Administration's Replies to Members Initial Written Questions

Total Page:16

File Type:pdf, Size:1020Kb

Administration's Replies to Members Initial Written Questions Index Page Replies to initial written questions raised by Finance Committee Members in examining the Estimates of Expenditure 2021-22 Director of Bureau : Secretary for Constitutional and Mainland Affairs Session No. : 3 Consolidated e-file name : CMAB-1-e1.docx Reply Serial Question Name of Member Head Programme No. Serial No. CMAB001 0003 CHENG Chung-tai 144 (1) Director of Bureau’s Office CMAB002 0759 CHENG Chung-tai 144 (5) Subvention: Equal Opportunities Commission and Office of the Privacy Commissioner for Personal Data CMAB003 0760 CHENG Chung-tai 144 (3) Mainland and Taiwan Offices CMAB004 2844 CHENG Chung-tai 144 (5) Subvention: Equal Opportunities Commission and Office of the Privacy Commissioner for Personal Data CMAB005 2859 CHENG Chung-tai 144 (1) Director of Bureau’s Office CMAB006 2227 CHEUNG 144 (2) Constitutional and Kwok-kwan Mainland Affairs CMAB007 1624 CHEUNG 144 (2) Constitutional and Wah-fung, Mainland Affairs Christopher CMAB008 1695 CHEUNG 144 (2) Constitutional and Wah-fung, Mainland Affairs Christopher CMAB009 1696 CHEUNG 144 (2) Constitutional and Wah-fung, Mainland Affairs Christopher CMAB010 1714 CHEUNG 144 (2) Constitutional and Wah-fung, Mainland Affairs Christopher CMAB011 1715 CHEUNG 144 (3) Mainland and Taiwan Wah-fung, Offices Christopher CMAB012 1716 CHEUNG 144 (2) Constitutional and Wah-fung, Mainland Affairs Christopher CMAB013 1313 CHIANG Lai-wan 144 (2) Constitutional and Mainland Affairs CMAB014 1112 CHUNG Kwok-pan 144 (3) Mainland and Taiwan Offices CMAB015 1115 CHUNG Kwok-pan 144 (3) Mainland and Taiwan Offices Reply Serial Question Name of Member Head Programme No. Serial No. CMAB016 1120 CHUNG Kwok-pan 144 (2) Constitutional and Mainland Affairs CMAB017 1513 Ho Kwan-yiu, 144 (2) Constitutional and Junius Mainland Affairs CMAB018 1514 HO Kwan-yiu, 144 (2) Constitutional and Junius Mainland Affairs CMAB019 1527 HO Kwan-yiu, 144 (2) Constitutional and Junius Mainland Affairs CMAB020 1528 HO Kwan-yiu, 144 (2) Constitutional and Junius Mainland Affairs CMAB021 1529 HO Kwan-yiu, 144 (5) Subvention: Equal Junius Opportunities Commission and Office of the Privacy Commissioner for Personal Data CMAB022 0398 IP LAU Suk-yee, 144 (2) Constitutional and Regina Mainland Affairs CMAB023 0537 IP LAU Suk-yee, 144 (5) Subvention: Equal Regina Opportunities Commission and Office of the Privacy Commissioner for Personal Data CMAB024 1760 IP LAU Suk-yee, 144 (5) Subvention: Equal Regina Opportunities Commission and Office of the Privacy Commissioner for Personal Data CMAB025 0018 LAM Kin-fung, 144 (2) Constitutional and Jeffrey Mainland Affairs CMAB026 1327 LAM Kin-fung, 144 (3) Mainland and Taiwan Jeffrey Offices CMAB027 1363 LAM Kin-fung, 144 (2) Constitutional and Jeffrey Mainland Affairs CMAB028 1779 LAU Ip-keung, 144 (2) Constitutional and Kenneth Mainland Affairs CMAB029 1822 LEE Wai-king, 144 (1) Director of Bureau’s Office Starry CMAB030 1823 LEE Wai-king, 144 (2) Constitutional and Starry Mainland Affairs CMAB031 1827 LEE Wai-king, 144 (2) Constitutional and Starry Mainland Affairs CMAB032 1828 LEE Wai-king, 144 (5) Subvention: Equal Starry Opportunities Commission and Office of the Privacy Commissioner for Personal Data CMAB033 1829 LEE Wai-king, 144 (2) Constitutional and Starry Mainland Affairs Reply Serial Question Name of Member Head Programme No. Serial No. CMAB034 1830 LEE Wai-king, 144 (2) Constitutional and Starry Mainland Affairs CMAB035 1831 LEE Wai-king, 144 (2) Constitutional and Starry Mainland Affairs CMAB036 1835 LEE Wai-king, 144 (4) Rights of the Individual Starry CMAB037 1851 LEE Wai-king, 144 (2) Constitutional and Starry Mainland Affairs CMAB038 1852 LEE Wai-king, 144 (3) Mainland and Taiwan Starry Offices CMAB039 1853 LEE Wai-king, 144 (5) Subvention: Equal Starry Opportunities Commission and Office of the Privacy Commissioner for Personal Data CMAB040 1855 LEE Wai-king, 144 (4) Rights of the Individual Starry CMAB041 1856 LEE Wai-king, 144 (5) Subvention: Equal Starry Opportunities Commission and Office of the Privacy Commissioner for Personal Data CMAB042 1863 LEE Wai-king, 144 (1) Director of Bureau’s Office Starry CMAB043 1864 LEE Wai-king, 144 (2) Constitutional and Starry Mainland Affairs CMAB044 1865 LEE Wai-king, 144 (2) Constitutional and Starry Mainland Affairs CMAB045 1866 LEE Wai-king, 144 (3) Mainland and Taiwan Starry Offices CMAB046 1867 LEE Wai-king, 144 (5) Subvention: Equal Starry Opportunities Commission and Office of the Privacy Commissioner for Personal Data CMAB047 1868 LEE Wai-king, 144 (5) Subvention: Equal Starry Opportunities Commission and Office of the Privacy Commissioner for Personal Data CMAB048 1869 LEE Wai-king, 144 (5) Subvention: Equal Starry Opportunities Commission and Office of the Privacy Commissioner for Personal Data CMAB049 0496 LEUNG Che-cheung 144 (2) Constitutional and Mainland Affairs CMAB050 0497 LEUNG Che-cheung 144 (2) Constitutional and Mainland Affairs Reply Serial Question Name of Member Head Programme No. Serial No. CMAB051 2476 LEUNG Mei-fun, 144 (2) Constitutional and Priscilla Mainland Affairs CMAB052 2480 LEUNG Mei-fun, 144 (2) Constitutional and Priscilla Mainland Affairs CMAB053 2484 LEUNG Mei-fun, 144 (5) Subvention: Equal Priscilla Opportunities Commission and Office of the Privacy Commissioner for Personal Data CMAB054 2485 LEUNG Mei-fun, 144 (4) Rights of the Individual Priscilla CMAB055 2494 LEUNG Mei-fun, 144 (4) Rights of the Individual Priscilla CMAB056 2497 LEUNG Mei-fun, 144 (3) Mainland and Taiwan Priscilla Offices CMAB057 2498 LEUNG Mei-fun, 144 (2) Constitutional and Priscilla Mainland Affairs CMAB058 2499 LEUNG Mei-fun, 144 (2) Constitutional and Priscilla Mainland Affairs CMAB059 2502 LEUNG Mei-fun, 144 (2) Constitutional and Priscilla Mainland Affairs CMAB060 2503 LEUNG Mei-fun, 144 (2) Constitutional and Priscilla Mainland Affairs CMAB061 2588 LEUNG Mei-fun, 144 (5) Subvention: Equal Priscilla Opportunities Commission and Office of the Privacy Commissioner for Personal Data CMAB062 2596 LEUNG Mei-fun, 144 (3) Mainland and Taiwan Priscilla Offices CMAB063 2601 LEUNG Mei-fun, 144 (5) Subvention: Equal Priscilla Opportunities Commission and Office of the Privacy Commissioner for Personal Data CMAB064 2602 LEUNG Mei-fun, 144 (5) Subvention: Equal Priscilla Opportunities Commission and Office of the Privacy Commissioner for Personal Data CMAB065 0328 LIAO Cheung-kong, 144 (5) Subvention: Equal Martin Opportunities Commission and Office of the Privacy Commissioner for Personal Data CMAB066 0579 LIAO Cheung-kong, 144 (2) Constitutional and Martin Mainland Affairs CMAB067 0802 LIAO Cheung-kong, 144 (2) Constitutional and