Google and the Digital Divide CHANDOS INTERNET SERIES

Total Page:16

File Type:pdf, Size:1020Kb

Google and the Digital Divide CHANDOS INTERNET SERIES Google and the Digital Divide CHANDOS INTERNET SERIES Chandos’ new series of books are aimed at all those individuals interested in the internet. They have been specially commissioned to provide the reader with an authoritative view of current thinking. If you would like a full listing of current and forthcoming titles, please visit our website www.chandospublishing.com or email [email protected] or telephone +44 (0) 1223 891358. New authors: we are always pleased to receive ideas for new titles; if you would like to write a book for Chandos, please contact Dr Glyn Jones on email [email protected] or telephone number +44 (0) 1993 848726. Bulk orders: some organisations buy a number of copies of our books. If you are interested in doing this, we would be pleased to discuss a discount. Please email [email protected] or telephone +44 (0) 1223 891358. Google and the Digital Divide The bias of online knowledge ELAD SEGEV Chandos Publishing Oxford • Cambridge • New Delhi Chandos Publishing TBAC Business Centre Avenue 4 Station Lane Witney Oxford OX28 4BN UK Tel: +44 (0) 1993 848726 Email: [email protected] www.chandospublishing.com Chandos Publishing is an imprint of Woodhead Publishing Limited Woodhead Publishing Limited Abington Hall Granta Park Great Abington Cambridge CB21 6AH UK www.woodheadpublishing.com First published in 2010 ISBN: 978 1 84334 565 7 © Elad Segev, 2010 British Library Cataloguing-in-Publication Data. A catalogue record for this book is available from the British Library. All rights reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form, or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the Publishers. This publication may not be lent, resold, hired out or otherwise disposed of by way of trade in any form of binding or cover other than that in which it is published without the prior consent of the Publishers. Any person who does any unauthorised act in relation to this publication may be liable to criminal prosecution and civil claims for damages. The Publishers make no representation, express or implied, with regard to the accuracy of the information contained in this publication and cannot accept any legal responsibility or liability for any errors or omissions. The material contained in this publication constitutes general guidelines only and does not represent to be advice on any particular matter. No reader or purchaser should act on the basis of material contained in this publication without first taking professional advice appropriate to their particular circumstances. All screenshots in this publication are the copyright of the website owner(s), unless indicated otherwise. Cover design by Hutchins Creative and Itamar Daube. Typeset by Domex e-Data Pvt. Ltd. Printed in the UK and USA. List of figures and tables Figures 2.1 Exclusion mechanisms 31 2.2 Interest conflicts within and between levels 34 3.1 The basic principles of page ranking 51 3.2 Google’s international offices 62 4.1 EPV index by country 91 4.2 VoU index by country 92 4.3 SoS index by country 93 4.4 Content vs. variety of searches 95 4.5 The trade-off between variety and specificity 97 4.6 Hierarchical cluster analysis 98 4.7 Trends of locality (percentage of local queries) 100 4.8 Locality by countries (percentage of local queries) 101 5.1 Frequency of occurrence of countries in Google World News 120 5.2 Frequency of occurrence of countries in Google News 121 5.3 Online news sources by country 122 5.4 Online news articles about Iraq 123 5.5 Online news articles about the USA 123 5.6 Online news articles about Israel 124 ix Google and the Digital Divide 5.7 Online news articles about Palestine 125 5.8 Online news articles about the UN 125 5.9 Online news articles about the EU 126 5.10 The centre of the international network 128 5.11 The international network of the UN 129 5.12 The international network of the EU 130 5.13 The international network of the UK 131 5.14 The international network of Iraq 132 5.15 The international network of China 133 5.16 The international network of Russia 133 5.17 The international network of Israel 135 5.18 The international network by language 138 6.1 Google Maps in New York 146 6.2 Google Maps in Benin City, Nigeria 147 6.3 Google RideFinder in New York 148 6.4 Thai air-force base in Korat 151 6.5 Iran’s nuclear plant in Natanz 151 6.6 The Dutch Ministry of Defence 152 6.7 AFCENT NATO HQ, Brunssum, the Netherlands 153 6.8 The US Naval Observatory 154 6.9 British headquarters in Basra before and after Google’s update 155 6.10 SAS headquarters in Credenhil 156 6.11 Uncensored overlay of the US Naval Observatory 157 6.12 The headquarters of the Swedish