported as unwritable f Full Article BASE+Base+SAS
pli Autoimmune complications of immunotherapy: pathophysiology and management By feeds.bmj.com Published On :: Monday, April 6, 2020 - 10:45 Full Article
pli Exercise Combats Hepatic Steatosis: Potential Mechanisms and Clinical Implications By diabetes.diabetesjournals.org Published On :: 2020-03-20T11:50:28-07:00 Hepatic steatosis, the excess storage of intrahepatic lipids, is a rampant clinical problem associated with the obesity epidemic. Hepatic steatosis is linked to increased risk for insulin resistance, type 2 diabetes, and cardiovascular and advanced liver disease. Accumulating evidence shows that physical activity, exercise, and aerobic capacity have profound effects on regulating intrahepatic lipids and mediating susceptibility for hepatic steatosis. Moreover, exercise can effectively reduce hepatic steatosis independent of changes in body mass. In this perspective, we highlight 1) the relationship between obesity and metabolic pathways putatively driving hepatic steatosis compared with changes induced by exercise; 2) the impact of physical activity, exercise, and aerobic capacity compared with caloric restriction on regulating intrahepatic lipids and steatosis risk; 3) the effects of exercise training (modalities, volume, intensity) for treatment of hepatic steatosis, and 4) evidence for a sustained protection against steatosis induced by exercise. Overall, evidence clearly indicates that exercise powerfully regulates intrahepatic storage of fat and risk for steatosis. Full Article
pli The mitochondrial protein PGAM5 suppresses energy consumption in brown adipocytes by repressing expression of uncoupling protein 1 [Metabolism] By feedproxy.google.com Published On :: 2020-04-24T06:08:45-07:00 Accumulating evidence suggests that brown adipose tissue (BAT) is a potential therapeutic target for managing obesity and related diseases. PGAM family member 5, mitochondrial serine/threonine protein phosphatase (PGAM5), is a protein phosphatase that resides in the mitochondria and regulates many biological processes, including cell death, mitophagy, and immune responses. Because BAT is a mitochondria-rich tissue, we have hypothesized that PGAM5 has a physiological function in BAT. We previously reported that PGAM5-knockout (KO) mice are resistant to severe metabolic stress. Importantly, lipid accumulation is suppressed in PGAM5-KO BAT, even under unstressed conditions, raising the possibility that PGAM5 deficiency stimulates lipid consumption. However, the mechanism underlying this observation is undetermined. Here, using an array of biochemical approaches, including quantitative RT-PCR, immunoblotting, and oxygen consumption assays, we show that PGAM5 negatively regulates energy expenditure in brown adipocytes. We found that PGAM5-KO brown adipocytes have an enhanced oxygen consumption rate and increased expression of uncoupling protein 1 (UCP1), a protein that increases energy consumption in the mitochondria. Mechanistically, we found that PGAM5 phosphatase activity and intramembrane cleavage are required for suppression of UCP1 activity. Furthermore, utilizing a genome-wide siRNA screen in HeLa cells to search for regulators of PGAM5 cleavage, we identified a set of candidate genes, including phosphatidylserine decarboxylase (PISD), which catalyzes the formation of phosphatidylethanolamine at the mitochondrial membrane. Taken together, these results indicate that PGAM5 suppresses mitochondrial energy expenditure by down-regulating UCP1 expression in brown adipocytes and that its phosphatase activity and intramembrane cleavage are required for UCP1 suppression. Full Article
pli Glycation-mediated inter-protein cross-linking is promoted by chaperone-client complexes of {alpha}-crystallin: Implications for lens aging and presbyopia [Glycobiology and Extracellular Matrices] By feedproxy.google.com Published On :: 2020-04-24T06:08:45-07:00 Lens proteins become increasingly cross-linked through nondisulfide linkages during aging and cataract formation. One mechanism that has been implicated in this cross-linking is glycation through formation of advanced glycation end products (AGEs). Here, we found an age-associated increase in stiffness in human lenses that was directly correlated with levels of protein–cross-linking AGEs. α-Crystallin in the lens binds to other proteins and prevents their denaturation and aggregation through its chaperone-like activity. Using a FRET-based assay, we examined the stability of the αA-crystallin–γD-crystallin complex for up to 12 days and observed that this complex is stable in PBS and upon incubation with human lens–epithelial cell lysate or lens homogenate. Addition of 2 mm ATP to the lysate or homogenate did not decrease the stability of the complex. We also generated complexes of human αA-crystallin or αB-crystallin with alcohol dehydrogenase or citrate synthase by applying thermal stress. Upon glycation under physiological conditions, the chaperone–client complexes underwent greater extents of cross-linking than did uncomplexed protein mixtures. LC-MS/MS analyses revealed that the levels of cross-linking AGEs were significantly higher in the glycated chaperone–client complexes than in glycated but uncomplexed protein mixtures. Mouse lenses subjected to thermal stress followed by glycation lost resilience more extensively than lenses subjected to thermal stress or glycation alone, and this loss was accompanied by higher protein cross-linking and higher cross-linking AGE levels. These results uncover a protein cross-linking mechanism in the lens and suggest that AGE-mediated cross-linking of α-crystallin–client complexes could contribute to lens aging and presbyopia. Full Article
