Judging Stories
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The FCO's Human Rights Work in 2012
House of Commons Foreign Affairs Committee The FCO’s human rights work in 2012 Fourth Report of Session 2013–14 Volume I: Report, together with formal minutes, oral and written evidence Additional written evidence is contained in Volume II, available on the Committee website at www.parliament.uk/facom Ordered by the House of Commons to be printed 8 October 2013 HC 267 Published on 17 October 2013 by authority of the House of Commons London: The Stationery Office Limited £15.50 The Foreign Affairs Committee The Foreign Affairs Committee is appointed by the House of Commons to examine the expenditure, administration, and policy of the Foreign and Commonwealth Office and its associated agencies. Current membership Richard Ottaway (Conservative, Croydon South) (Chair) Mr John Baron (Conservative, Basildon and Billericay) Rt Hon Sir Menzies Campbell (Liberal Democrat, North East Fife) Rt Hon Ann Clwyd (Labour, Cynon Valley) Mike Gapes (Labour/Co-op, Ilford South) Mark Hendrick (Labour/Co-op, Preston) Sandra Osborne (Labour, Ayr, Carrick and Cumnock) Andrew Rosindell (Conservative, Romford) Mr Frank Roy (Labour, Motherwell and Wishaw) Rt Hon Sir John Stanley (Conservative, Tonbridge and Malling) Rory Stewart (Conservative, Penrith and The Border) The following Members were also members of the Committee during the parliament: Rt Hon Bob Ainsworth (Labour, Coventry North East) Emma Reynolds (Labour, Wolverhampton North East) Mr Dave Watts (Labour, St Helens North) Powers The Committee is one of the departmental select committees, the powers of which are set out in House of Commons Standing Orders, principally in SO No 152. These are available on the internet via www.parliament.uk. -
Citizens' Band (CB) Radio
Citizens’ Band (CB) radio – Authorising Amplitude Modulation (AM) modes of operation Permitting AM double and single side band CB radio in the UK Statement Publication date: 10 December 2013 Contents Section Page 1 Executive Summary 1 2 Introduction and background 2 3 Consultation Responses 5 4 Conclusions and next steps 10 Annex Page 1 List of non-confidential respondents 11 Citizens’ Band (CB) radio – Authorising Amplitude Modulation (AM) modes of operation Section 1 1 Executive Summary 1.1 This Statement sets out Ofcom’s decision to proceed with proposals made in our Consultation “Citizens’ Band (CB) radio – Authorising Amplitude Modulation (AM) modes of operation”1 (the ‘Consultation') which was published on 7 October 2013 and closed on 8 November 2013. 1.2 The Consultation proposed to amend current arrangements for Citizens’ Band (CB) Radio in the UK to allow the use of Amplitude Modulation (AM) Double-sideband (DSB) and Single-sideband (SSB) transmission on CB radio. 1.3 Ofcom specifically proposed to: • Authorise the use of AM emissions on European Conference of Postal and Telecommunications Administrations (CEPT) harmonised channels in line with European Communication Committee (ECC) Decision (11)032; and • Authorise such use on a licence exempt basis (in line with our authorisation approach for other modes of operation for CB). 1.4 These proposals followed on from work carried out in Europe. In June 2011 the ECC, part of CEPT, published a Decision, ECC/DEC/ (11)03 (the ‘Decision’) on the harmonised use of frequencies for CB radio equipment. The Decision sought to harmonise the technical standards and usage conditions relating to the use of frequencies for CB radio equipment in CEPT administrations. -
Jamming Attacks and Anti-Jamming Strategies in Wireless Networks
1 Jamming Attacks and Anti-Jamming Strategies in Wireless Networks: A Comprehensive Survey Hossein Pirayesh and Huacheng Zeng Department of Computer Science and Engineering, Michigan State University, East Lansing, MI USA Abstract—Wireless networks are a key component of the will become ubiquitously available for massive devices to telecommunications infrastructure in our society, and wireless realize the vision of Internet of Everything (IoE) in the near services become increasingly important as the applications of future [18]. wireless devices have penetrated every aspect of our lives. Although wireless technologies have significantly advanced in As we are increasingly reliant on wireless services, security the past decades, most wireless networks are still vulnerable to threats have become a big concern about the confidentiality, radio jamming attacks due to the openness nature of wireless integrity, and availability of wireless communications. Com- channels, and the progress in the design of jamming-resistant pared to other security threats such as eavesdropping and wireless networking systems remains limited. This stagnation can data fabrication, wireless networks are particularly vulnerable be attributed to the lack of practical physical-layer wireless tech- nologies that can efficiently decode data packets in the presence to radio jamming attacks for the following reasons. First, of jamming attacks. This article surveys existing jamming attacks jamming attacks are easy to launch. With the advances in and anti-jamming strategies in wireless local area networks software-defined radio, one can easily program a small $10 (WLANs), cellular networks, cognitive radio networks (CRNs), USB dongle device to a jammer that covers 20 MHz bandwidth ZigBee networks, Bluetooth networks, vehicular networks, LoRa below 6 GHz and up to 100 mW transmission power [34]. -