National Defence Radio Establishment in Eniro 158 6.13 The headquarters of the Swedish National Defence Radio Establishment in Google Maps 158 B.1 Search topics worldwide 187 B.2 Arts and business searches by country 188 x List of figures and tables Tables 4.1 Weight of economic and political value 87 4.2 A summary of index rankings 94 4.3 Correlation between the EPV and the VoU indices 95 4.4 Correlation between the VoU and the SoS indices 96 4.5 Summary of cluster analysis 99 4.6 Freedom level in 2005 103 5.1 Frequency of occurrence of countries in Google World News by language 136 A.1 Share of searches in the USA 181 A.2 Share of searches worldwide 182 A.3 Share of searches worldwide, April 2004 182 B.1 Countries appearing in the Google Zeitgeist report 184 B.2 Percentage of online users in the observed countries 185 B.3 Categories of search queries (first two levels) 186–7 B.4 Percentage of searches by countries 189 xi About the author Elad Segev is a postdoctoral fellow and lecturer of media and communications at the Hebrew University of Jerusalem and visiting lecturer at Tel Aviv University and Ben Gurion University in Israel. He dedicated his doctorate work at the Research Institute for Law, Politics and Justice at Keele University in England to the study of search engine biases and their social and political implications. He also publishes studies on online news biases, Americanisation, cultural diversity, the digital divide, and new applications and methodologies to utilise data-mining for new media research. The author may be contacted at: Elad Segev PO Box 4092 Zichron Yaaqov 30900 Israel E-mail: [email protected] xiii Acknowledgments I would like to convey my sincere gratitude and appreciation to Professor Costas Constantinou for his insightful intellectual comments and suggestions. A very special thank to Professor Menahem Blondheim who read the entire manuscript and provided a lot of support. Many thanks to Professor Niv Ahituv, Dr Elizabeth Carter and Professor Gadi Wolfsfeld, who provided tremendous assistance with improving the empirical chapters and offered some very useful suggestions. Many thanks to Professor John Vogler and the reflection group at Keele University for the intriguing ideas and scholarly atmosphere. Thanks to Dr Glyn Jones from Chandos Publishing for his useful suggestions and comments, and to Marion Lupu and John Tresman for their beautiful and careful proofreading of the entire manuscript. A very special dedication and thanks to Yuko Hori for her admirable patience, encouragement and support during the process of writing. This book would never have commenced without her. Thanks to Professor Robert Smith for his friendly company and academic inspiration. A warm thank you to my parents, who encouraged and supported my curiosity and eagerness to pursue knowledge from a very early age. Endless thanks to Regula Miesch who apart from linguistic comments and brilliant ideas, always gave me a lot of courage, love and a listening ear in the most critical moments. Finally, thanks to my charming little brothers and friends who kept on reminding me of the ‘other life’ beyond the book. I would like to dedicate this book to all these very dear people who made it possible. xv Preface Technologies are often developed in response to the agendas of powerful social actors. Initially, they shape themselves to the contours of custom; ultimately, they follow paths selected through struggles among groups seeking to turn technologies to their own interests. (DiMaggio et al., 2001: 327 on McGuire and Granovetter, 1998) One of the current concerns of socially informed studies of the internet is to understand the reasons for the so-called digital divide and to assess its implications for everyday life. In this sense, the internet, which is an almost unlimited and expanding information source, increasingly becomes a useful and powerful instrument for the acquisition of knowledge, and such knowledge brings social, political and economic advantages. When searching for information, people turn first, and increasingly only, to the internet (Hinman, 2005). This suggests that using the internet in general and search engines in particular can increase information opportunities but also information inequalities – something that should be carefully studied. As a field of research, the internet provides a rich site to study socio- technological practices, as well as to look at their power implications during the early stages of the diffusion and institutionalisation of a new medium. The internet is a unique medium as it combines a variety of methods and forms of communication, such as mutual interaction, broadcasting, self-searching for information, forum groups, human–computer interaction, and various types of content, e.g.