Martin Mainland Affairs Reply Serial Question Name of Member Head Programme No. Serial No. CMAB068 1266 LIAO Cheung-kong, 144 (3) Mainland and Taiwan Martin Offices CMAB069 0549 LO Wai-kwok 144 (2) Constitutional and Mainland Affairs CMAB070 2015 LUK Chung-hung 144 (5) Subvention: Equal Opportunities Commission and Office of the Privacy Commissioner for Personal Data CMAB071 2033 LUK Chung-hung 144 (2) Constitutional and Mainland Affairs CMAB072 2069 LUK Chung-hung 144 (5) Subvention: Equal Opportunities Commission and Office of the Privacy Commissioner for Personal Data CMAB073 2328 MA Fung-kwok 144 (3) Mainland and Taiwan Offices CMAB074 2350 MA Fung-kwok 144 (2) Constitutional and Mainland Affairs CMAB075 1990 MAK Mei-kuen, 144 (5) Subvention: Equal Alice Opportunities Commission and Office of the Privacy Commissioner for Personal Data CMAB076 1991 MAK Mei-kuen, 144 (5) Subvention: Equal Alice Opportunities Commission and Office of the Privacy Commissioner for Personal Data CMAB077 0201 NG Wing-ka, Jimmy 144 (2) Constitutional and Mainland Affairs CMAB078 0212 NG Wing-ka, Jimmy 144 (5) Subvention: Equal Opportunities Commission and Office of the Privacy Commissioner for Personal Data CMAB079 0213 NG Wing-ka, Jimmy 144 (3) Mainland and Taiwan Offices CMAB080 2415 OR Chong-shing, 144 (2) Constitutional and Wilson Mainland Affairs CMAB081 2634 OR Chong-shing, 144 (3) Mainland and Taiwan Wilson Offices CMAB082 0703 QUAT Elizabeth 144 (5) Subvention: Equal Opportunities Commission and Office of the Privacy Commissioner for Personal Data Reply Serial Question Name of Member Head Programme No. Serial No. CMAB083 1482 TSE Wai-chun, Paul 144 (3) Mainland and Taiwan Offices CMAB084 1483 TSE Wai-chun, Paul 144 (3) Mainland and Taiwan Offices CMAB085 1485 TSE Wai-chun, Paul 144 (3) Mainland and Taiwan Offices CMAB086 1488 TSE Wai-chun, Paul 144 (2) Constitutional and Mainland Affairs CMAB087 3263 TSE Wai-chun, Paul 144 (3) Mainland and Taiwan Offices CMAB088 1169 WONG Kwok-kin 144 (2) Constitutional and Mainland Affairs CMAB089 1175 WONG Kwok-kin 144 (3) Mainland and Taiwan Offices CMAB090 2080 WONG Kwok-kin 144 (2) Constitutional and Mainland Affairs CMAB091 1467 YUNG Hoi-yan 144 (2) Constitutional and Mainland Affairs CMAB092 1468 YUNG Hoi-yan 144 (2) Constitutional and Mainland Affairs CMAB093 1469 YUNG Hoi-yan 144 (2) Constitutional and Mainland Affairs CMAB094 1470 YUNG Hoi-yan 144 (2) Constitutional and Mainland Affairs CMAB095 1471 YUNG Hoi-yan 144 (2) Constitutional and Mainland Affairs CMAB096 1472 YUNG Hoi-yan 144 (2) Constitutional and Mainland Affairs CMAB097 0755 CHENG Chung-tai 163 Electoral Services CMAB098 0756 CHENG Chung-tai 163 Electoral Services CMAB099 0757 CHENG Chung-tai 163 Electoral Services CMAB100 0758 CHENG Chung-tai 163 Electoral Services CMAB101 1717 CHEUNG 163 Electoral Services Wah-fung, Christopher CMAB102 1718 CHEUNG 163 Electoral Services Wah-fung, Christopher
Recommended publications
  • Reviewing and Evaluating the Direct Elections to the Legislative Council and the Transformation of Political Parties in Hong Kong, 1991-2016