Jamming the Stations: Is There an International Free Flow of Info
Schenone: Jamming The Stations: Is There an International Free Flow of Info JAMMING THE STATIONS: IS THERE AN INTERNATIONAL FREE FLOW OF INFORMATION? In September 1983, Korean Airlines flight 7 was shot down by a Soviet interceptor.' All 269 passengers perished.2 Within an hour, news of the incident was broadcast to citizens of the Eastern European countries and the Soviet Union 3 over Radio Free Europe (RFE)4 and Radio Liberty (RL).5 The Soviet news services, how- ever, failed to mention the incident.6 The Soviet government delib- erately attempted to block reception of the RFE and RL broadcast through radio jamming.' Radio jamming is a significant international problem because radio broadcasting is an essential and powerful means of dissemi- nating information among nations.8 Radio jamming is generally defined as "deliberate radio interference to prevent reception of a foreign broadcast."9 A more technical definition is "intentional harmful interference" '0 which results in intentional non-conformity 1. THE BOARD FOR INTERNATIONAL BROADCASTING, TENTH ANNUAL REPORT 11 (1984) [hereinafter cited as TENTH ANNUAL REPORT]. 2. Id. 3. Id. 4.' See infra note 35 and accompanying text. 5. See infra note 36 and accompanying text. 6. TENTH ANNUAL REPORT, supranote I, at 11. The Soviet Union at first denied that the plane was shot down. When the Soviet news services later admitted it had in fact been shot down by one of their pilots, they claimed the Korean plane had no lights identifying it as non-agressive. However, RFE and RL broadcasts of the tapes of the interceptor's pilot revealed that he claimed he could see the Korean jet's strobe lights. -
Journalism Is Not a Crime” Violations of Media Freedom in Ethiopia WATCH
HUMAN RIGHTS “Journalism Is Not a Crime” Violations of Media Freedom in Ethiopia WATCH “Journalism Is Not a Crime” Violations of Media Freedom in Ethiopia Copyright © 2015 Human Rights Watch All rights reserved. Printed in the United States of America ISBN: 978-1-6231-32279 Cover design by Rafael Jimenez Human Rights Watch defends the rights of people worldwide. We scrupulously investigate abuses, expose the facts widely, and pressure those with power to respect rights and secure justice. Human Rights Watch is an independent, international organization that works as part of a vibrant movement to uphold human dignity and advance the cause of human rights for all. Human Rights Watch is an international organization with staff in more than 40 countries, and offices in Amsterdam, Beirut, Berlin, Brussels, Chicago, Geneva, Goma, Johannesburg, London, Los Angeles, Moscow, Nairobi, New York, Paris, San Francisco, Sydney, Tokyo, Toronto, Tunis, Washington DC, and Zurich. For more information, please visit our website: http://www.hrw.org 2 HUMAN RIGHTS WATCH | JANUARY 2015 JANUARY 2015 978-1-6231-32279 “Journalism Is Not a Crime” Violations of Media Freedoms in Ethiopia Glossary of Abbreviations ................................................................................................... i Map of Ethiopia .................................................................................................................. ii Summary .......................................................................................................................... -
Threat Modeling and Circumvention of Internet Censorship by David Fifield
Threat modeling and circumvention of Internet censorship By David Fifield A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J.D. Tygar, Chair Professor Deirdre Mulligan Professor Vern Paxson Fall 2017 1 Abstract Threat modeling and circumvention of Internet censorship by David Fifield Doctor of Philosophy in Computer Science University of California, Berkeley Professor J.D. Tygar, Chair Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities|such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations. My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements. -
“The Law of Incitement” (PDF)