Recommended publications
  • PDF a Parent and Carer's Guide to Google Safesearch and Youtube Safety Mode
    A parent and carer’s guide to Google SafeSearch and YouTube Safety Mode Google is the most used search engine in the world and users can type in a word, expression, phrase or sentence in more than 100 languages and receive instant results in text, images or videos. YouTube is ranked as the world second largest search engine, with over 1 billion users that each day watch a billion hours of videos. With limited ways to control content, the Google and YouTube platforms can be challenge for parents and carers because there are hundreds of thousands of videos, images and other content that may not be considered appropriate for children or young people. This article explains why it may be useful to filter search results on Google and YouTube and how parents and carers can engage safety settings on these two platforms. Please note – the weblinks in this document are only available in English language. Is Google content appropriate for children and young people? A Google query lasts less than half a second, however there are many more steps involved before a final result is provided. This video from Google illustrates exactly how a Google search works. When Google realized that the results of an unfiltered Google search contained content that is not always appropriate for children, Google then developed SafeSearch so that children could safely find documents, images, and videos within the Google database. Is YouTube content appropriate for children and young people? Google purchased YouTube in 2006 with the idea that YouTube would provide a marketing hub as more viewers and advertisers chose the Internet over television.
    [Show full text]
  • DAVID JULIAN Mcclements
    DAVID JULIAN Honors and Awards MCCLEMENTS Marcel Loncin Research Prize ($50,000). for Basic Research in Foods, Institute of Professor, Department of Food Science, Food Technologists, USA, 2010 University of Massachusetts, Amherst, Stephen S. Chang Award. Outstanding MA 01003 accomplishments in lipid research, (413)-545-1019, (413)-545-1262 American Oil Chemists Society, USA,2010. [email protected] Award for Outstanding Accomplishments in Research and Creative Activity. University of Massachusetts, Amherst Faculty Education Convocation, USA, 2008. University of Leeds, UK, Doctor of Fergus M. Clydesdale Professor of Food Philosophy in Food Science, 1985-1989 Science. Endowed Chair. 7/1/07 – 6/30/12. University of Leeds, UK, Bachelor of Science in Food Science (Hons), 1981- Highly Cited Author in Agricultural 1985 Sciences, ISI Thomson Scientific, Philadelphia. Research and Development Award, Institute of Food Technologists, USA, 2007 Professional Experience 8th Ranked Internationally, Highly Cited 2005 to Present: Professor, Author in Agricultural Sciences, 1996-2006 Department of Food Science, (Ranked by Total Citations). Science University of Massachusetts, Watch, ISI Thomson Scientific, Amherst Philadelphia: DJM – 125 Papers, 1,300 citations. 2000 to 2005: Associate Professor, Department of Food Science, Award for the Advancement of Agricultural University of Massachusetts, and Food Chemistry. Agricultural and Food Amherst Chemistry Division, American Chemical 1994 to 2000: Assistant Professor, Society, USA, 2006 Department of Food Science, University of Massachusetts, Food Chemicals Codex (2005-2006), Amherst National Academies – Committee Member. 1994 to 1994: Senior Research Samuel Cate Prescott Award. Outstanding Fellow, Department of Food Ability in Research in Food Science and Chemistry, University College Technology, Institute of Food Cork, Ireland Technologists, USA, 1999 1992 to 1994: Senior Research Fellow, Department of Food Young Scientist Award.
