Shanghai Cooperation Organization
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest
Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest Patricia Moloney Figliola Specialist in Internet and Telecommunications Policy May 18, 2018 Congressional Research Service 7-5700 www.crs.gov R45200 Internet Freedom in China: U.S. Government and Private Sector Activity Summary By the end of 2017, the People’s Republic of China (PRC) had the world’s largest number of internet users, estimated at over 750 million people. At the same time, the country has one of the most sophisticated and aggressive internet censorship and control regimes in the world. PRC officials have argued that internet controls are necessary for social stability, and intended to protect and strengthen Chinese culture. However, in its 2017 Annual Report, Reporters Without Borders (Reporters Sans Frontières, RSF) called China the “world’s biggest prison for journalists” and warned that the country “continues to improve its arsenal of measures for persecuting journalists and bloggers.” China ranks 176th out of 180 countries in RSF’s 2017 World Press Freedom Index, surpassed only by Turkmenistan, Eritrea, and North Korea in the lack of press freedom. At the end of 2017, RSF asserted that China was holding 52 journalists and bloggers in prison. The PRC government employs a variety of methods to control online content and expression, including website blocking and keyword filtering; regulating and monitoring internet service providers; censoring social media; and arresting “cyber dissidents” and bloggers who broach sensitive social or political issues. The government also monitors the popular mobile app WeChat. WeChat began as a secure messaging app, similar to WhatsApp, but it is now used for much more than just messaging and calling, such as mobile payments, and all the data shared through the app is also shared with the Chinese government. -
The Limits of Commercialized Censorship in China
The Limits of Commercialized Censorship in China Blake Miller∗ September 27, 2018 Abstract Despite massive investment in China's censorship program, internet platforms in China are rife with criticisms of the government and content that seeks to organize opposition to the ruling Communist Party. Past works have attributed this \open- ness" to deliberate government strategy or lack of capacity. Most, however, do not consider the role of private social media companies, to whom the state delegates information controls. I suggest that the apparent incompleteness of censorship is largely a result of principal-agent problems that arise due to misaligned incentives of government principals and private media company agents. Using a custom dataset of annotated leaked documents from a social media company, Sina Weibo, I find that 16% of directives from the government are disobeyed by Sina Weibo and that disobedience is driven by Sina's concerns about censoring more strictly than com- petitor Tencent. I also find that the fragmentation inherent in the Chinese political system exacerbates this principal agent problem. I demonstrate this by retrieving actual censored content from large databases of hundreds of millions of Sina Weibo posts and measuring the performance of Sina Weibo's censorship employees across a range of events. This paper contributes to our understanding of media control in China by uncovering how market competition can lead media companies to push back against state directives and increase space for counterhegemonic discourse. ∗Postdoctoral Fellow, Program in Quantitative Social Science, Dartmouth College, Silsby Hall, Hanover, NH 03755 (E-mail: [email protected]). 1 Introduction Why do scathing criticisms, allegations of government corruption, and content about collective action make it past the censors in China? Past works have theorized that regime strategies or state-society conflicts are the reason for incomplete censorship. -
Effective Censorship: Maintaining Control in China
