A Survey of Defensive Measures for Digital Persecution in the Global South
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Internet Surveillance in China
The Architecture of Control: Internet Su rveillance in China James A. Lewis , Center for Strategic and International Studies July 200 6 Security concerns shape China’s official internet and information technology strateg ies . Th ese include concerns shared by many cou nt ries: promoting a strong and growing economy , providing information assurance , and defending against foreign intrusions into China’s information space . Most importantly for the Chinese, information security include s a political element not foun d in many other nations – c ontrol by the party and the state over communications and the flow of informa tion . The rapid spread of internet access and mobile communications pose a serious challenge to this goal. In response, China’s security apparatus is reorienting its informational defenses. In the past, the emphasi s was on blocking access - the “great firewall.” In the future, the emphasis will be on the monitoring and surveillance of online activities. China’s primary objective in internet securi ty is political – preventing IT from eroding the regime’s authority. Information security is defined in China as “a comprehensive concept understood in a broad sense, and it involves political, economic, cultural, ideological, media, social and military l evel or field. ” It includes “data, system, network, infrastructure .”1 Chin ese officials worry about the potential of the Internet to contribute to the loss of state secrets , offer new avenues for organizing dissent and opposition , and spread “harmful inf ormation. ” This makes controlling access to "harmful network information” and the ability to monitor and intercept communications top priorities .2 For China’s leadership, one particular set of event s demonstrated the risks of not securing networks. -
THE BUSINESS of CENSORSHIP: CONTENT MANAGEMENT and the CHINESE ECONOMY By
THE BUSINESS OF CENSORSHIP: CONTENT MANAGEMENT AND THE CHINESE ECONOMY by JOSHUA CLARK B.A. (Hons.), Queen's University at Kingston, 2009 MASTER OF ARTS in THE FACULTY OF GRADUATE STUDIES (Political Science) THE UNIVERSITY OF BRITISH COLUMBIA (Vancouver) August 2010 ©Joshua Clark, 2010 Abstract Content control and censorship on the Internet are increasingly important topics for scholars of democratization, media and communications. Most studies have examined the relationship between the Internet, content management and various elements important to democratization such as the formation of civil society organizations. This thesis attempts to expand this discussion by examining the effects of online content management on economic systems, using the People's Republic of China as an example. China features a globally integrated economy that is increasing dependent on manufacturing and services while simultaneously maintaining one of the most extensive online content management systems in the world. This paper attempts to show how the Communist Party of China is able to reconcile the need for connectivity in order to drive their economy while maintaining political control. It also discusses the long-term implications of this strategy. The first section consists of a series of quantitative and qualitative tests to determine how various classes of websites are managed. These tests reveal that in order to maintain the flow of information necessary for a globally integrated economy, the Chinese Communist Party utilizes strategies that manage but not block the information flows related to business. This survey is followed by a case study examining the relationship between Google and China, and the implications of Chinese regulation and control for the broader economy. -
The Filtering Matrix
The Filtering Matrix Filtering and Surveillance Practices Worldwide Nart Villeneuve Director of Technical Research The Citizen Lab / OpenNet Initiative University of Toronto Internet Challenges Bloggers and independent media challenge traditional corporate and state-owned media VoIP is seen as a threat by traditional tele-communications companies Offshore gambling and banking sites challenge existing laws and regulations File sharing services have significantly impacted the area of copyright and intellectual property Spam, child pornography, identity theft, computer break-ins and terrorism present significant security concerns Borders in Cyberspace In an effort to counter the once borderless Internet, states are seeking to create informational boundaries in cyberspace. Informational Borders Although decentralized there are significant ªchoke pointsº at which controls can be placed on the Internet Technical & non-technical mechanisms used to censor and control access to the Internet Filtering is the technical mechanism through which such controls are operationalized Internet Filtering Internet content filtering is a term that refers to the techniques by which control is imposed on access to information on the Internet The motivations for state-directed Internet filtering include those with: a specific emphasis on e-commerce: tax, copyright, VoIP a specific emphasis on children: child pornography, violence a specific emphasis on content cultural: pornography and gambling political: dissidents and independent media security: (cyber)terrorism and hacking Filtering Techniques DNS filtering: modification to DNS servers to prevent a domain name from resolving to the correct IP address. IP filtering: entries are made in routing equipment that stop all outgoing requests for a specific IP address URL filtering: filtering technology that (a) reassembles the packets for traffic flowing through its network, (b) reads each http request, and (c) if the URL in the request matches one of the URLs (or keywords) specified in a blocklist, block the http request. -
