Exporting Digital Authoritarianism: the Russian and Chinese Models Alina Polyakova and Chris Meserole
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Internet Surveillance in China
The Architecture of Control: Internet Su rveillance in China James A. Lewis , Center for Strategic and International Studies July 200 6 Security concerns shape China’s official internet and information technology strateg ies . Th ese include concerns shared by many cou nt ries: promoting a strong and growing economy , providing information assurance , and defending against foreign intrusions into China’s information space . Most importantly for the Chinese, information security include s a political element not foun d in many other nations – c ontrol by the party and the state over communications and the flow of informa tion . The rapid spread of internet access and mobile communications pose a serious challenge to this goal. In response, China’s security apparatus is reorienting its informational defenses. In the past, the emphasi s was on blocking access - the “great firewall.” In the future, the emphasis will be on the monitoring and surveillance of online activities. China’s primary objective in internet securi ty is political – preventing IT from eroding the regime’s authority. Information security is defined in China as “a comprehensive concept understood in a broad sense, and it involves political, economic, cultural, ideological, media, social and military l evel or field. ” It includes “data, system, network, infrastructure .”1 Chin ese officials worry about the potential of the Internet to contribute to the loss of state secrets , offer new avenues for organizing dissent and opposition , and spread “harmful inf ormation. ” This makes controlling access to "harmful network information” and the ability to monitor and intercept communications top priorities .2 For China’s leadership, one particular set of event s demonstrated the risks of not securing networks. -
Egypt Digital Rights Landscape Report
ids.ac.uk Digital Rights in Closing Civic Space: Lessons from Ten African Countries 209 Egypt Digital Rights Landscape Report Egypt Digital Rights Landscape Report Mohamed Farahat This is an Open Access report distributed under the terms of the Creative Commons Attribution 4.0 International licence (CC BY), which permits unrestricted use, distribution, and reproduction in any medium, provided the original authors and source are credited and any modifications or adaptations are indicated. This report is part of ‘Digital Rights in Closing Civic Space: Lessons from Ten African Countries’; the Introduction is also recommended reading. © 2021 Mohamed Farahat © Institute of Development Studies. DOI: 10.19088/IDS.2021.014 ids.ac.uk Digital Rights in Closing Civic Space: Lessons from Ten African Countries 210 Egypt Digital Rights Landscape Report 1. Introduction Egypt has experienced many political and social changes prior to and since the 2011 uprising. These changes have had a significant impact on civic space offline, as well as online. Digital rights are simply human rights in online spaces and are recognised as being of central importance. This is especially true when closing civic space in the physical world means that opening civic space online is a necessary last resort. The coronavirus (Covid-19) pandemic has highlighted the importance of digital rights, especially for vulnerable groups such as refugees and people in rural and remote areas. The main objective of this report is to give an overview of digital rights in Egypt, especially in the context of freedom of expression and freedom of assembly, the right to access the internet, and for access to information, and the right to knowledge; and to explore the impacts of the political context on civic space in general and digital rights in particular. -
Who Set the Narrative? Assessing the Influence of Chinese Media in News Coverage of COVID-19 in 30 African Countries the Size Of
Who Set the Narrative? Assessing the Influence of Chinese Media in News Coverage of COVID-19 in 30 African Countries The size of China’s State-owned media’s operations in Africa has grown significantly since the early 2000s. Previous research on the impact of increased Sino-African mediated engagements has been inconclusive. Some researchers hold that public opinion towards China in African nations has been improving because of the increased media presence. Others argue that the impact is rather limited, particularly when it comes to affecting how African media cover China- related stories. This paper seeks to contribute to this debate by exploring the extent to which news media in 30 African countries relied on Chinese news sources to cover China and the COVID-19 outbreak during the first half of 2020. By computationally analyzing a corpus of 500,000 news stories, I show that, compared to other major global players (e.g. Reuters, AFP), content distributed by Chinese media (e.g. Xinhua, China Daily, People’s Daily) is much less likely to be used by African news organizations, both in English and French speaking countries. The analysis also reveals a gap in the prevailing themes in Chinese and African media’s coverage of the pandemic. The implications of these findings for the sub-field of Sino-African media relations, and the study of global news flows is discussed. Keywords: China-Africa, Xinhua, news agencies, computational text analysis, big data, intermedia agenda setting Beginning in the mid-2010s, Chinese media began to substantially increase their presence in many African countries, as part of China’s ambitious going out strategy that covered a myriad of economic activities, including entertainment, telecommunications and news content (Keane, 2016). -