    [Show full text]
  • Google™ Safesearch™ and Youtube™ Safety Mode
    Google™ SafeSearch™ and YouTube™ Safety Mode Searching the internet is a daily activity and Google™ is often the first port of call for homework, shopping and finding answers to any questions. But it is important to remember that you, or your children, might come across inappropriate content during a search, even if searching the most seemingly harmless of topics. Google SafeSearch is designed to screen out sites that contain sexually explicit content so they don’t show up in your family’s search results. No filter is 100% accurate, but SafeSearch helps you avoid the stuff you’d prefer not to see or have your kids stumble across. ‘Google’, the Google logo and ‘SafeSearch’ are trademarks or registered trademarks of Google Inc. Google SafeSearch and YouTube Safety Mode | 2 Follow these simple steps to set up Google SafeSearch. 1 Open your web browser and go to google.co.uk 2 Click Settings at the bottom of the page, then click Search settings in the pop-up menu that appears. Google SafeSearch and YouTube Safety Mode | 3 3 On the Search Settings page, tick the Filter explicit results box. Then click Save at the bottom of the page to save your SafeSearch settings. 4 If you have a Google account, you can lock SafeSearch on your family’s computer so that filter explicit results is always in place and no-one except you can change the settings. Click on Lock SafeSearch. If you’re not already signed in to your Google account, you’ll be asked to sign in. 5 Once you’re signed in, click on Lock SafeSearch.
    [Show full text]
  • Safesearch: Turn on Or Off
    Google SafeSearch. This information is taken directly from The Google Website SafeSearch: Turn on or off With SafeSearch, you can help prevent adult content from appearing in your search results. No filter is 100 percent accurate, but SafeSearch should help you avoid most of this type of material. Turn SafeSearch on or off 1. Visit the Search Settings page at http://www.google.com/preferences. 2. In the "SafeSearch filters" section: o Turn on SafeSearch by checking the box beside "Filter explicit results." Turning SafeSearch will filter sexually explicit video and images from Google Search result pages, as well as results that might link to explicit content. o Turn off SafeSearch by leaving the box unchecked. With SafeSearch off, we'll provide the most relevant results for your search and may include explicit content when you search for it. 3. Click the Save button at the bottom of the page. Change my settings If you're signed in to your Google Account, you can click Lock SafeSearch to help prevent others from changing your setting. Learn more about locking SafeSearch SafeSearch should remain set as long as cookies are enabled on your computer, although your SafeSearch settings may be reset if you delete your cookies. Learn more Report explicit content If you're trying to have sites or images removed, request to remove information from Google. We do our best to keep SafeSearch as up-to-date and comprehensive as possible, but objectionable content sometimes slips through the cracks. If you have SafeSearch set to filter explicit results, but still see these types of sites or images, please let us know.