pli Affinity maturation, humanization, and co-crystallization of a rabbit anti-human ROR2 monoclonal antibody for therapeutic applications [Immunology] By feedproxy.google.com Published On :: 2020-05-01T00:06:09-07:00 Antibodies are widely used as cancer therapeutics, but their current use is limited by the low number of antigens restricted to cancer cells. A receptor tyrosine kinase, receptor tyrosine kinase-like orphan receptor 2 (ROR2), is normally expressed only during embryogenesis and is tightly down-regulated in postnatal healthy tissues. However, it is up-regulated in a diverse set of hematologic and solid malignancies, thus ROR2 represents a candidate antigen for antibody-based cancer therapy. Here we describe the affinity maturation and humanization of a rabbit mAb that binds human and mouse ROR2 but not human ROR1 or other human cell-surface antigens. Co-crystallization of the parental rabbit mAb in complex with the human ROR2 kringle domain (hROR2-Kr) guided affinity maturation by heavy-chain complementarity-determining region 3 (HCDR3)-focused mutagenesis and selection. The affinity-matured rabbit mAb was then humanized by complementarity-determining region (CDR) grafting and framework fine tuning and again co-crystallized with hROR2-Kr. We show that the affinity-matured and humanized mAb retains strong affinity and specificity to ROR2 and, following conversion to a T cell–engaging bispecific antibody, has potent cytotoxicity toward ROR2-expressing cells. We anticipate that this humanized affinity-matured mAb will find application for antibody-based cancer therapy of ROR2-expressing neoplasms. Full Article
pli Risk Factors for Diabetic Peripheral Neuropathy and Cardiovascular Autonomic Neuropathy in the Diabetes Control and Complications Trial/Epidemiology of Diabetes Interventions and Complications (DCCT/EDIC) Study By diabetes.diabetesjournals.org Published On :: 2020-05-01 Barbara H. BraffettMay 1, 2020; 69:1000-1010Complications Full Article
pli The Biology of Mitochondrial Uncoupling Proteins By diabetes.diabetesjournals.org Published On :: 2004-02-01 Sophie RoussetFeb 1, 2004; 53:S130-S135Section III: Mitochondria, Beta-Cell Function, and Type 2 Diabetes Full Article
pli Muscle Weakness: A Progressive Late Complication in Diabetic Distal Symmetric Polyneuropathy By diabetes.diabetesjournals.org Published On :: 2006-03-01 Christer S. AndreassenMar 1, 2006; 55:806-812Complications Full Article
pli Intense Exercise Has Unique Effects on Both Insulin Release and Its Roles in Glucoregulation: Implications for Diabetes By diabetes.diabetesjournals.org Published On :: 2002-02-01 Errol B. MarlissFeb 1, 2002; 51:S271-S283Section 6: Pusatile and Phasic Insulin Release in Normal and Diabetic Men Full Article
pli The Pathobiology of Diabetic Complications: A Unifying Mechanism By diabetes.diabetesjournals.org Published On :: 2005-06-01 Michael BrownleeJun 1, 2005; 54:1615-1625Banting Lecture 2004 Full Article
pli Tackle the ‘Splinternet’ By feedproxy.google.com Published On :: Fri, 31 May 2019 14:57:47 +0000 12 June 2019 Marjorie Buchser Executive Director, Digital Society Initiative @Marjorie_BU LinkedIn Joyce Hakmeh Senior Research Fellow, International Security Programme; Co-Editor, Journal of Cyber Policy @joycehakmeh LinkedIn Competing governance visions are impairing efforts to regulate the digital space. To limit the spread of repressive models, policymakers in the West and elsewhere need to ensure the benefits of an open and well-run system are more widely communicated. 20150415GCIG-1.jpg The development of governance in a wide range of digital spheres – from cyberspace to internet infrastructure to emerging technologies such as artificial intelligence (AI) – is failing to match rapid advances in technical capabilities or the rise in security threats. This is leaving serious regulatory gaps, which means that instruments and mechanisms essential for protecting privacy and data, tackling cybercrime or establishing common ethical standards for AI, among many other imperatives, remain largely inadequate.A starting point for effective policy formation is to recognize the essential complexity of the digital landscape, and the consequent importance of creating a ‘common language’ for multiple stakeholders (including under-represented actors such as smaller and/or developing countries, civil society and non-for-profit organizations).The world’s evolving technological infrastructure is not a monolithic creation. In practice, it encompasses a highly diverse mix of elements – so-called ‘high-tech domains’,[1] hardware, systems, algorithms, protocols and standards – designed by a plethora of private companies, public bodies and non-profit organizations.