Egypt: Freedom on the Net 2017
FREEDOM ON THE NET 2017 Egypt 2016 2017 Population: 95.7 million Not Not Internet Freedom Status Internet Penetration 2016 (ITU): 39.2 percent Free Free Social Media/ICT Apps Blocked: Yes Obstacles to Access (0-25) 15 16 Political/Social Content Blocked: Yes Limits on Content (0-35) 15 18 Bloggers/ICT Users Arrested: Yes Violations of User Rights (0-40) 33 34 TOTAL* (0-100) 63 68 Press Freedom 2017 Status: Not Free * 0=most free, 100=least free Key Developments: June 2016 – May 2017 • More than 100 websites—including those of prominent news outlets and human rights organizations—were blocked by June 2017, with the figure rising to 434 by October (se Blocking and Filtering). • Voice over Internet Protocol (VoIP) services are restricted on most mobile connections, while repeated shutdowns of cell phone service affected residents of northern Sinai (Se Restrictions on Connectivity). • Parliament is reviewing a problematic cybercrime bill that could undermine internet freedom, and lawmakers separately proposed forcing social media users to register with the government and pay a monthly fee (see Legal Environment and Surveillance, Privacy, and Anonymity). • Mohamed Ramadan, a human rights lawyer, was sentenced to 10 years in prison and a 5-year ban on using the internet, in retaliation for his political speech online (see Prosecutions and Detentions for Online Activities). • Activists at seven human rights organizations on trial for receiving foreign funds were targeted in a massive spearphishing campaign by hackers seeking incriminating information about them (see Technical Attacks). 1 www.freedomonthenet.org Introduction FREEDOM EGYPT ON THE NET Obstacles to Access 2017 Introduction Availability and Ease of Access Internet freedom declined dramatically in 2017 after the government blocked dozens of critical news Restrictions on Connectivity sites and cracked down on encryption and circumvention tools. -
Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest
Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest Patricia Moloney Figliola Specialist in Internet and Telecommunications Policy May 18, 2018 Congressional Research Service 7-5700 www.crs.gov R45200 Internet Freedom in China: U.S. Government and Private Sector Activity Summary By the end of 2017, the People’s Republic of China (PRC) had the world’s largest number of internet users, estimated at over 750 million people. At the same time, the country has one of the most sophisticated and aggressive internet censorship and control regimes in the world. PRC officials have argued that internet controls are necessary for social stability, and intended to protect and strengthen Chinese culture. However, in its 2017 Annual Report, Reporters Without Borders (Reporters Sans Frontières, RSF) called China the “world’s biggest prison for journalists” and warned that the country “continues to improve its arsenal of measures for persecuting journalists and bloggers.” China ranks 176th out of 180 countries in RSF’s 2017 World Press Freedom Index, surpassed only by Turkmenistan, Eritrea, and North Korea in the lack of press freedom. At the end of 2017, RSF asserted that China was holding 52 journalists and bloggers in prison. The PRC government employs a variety of methods to control online content and expression, including website blocking and keyword filtering; regulating and monitoring internet service providers; censoring social media; and arresting “cyber dissidents” and bloggers who broach sensitive social or political issues. The government also monitors the popular mobile app WeChat. WeChat began as a secure messaging app, similar to WhatsApp, but it is now used for much more than just messaging and calling, such as mobile payments, and all the data shared through the app is also shared with the Chinese government. -
Ant Financial Case Study.Pdf
EO INTELLIGENCE Cover photo credit to IC photo Deciphering the Trillion-valued Unicorn -Ant Financial Case Study Copyright ©2019 EO Intelligence. All Rights Reserved. EO INTELLIGENCE INTRODUCTION According to the World Development Report 2019 issued by the World Bank in October 2018, Ant Financial was rated as the most valuable fintech company in the world. As a financial services company that has just spun off from Alibaba Group for four years, it does deserve the title "the most valuable company" with a valuation of USD 160 billion. In China, there is a huge gap between the lofty valuation of Ant Financial and the valuation of other unicorn companies. It can be seen that Ant Financial is growing rapidly and outperforming financial institutions that have been developing for decades in China and even the world. Ant Financial cannot be labeled as a simple fintech or a financial company, because in terms of the 15-year accumulation and development from Alipay to Ant Financial, both the innovation capability of its financial business and the technical output capability serving a third-party financial and non-financial institution are indispensable consideration factors for its valuation of USD 160 billion. Why is Ant Financial selected? By making a summary and analysis on the development of Ant Financial, EO Intelligence hopes to have a deep understanding of the impetus for the industry brought by the combination of technology and finance, and the logic behind it. The scale and uniqueness of the Ant Financial ecosystem may not be replicable today, but the exploration course of Ant Financial will definitely give practitioners food for thought. -