    [Show full text]
  • La Sécurité Informatique Edition Livres Pour Tous (
    La sécurité informatique Edition Livres pour tous (www.livrespourtous.com) PDF générés en utilisant l’atelier en source ouvert « mwlib ». Voir http://code.pediapress.com/ pour plus d’informations. PDF generated at: Sat, 13 Jul 2013 18:26:11 UTC Contenus Articles 1-Principes généraux 1 Sécurité de l'information 1 Sécurité des systèmes d'information 2 Insécurité du système d'information 12 Politique de sécurité du système d'information 17 Vulnérabilité (informatique) 21 Identité numérique (Internet) 24 2-Attaque, fraude, analyse et cryptanalyse 31 2.1-Application 32 Exploit (informatique) 32 Dépassement de tampon 34 Rétroingénierie 40 Shellcode 44 2.2-Réseau 47 Attaque de l'homme du milieu 47 Attaque de Mitnick 50 Attaque par rebond 54 Balayage de port 55 Attaque par déni de service 57 Empoisonnement du cache DNS 66 Pharming 69 Prise d'empreinte de la pile TCP/IP 70 Usurpation d'adresse IP 71 Wardriving 73 2.3-Système 74 Écran bleu de la mort 74 Fork bomb 82 2.4-Mot de passe 85 Attaque par dictionnaire 85 Attaque par force brute 87 2.5-Site web 90 Cross-site scripting 90 Défacement 93 2.6-Spam/Fishing 95 Bombardement Google 95 Fraude 4-1-9 99 Hameçonnage 102 2.7-Cloud Computing 106 Sécurité du cloud 106 3-Logiciel malveillant 114 Logiciel malveillant 114 Virus informatique 120 Ver informatique 125 Cheval de Troie (informatique) 129 Hacktool 131 Logiciel espion 132 Rootkit 134 Porte dérobée 145 Composeur (logiciel) 149 Charge utile 150 Fichier de test Eicar 151 Virus de boot 152 4-Concepts et mécanismes de sécurité 153 Authentification forte
    [Show full text]
  • RELX Group Annual Reports and Financial Statements 2015
    Annual Reports and Financial Statements 2015 Annual Reports and Financial Statements 2015 RELX Group is a world-leading provider of information and analytics for professional and business customers across industries. We help scientists make new discoveries, lawyers win cases, doctors save lives and insurance companies offer customers lower prices. We save taxpayers and consumers money by preventing fraud and help executives forge commercial relationships with their clients. In short, we enable our customers to make better decisions, get better results and be more productive. RELX PLC is a London listed holding company which owns 52.9 percent of RELX Group. RELX NV is an Amsterdam listed holding company which owns 47.1 percent of RELX Group. Forward-looking statements The Reports and Financial Statements 2015 contain forward-looking statements within the meaning of Section 27A of the US Securities Act of 1933, as amended, and Section 21E of the US Securities Exchange Act of 1934, as amended. These statements are subject to a number of risks and uncertainties that could cause actual results or outcomes to differ materially from those currently being anticipated. The terms “estimate”, “project”, “plan”, “intend”, “expect”, “should be”, “will be”, “believe”, “trends” and similar expressions identify forward-looking statements. Factors which may cause future outcomes to differ from those foreseen in forward-looking statements include, but are not limited to competitive factors in the industries in which the Group operates; demand for the Group’s products and services; exchange rate fluctuations; general economic and business conditions; legislative, fiscal, tax and regulatory developments and political risks; the availability of third-party content and data; breaches of our data security systems and interruptions in our information technology systems; changes in law and legal interpretations affecting the Group’s intellectual property rights and other risks referenced from time to time in the filings of the Group with the US Securities and Exchange Commission.
    [Show full text]
  • Towards Active SEO 2
    JISTEM - Journal of Information Systems and Technology Management Revista de Gestão da Tecnologia e Sistemas de Informação Vol. 9, No. 3, Sept/Dec., 2012, pp. 443-458 ISSN online: 1807-1775 DOI: 10.4301/S1807-17752012000300001 TOWARDS ACTIVE SEO (SEARCH ENGINE OPTIMIZATION) 2.0 Charles-Victor Boutet (im memoriam) Luc Quoniam William Samuel Ravatua Smith South University Toulon-Var - Ingémédia, France ____________________________________________________________________________ ABSTRACT In the age of writable web, new skills and new practices are appearing. In an environment that allows everyone to communicate information globally, internet referencing (or SEO) is a strategic discipline that aims to generate visibility, internet traffic and a maximum exploitation of sites publications. Often misperceived as a fraud, SEO has evolved to be a facilitating tool for anyone who wishes to reference their website with search engines. In this article we show that it is possible to achieve the first rank in search results of keywords that are very competitive. We show methods that are quick, sustainable and legal; while applying the principles of active SEO 2.0. This article also clarifies some working functions of search engines, some advanced referencing techniques (that are completely ethical and legal) and we lay the foundations for an in depth reflection on the qualities and advantages of these techniques. Keywords: Active SEO, Search Engine Optimization, SEO 2.0, search engines 1. INTRODUCTION With the Web 2.0 era and writable internet, opportunities related to internet referencing have increased; everyone can easily create their virtual territory consisting of one to thousands of sites, and practically all 2.0 territories are designed to be participatory so anyone can write and promote their sites.