[2] Varying cultural, economic and political assumptions have shaped where and which technologies have been deployed so far, and how they have been implemented.Perhaps the most notable trend is the proliferation of techno-national regimes and private-sector policy initiatives, reflecting often-incompatible doctrines in respect of privacy, openness, inclusion and state control. Beyond governments, the interests and ambitions of prominent multinationals (notably the so-called ‘GAFAM’ tech giants in the West, and their ‘BATX’ counterparts in China)[3] are significant factors feeding into this debate.Cyberspace and AI – two case studiesTwo particular case studies highlight the essential challenges that this evolving – and, in some respects, still largely unformed – policy landscape presents. The first relates to cyberspace. Since 1998, Russia has established itself as a strong voice in the cyberspace governance debate – calling for a better understanding, at the UN level, of ICT developments and their impact on international security.The country’s efforts were a precursor to the establishment in 2004 of a series of UN Groups of Governmental Experts (GGEs), aimed at strengthening the security of global information and telecommunications systems. These groups initially succeeded in developing common rules, norms and principles around some key issues. For example, the 2013 GGE meeting recognized that international law applies to the digital space and that its enforcement is essential for a secure, peaceful and accessible ICT environment.However, the GGE process stalled in 2017, primarily due to fundamental disagreements between countries on the right to self-defence and on the applicability of international humanitarian law to cyber conflicts. The breakdown in talks reflected, in particular, the divide between two principal techno-ideological blocs: one, led by the US, the EU and like-minded states, advocating a global and open approach to the digital space; the other, led mainly by Russia and China, emphasizing a sovereignty-and-control model.The divide was arguably entrenched in December 2018, with the passage of two resolutions at the UN General Assembly. A resolution sponsored by Russia created a working group to identify new norms and look into establishing regular institutional dialogue.At the same time, a US-sponsored resolution established a GGE tasked, in part, with identifying ways to promote compliance with existing cyber norms. Each resolution was in line with its respective promoter’s stance on cyberspace. While some observers considered these resolutions potentially complementary, others saw in them competing campaigns to cement a preferred model as the global norm. Outside the UN, there have also been dozens of multilateral and bilateral accords with similar objectives, led by diverse stakeholders.[4]The second case study concerns AI. Emerging policy in this sector suffers from an absence of global standards and a proliferation of proposed regulatory models. The potential ability of AI to deliver unprecedented capabilities in so many areas of human activity – from automation and language applications to warfare – means that it has become an area of intense rivalry between governments seeking technical and ideological leadership of this field.China has by far the most ambitious programme. In 2017, its government released a three-step strategy for achieving global dominance in AI by 2030. Beijing aims to create an AI industry worth about RMB 1 trillion ($150 billion)[5] and is pushing for greater use of AI in areas ranging from military applications to the development of smart cities. Elsewhere, the US administration has issued an executive order on ‘maintaining American leadership on AI’.On the other side of the Atlantic, at least 15 European countries (including France, Germany and the UK) have set up national AI plans. Although these strategies are essential for the development of policy infrastructure, they are country-specific and offer little in terms of global coordination. Ominously, greater inclusion and cooperation are scarcely mentioned, and remain the least prioritized policy areas.[6]Competing multilateral frameworks on AI have also emerged. In April 2019, the European Commission published its ethics guidelines for trustworthy AI. Ministers from Nordic countries[7] recently issued their own declaration on collaboration in ‘AI in the Nordic-Baltic region’. And leaders of the G7 have committed to the ‘Charlevoix Common Vision for the Future of Artificial Intelligence’, which includes 12 guiding principles to ensure ‘human-centric AI’.More recently, OECD member countries adopted a set of joint recommendations on AI. While nations outside the OECD were welcomed into the coalition – with Argentina, Brazil and Colombia adhering to the OECD’s newly established principles – China, India and Russia have yet to join the discussion. Despite their global aspirations, these emerging groups remain largely G7-led or EU-centric, and again highlight the divide between parallel models. The importance of ‘swing states’No clear winner has emerged from among the competing visions for cyberspace and AI governance, nor indeed from the similar contests for doctrinal control in other digital domains. Concerns are rising that a so-called ‘splinternet’ may be inevitable – in which the internet fragments into separate open and closed spheres and cyber governance is similarly divided.Each ideological camp is trying to build a critical mass of support by recruiting undecided states to its cause. Often referred to as ‘swing states’, the targets of these overtures are still in the process of developing their digital infrastructure and determining which regulatory and ethical frameworks they will apply. Yet the policy choices made by these countries could have a major influence on the direction of international digital governance in the future.India offers a case in point. For now, the country seems to have chosen a versatile approach, engaging with actors on various sides of the policy debate, depending on the technology governance domain. On the one hand, its draft Personal Data Protection Bill mirrors principles in the EU’s General Data Protection Regulation (GDPR), suggesting a potential preference for the Western approach to data security.However, in 2018, India was the leading country in terms of internet shutdowns, with over 100 reported incidents.