    Journal of US-China Public Administration, August 2016, Vol. 13, No. 8, 499-517 doi: 10.17265/1548-6591/2016.08.001 D DAVID PUBLISHING Reviewing and Evaluating the Direct Elections to the Legislative Council and the Transformation of Political Parties in Hong Kong, 1991-2016 Chung Fun Steven Hung The Education University of Hong Kong, Hong Kong After direct elections were instituted in Hong Kong, politicization inevitably followed democratization. This paper intends to evaluate how political parties’ politics happened in Hong Kong’s recent history. The research was conducted through historical comparative analysis, with the context of Hong Kong during the sovereignty transition and the interim period of democratization being crucial. For the implementation of “one country, two systems”, political democratization was hindered and distinct political scenarios of Hong Kong’s transformation were made. The democratic forces had no alternative but to seek more radicalized politics, which caused a decisive fragmentation of the local political parties where the establishment camp was inevitable and the democratic blocs were split into many more small groups individually. It is harmful. It is not conducive to unity and for the common interests of the publics. This paper explores and evaluates the political history of Hong Kong and the ways in which the limited democratization hinders the progress of Hong Kong’s transformation. Keywords: election politics, historical comparative, ruling, democratization The democratizing element of the Hong Kong political system was bounded within the Legislative Council under the principle of the separation of powers of the three governing branches, Executive, Legislative, and Judicial. Popular elections for the Hong Kong legislature were introduced and implemented for 25 years (1991-2016) and there were eight terms of general elections for the Legislative Council.
    [Show full text]
  • Hong Kong's Endgame and the Rule of Law (Ii): the Battle Over "The People" and the Business Community in the Transition to Chinese Rule
    HONG KONG'S ENDGAME AND THE RULE OF LAW (II): THE BATTLE OVER "THE PEOPLE" AND THE BUSINESS COMMUNITY IN THE TRANSITION TO CHINESE RULE JACQUES DELISLE* & KEVIN P. LANE- 1. INTRODUCTION Transitional Hong Kong's endgame formally came to a close with the territory's reversion to Chinese rule on July 1, 1997. How- ever, a legal and institutional order and a "rule of law" for Chi- nese-ruled Hong Kong remain works in progress. They will surely bear the mark of the conflicts that dominated the final years pre- ceding Hong Kong's legal transition from British colony to Chinese Special Administrative Region ("S.A.R."). Those endgame conflicts reflected a struggle among adherents to rival conceptions of a rule of law and a set of laws and institutions that would be adequate and acceptable for Hong Kong. They unfolded in large part through battles over the attitudes and allegiance of "the Hong Kong people" and Hong Kong's business community. Hong Kong's Endgame and the Rule of Law (I): The Struggle over Institutions and Values in the Transition to Chinese Rule ("Endgame I") focused on the first aspect of this story. It examined the political struggle among members of two coherent, but not monolithic, camps, each bound together by a distinct vision of law and sover- t Special Series Reprint: Originally printed in 18 U. Pa. J. Int'l Econ. L. 811 (1997). Assistant Professor, University of Pennsylvania Law School. This Article is the second part of a two-part series. The first part appeared as Hong Kong's End- game and the Rule of Law (I): The Struggle over Institutions and Values in the Transition to Chinese Rule, 18 U.