THE LAW OF INCITEMENT United States Holocaust Memorial Museum Symposium "Speech, Power and Violence" ∗ by Gregory S. Gordon I. INTRODUCTION This essay will explore the origins and development of the crime of direct and public incitement to commit genocide. It will begin with an historical analysis of the epochal Nuremberg decisions regarding Nazi hate-mongers Julius Streicher, Hans Fritzsche and Otto Dietrich. Although these decisions did not deal explicitly with incitement as a separate crime, they laid the groundwork for future development of incitement as a crime in its own right. The essay will then examine the official birth of the incitement crime with the adoption of the 1948 Convention on the Prevention and Punishment of Genocide ("Genocide Convention"). From that point through the next forty-five years, the crime was not actually applied. But that changed with the creation of the International Criminal Tribunal for Rwanda (ICTR), which vigorously prosecuted incitement to genocide. Through a series of cases that progressively fleshed out elements of the crime, the ICTR jurisprudence set out the materials necessary to construct a legal framework necessary to analyze incitement. That framework was put to good use in the Canadian immigration context in the case of Rwandan politician Leon Mugesera, who delivered an infamous pre-1994 speech calling for genocide through a series of violent and macabre metaphors. The essay will conclude with an analysis of the most recent ICTR case to apply and develop the incitement framework -- Prosecutor v. Simon Bikindi. Bikindi, a popular songwriter, composed music and lyrics that provoked ethnic hatred toward Tutsis. -
Rwandan Journalists Who Were Living in Uganda Went Back Home and Resumed Working
Because of this history, the media are no longer trusted by the public and government, and most people are suspicious of the journalism profession generally. Under the new government, a few journalists who had survived the genocide and other Rwandan journalists who were living in Uganda went back home and resumed working. RWANDA 268 MEDIA SUSTAINABILITY INDEX 2006–2007 INTRODUCTION OVERALL SCORE: 2.29 RWANDA Rwanda lost almost all its journalists during the 1994 genocide; they were among the roughly one million Tutsi and moderate Hutu Rwandans who were killed by extremist armed militia known by the name Interehemwa. The genocide came after the death of then-President Juvenile Habyarimana in a plane crash Rsuspected to have been caused by rebels hiding out in Uganda. During this genocide, which lasted for a period of about 100 days, the media stood accused of acting as a tool of hate. Some local radio stations and print media encouraged neighbors to turn against each other. Hutu extremists used the radio to mobilize the Hutu majority, coordinate killings, and try to ensure that the Tutsi were systematically eliminated. Rwandans are still bitter that it occurred with little intervention from Western governments, and it finally ended when the rebel group Rwanda Patriotic Front and the Ugandan Army wrested power away from the perpetrators and stopped the massacres. Some journalists who are believed to have actively participated in the genocide were investigated by international human-rights groups and were arrested and charged by the UN International Criminal Tribunal for Rwanda. Other journalists chose to go into exile. -
The Cycles of Global Telecommunication Censorship and Surveillance
PENNEY (DO NOT DELETE) 5/14/2015 5:02 PM THE CYCLES OF GLOBAL TELECOMMUNICATION CENSORSHIP AND SURVEILLANCE JONATHON W. PENNEY* ABSTRACT Internet censorship and surveillance is on the rise globally and cyber- warfare increasing in scope and intensity. To help understand these new threats, commentators have grasped at historical analogies often with little regard for historical complexities or international perspective. Unfortunately, helpful new works on telecommunications history have focused primarily on U.S. history with little focus on international developments. There is thus a need for further internationally oriented investigation of telecommunications technologies, and their history. This essay attempts to help fill that void, drawing on case studies wherein global telecommunications technologies have been disrupted or censored – telegram censorship and surveillance, high frequency radio jamming, and direct broadcast satellite blocking. The case studies suggest remarkable regulatory patterns or cycles with insights for current censorship and privacy threats and challenges. * The author would like to thank Joseph Nye, Jonathan Zittrain, Ron Deibert, Masashi Crete-Nishihata, Joss Wright, Harry Lewis, Dorothy Zineberg, Victoria Nash, Ariel Katz, Carys Craig, Jennifer Granick, Fred von Lohmann, Eric Goldman, Dan Hunter, Scott Boone, Kendra Albert, Ryan Budish, Andy Sellars, Molly Sauter, Phillipa Gill, Adam Holland, Amar Ashar, Dan Jones, Enrique Armijo, Lorne Sossin, François Tanguay-Renaud, and Simon Stern, for comments, questions, -
ORIGINAL: ENGLISH TRIAL CHAMBER I Before: Judge Erik Møse