Retweeting Through the Great Firewall a Persistent and Undeterred Threat Actor
Retweeting through the great firewall A persistent and undeterred threat actor Dr Jake Wallis, Tom Uren, Elise Thomas, Albert Zhang, Dr Samantha Hoffman, Lin Li, Alex Pascoe and Danielle Cave Policy Brief Report No. 33/2020 About the authors Dr Jacob Wallis is a Senior Analyst working with the International Cyber Policy Centre. Tom Uren is a Senior Analyst working with the International Cyber Policy Centre. Elise Thomas is a Researcher working with the International Cyber Policy Centre. Albert Zhang is a Research Intern working with the International Cyber Policy Centre. Dr Samanthan Hoffman is an Analyst working with the International Cyber Policy Centre. Lin Li is a Researcher working with the International Cyber Policy Centre. Alex Pascoe is a Research Intern working with the International Cyber Policy Centre. Danielle Cave is Deputy Director of the International Cyber Policy Centre. Acknowledgements ASPI would like to thank Twitter for advanced access to the takedown dataset that formed a significant component of this investigation. The authors would also like to thank ASPI colleagues who worked on this report. What is ASPI? The Australian Strategic Policy Institute was formed in 2001 as an independent, non‑partisan think tank. Its core aim is to provide the Australian Government with fresh ideas on Australia’s defence, security and strategic policy choices. ASPI is responsible for informing the public on a range of strategic issues, generating new thinking for government and harnessing strategic thinking internationally. ASPI International Cyber Policy Centre ASPI’s International Cyber Policy Centre (ICPC) is a leading voice in global debates on cyber and emerging technologies and their impact on broader strategic policy. -
Xi Jinping's Address to the Central Conference On
Xi Jinping’s Address to the Central Conference on Work Relating to Foreign Affairs: Assessing and Advancing Major- Power Diplomacy with Chinese Characteristics Michael D. Swaine* Xi Jinping’s speech before the Central Conference on Work Relating to Foreign Affairs—held November 28–29, 2014, in Beijing—marks the most comprehensive expression yet of the current Chinese leadership’s more activist and security-oriented approach to PRC diplomacy. Through this speech and others, Xi has taken many long-standing Chinese assessments of the international and regional order, as well as the increased influence on and exposure of China to that order, and redefined and expanded the function of Chinese diplomacy. Xi, along with many authoritative and non-authoritative Chinese observers, presents diplomacy as an instrument for the effective application of Chinese power in support of an ambitious, long-term, and more strategic foreign policy agenda. Ultimately, this suggests that Beijing will increasingly attempt to alter some of the foreign policy processes and power relationships that have defined the political, military, and economic environment in the Asia- Pacific region. How the United States chooses to respond to this challenge will determine the Asian strategic landscape for decades to come. On November 28 and 29, 2014, the Central Chinese Communist Party (CCP) leadership convened its fourth Central Conference on Work Relating to Foreign Affairs (中央外事工作会)—the first since August 2006.1 The meeting, presided over by Premier Li Keqiang, included the entire Politburo Standing Committee, an unprecedented number of central and local Chinese civilian and military officials, nearly every Chinese ambassador and consul-general with ambassadorial rank posted overseas, and commissioners of the Foreign Ministry to the Hong Kong Special Administrative Region and the Macao Special Administrative Region. -
The Limits of Commercialized Censorship in China
The Limits of Commercialized Censorship in China Blake Miller∗ September 27, 2018 Abstract Despite massive investment in China's censorship program, internet platforms in China are rife with criticisms of the government and content that seeks to organize opposition to the ruling Communist Party. Past works have attributed this \open- ness" to deliberate government strategy or lack of capacity. Most, however, do not consider the role of private social media companies, to whom the state delegates information controls. I suggest that the apparent incompleteness of censorship is largely a result of principal-agent problems that arise due to misaligned incentives of government principals and private media company agents. Using a custom dataset of annotated leaked documents from a social media company, Sina Weibo, I find that 16% of directives from the government are disobeyed by Sina Weibo and that disobedience is driven by Sina's concerns about censoring more strictly than com- petitor Tencent. I also find that the fragmentation inherent in the Chinese political system exacerbates this principal agent problem. I demonstrate this by retrieving actual censored content from large databases of hundreds of millions of Sina Weibo posts and measuring the performance of Sina Weibo's censorship employees across a range of events. This paper contributes to our understanding of media control in China by uncovering how market competition can lead media companies to push back against state directives and increase space for counterhegemonic discourse. ∗Postdoctoral Fellow, Program in Quantitative Social Science, Dartmouth College, Silsby Hall, Hanover, NH 03755 (E-mail: [email protected]). 1 Introduction Why do scathing criticisms, allegations of government corruption, and content about collective action make it past the censors in China? Past works have theorized that regime strategies or state-society conflicts are the reason for incomplete censorship. -