    [Show full text]
  • JW Apostate Reply Supporting Motion to Quash April 6Th
    Case 7:20-mc-00119-CS Document 13 Filed 04/06/20 Page 1 of 21 1 JANE / JOHN DOE 2 Email: [email protected] 3 4 Pro se 5 IN THE UNITED STATES DISTRICT COURT FOR THE 6 SOUTHERN DISTRICT OF NEW YORK 7 8 IN RE: DMCA SUBPOENA TO GOOGLE, LLC Case No.: 7:20-mc-00119 9 10 JANE / JOHN DOE’S REPLY IN SUPPORT OF THE OBJECTION AND MOTION TO 11 QUASH DMCA SUBPOENA 12 13 A. INTRODUCTION 14 15 While it is true that Jehovah’s Witnesses are well known for their distribution of 16 Bible based books and publications, they are also a notorious group of criminal 17 pedophiles running a scam “religion” who are guilty of abuse of process and emotional 18 19 extortion through sham litigation in their pathetic efforts at discovering leaks and 20 moles and whistleblowers. Unfortunately for them, this is the year 2020 and things 21 22 like VPNs, anonymous proxies, and TOR exit nodes frustrate them at every turn. 23 Whether one is known as Darkspilver or John Redwood or JW Apostate, or any 24 number of other pseudonyms, it does not really matter as we are all Spartacus in this 25 26 fight! Reporting on and exposing to public comment and ridicule the doctrinal 27 inconsistencies and reversals, failed predictions, mistranslation of the Bible, harsh 28 JANE / JOHN DOE’S REPLY IN SUPPORT OF OBJECTION AND MOTION TO QUASH DMCA SUBPOENA- 1 Case 7:20-mc-00119-CS Document 13 Filed 04/06/20 Page 2 of 21 1 treatment of former members and autocratic and coercive leadership (not to mention 2 the child raping!) is a public duty that Jane / John Doe takes extremely seriously at 3 1 great personal risk.
    [Show full text]
  • Introduction Points
    Introduction Points Ahmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database) TORLINKS Directory for .onion sites, moderated. Core.onion - Simple onion bootstrapping Deepsearch - Another search engine. DuckDuckGo - A Hidden Service that searches the clearnet. TORCH - Tor Search Engine. Claims to index around 1.1 Million pages. Welcome, We've been expecting you! - Links to basic encryption guides. Onion Mail - SMTP/IMAP/POP3. ***@onionmail.in address. URSSMail - Anonymous and, most important, SECURE! Located in 3 different servers from across the globe. Hidden Wiki Mirror - Good mirror of the Hidden Wiki, in the case of downtime. Where's pedophilia? I WANT IT! Keep calm and see this. Enter at your own risk. Site with gore content is well below. Discover it! Financial Services Currencies, banks, money markets, clearing houses, exchangers. The Green Machine Forum type marketplace for CCs, Paypals, etc.... Some very good vendors here!!!! Paypal-Coins - Buy a paypal account and receive the balance in your bitcoin wallet. Acrimonious2 - Oldest escrowprovider in onionland. BitBond - 5% return per week on Bitcoin Bonds. OnionBC Anonymous Bitcoin eWallet, mixing service and Escrow system. Nice site with many features. The PaypalDome Live Paypal accounts with good balances - buy some, and fix your financial situation for awhile. EasyCoin - Bitcoin Wallet with free Bitcoin Mixer. WeBuyBitcoins - Sell your Bitcoins for Cash (USD), ACH, WU/MG, LR, PayPal and more. Cheap Euros - 20€ Counterfeit bills. Unbeatable prices!! OnionWallet - Anonymous Bitcoin Wallet and Bitcoin Laundry. BestPal BestPal is your Best Pal, if you need money fast. Sells stolen PP accounts.
    [Show full text]
  • Civil Society and Democratization in Hong Kong Paradox and Duality
    Taiwan Journal of Democracy, Volume 4, No.2: 155-175 Civil Society and Democratization in Hong Kong Paradox and Duality Ma Ngok Abstract Hong Kong is a paradox in democratization and modernization theory: it has a vibrant civil society and high level of economic development, but very slow democratization. Hong Kong’s status as a hybrid regime and its power dependence on China shape the dynamics of civil society in Hong Kong. The ideological orientations and organizational form of its civil society, and its detachment from the political society, prevent civil society in Hong Kong from engineering a formidable territory-wide movement to push for institutional reforms. The high level of civil liberties has reduced the sense of urgency, and the protracted transition has led to transition fatigue, making it difficult to sustain popular mobilization. Years of persistent civil society movements, however, have created a perennial legitimacy problem for the government, and drove Beijing to try to set a timetable for full democracy to solve the legitimacy and governance problems of Hong Kong. Key words: Civil society, democratization in Hong Kong, dual structure, hybrid regime, protracted transition, transition fatigue. For many a democratization theorist, the slow democratization of Hong Kong is anomalous. As one of the most advanced cities in the world, by as early as the 1980s, Hong Kong had passed the “zone of transition” postulated by the modernization theorists. Hong Kong also had a vibrant civil society, a sizeable middle class, many civil liberties that rivaled Western democracies, one of the freest presses in Asia, and independent courts.