    [Show full text]
  • Disable Or Enable Restricted Mode
    Disable or enable Restricted Mode Restricted Mode is an opt-in setting available on the computer and mobile site that helps screen out potentially objectionable content that you may prefer not to see or don't want others in your family to stumble across while enjoying YouTube. You can think of this as a parental control setting for YouTube. 1. Scroll to the bottom of any YouTube page and click the drop-down menu in the "Restricted Mode" section. 2. Select the On or Off option to enable or disable this feature. Lock Restricted Mode: If you wish for Restricted Mode to stay enabled for anyone using this browser, you must lock Restricted Mode. 1. Sign in to your YouTube account. 2. Scroll to the bottom of any YouTube page and click the drop-down menu in the "Restricted Mode" section. 3. Click "Lock Restricted Mode on this browser." 4. Enter in your password again to lock Restricted Mode on this browser. Turn Restricted Mode off: 1. Scroll to the bottom of any YouTube page and click “Restricted Mode: On”. 2. Next, click the “off” option. 3. If you’ve locked Restricted Mode, you’ll be prompted to login and enter your username and password to confirm that you’d like to turn off Restricted Mode. 4. Once you’ve successfully logged in, scroll to the bottom of the page to turn Restricted Mode off. How Restricted Mode works: While it's not 100 percent accurate, we use community flagging, age- restrictions, and other signals to identify and filter out inappropriate content.
    [Show full text]
  • Larry Page Developing the Largest Corporate Foundation in Every Successful Company Must Face: As Google Word.” the United States
    LOWE —continued from front flap— Praise for $19.95 USA/$23.95 CAN In addition to examining Google’s breakthrough business strategies and new business models— In many ways, Google is the prototype of a which have transformed online advertising G and changed the way we look at corporate successful twenty-fi rst-century company. It uses responsibility and employee relations——Lowe Google technology in new ways to make information universally accessible; promotes a corporate explains why Google may be a harbinger of o 5]]UZS SPEAKS culture that encourages creativity among its where corporate America is headed. She also A>3/9A addresses controversies surrounding Google, such o employees; and takes its role as a corporate citizen as copyright infringement, antitrust concerns, and “It’s not hard to see that Google is a phenomenal company....At Secrets of the World’s Greatest Billionaire Entrepreneurs, very seriously, investing in green initiatives and personal privacy and poses the question almost Geico, we pay these guys a whole lot of money for this and that key g Sergey Brin and Larry Page developing the largest corporate foundation in every successful company must face: as Google word.” the United States. grows, can it hold on to its entrepreneurial spirit as —Warren Buffett l well as its informal motto, “Don’t do evil”? e Following in the footsteps of Warren Buffett “Google rocks. It raised my perceived IQ by about 20 points.” Speaks and Jack Welch Speaks——which contain a SPEAKS What started out as a university research project —Wes Boyd conversational style that successfully captures the conducted by Sergey Brin and Larry Page has President of Moveon.Org essence of these business leaders—Google Speaks ended up revolutionizing the world we live in.