University of Pennsylvania ScholarlyCommons CUREJ - College Undergraduate Research Electronic Journal College of Arts and Sciences 2010 Effective Censorship: Maintaining Control In China Michelle (Qian) Yang University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/curej Part of the Political Science Commons Recommended Citation Yang, Michelle (Qian), "Effective Censorship: Maintaining Control In China" 01 January 2010. CUREJ: College Undergraduate Research Electronic Journal, University of Pennsylvania, https://repository.upenn.edu/curej/118. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/curej/118 For more information, please contact [email protected]. Effective Censorship: Maintaining Control In China Keywords censorship, china, incentives, Social Sciences, Political Science, Devesh Kapur, Kapur, Devesh Disciplines Political Science This article is available at ScholarlyCommons: https://repository.upenn.edu/curej/118 Effective Censorship: Maintaining Control in China Michelle Yang April 09, 2010 Acknowledgments My initial interest in this thesis topic was generated during the summer of 2009 when I was interning in Beijing. There, I had found myself unable to access a large portion of the websites I’ve grown so accustomed to in my everyday life. I knew from then that I wanted to write about censorship in China. Since that summer, the scope of the topic has changed greatly under the careful guidance of Professor Devesh Kapur. I am incredibly grateful for all the support he has given me during this entire process. This final thesis wouldn’t be what it is today without his guidance. Professor Kapur, thank you for believing in me and for pushing me to complete this thesis! I would also like to extend my gratitude to both Professor Doherty-Sil and Professor Goldstein for taking time out of their busy schedules to meet with me and for providing me with indispensible advice. -
Internet Landscape in Mainland China NPD Sep 14 2017
Internet Landscape in China Yali Z. Liu Internet Landscape and Peering in China, GPF 12.0 Content n China Internet Market Overview n Regulatory Environment n Data Center & Interconnect n ICP Beian (Permit to go Online in China) 2 Internet Landscape in China, NPD 2017 Internet Market in China TOP 10 INTERNET COUNTRIES -2017 ** Highest of Internet Users* With the Highest Number of Internet Users n Internet User 751 million n Mobile Internet User 724 million n Mobile Payment User 502 million * Source:CNNIC, Data as of June 2017 ** Source:Internet WorlD Stats, Data as of June 2017 3 Internet Landscape in China, NPD 2017 Broadband ISP in China 2012-2017Q2 ISP BroadbanD Users Distribution Current state 80.00% 60.00% n Top two ISP 40.00% 20.00% n More meDium & small ISPs 0.00% 2012 2013 2014 2015 2016 2017Q2 China Telecom China Unicom Others 2012 2013 2014 2015 2016 2017Q2 China Telecom 58.81% 56% 53.16% 54.14% 41.43% 41.85% China Unicom 26.36% 26.65% 29.19% 28.36% 25.31% 25.13% Others 14.83% 17.35% 17.65% 17.50% 33.26% 33.02% (Data sources: CNZZ) 4 Internet Landscape in China, NPD 2017 Internet Content - plugins, sites apps and keywords 5 Internet Landscape in China, NPD 2017 Alternatives 6 Internet Landscape in China, NPD 2017 Governance Content Cyberspace Administration SAPPRFT MIIT State Administration of Ministry of Industry & Press, Publication, Radio, License Video Information Technology Film and Television 7 Internet Landscape in China, NPD 2017 Cybersecurity Law & License Requirement n First comprehensive law regulating network security -
The Rural Video Influencers in China: on the New Edge of Urbanization
THE RURAL VIDEO INFLUENCERS IN CHINA: ON THE NEW EDGE OF URBANIZATION A Thesis Presented to the Faculty of the Graduate School of Cornell University In Partial Fulfillment of the Requirements for the Degree of Master of Arts by Xinwen Zhang May 2020 © 2020 Xinwen Zhang ABSTRACT On the new media platforms in China, especially the video platforms, some rural content has become quite influential, which is, to some extent, inconsistent with people's impression of the vulnerable position of rural areas the urban-rural inequality. This thesis studied some of the most popular the rural content producers with the close reading of their videos, explaining how they frame themselves and their artworks and what kind of "rurality" is performed to the audiences. While the audience might assign them as rural figures, these people were on the edge of the urban and the rural as they had a shared history as some people who were from the rural areas, spent a period of their lives as migrant workers, and finally became video influencers performing some kind of rural lifestyle. BIOGRAPHICAL SKETCH Xinwen Zhang was born in Shenyang, China, and spent the first 18 years of her life there. Then, she went to Sun Yat-sen University and entered Boya college, which sets no determined major and emphasizes on text close reading to explore potential for students. She finally chose anthropology as the major and researched the breakfast stalls in New Phoenix Village. She went to the village and had close contact with the migrant workers running breakfast stalls and people at breakfast, mainly focusing on the population identification, identity cognition, and community construction of the migrant population as well as their dilemma. -