    [Show full text]
  • Longitudinal Analysis of Misuse of Bitcoin⋆
    Longitudinal Analysis of Misuse of Bitcoin? Karim Eldefrawy1, Ashish Gehani1, and Alexandre Matton2?? 1 SRI International, USA 2 Stanford University, USA Abstract. We conducted a longitudinal study to analyze the misuse of Bitcoin. We first investigated usage characteristics of Bitcoin by analyz- ing how many addresses each address transacts with (from January 2009 to May 2018). To obtain a quantitative estimate of the malicious activity that Bitcoin is associated with, we collected over 2.3 million candidate Bitcoin addresses, harvested from the dark web between June 2016 and December 2017. The Bitcoin addresses found on the dark web were la- beled with tags that classified the activities associated with the onions that these addresses were collected from. The tags covered a wide range of activities, from suspicious to outright malicious or illegal. Of these addresses, only 47,697 have tags we consider indicative of suspicious or malicious activities. We saw a clear decline in the monthly number of Bitcoin addresses seen on the dark web in the periods coinciding with takedowns of known dark web markets. We also found interesting behavior that distinguishes the Bitcoin addresses collected from the dark web when compared to activity of a random address on the Bitcoin blockchain. For example, we found that Bitcoin addresses used on the dark web are more likely to be involved in mixing transactions. To identify mixing transactions, we developed a new heuristic that extends previously known ones. We found that Bitcoin addresses found on the dark web are significantly more ac- tive, they engage in transactions with 20 times the neighbors and 4 times the Bitcoin amounts when compared to random addresses.
    [Show full text]
  • Cyber Influence Campaigns in the Dark Web
    Cyber Influence Campaigns in the Dark Web Lev Topor and Pnina Shuker In recent years there has been a significant rise in the scope and intensity of information wars between the great powers and other forces in the international arena, and influence campaigns have become a legitimate tool in the hands of politicians, propagandists, and global powers. In this context, the professional literature has focused most on campaigns on social networks while it has almost ignored similar campaigns in the Dark Web where the current research tends to focus on criminal activity. The Dark Web was developed by the American Navy for intelligence purposes and was then promoted by the West as a public tool to protect privacy and anonymity. Today it provides fertile ground for deliberate leaks by countries that do not wish to publish certain information in the traditional media. These leaks are perceived as authentic, leading the media and other intelligence organizations to swallow the bait and investigate, and in some cases they even change their operations accordingly. The purpose of this article is to present the way in which the Dark Web is used in influence campaigns, particularly through deliberately leaking information. Keywords: Dark Web, influence campaigns, propaganda, information wars, disinformation Dr. Lev Topor is a senior strategic advisor and researcher on racism and cyber. Pnina Shuker is a Neubauer Research Fellow at the Institute of National Security Studies. Cyber, Intelligence, and Security | Volume 3 | No. 2 | October 2019 63 LEV TOPOR AND PNINA SHUKER | CYBER Influence Campaigns IN THE DARK WEB 64 Introduction In January 2019, tens of thousands of documents and emails from senior Russian government officials, leaders of the Russian Orthodox Church, and Russian oligarchs were leaked to the Dark Web.