[8] India has also chosen to collaborate outside the principal ideological blocs, as evidenced by an AI partnership it has entered into with the UAE. At the UN level, India has taken positions that support both blocs, although more often favouring the sovereignty-and-control approach.Principles for rule-makingSovereign nations have asserted aspirations for technological dominance with little heed to the cross-border implications of their policies. This drift towards a digital infrastructure fragmented by national regulation has potentially far-reaching societal and political consequences – and implies an urgent need for coordinated rule-making at the international level.The lack of standards and enforcement mechanisms has created instability and increased vulnerabilities in democratic systems. In recent years, liberal democracies have been targeted by malevolent intrusions in their election systems and media sectors, and their critical infrastructure has come under increased threat. If Western nations cannot align around, and enforce, a normative framework that seeks to preserve individual privacy, openness and accountability through regulation, a growing number of governments may be drawn towards repressive forms of governance.To mitigate those risks, efforts to negotiate a rules-based international order for the digital space should keep several guiding principles in mind. One is the importance of developing joint standards, as well as the need for consistent messaging towards the emerging cohort of engaged ‘swing states’. Another is the need for persistence in ensuring that the political, civic and economic benefits associated with a more open and well-regulated digital sphere are made clear to governments and citizens everywhere.Countries advocating an open, free and secure model should take the lead in embracing and promoting a common affirmative model – one that draws on human rights principles (such as the rights to freedom of opinion, freedom of expression and privacy) and expands their applications to the digital space. Specific rules on cyberspace and technology use need to include pragmatic policy ideas and models of implementation. As this regulatory corpus develops, rules should be adapted to reflect informed consideration of economic and social priorities and attitudes, and to keep pace with what is possible technologically.[9]What needs to happenDemystifying the salient issues, consistent messaging and the creation of a common discourse are key to advancing a well-informed debate on global digital governance.The benefits associated with open and well-regulated digital governance should be clearly presented to all stakeholders. For example, the link between sustainable development, respect for human rights and a secure, free and open internet should take priority in the debate with developing countries.International norms need to be updated and reinterpreted to assert the primacy of non-harmful applications of technologies and digital interactions.This process should follow a multi-stakeholder approach to include under-represented actors, such as developing countries and civil society, and should adopt a gender-balanced approach.The design of rules, standards and norms needs to take into account the essentially transnational nature of digital technologies. Rules, standards and norms need to be applicable consistently across jurisdictions.Developing countries should be supported in building their digital infrastructure, and in increasing the capacity of governments and citizens to make informed policy decisions on technology.Notes[1] Including but not limited to AI and an associated group of digital technologies, such as the Internet of Things, big data, blockchain, quantum computing, advanced robotics, self-driving cars and other autonomous systems, additive manufacturing (i.e. 3D printing), social networks, the new generation of biotechnology, and genetic engineering.[2] O’Hara, K. and Hall, W. (2018), Four Internets: The Geopolitics of Digital Governance, Centre for International Governance Innovation, CIGI Paper No. 206, https://www.cigionline.org/publications/four-internets-geopolitics-digital-governance.[3] GAFAM = Google, Amazon, Facebook, Apple and Microsoft; BATX = Baidu, Alibaba, Tencent and Xiaomi.[4] Carnegie Endowment for International Peace (undated), ‘Cyber Norms Index’, https://carnegieendowment.org/publications/interactive/cybernorms (accessed 30 May 2019).[5] Future of Life Institute (undated), ‘AI Policy – China’, https://futureoflife.org/ai-policy-china?cn-reloaded=1.[6] Dutton, T. (2018), ‘Building an AI World: Report on National and Regional AI Strategies’, 6 December 2018, CIFAR, https://www.cifar.ca/cifarnews/2018/12/06/building-an-ai-world-report-on-national-and-regional-ai-strategies.