Security Analytics for Enterprise Threat Detection
MADE: Security Analytics for Enterprise Threat Detection Alina Oprea Zhou Li Northeastern University University of California, Irvine [email protected] [email protected] Robin Norris Kevin Bowers EMC/Dell CIRC RSA [email protected] [email protected] ABSTRACT These concerns affect not only individuals, but enterprises as well. Enterprises are targeted by various malware activities at a staggering The enterprise perimeter is only as strong as its weakest link and rate. To counteract the increased sophistication of cyber attacks, that boundary is becoming increasingly fuzzy with the prevalence most enterprises deploy within their perimeter a number of secu- of remote workers using company-issued computers on networks rity technologies, including firewalls, anti-virus software, and web outside of the enterprise control. Enterprises attempt to combat cyber proxies, as well as specialized teams of security analysts forming attacks by deploying firewalls, anti-virus agents, web proxies and Security Operations Centers (SOCs). other security technologies, but these solutions cannot detect or In this paper we address the problem of detecting malicious ac- respond to all malware. Large organizations employ “hunters” or tivity in enterprise networks and prioritizing the detected activities tier 3 analysts (part of the enterprise Security Operations Center – according to their risk. We design a system called MADE using ma- SOC) [44] to search for malicious behavior that has evaded their chine learning applied to data extracted from security logs. MADE automated tools. Unfortunately, this solution is not scalable, both due leverages an extensive set of features for enterprise malicious com- to the lack of qualified people and the rate at which such malware is munication and uses supervised learning in a novel way for prior- invading the enterprise. -
Operation Black Atlas
A TrendLabs Report Operation Black Atlas How Modular Botnets are Used in PoS Attacks TrendLabs Security Intelligence Blog Jay Yaneza and Erika Mendoza Trend Micro Cyber Safety Solutions Team December 2015 Trend Micro | Operation Black Atlas: How Modular Botnets are Used in Attacks Contents Introduction ............................................................................................................ 3 Technical Details ................................................................................................... 3 Probing and Penetrating the Environment ......................................................... 3 Point-of-Sale Threats ......................................................................................... 5 New Items in NewPosThings ............................................................................. 7 Use of Known PoS Malware Threats ............................................................... 10 Gorynych or Diamond Fox ............................................................................... 13 Spy Net RAT .................................................................................................... 20 Victimology .......................................................................................................... 21 Attribution ............................................................................................................ 23 Conclusion ........................................................................................................... 25 TREND MICRO LEGAL -
Spring 2011 Cover Thru Page 11.Indd
ANGEL TALES MAGAZINE Spring/Summer 2011 Annual Report The Beck Family and the Launch of the GusMobile Spay/Neuter Van National Impact Rejuvenation Tips PAWS Chicago’s No Kill model spreading across for Older Pets the country www.pawschicago.org Spring 2011 cover thru page 11.indd 1 5/24/11 9:42:30 AM PAWS Chicago Dottie Cross Leaves a Legacy for Guardian ngel the Animals AProgram In 2004, Dottie Cross retired to pursue her dream of living on the road with her beloved rescue dogs – Biscuit, Jenny and Gus. Combining her interests as an adventurer and an animal lover, Dottie now spends her time rock climbing and educating people in Mexico on how to care for their pets in an effort to reduce the number of stray dogs living on the streets. However, while caring for other’s animals, a sudden accident put the future of her own dogs in perspective. “Knowing that my dogs will be loved and cared for after my death is a wonderful feeling.” Last year, Dottie fell while rock climbing and shattered her leg. As a single woman, she was concerned that, had she died, her dogs would be put down without having a plan in place for their care. Through the PAWS Chicago Guardian Angel program, Dottie has While in the process of updating her ensured the futures of Biscuit (5, Mix Breed), Jenny (3, Beagle Mix) trust, Dottie read about PAWS Chicago’s and Gus (3, Pit Bull Mix), should she be unable to care for them. Guardian Angel program and chose to make a planned gift that would enable her to provide shelter, food, veterinary care, medicines and loving new homes for countless animals long after she was gone.