    [Show full text]
  • Chapter 6 Hong Kong
    CHAPTER 6 HONG KONG Key Findings • The Hong Kong government’s proposal of a bill that would allow for extraditions to mainland China sparked the territory’s worst political crisis since its 1997 handover to the Mainland from the United Kingdom. China’s encroachment on Hong Kong’s auton- omy and its suppression of prodemocracy voices in recent years have fueled opposition, with many protesters now seeing the current demonstrations as Hong Kong’s last stand to preserve its freedoms. Protesters voiced five demands: (1) formal with- drawal of the bill; (2) establishing an independent inquiry into police brutality; (3) removing the designation of the protests as “riots;” (4) releasing all those arrested during the movement; and (5) instituting universal suffrage. • After unprecedented protests against the extradition bill, Hong Kong Chief Executive Carrie Lam suspended the measure in June 2019, dealing a blow to Beijing which had backed the legislation and crippling her political agenda. Her promise in September to formally withdraw the bill came after months of protests and escalation by the Hong Kong police seeking to quell demonstrations. The Hong Kong police used increasingly aggressive tactics against protesters, resulting in calls for an independent inquiry into police abuses. • Despite millions of demonstrators—spanning ages, religions, and professions—taking to the streets in largely peaceful pro- test, the Lam Administration continues to align itself with Bei- jing and only conceded to one of the five protester demands. In an attempt to conflate the bolder actions of a few with the largely peaceful protests, Chinese officials have compared the movement to “terrorism” and a “color revolution,” and have im- plicitly threatened to deploy its security forces from outside Hong Kong to suppress the demonstrations.
    [Show full text]
  • Full 8Chan Leak Dump As of April-15-2015 This Is a Quick Overview of Quick Leak
    Full 8chan Leak Dump As Of April-15-2015 This is a quick overview of Quick Leak http://8ch.net/leaked/index.html Anonymous Post Makes News Headline! KILLCEN 04/15/15 (Wed) 15:09:40 No.235[Repl y][Watch Thread] LoL! Hey Anonymous! You made news coverage! http://www.cbsnews.com/news/top-law-officials-personal-information-posted-online -right-wing-group-blamed/ DHS-CIA-FBI TRAITORS HOME ADDRESSES: http://quickleak.ir/xiUw8SIv Infowars also covers dox KILLCEN 04/15/15 (Wed) 15:19:3 2 No.236 Holly Molly! Infowars posts report about this too! (I'd l ay low if I were you, for a while) http://www.infowars.com/leaking-of-government-officials-ad dresses-accompanied-by-note-warning-of-fema-crackdown-by-nwo-satanists/ PREPARATION FOR MARTIAL LAW DOWNLOAD LINKS Anonymous 04/15/15 (Wed) 14:51:11 No .234[Reply][Watch Thread] CONCENTRATION CAMPS FOR AMERICANS FREE PDF DOWNLOAD Concentration Camps for Americans How would you like to enter one the over 600 American concentration camps acros s the USA? The barbed wired, shackle embedded camps have been built and are awaiti ng to enslave huge numbers of the population. Should a fitting event take place, current laws allow FEMA to legally incarcerate civilians into these camps. The Federal Government admits plans to detain millions of people Rex 84, short for Readiness Exercise 1984, was a plan by the United States fede ral government to test their ability to detain large numbers of American citizens in case of massive civil unrest or national emergency.
    [Show full text]
  • Says a Friend of Benthall's
    54 I At 3:15 P.M. on October 1, 2013, Ross Ulbricht’s career as a drug kingpin came to an end in the science- fiction section of San Francisco’s Glen Park Library. The 29-year- old had walked up the steps just inside the modern stone building, passed the librarian working at the circula- tion desk and taken a seat at a far corner table near a window. It was a sunny day, but the small community library was filled with people. Ulbricht, with his easy smile and thick mop of brown hair, was dressed in blue jeans web of lies_ AN UNDERGROUND, ANONYMOUS INTERNET— THE DEEP WEB—IS THE LAST LAWLESS FRONTIER ON EARTH. BUT NOTHING COULD SAVE ITS KINGPINS FROM THE PAINFUL CONSEQUENCES OF HUMAN ERROR BY JOSHUA HUNT and a T-shirt. The hand- ful of people reading and wandering among rows of novels nearby weren’t dressed much differently, but beneath their shirts and jackets they wore vests that identified them as FBI agents. Until the moment they rushed Ulbricht, pushing him up against a window to handcuff him as other agents seized his laptop before he could lock it down, nobody suspected anything out of place. The cuffs went on and a small crowd gathered, but Ulbricht just looked out at the afternoon sun. Ulbricht was an educated person, with a master’s degree in 55 materials science and engi- neering from Penn State. He was a good son from a good Texas family, an un- likely addition to the list of men who had changed the shape and scale of drug distribution in Amer- ica.