[7] Including Denmark, Estonia, Finland, the Faroe Islands, Iceland, Latvia, Lithuania, Norway, Sweden and the Åland Islands.[8] Shahbaz, A. (2018), Freedom on the Net 2018: The Rise of Digital Authoritarianism, Freedom House, October 2018, https://freedomhouse.org/report/freedom-net/freedom-net-2018/rise-digital-authoritarianism.[9] Google White Paper (2018), Perspectives on Issues in AI Governance, https://www.blog.google/outreach-initiatives/public-policy/engaging-policy-stakeholders-issues-ai-governance/.This essay was produced for the 2019 edition of Chatham House Expert Perspectives – our annual survey of risks and opportunities in global affairs – in which our researchers identify areas where the current sets of rules, institutions and mechanisms for peaceful international cooperation are falling short, and present ideas for reform and modernization. Full Article
pli Sovereignty and Non-Intervention: The Application of International Law to State Cyberattacks By feedproxy.google.com Published On :: Fri, 01 Nov 2019 10:55:01 +0000 Research Event 4 December 2019 - 5:30pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Douglas, Legal Director, GCHQZhixiong Huang, Luojia Chair of International Law, Wuhan UniversityNemanja Malisevic, Director of Digital Diplomacy, MicrosoftHarriet Moynihan, Associate Fellow, International Law Programme, Chatham HouseChair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House International law applies to cyber operations – but views differ on exactly how. Does state-sponsored interference in another state's affairs using cyber means – for example, disinformation campaigns in elections, disabling government websites, or disrupting transport systems – breach international law? If so, on what basis and how are the principles of sovereignty and non-intervention relevant? States are increasingly attributing cyber operations to other states and engaging in the debate on how international law applies, including circumstances that would justify countermeasures.As states meet to debate these issues at the UN, the panel will explore how international law regulates cyberoperations by states, consider the prospects of progress at the UN, and assess the value of other initiatives.This event coincides with the launch of a Chatham House research paper which analyses how the principles of sovereignty and intervention apply in the context of cyberoperations, and considers a way forward for agreeing a common understanding of cyber norms.This event will bring together a broad group of actors, including policymakers, the private sector, legal experts and civil society, and will be followed by a drinks reception. Department/project International Law Programme, Cyber, Sovereignty and Human Rights Jacqueline Rowe Programme Assistant, International Law Programme 020 7389 3287 Email Full Article
pli The Application of International Law to State Cyberattacks: Sovereignty and Non-Intervention By feedproxy.google.com Published On :: Fri, 29 Nov 2019 16:56:12 +0000 2 December 2019 Hostile cyber operations by one state against another state are increasingly common. This paper analyzes the application of the sovereignty and non-intervention principles in relation to states’ cyber operations in another state below the threshold of the use of force. Read online Download PDF Harriet Moynihan Senior Research Fellow, International Law Programme @HarrietMoyniha9 2019-11-29-Intl-Law-Cyberattacks.jpg A computer hacked by a virus known as Petya. The Petya ransomware cyberattack hit computers of Russian and Ukrainian companies on 27 June 2017. Photo: Getty Images. SummaryThe vast majority of state-to-state cyberattacks consist of persistent, low-level intrusions that take place below the threshold of use of force. International law, including the principle of non-intervention in another state’s internal affairs and the principle of sovereignty, applies to these cyber operations.It is not clear whether any unauthorized cyber intrusion would violate the target state’s sovereignty, or whether there is a threshold in operation. While some would like to set limits by reference to effects of the cyber activity, at this time such limits are not reflected in customary international law. The assessment of whether sovereignty has been violated therefore has to be made on a case by case basis, if no other more specific rules of international law apply.In due course, further state practice and opinio iuris may give rise to an emerging cyber-specific understanding of sovereignty, just as specific rules deriving from the sovereignty principle have crystallized in other areas of international law.Before a principle of due diligence can be invoked in the cyber context, further work is needed by states to agree upon rules as to what might be expected of a state in this context.The principle of non-intervention applies to a state’s cyber operations as it does to other state activities. It consists of coercive behaviour by one state that deprives the target state of its free will in relation to the exercise of its sovereign functions in order to compel an outcome in, or conduct with respect to, a matter reserved to the target state.In practice, activities that contravene the non-intervention principle and activities that violates sovereignty will often overlap.In order to reach agreement on how international law applies to states’ cyber operations below the level of use of force, states should put their views on record, where possible giving examples of when they consider that an obligation may be breached, as states such as the UK, Australia, France and the Netherlands have done.Further discussion between states should focus on how the rules apply to practical examples of state-sponsored cyber operations. There is likely to be more commonality about specific applications of the law than there is about abstract principles.The prospects of a general treaty in this area are still far off. In due course, there may be benefit in considering limited rules, for example on due diligence and a prohibition on attacking critical infrastructure, before tackling broad principles. Department/project International Law Programme, Cyber, Sovereignty and Human Rights Full Article
