Rivers all over the world are deteriorating in a fast rate. As a response, movements in the defence of rivers emerge and aim to restore and protect rivers. One of these defence strategies is to politicise fish to generate arguments for the protection of rivers, drawing from a fish-friendly river imaginary. The concept of river imaginaries describes that power is exercised through and by knowledge generated in truth regimes. In this poster presentation, we elaborate on two cases in which fishing people and their allies use a variety of truth strategies, resonating with specific fish-friendly river imaginaries. Both case studies are influenced by harmful mining and industry practices that pollute the river and wetland.The Dutch case study of the Border Meuse river reveals that the main argument to politicise fish is that infrastructural interventions and hydropower is killing and damaging fish. Through knowledge generating on the amount of fish-death and the aquatic state, a knowledge agenda is set and power is exercised to stop harmful river activities. The Colombian case of the Zapatosa wetlands reveals that the main argument to politicise fish is that fish is the main source of food. Through knowledge generating that focusses on re-learning from past artisanal fishing strategies and biocultural adaptation, a knowledge agenda is set and power is exercised to stop harmful mining practices. Although these river movements are using truth regimes to defend rivers, counter facts, counter norms, and counter agendas in the defence of harmful practices remain to exist.
DOCUMENT
This article examines whether calls for European ‘strategic autonomy’ in response to Trump’s rhetoric are qualitatively different from earlier disagreements in US-EU relations. By doing so, it re-assesses Geir Lundestad’s concept of “Empire by Invitation” to illustrate constraints for the development of such an autonomy especially in defence affairs. We argue that the US’s involvement in European defence affairs was never an invitation to ‘empire’, as the invitational aspect was based on consent. A process has been accelerated by the Trump presidency whereby this consent has shifted towards strategic estrangement. However, the article argues that the reactive and intergovernmental nature of EU foreign and security policy continues to hamper more autonomous policy planning in CSDP matters – different readings about cyclical disruptions in EU-US relations notwithstanding. The article finally discusses how the introduction of new CSDP mechanisms impacts on this debate. LinkedIn: https://www.linkedin.com/in/martijn-lak-71793013/
DOCUMENT
The international Wadden Sea is an estuarine tidal area along the North Sea coasts of The Netherlands, Germany and Denmark. It is characteristic for regions with sandy coasts and a medium tidal range. Fifty barrier islands separate the Wadden Sea from the North Sea, and an offshore transition zone to the North Sea. The tidal flats of the Wadden Sea form the largest unbroken stretchof mudflats worldwide. The present form of the Wadden Sea is still mainly the result of natural forces, although since the Middle Ages man has changed the Wadden Sea landscape by building dykes and reclaiming land. The Wadden Sea is an important nursery area for fish, a foraging and resting habitat for seals, and a foraging habitat for migrating waders. The Wadden Sea, including large parts of the islands, is a fully nature protected area and designated as a natural World Heritage site in 2009 (Wolff, 2013). The research group Marine Wetlands Studies at Stenden University is focusing on the sustainable development of tourism in the area. Current research has the purpose to get insight in to the effects of the World Heritage Status, in particular the natural values of the area, on future tourism development.
DOCUMENT
Prompt and timely response to incoming cyber-attacks and incidents is a core requirement for business continuity and safe operations for organizations operating at all levels (commercial, governmental, military). The effectiveness of these measures is significantly limited (and oftentimes defeated altogether) by the inefficiency of the attack identification and response process which is, effectively, a show-stopper for all attack prevention and reaction activities. The cognitive-intensive, human-driven alarm analysis procedures currently employed by Security Operation Centres are made ineffective (as opposed to only inefficient) by the sheer amount of alarm data produced, and the lack of mechanisms to automatically and soundly evaluate the arriving evidence to build operable risk-based metrics for incident response. This project will build foundational technologies to achieve Security Response Centres (SRC) based on three key components: (1) risk-based systems for alarm prioritization, (2) real-time, human-centric procedures for alarm operationalization, and (3) technology integration in response operations. In doing so, SeReNity will develop new techniques, methods, and systems at the intersection of the Design and Defence domains to deliver operable and accurate procedures for efficient incident response. To achieve this, this project will develop semantically and contextually rich alarm data to inform risk-based metrics on the mounting evidence of incoming cyber-attacks (as opposed to firing an alarm for each match of an IDS signature). SeReNity will achieve this by means of advanced techniques from machine learning and information mining and extraction, to identify attack patterns in the network traffic, and automatically identify threat types. Importantly, SeReNity will develop new mechanisms and interfaces to present the gathered evidence to SRC operators dynamically, and based on the specific threat (type) identified by the underlying technology. To achieve this, this project unifies Dutch excellence in intrusion detection, threat intelligence, and human-computer interaction with an industry-leading partner operating in the market of tailored solutions for Security Monitoring.