Effective Censorship: Maintaining Control in China
University of Pennsylvania ScholarlyCommons CUREJ - College Undergraduate Research Electronic Journal College of Arts and Sciences 2010 Effective Censorship: Maintaining Control In China Michelle (Qian) Yang University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/curej Part of the Political Science Commons Recommended Citation Yang, Michelle (Qian), "Effective Censorship: Maintaining Control In China" 01 January 2010. CUREJ: College Undergraduate Research Electronic Journal, University of Pennsylvania, https://repository.upenn.edu/curej/118. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/curej/118 For more information, please contact [email protected]. Effective Censorship: Maintaining Control In China Keywords censorship, china, incentives, Social Sciences, Political Science, Devesh Kapur, Kapur, Devesh Disciplines Political Science This article is available at ScholarlyCommons: https://repository.upenn.edu/curej/118 Effective Censorship: Maintaining Control in China Michelle Yang April 09, 2010 Acknowledgments My initial interest in this thesis topic was generated during the summer of 2009 when I was interning in Beijing. There, I had found myself unable to access a large portion of the websites I’ve grown so accustomed to in my everyday life. I knew from then that I wanted to write about censorship in China. Since that summer, the scope of the topic has changed greatly under the careful guidance of Professor Devesh Kapur. I am incredibly grateful for all the support he has given me during this entire process. This final thesis wouldn’t be what it is today without his guidance. Professor Kapur, thank you for believing in me and for pushing me to complete this thesis! I would also like to extend my gratitude to both Professor Doherty-Sil and Professor Goldstein for taking time out of their busy schedules to meet with me and for providing me with indispensible advice. -
The Internet Beyond Borderless Versus Balkanized
POROUS TERRITORIES: THE INTERNET BEYOND BORDERLESS VERSUS BALKANIZED LUKE MUNN Western Sydney University (Australia) [email protected] Abstract: If the internet was once viewed as a borderless realm, critics now warn it is in danger of being “balkanized”, splintering into nationalized fragments. Certainly nation-states increasingly see the Internet as “their” internet, a national space to be regulated and actively shaped. The first half of this article charts the technologies that appear to place this vision within reach: data localization, internet shutdowns, and internet filtering. These moves promise to exert sovereign control, to make the inter- net an extension of national territory. Yet by drawing on two recent events in China, this article argues that these territories are messy and their borders are permeable. Pro-government activists jump across the firewall in order to attack individuals and organizations who threaten the stability and security of their motherland. Simultane- ously, individuals scale the firewall in order to question the party line and express solidarity with democratic movements, undermining the political and technical boundaries established by their nation. Internet architectures create a condition where territorialization is constantly being both amplified and undermined by “extra- territorial” activities. These practices demonstrate the everyday porosity of internet territories, providing a messier portrait that goes beyond the dichotomy of borderless vs balkanized. Keywords: territory, fragmentation, balkanization, internet, China. When nations speak of the internet today, they no longer use the language of the virtual, but of soil. At the dawn of the internet, cyberspace was framed as a new realm decoupled from the state. This digital sphere stretched across the globe, making it essentially ungovernable. -
Amnesty International Report 2014/15 the State of the World's Human Rights
AMNESTY INTERNATIONAL OF THE WORLD’S HUMAN RIGHTS THE STATE REPORT 2014/15 AMNESTY INTERNATIONAL REPORT 2014/15 THE STATE OF THE WORLD’S HUMAN RIGHTS The Amnesty International Report 2014/15 documents the state of human rights in 160 countries and territories during 2014. Some key events from 2013 are also reported. While 2014 saw violent conflict and the failure of many governments to safeguard the rights and safety of civilians, significant progress was also witnessed in the safeguarding and securing of certain human rights. Key anniversaries, including the commemoration of the Bhopal gas leak in 1984 and the Rwanda genocide in 1994, as well as reflections on 30 years since the adoption of the UN Convention against Torture, reminded us that while leaps forward have been made, there is still work to be done to ensure justice for victims and survivors of grave abuses. AMNESTY INTERNATIONAL This report also celebrates those who stand up REPORT 2014/15 for human rights across the world, often in difficult and dangerous circumstances. It represents Amnesty International’s key concerns throughout 2014/15 the world, and is essential reading for policy- THE STATE OF THE WORLD’S makers, activists and anyone with an interest in human rights. HUMAN RIGHTS Work with us at amnesty.org AIR_2014/15_cover_final.indd All Pages 23/01/2015 15:04 AMNESTY INTERNATIONAL Amnesty International is a global movement of more than 7 million people who campaign for a world where human rights are enjoyed by all. Our vision is for every person to enjoy all the rights enshrined in the Universal Declaration of Human Rights and other international human rights standards. -