pli Crimea’s Occupation Exemplifies the Threat of Attacks on Cultural Heritage By feedproxy.google.com Published On :: Tue, 04 Feb 2020 14:24:47 +0000 4 February 2020 Kateryna Busol Robert Bosch Stiftung Academy Fellow, Russia and Eurasia Programme @KaterynaBusol LinkedIn Societies, courts and policymakers should have a clearer awareness that assaults against cultural heritage constitute a creeping encroachment on a people’s identity, endangering its very survival. 2020-02-04-Bakhchysarai.jpg 'The destructive reconstruction of the 16th-century Bakhchysarai Palace is being conducted by a team with no experience of cultural sites, in a manner that erodes its authenticity and historical value.' Photo: Getty Images. Violations against cultural property – such as archaeological treasures, artworks, museums or historical sites – can be no less detrimental to the survival of a nation than the physical persecution of its people. These assaults on heritage ensure the hegemony of some nations and distort the imprint of other nations in world history, sometimes to the point of eradication.As contemporary armed conflicts in Syria, Ukraine and Yemen demonstrate, cultural property violations are not only a matter of the colonial past; they continue to be perpetrated, often in new, intricate ways.Understandably, from a moral perspective, it is more often the suffering of persons, rather than any kind of ‘cultural’ destruction, that receives the most attention from humanitarian aid providers, the media or the courts. Indeed, the extent of the damage caused by an assault on cultural property is not always immediately evident, but the result can be a threat to the survival of a people. This is strikingly exemplified by what is currently happening in Crimea.Ukraine’s Crimean peninsula has been occupied by Russia since February 2014, meaning that, under international law, the two states have been involved in an international armed conflict for the last six years.While much attention has been paid to the alleged war crimes perpetrated by the occupying power, reports by international organizations and the International Criminal Court (ICC) have been less vocal on the issue of cultural property in Crimea. Where they do raise it, they tend to confine their findings to the issue of misappropriation.However, as part of its larger policy of the annexation and Russification of the peninsula and its history, Russia has gone far beyond misappropriation.Crimean artefacts have been transferred to Russia – without security justification or Ukrainian authorization as required by the international law of occupation – to be showcased at exhibitions celebrating Russia’s own cultural heritage. In 2016, the Tretyakov Gallery in Moscow staged its record-breaking Aivazovsky exhibition, which included 38 artworks from the Aivazovsky Museum in the Crimean town of Feodosia.Other ‘cultural’ violations in the region include numerous unsanctioned archaeological excavations, whose findings are often unlawfully exported to Russia or end up on the black market.There is also the example of Russia’s plan to establish a museum of Christianity in Ukraine’s UNESCO World Heritage site, the Ancient City of Tauric Chersonese. This is an indication of Russia’s policy of asserting itself as a bastion of Orthodox Christianity and culture in the Slavic world, with Crimea as one of the centres.The harmful effects of Russia’s destructive cultural property policy can be seen in the situation of the Crimean Tatars, Ukraine’s indigenous Muslim people. Already depleted by a Stalin-ordered deportation in 1944 and previously repressed by the Russian Empire, the Crimean Tatars are now facing the destruction of much of the remainder of their heritage.For example, Muslim burial grounds have been demolished to build the Tavrida Highway, which leads to the newly built Kerch Bridge connecting the peninsula to Russia.The destructive reconstruction of the 16th-century Bakhchysarai Palace – the only remaining complete architectural ensemble of the indigenous people, included in the UNESCO World Heritage Tentative List – is another example of how the very identity of the Crimean Tatars is being threatened. This reconstruction is being conducted by a team with no experience of cultural sites, in a manner that erodes its authenticity and historical value – which is precisely as Russia intends.There is a solid body of international and domestic law covering Russia’s treatment of Crimea’s cultural property.Under the 1954 Hague Convention for the Protection of Cultural Property in the Event of Armed Conflict – ratified by both Ukraine and Russia – the occupying power must