SCO “Peace Mission” 2012 Promotes Security Myths
SCO “Peace Mission” 2012 Promotes Security Myths Roger N. McDermott The security dimension of the Shanghai Cooperation plaining that heavy equipment, strategic bombers and Organization (SCO), which consists of Russia, China, submarines contradicted the official claims of the exer- Kazakhstan, Kyrgyzstan, Tajikistan and Uzbekistan, cises having an anti-terrorist scenario. Uzbekistan has focuses on combatting the three “evils” of terrorism, only participated in one Peace Mission in 2007, limiting extremism and separatism. The organization has become its involvement to sending a small number of officers to closely associated with the joint biannual “Peace Mission” the command-staff element of the exercise. Although no military exercises, which has prompted some observers to official explanation was offered by Tashkent to explain its overestimate the organization’s emerging military dimen- stance on Peace Mission 2012, it may have been influ- sion. The ninth Peace Mission exercise, aimed at showcas- enced by tense bilateral relations with Tajikistan, which ing advances in military cooperation and the anti-terrorist include mining the border and enforcing a visa regime capabilities of the SCO, was staged on 8-14 June 2012 in between both countries. Tashkent also denied an official Tajikistan. request to allow Kazakhstan to send troops and military Moscow is seeking to boost its security apparatus hardware to transit through Uzbek territory to Tajikistan beyond SCO’s information sharing Regional Antiterror- rendering the whole display of SCO unity entirely open ist Centre (RATS) in Tashkent. It also promotes a joint to question. military anti-terrorist dimension modelling Peace Mis- Peace Mission 2012 was the smallest in the series of sion exercises around the bilateral prototype with the Peo- exercises involving only 2,000 personnel, including 369 ple’s Liberation Army (PLA) conducted under the SCO from the PLA and 350 Russian servicemen (Peace Mission banner in 2003. -
Gateways, Sieves, and Domes: on the Infrastructural Topology of the Chinese Stack
International Journal of Communication 15(2021), 2669–2692 1932–8036/20210005 Gateways, Sieves, and Domes: On the Infrastructural Topology of the Chinese Stack GABRIELE DE SETA1 University of Bergen, Norway This article proposes a topological model capable of accounting for the scale and complexity of China’s digital infrastructure. Beginning with the troubled development of a submarine data cable between Los Angeles and Hong Kong, it identifies the limitations of topographical analyses of ICTs and then reviews theorizations of “the stack” as a topological model of planetary computation. To situate the stack model in the Chinese context, I draw on 3 case studies—QR codes, filtering, and cybersovereignty— exemplifying three topological configurations: the gateway, the sieve, and the dome. These configurations expand the conceptual vocabulary of the stack model at different scales, and provide useful tools for the analysis of computational infrastructures in Asia and beyond. Keywords: China, computation, infrastructure, platforms, sovereignty, stack, topology Unraveling a 12,971-km Cable In 2016, Google and Facebook announced a partnership with the Pacific Light Data Communication Co., Ltd. (PLDC), a broadband communications service provider based in Hong Kong. The partnership revolved around a 12,971-km-long submarine cable crossing the Pacific Ocean from Hermosa Beach, a town near Los Angeles, California, to Deep Water Bay, on the south of Hong Kong Island. Once completed, the Pacific Light Cable Network (PLCN) cable would afford a data transmission rate of 144 terabytes per second, connecting the United States to Hong Kong with one of the lowest latencies worldwide (Hecht, 2018). From the PLDC side, this partnership was framed as an important step in Pacific Rim networking, “the initial step in PLCN’s construction of a global network” (Moss, 2016, para. -
Canadian Cross-Border Data: Your Data May Be Heading South Even When You Are Not