    [Show full text]
  • Lecture 18: CS 5306 / INFO 5306: Crowdsourcing and Human Computation Web Link Analysis (Wisdom of the Crowds) (Not Discussing)
    Lecture 18: CS 5306 / INFO 5306: Crowdsourcing and Human Computation Web Link Analysis (Wisdom of the Crowds) (Not Discussing) • Information retrieval (term weighting, vector space representation, inverted indexing, etc.) • Efficient web crawling • Efficient real-time retrieval Web Search: Prehistory • Crawl the Web, generate an index of all pages – Which pages? – What content of each page? – (Not discussing this) • Rank documents: – Based on the text content of a page • How many times does query appear? • How high up in page? – Based on display characteristics of the query • For example, is it in a heading, italicized, etc. Link Analysis: Prehistory • L. Katz. "A new status index derived from sociometric analysis“, Psychometrika 18(1), 39-43, March 1953. • Charles H. Hubbell. "An Input-Output Approach to Clique Identification“, Sociolmetry, 28, 377-399, 1965. • Eugene Garfield. Citation analysis as a tool in journal evaluation. Science 178, 1972. • G. Pinski and Francis Narin. "Citation influence for journal aggregates of scientific publications: Theory, with application to the literature of physics“, Information Processing and Management. 12, 1976. • Mark, D. M., "Network models in geomorphology," Modeling in Geomorphologic Systems, 1988 • T. Bray, “Measuring the Web”. Proceedings of the 5th Intl. WWW Conference, 1996. • Massimo Marchiori, “The quest for correct information on the Web: hyper search engines”, Computer Networks and ISDN Systems, 29: 8-13, September 1997, Pages 1225-1235. Hubs and Authorities • J. Kleinberg. “Authoritative
    [Show full text]
  • Parent Guidebook on Protecting Children Online
    Parent Guidebook on Protecting Children Online Contact Information: #3 A. Griboedov Street Georgia, 0180, Tbilisi Tel: + 995 32 2 92 15 14 E-mail: [email protected] Website: www.idfi.ge 2018 Content Introduction .................................................................................................................................................. 2 Google SafeSearch ........................................................................................................................................ 2 YouTube Safe Search System ........................................................................................................................ 4 Facebook Safe Mode System ...................................................................................................................... 10 Activation of Safety Mode on Windows 7................................................................................................... 11 Activation of Safety Mode on Windows 10 ................................................................................................ 16 Activation of Safety Mode on Android Devices .......................................................................................... 18 Activation of Parental Controls on iPhone and iPad ................................................................................... 20 1 Introduction Internet and electronic devices are natural and integral parts of life for contemporary children. While this is by no means a bad thing, with digital skills being essential for
    [Show full text]
  • Brazil Country Handbook 1
    Brazil Country Handbook 1. This handbook provides basic reference information on Brazil, including its geography, history, government, military forces, and communications and trans- portation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to Brazil. 2. This product is published under the auspices of the U.S. Department of Defense Intelligence Production Program (DoDIPP) with the Marine Corps Intel- ligence Activity designated as the community coordinator for the Country Hand- book Program. This product reflects the coordinated U.S. Defense Intelligence Community position on Brazil. 3. Dissemination and use of this publication is restricted to official military and government personnel from the United States of America, United Kingdom, Canada, Australia, NATO member countries, and other countries as required and designated for support of coalition operations. 4. The photos and text reproduced herein have been extracted solely for research, comment, and information reporting, and are intended for fair use by designated personnel in their official duties, including local reproduction for train- ing. Further dissemination of copyrighted material contained in this document, to include excerpts and graphics, is strictly prohibited under Title 17, U.S. Code. CONTENTS KEY FACTS. 1 U.S. MISSION . 2 U.S. Embassy. 2 U.S. Consulates . 2 Travel Advisories. 7 Entry Requirements . 7 Passport/Visa Requirements . 7 Immunization Requirements. 7 Custom Restrictions . 7 GEOGRAPHY AND CLIMATE . 8 Geography . 8 Land Statistics. 8 Boundaries . 8 Border Disputes . 10 Bodies of Water. 10 Topography . 16 Cross-Country Movement. 18 Climate. 19 Precipitation . 24 Environment . 24 Phenomena . 24 TRANSPORTATION AND COMMUNICATION .
    [Show full text]