facilitate the safeguarding efforts of the national authorities in occupied territories. States parties must prevent any vandalism or misappropriation of cultural property, and, according to the first protocol of the convention, the occupying power is required to prevent any export of artefacts from the occupied territory.The 1907 Hague Regulations and the 1949 Fourth Geneva Convention confirm that the authentic domestic legislation continues to apply in occupied territories. This leaves Russia with no excuse for non-compliance with Ukraine’s cultural property laws and imposing its own rules unless absolutely necessary.Besides, both Ukrainian and Russian criminal codes penalise pillage in occupied territory, as well as unsanctioned archaeological excavations. As an occupying power, Russia must not just abstain from such wrongdoings in Crimea, but also duly investigate and prosecute the alleged misconduct.The clarity of the international legal situation demonstrates that no exhibitions in continental Russia and no archaeological excavations which are not sanctioned by Ukraine can be justified. Likewise, any renovation or use of cultural sites, especially those on permanent or tentative UNESCO lists, must only be conducted pursuant to consultancy with and approval of the Ukrainian authorities.But the resonance of the Crimean case goes beyond law and touches on issues of the very survival of a people. The Soviet deportation of the Crimean Tatars in 1944 did not only result in the deaths of individuals. Their footprints in Crimea have been gradually erased by baseless treason charges, the long exile of the indigenous community from their native lands and ongoing persecution.First the Soviet Union and now Russia have targeted the Crimean Tatars’ cultural heritage to undermine their significance in the general historical narrative, making attempts to preserve or celebrate this culture seem futile. Russia is thus imposing its own historical and political hegemony at the expense of the Crimean Tatar and Ukrainian layers of Crimean history.As exemplified by occupied Crimea, the manipulation and exploitation of cultural heritage can serve an occupying power’s wider policies of appropriating history and asserting its own dominance. Domestic cultural property proceedings are challenging due to the lack of access to the occupied territory, but they should still be pursued.More effort is needed in the following areas: case prioritization; informing the documenters of alleged violations about the spectrum of cultural property crimes; developing domestic investigative and prosecutorial capacity, including by involving foreign expert consultancy; more proactively seeking bilateral and multilateral cooperation in art crime cases; liaising with auction houses (to track down objects originating from war-affected areas) and museums (to prevent the exhibition of the artefacts from occupied territories).When possible, cultural property crimes should also be reported to the ICC.Additionally, more international – public, policy, media and jurisprudential – attention to such violations is needed. Societies, courts and policymakers should have a clearer awareness that assaults against cultural heritage constitute a creeping encroachment on a people’s identity, endangering its very survival. Full Article
pli Implications of AMLO and Bolsonaro for Mexican and Brazilian Foreign Policy By feedproxy.google.com Published On :: Fri, 14 Feb 2020 10:30:01 +0000 Invitation Only Research Event 26 February 2020 - 12:15pm to 1:15pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Ambassador Andrés Rozental, Senior Adviser, Chatham House; Founding President, Mexican Council on Foreign RelationsDr Elena Lazarou, Associate Fellow, US and the Americas Programme, Chatham HouseChair: Dr Christopher Sabatini, Senior Research Fellow for Latin America, US and the Americas Programme, Chatham House The end of 2018 was a monumental year for Latin America’s two biggest economies. In December 2018, Andrés Manuel López Obrador (AMLO) was inaugurated as Mexico’s 58th president. The following month saw another political shift further south, as Jair Bolsonaro became Brazil’s 38th president. While sitting on opposite ends of the political spectrum, both AMLO and Bolsonaro were considered to be political outsiders and have upended the status quo through their election to office. To what extent does the election of AMLO in Mexico and Bolsonaro in Brazil represent a shift in those countries’ definitions of national interest and foreign policy priorities? How will this affect these states’ policies regarding international commitments and cooperation on issues such as human rights, environment and climate change, migration, and trade? To what extent do possible shifts reflect changing domestic opinions? Will any changes represent a long-term shift in state priorities and policies past these administrations? Department/project US and the Americas Programme, Latin America Initiative US and Americas Programme Email Full Article