Redalyc.Characterizing E-Government in China
Desafíos ISSN: 0124-4035 [email protected] Universidad del Rosario Colombia Baquero-Hernández, Ricardo Alberto Characterizing E-Government in China Desafíos, vol. 24, núm. 2, julio-diciembre, 2012, pp. 233-257 Universidad del Rosario Bogotá, Colombia Disponible en: http://www.redalyc.org/articulo.oa?id=359633172009 Cómo citar el artículo Número completo Sistema de Información Científica Más información del artículo Red de Revistas Científicas de América Latina, el Caribe, España y Portugal Página de la revista en redalyc.org Proyecto académico sin fines de lucro, desarrollado bajo la iniciativa de acceso abierto Characterizing E-Government in China RICARDO ALBERTO BAQUERO-HERNÁNDEZ* Artículo recibido: 10 de noviembre de 2010 Artículo aprobado: 12 de febrero de 2011 Para citar este artículo: Baquero Hernández, R. A. (2012). Characterizing E-Government in China. Desafíos, 24 (2), pp. 233-257. Abstract Although E-Government (E-G) is one public policy in China, it still has a long way to go in terms of diffusion across the country and interactive participation from citizens. It constitutes a double sided sword since it enhances the features that China needs to show to the world in international competitiveness and status, but also poses challenges to the Communist rule inasmuch as it has to be controlled. Therefore, E-G is both a political and a managerial issue: it is sensitive to the Chinese Communist Party but also leads to economical and administrative pros- perity and efficiency. Some of the keys would be the development of the middle class, further penetration of the Internet, and more education about virtual tools in government issues and services. -
Redefining Digital Citizenship in the Cyber Era
Cybersoverignty: Redefining Digital Citizenship in the Cyber Era By: Sophie Laurence AP Gov May 20, 2019 Cyber: a combining form meaning “computer,” “computer network,” or “virtual reality,” used in the formation of compound words (cybertalk; cyberart; cyberspace) and, by extension, meaning “expressing visions of the future.” Sovereignty: supreme power especially over a body politic; freedom from external control; autonomy. A search in dictionary.com yields the following result: “No results found for cybersovereignty.” Neither this word nor its variations (cyber-sovereignty, cyber sovereignty) appears in any English language dictionary. Yet, the rise of China as the world’s dominant cyber-superpower amplifies the urgent need for international discourse on its meaning and implications. Even as the West is wondering if a change in the global paradigm is underway, China has already dramatically redefined what it means to be a digital citizen in the 21st century. The working meaning of “cybersovereignty” is the full right and power of a governing body over the internet within its own borders, without any interference from outside entities. In the material world, national borders are physical boundaries protected by border guards, demarcated by country lines on maps, and governed by national laws. There is no equivalent universal system to regulate internet borders. Though utopianists routinely frame the internet as an open and free instrument of democracy, this is an ideological fiction; the reality is that the internet is a commodified entity owned by a privileged few and, in the case of China, state-controlled. Correspondingly, it has become a battleground in the struggle for international economic dominance and domestic political control. -
Professional Search in Pharmaceutical Research
Professional Search in Pharmaceutical Research Alex Kohn München 2009 Professional Search in Pharmaceutical Research Alex Kohn Dissertation an der Fakultät für Mathematik, Informatik und Statistik der Ludwig‐Maximilians‐Universität München vorgelegt von Alex Kohn München, den 24.11.2009 Erstgutachter: Prof. Dr. François Bry (Ludwig‐Maximilians‐Universität München) Zweitgutachter: Prof. Dr. Steffen Staab (Universität Koblenz‐Landau) Tag der mündlichen Prüfung: 19.01.2010 Abstract In the mid 90s, visiting libraries – as means of retrieving the latest literature – was still a common necessity among professionals. Nowadays, professionals simply access information by ‘googling’. Indeed, the name of the Web search engine market leader “Google” became a synonym for searching and retrieving information. Despite the increased popularity of search as a method for retrieving relevant information, at the workplace search engines still do not deliver satisfying results to professionals. Search engines for instance ignore that the relevance of answers (the satisfaction of a searcher’s needs) depends not only on the query (the information request) and the document corpus, but also on the working context (the user’s personal needs, education, etc.). In effect, an answer which might be appropriate to one user might not be appropriate to the other user, even though the query and the document corpus are the same for both. Personalization services addressing the context become therefore more and more popular and are an active field of research. This is only one of several challenges encountered in ‘professional search’: How can the working context of the searcher be incorporated in the ranking process; how can unstructured free‐text documents be enriched with semantic information so that the information need can be expressed precisely at query time; how and to which extent can a company’s knowledge be exploited for search purposes; how should data from distributed sources be accessed from into one‐single‐entry‐point. -