    [Show full text]
  • Introduction: the Uniqueness of Hong Kong Democracy
    Notes Introduction: The Uniqueness of Hong Kong Democracy 1 . Charles Tilly, Democracy (New York: Cambridge University Press, 2007), p. 7. 2 . Ibid . 3 . Ibid ., p. 9. 4 . Ibid . 5 . Ibid ., p. xi. 6 . Ibid . 7 . Ibid ., p. 13. 8 . Charles Tilly, Trust and Rule (New York: Cambridge University Press, 2005), p. 12. 9 . Ibid. 10 . Ibid ., p. 104. 11 . Tilly, Democracy , p. 135. 12 . Ibid ., p. 136. 13 . Ibid ., p. 146. 14 . Ibid ., pp. 110–111. 15 . Ibid ., p. 110. 16 . Ibid ., p. 135. 17 . David Potter, “Explaining Democratization,” in David Potter, David Goldblatt, Margaret Kiloh and Paul Lewis, eds., Democratization (Cambridge: Polity Press, 1997), pp. 3–5. 18 . See, for example, Seymour Martin Lipset, Political Man (London: Heinemann, 1983). 19 . Ibid ., p. 21. 20 . Ibid . 21 . Ibid . 22 . Ibid ., p. 15. 23 . Guillermo O’Donnell and Philippe C. Schmitter, Transition from Authoritarian Rule: Tentative Conclusions about Uncertain Democracies (Baltimore, Maryland: Johns Hopkins University Press, 1986). 24 . Potter, “Explaining Democratization,” p. 29. 25 . Samuel P. Huntington, The Third Wave: Democratization in the Late Twentieth Century (Norman: University of Oklahoma Press, 1993), p. 7. 26 . Ibid ., p. 38. 27 . Ibid ., pp. 65–66. 28 . Ibid ., p. 73. 29 . Ibid ., p. 86. 30 . Ibid ., pp. 93–94. 31 . Ibid ., p. 100. 32 . Ibid ., p. 122. 33 . Ibid ., p. 123. 34 . Ibid ., p. 142. 160 Notes 161 35 . Ibid ., p. 151. 36 . Ibid ., pp. 152–153. 37 . Ibid ., p. 159. 38 . Ibid ., p. 159. 39 . Ibid ., p. 171. 40 . Ibid ., p. 192. 41 . Ibid ., p. 199. 42 . Ibid ., p. 202. 43 . Ibid ., p.
    [Show full text]
  • Technical and Legal Overview of the Tor Anonymity Network
    Emin Çalışkan, Tomáš Minárik, Anna-Maria Osula Technical and Legal Overview of the Tor Anonymity Network Tallinn 2015 This publication is a product of the NATO Cooperative Cyber Defence Centre of Excellence (the Centre). It does not necessarily reflect the policy or the opinion of the Centre or NATO. The Centre may not be held responsible for any loss or harm arising from the use of information contained in this publication and is not responsible for the content of the external sources, including external websites referenced in this publication. Digital or hard copies of this publication may be produced for internal use within NATO and for personal or educational use when for non- profit and non-commercial purpose, provided that copies bear a full citation. www.ccdcoe.org [email protected] 1 Technical and Legal Overview of the Tor Anonymity Network 1. Introduction .................................................................................................................................... 3 2. Tor and Internet Filtering Circumvention ....................................................................................... 4 2.1. Technical Methods .................................................................................................................. 4 2.1.1. Proxy ................................................................................................................................ 4 2.1.2. Tunnelling/Virtual Private Networks ............................................................................... 5
    [Show full text]