pli US 2020: Super Tuesday and Implications for the General Election By feedproxy.google.com Published On :: Mon, 17 Feb 2020 10:10:01 +0000 Invitation Only Research Event 5 March 2020 - 12:00pm to 1:30pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Dr Lindsay Newman, Senior Research Fellow, US and the Americas Programme, Chatham HouseProfessor Peter Trubowitz, Professor of International Relations, London School of Economics and Political Science; Associate Fellow, US and the Americas Programme, Chatham HouseAmy Pope, Associate Fellow, US and the Americas Programme, Chatham House; Deputy Homeland Security Advisor, US National Security Council, 2015-17Chair: Dr Leslie Vinjamuri, Director, US and the Americas Programme, Chatham House The US 2020 election season enters a potentially decisive next phase with the Super Tuesday primaries on 3 March. With these fifteen, simultaneously-held state elections, the Democrats hope to have greater clarity about their party’s likely nominee for the general race against President Donald Trump in November. Concerns around intraparty divisions in the Democratic party between progressives (represented by Senators Elizabeth Warren and Bernie Sanders) and moderates (represented by former Vice President Joe Biden and former mayor Pete Buttigieg) have surrounded the primary races so far, and are unlikely to dissipate even if one candidate emerges from the field on 3 March.Against this backdrop, Chatham House brings together a panel of experts to discuss the state of the Democratic primary race, implications for the general election, and the Trump campaign’s priorities ahead of its re-election bid. Will the Democratic party resolve its divisions and unite behind a progressive or moderate in light of the Super Tuesday election results? How is Trump positioned to fair against the Democratic candidates left in the race? Did Former Mayor of New York Michael Bloomberg’s primary gamble to focus on Super Tuesday pay off? And what policy priorities are likely to be pursued under either a Trump 2.0 or a Democratic administration? Event attributes Chatham House Rule Department/project US and the Americas Programme, Chatham House US 2020 Election Series US and Americas Programme Email Full Article
pli EU makes second donation of medical supplies to Jamaica By jamaica-gleaner.com Published On :: Sat, 09 May 2020 11:33:17 -0500 (CMC): The European Union (EU) will be making a second donation of medical supplies and equipment to Jamaica in support of the country’s efforts to tackle COVID-19, the Head of the EU Delegation to Jamaica, Ambassador Malgorzata Wasilewska,... Full Article
pli The Changing Nature of Russia’s Military Strategy and Its Tactical Application By feedproxy.google.com Published On :: Mon, 14 Oct 2019 10:15:01 +0000 Invitation Only Research Event 12 November 2019 - 4:00pm to 5:30pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Oscar Jonsson, Director, Stockholm Free World Forum (Frivärld)Mathieu Boulègue, Research Fellow, Russia and Eurasia Programme, Chatham HouseChair: Alice Billon-Galland, Research Associate, Europe Programme, Chatham House Russia’s military strategy is increasingly blurring the boundaries between war and peace. As the nature of warfare changes, the Kremlin is adapting its strategies to pursue conflict, especially through non-military means - below the threshold of armed violence. Russian military tactics are often mistaken for strategy in the West. Oscar Jonson, author of The Russian Understanding of War, will talk through this debate and explore how the Russian leadership now understands military strategy in the context of modern warfare. Mathieu Boulègue will address the more operational aspects of contemporary warfare for Russia, notably grey zone operations. Department/project Russia and Eurasia Programme Anna Morgan Administrator, Ukraine Forum +44 (0)20 7389 3274 Email Full Article
pli Russia's Imperial Nostalgia: Implications for the West By feedproxy.google.com Published On :: Thu, 16 Jan 2020 14:50:01 +0000 Invitation Only Research Event 31 January 2020 - 11:00am to 12:30pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Sergei Medvedev, Professor, Faculty of Social Sciences, Higher School of Economics (Moscow) Vladimir Putin’s goal of restoring Russia’s status as a great power has led to an aggressive foreign policy and confrontation with its immediate neighbours as well as Western countries.Sergei Medvedev, author of The Return of the Russian Leviathan, will discuss the forces shaping Russian politics and society today as well as how a nostalgia for empire – still widespread in contemporary Russia - has shaped Moscow’s foreign policy.Attendance at this event is by invitation only. Event attributes Chatham House Rule Department/project Russia and Eurasia Programme, Russian Foreign Policy, The Drivers of Russian Foreign Policy Anna Morgan Administrator, Ukraine Forum +44 (0)20 7389 3274 Email Full Article
pli Earth Observation, Risk Assessment and Global Change: Implications for the Insurance and Aerospace Sectors By feedproxy.google.com Published On :: Fri, 20 May 2011 13:17:51 +0000 Research Event 16 July 2008 - 2:00pm to 5:15pm Chatham House, London Conference Agenda: Earth Observation, Risk Assessment and Global Changepdf | 60.78 KB This event is organized by Chatham House and the Center for Strategic and International Studies (CSIS).Keynote speaker:Lindene Patton, Climate Product Officer, Zurich Financial ServicesOther speaker highlights:Alexis Livanos, Northrop GrummanSir David King, University of OxfordBarend Van Bergen, KPMGMike Keebaugh,RaytheonPeter Stott, UK Met OfficeTrevor Maynard, Lloyd'sShree Khare, Risk Management SolutionsGiovanni Rum, Group on Earth ObservationsGreg Withee, US National Oceanic and Atmospheric AdministrationMan Cheung, Marsh Ltd Full Article