Artificial Intelligence, China, Russia, and the Global Order Technological, Political, Global, and Creative Perspectives
AIR UNIVERSITY LIBRARY AIR UNIVERSITY PRESS Artificial Intelligence, China, Russia, and the Global Order Technological, Political, Global, and Creative Perspectives Shazeda Ahmed (UC Berkeley), Natasha E. Bajema (NDU), Samuel Bendett (CNA), Benjamin Angel Chang (MIT), Rogier Creemers (Leiden University), Chris C. Demchak (Naval War College), Sarah W. Denton (George Mason University), Jeffrey Ding (Oxford), Samantha Hoffman (MERICS), Regina Joseph (Pytho LLC), Elsa Kania (Harvard), Jaclyn Kerr (LLNL), Lydia Kostopoulos (LKCYBER), James A. Lewis (CSIS), Martin Libicki (USNA), Herbert Lin (Stanford), Kacie Miura (MIT), Roger Morgus (New America), Rachel Esplin Odell (MIT), Eleonore Pauwels (United Nations University), Lora Saalman (EastWest Institute), Jennifer Snow (USSOCOM), Laura Steckman (MITRE), Valentin Weber (Oxford) Air University Press Muir S. Fairchild Research Information Center Maxwell Air Force Base, Alabama Opening remarks provided by: Library of Congress Cataloging-in- Publication Data Brig Gen Alexus Grynkewich (JS J39) Names: TBD. and Lawrence Freedman (King’s College, Title: Artificial Intelligence, China, Russia, and the Global Order : Techno- London) logical, Political, Global, and Creative Perspectives / Nicholas D. Wright. Editor: Other titles: TBD Nicholas D. Wright (Intelligent Biology) Description: TBD Identifiers: TBD Integration Editor: Subjects: TBD Mariah C. Yager (JS/J39/SMA/NSI) Classification: TBD LC record available at TBD AIR UNIVERSITY PRESS COLLABORATION TEAM Published by Air University Press in October -
The Impact of Media Censorship: Evidence from a Field Experiment in China
The Impact of Media Censorship: Evidence from a Field Experiment in China Yuyu Chen David Y. Yang* January 4, 2018 — JOB MARKET PAPER — — CLICK HERE FOR LATEST VERSION — Abstract Media censorship is a hallmark of authoritarian regimes. We conduct a field experiment in China to measure the effects of providing citizens with access to an uncensored Internet. We track subjects’ me- dia consumption, beliefs regarding the media, economic beliefs, political attitudes, and behaviors over 18 months. We find four main results: (i) free access alone does not induce subjects to acquire politically sen- sitive information; (ii) temporary encouragement leads to a persistent increase in acquisition, indicating that demand is not permanently low; (iii) acquisition brings broad, substantial, and persistent changes to knowledge, beliefs, attitudes, and intended behaviors; and (iv) social transmission of information is statis- tically significant but small in magnitude. We calibrate a simple model to show that the combination of low demand for uncensored information and the moderate social transmission means China’s censorship apparatus may remain robust to a large number of citizens receiving access to an uncensored Internet. Keywords: censorship, information, media, belief JEL classification: D80, D83, L86, P26 *Chen: Guanghua School of Management, Peking University. Email: [email protected]. Yang: Department of Economics, Stanford University. Email: [email protected]. Yang is deeply grateful to Ran Abramitzky, Matthew Gentzkow, and Muriel Niederle -
Middle East, North Africa
MIDDLE EAST, NORTH AFRICA Iran: Armed Forces Ready to Take Over National Intranet Project OE Watch Commentary: The Islamic Republic launched plans to build a national intranet in 2005, driven by the Iranian leadership’s belief that the Islamic Republic is engaged in a cultural war against the West and that unfettered communications pose a threat to the Islamic Republic’s internal security. Almost 15 years later and more than five years after the project was supposed to be completed, efforts to build a national intranet continue (See: “Iran: Progress on National Intranet,” OE Watch, July 2018; “Comprehensive Legal System for the Country’s Internet and Cyberspace,” OE General Mohammed Bagheri, speaking to military elites at the Islamic Revolutionary Guard Corps’ Ground Forces Martyr Modarres Primary Combat Training School. Watch, October 2017). Source: Fars News Agency, https://media.farsnews.com/Uploaded/Files/Images/1398/04/24/13980424000739_Test_PhotoN.jpg In the excerpted article from the Fars News Agency, an outlet close to the Islamic Revolutionary Guard Corps (IRGC), Major General Mohammad Bagheri, chief-of-staff of the Armed Forces, suggests that Iran’s military—presumably the IRGC from whose ranks Bagheri arose—could take charge of the project. His comments likely reflect frustration on the part of the IRGC and other hardline ideologues that the project to cut the Islamic Republic off from the World Wide Web remains delayed with no end date in sight. To advocate for such a position, he argues that foreign “control” of Iranian bandwidth is a danger to Iran, saying, “Foreigners control seventy per cent of the bandwidth in our country and we have just left the door open for them to come and influence public opinion and the youth here.” Beyond the excerpts provided here, Bagheri’s speech was wide-ranging.