Canada Institute | May 2019 Canadian Cross-Border Data: Your Data May Be Heading South Even When You Are Not By Jacqueline Orr Canadian data: what goes where? Canada is fast becoming a technology powerhouse with cities across the country such as Waterloo, Calgary, Toronto, Montreal, and Edmonton transforming into tech hubs. They promise that their research centers and internet companies are going to light the way for Canada’s innovation economy. But the state of Canada’s internet is increasingly becoming an oxymoron. While Canada’s internet economy might be self-sustaining, the Canadian internet itself is not. Issues of territoriality are fluid and unbound. This is because Canada’s network infrastructure relies on American networks to transfer and store data. But, when Canadian data enters the United States, it becomes foreign data and is not protected by the same privacy rights as those accorded to U.S. domestic data and its owners. CIRA, the Canadian Internet Registration Authority, states that three-quarters of the Canadian population spends three to four hours a day online.1 CIRA also reports 64 percent of Canadians are concerned about the security of their personal information when it is routed through the United States. Are these concerns justified? This Canada Institute briefing explores key questions about cross-border data travel to better understand the risks and opportunities facing Canadians in an increasingly inter-connected world. There is a glossary at the end of the document. Is it legal for the U.S. government to collect data from Canadians? Yes. U.S. government agencies may collect any foreign data that crosses into U.S. -
Network Sovereignty: Understanding the Implications of Tribal Broadband Networks
Network Sovereignty: Understanding the Implications of Tribal Broadband Networks Marisa Elena Duarte A dissertation submitted in partial fulfillment of the requirement for the degree of Doctor of Philosophy University of Washington 2013 Reading Committee: Cheryl A. Metoyer Raya Fidel Maria Elena Garcia David Levy Adam Moore Program Authorized to Offer Degree: Information School i © Copyright 2013 Marisa Elena Duarte ii Abstract For tribal leaders, bringing reliable, affordable broadband Internet service to Indian Country is a matter of self-determination. At this point in history, tribal leaders enforce the sovereign rights of tribes by communicating through information and communication technologies (ICTs) mobilized to work across powerful institutions. Tribal leaders who command the processes of broadband Internet deployment within their communities increase their capacity to support the health of tribal lands, waters, and peoples. Whereas freedom of expression and the exercise of all other human rights through the Internet is a human right, and the infrastructure for connecting to the Internet is essential for citizens to self-govern, so does the U.S. federal government, under obligation of the trust relationship they share with federally-recognized tribes, have a responsibility to support the deployment of broadband Internet infrastructure—including networks, devices, spectrum, technical expertise, and policies—throughout Indian Country. This qualitative inquiry reveals how tribal leaders who deploy broadband Internet to their communities must contend with national telecommunications policy, neighboring deployment strategies, regulatory matters, and the development of steady revenue streams to advance robust broadband network design and services. As each of these intersects with the sovereign rights of tribes, it is possible to conceptualize sociotechnical dimensions to future exercises of tribal sovereignty. -
Shanghai Cooperation Organization (SCO)
Implementation of the International Covenant on Civil and Political Rights in Kazakhstan A Parallel NGO Submission by Human Rights in China June 3, 2011 ATTACHMENT A: Shanghai Cooperation Organization and Counter-Terrorism Fact Sheet Established: June 2001 Member states: China, the Russian Federation, Kazakhstan, Kyrgyzstan, Tajikistan, and Uzbekistan Combined land area and population: 30,189,000 square kilometers; 1.5 billion people Purpose: “Cooperation in the maintenance and strengthening of peace, security and stability”; jointly counteracting “terrorism, separatism and extremism in all their manifestations”; and fighting against “illicit narcotics, arms trafficking and other types of criminal activity.” Affiliated states: Observer status states: India, Iran, Mongolia, and Pakistan; Dialogue partners: Belarus and Sri Lanka; Other affiliates: Afghanistan (SCO-Afghanistan Contact Group). INTERNATIONAL COUNTER-TERRORISM FRAMEWORK CRITERIA FOR TERRORISM There is not yet an internationally-agreed upon definition of terrorism. However, Security Council Resolution 1566 stipulates three criteria as a baseline for establishing terrorism: the offence is within the scope of and as defined in the international conventions and protocols relating to terrorism; the intention is