International Criminal Tribunal for Rwanda Tribunal pénal international pour le Rwanda ORIGINAL: ENGLISH TRIAL CHAMBER I Before: Judge Erik Møse, presiding Judge Jai Ram Reddy Judge Sergei Alekseevich Egorov Registrar: Adama Dieng Date: 18 December 2008 THE PROSECUTOR v. Théoneste BAGOSORA Gratien KABILIGI Aloys NTABAKUZE Anatole NSENGIYUMVA Case No. ICTR-98-41-T JUDGEMENT AND SENTENCE Office of the Prosecutor: Counsel for the Defence: Barbara Mulvaney Raphaël Constant Christine Graham Allison Turner Kartik Murukutla Paul Skolnik Rashid Rashid Frédéric Hivon Gregory Townsend Peter Erlinder Drew White Kennedy Ogetto Gershom Otachi Bw’Omanwa The Prosecutor v. Théoneste Bagosora et al., Case No. ICTR-98-41-T TABLE OF CONTENTS CHAPTER I: INTRODUCTION........................................................................................ 1 1. Overview ................................................................................................................... 1 2. The Accused ............................................................................................................. 8 2.1 Théoneste Bagosora ................................................................................................... 8 2.2 Gratien Kabiligi ....................................................................................................... 10 2.3 Aloys Ntabakuze ...................................................................................................... 10 2.4 Anatole Nsengiyumva ............................................................................................. -
Hate Crimes and Hate Group Activity in Canada
HATE CRIMES AND HATE GROUP ACTIVITY IN CANADA Mark Sandler* When I arrived in Fredericton, I expected to be asked questions such as “just how bad is hate group activity in Canada?”, and “how does freedom of speech limit the application of the criminal law to hate propaganda?” Instead, the first question I was met with was “what do you think of Professor Yaqzan and his comments about the male-female relationship?” Though I had not intended to address Professor Yaqzan, my combative nature and my strongly held views compel me to weave some comments about him, in some subtle way, into my presentation. I will attempt, here, to persuade you of three things. First, few appreciate the prevalence of hate group activity in Canada. Second, the criminal law is the most appropriate vehicle to combat that hate group activity in Canada. Third, freedom of speech does not prevent a democracy from dealing with the wilful promotion of hatred and racially motivated crimes. Whereas legitimate defenders of freedom of speech raise legitimate concerns about inhibiting this basic freedom, freedom of speech is also being used by the racists in our midst to disguise the true nature of their activity, and to seek immunity for hate propaganda that undermines the very fabric of our society. On 1 July 1990,1 had the misfortune of witnessing a Neo-Nazi rally held in Metcalfe, Ontario, near the nation’s capital. One hundred to two hundred and fifty Neo-Nazi “skinheads” congregated in a blasphemous celebration of Canada Day. Racists came together from Toronto, Montréal, Hamilton, Eastern and Western Canada, the United States, England and elsewhere. -
Holocaust-Denial Literature: a Third Bibliography
City University of New York (CUNY) CUNY Academic Works Publications and Research York College 1998 Holocaust-Denial Literature: A Third Bibliography John A. Drobnicki CUNY York College How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/yc_pubs/26 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] Holocaust-Denial Literature: A Third Bibliography John A. Drobnicki This bibliography is a supplement to two earlier ones published in the March 1994 and Decem- ber 1996 issues of the Bulletin of Bibliography. During the intervening time, Holocaust revision- ism has continued to be discussed in both the scholarly literature and the mainstream press. The Holocaust deniers, who prefer to call themselves “revisionists” in an attempt to gain scholarly le- gitimacy, have refused to go away and remain as vocal as ever— Bradley R. Smith has contin- ued to send revisionist advertisements to college newspapers, generating publicity for his cause. Holocaust-denial, which will be used interchangeably with Holocaust revisionism in this bib- liography, is a body of literature that seeks to “prove” that the Jewish Holocaust did not hap- pen. Although individual revisionists may have different motives and beliefs, they all share at least one point: that there was no systematic attempt by Nazi Germany to exterminate Euro- pean Jewry. Hence, they claim that the Holocaust is a “hoax” perpetrated by Jews (“Zionists”) in an attempt to blackmail the rest of the world for sympathy, money, and legitimacy for the state of Israel.