to cause death or serious bodily injury, or the taking of hostages; and the purpose is to provoke a state of terror in the public, intimidate a population or compel a government or an international organization to do or to abstain from doing any act. The UN Special Rapporteur on the promotion and protection of human rights and fundamental freedoms while countering terrorism stated: “Crimes not having the quality of terrorism, regardless of how serious, should not be the subject of counter-terrorist legislation. Nor should conduct that does not bear the quality of terrorism be the subject of counter-terrorism measures.” RESPECT FOR HUMAN RIGHTS AND RULE OF LAW The UN, particularly over the past decade, has emphasized the importance of respect for human rights in counter-terrorism efforts. -
Is China Prepared for Global Terrorism? Xinjiang and Beyond
IS CHINA PREPARED FOR GLOBAL TERRORISM? XINJIANG AND BEYOND DANIEL L. BYMAN AND ISRAA SABER SEPTEMBER 2019 EXECUTIVE SUMMARY While China has never been a particularly strong counterterrorism partner for the United States, recent China has long faced low-level violence from the East tensions in trade and rhetoric make cooperation Turkestan Islamic Movement (ETIM), which seeks an especially unlikely in the near to medium term. independent Xinjiang. To counter the ETIM and other Differences in approaches to technology usage separatist Uighurs, the Chinese Communist Party and oversight and criticisms of China’s human (CCP) has passed laws regulating, and in some cases rights violations have added to the tension. restricting, expressions of Islamic and Turkic identity. Though, superficially, the United States and other Such levels of control have been used elsewhere in liberal democracies are still setting the global China where the CCP has felt threatened by separatist counterterrorism agenda, China has found opportunity movements. Since the 2014 “Strike Hard” campaign, to independently strengthen ties with states facing China’s crackdown in Xinjiang has escalated to terrorism threats. If China moves towards taking a include internment camps, forced labor, and daily leadership role in countering terrorism and its policies indoctrination programs. The CCP has also made great become the future standard, counterterrorism could use of technological advancements to surveil Xinjiang become an additional area of contention between residents. Besides surveillance cameras equipped Beijing and Washington. with facial recognition, the government also collects information such as biometric data, data usage, and location. This sweeping approach is used to combat INTRODUCTION what China considers to be a serious terrorism threat. -
A Structural Analysis of Counter-Terrorism Legal Architecture in China, 33 Emory Int'l L
Emory International Law Review Volume 33 Issue 3 2019 Fighting the "Three Evils": A Structural Analysis of Counter- Terrorism Legal Architecture in China Enshen Li Follow this and additional works at: https://scholarlycommons.law.emory.edu/eilr Recommended Citation Enshen Li, Fighting the "Three Evils": A Structural Analysis of Counter-Terrorism Legal Architecture in China, 33 Emory Int'l L. Rev. 311 (2019). Available at: https://scholarlycommons.law.emory.edu/eilr/vol33/iss3/1 This Article is brought to you for free and open access by the Journals at Emory Law Scholarly Commons. It has been accepted for inclusion in Emory International Law Review by an authorized editor of Emory Law Scholarly Commons. For more information, please contact [email protected]. LIPROOFS_5.23.19 5/23/2019 10:00 AM FIGHTING THE “THREE EVILS”: A STRUCTURAL ANALYSIS OF COUNTER-TERRORISM LEGAL ARCHITECTURE IN CHINA Enshen Li* ABSTRACT In the aftermath of September 11 attacks, China has not been immune to the global trend of destructive terrorism. However, China’s perceptions of terrorism and legal responses to it greatly diverge from those of other countries. This Article first seeks to understand the cause, source, and impact of terrorist threats in China, known as “Three Evils”—terrorism, extremism, and separatism, through a critical inquiry of the country’s ethnic and religious policies. It then proceeds to delineate China’s legal framework for combating the “Three Evils” to explore the cultural characteristics of the government’s approach against these rising threats. Tracing the evolution of the country’s counter-terrorism laws and policies, this Article argues that China has developed an operational infrastructure composed of four strands to fight terrorism: crackdown, criminalization, control, and cooperation.