“Leaked Files” and China's Ethnic and Religious Polices

Total Page:16

File Type:pdf, Size:1020Kb

“Leaked Files” and China's Ethnic and Religious Polices “Leaked Files” and China’s Ethnic and Religious Polices (Research Report) Liang Zheng Nov.28,2019 applied for 70 years. Ethnic relations were stable for most of that time. The On Nov. 16, 2019, the New York shift from a planned economy to a Times reported that it acquired 403 market economy transformed the pages of “leaked files” from “a member situation for ethnic districts as well as of Chinese political establishment”. The other districts in China. In the process content of those files concerns China’s of transformation, different social ethnic and religious policies and problems occurred in ethnic districts. In counter-terrorism and de-radicalization Xinjiang, apart from the efforts in Xinjiang. 1 transformational problems brought by Since from New York Times reported reform and opening up, religious the “leaked files” on November 16th, no extremism, ethnic separatism, think tank or research institution has terrorism and violence have long conducted any research and analysis on plagued society. These conditions pose it. This possibly was because the source hazards and challenges to the of documents is unclear, and its development of Xinjiang and the authenticity is not verifiable. Despite stability of the western area. The violent their lack of authenticity, the content of terrorist incidents between 2009 and the “leaked files” can be used as a 2015 demonstrated Xinjiang’s problems reference and attracts public attention to others in inland provinces. These to Chinese long-term ethnic and attacks, widely covered by the media, religious policy and practice. have imbued fear among viewers. The China is a multi-ethnic country. direct response of many in inland Since 1949, there have been 55 officially provinces was “what’s going on in recognized ethnic minorities. China Xinjiang?” This involves a major established five provincial-level ethnic question: what ethnic and religious autonomous regions. In 1984, the policies is the Chinese government Central Government of China pursuing in Xinjiang? Or is there any implemented the Law on Regional policy issues? What goes wrong? The Ethnic Autonomy, which brought legal governance of Xinjiang is confined to basis to China’s ethnic policies and the mass media’s mechanical reports on management measures. policy. It is difficult to grasp the ethnic The ethnic policy of China has been and religious policy pursued by Chinese 1https://www.nytimes.com/interacti ve/2019/11/16/world/asia/china- xinjiang-documents.html 1 government unless there is long-term to terrorist attacks that happened in field research and study of Xinjiang. Xinjiang, the The New York Times This report about “leaked files” from reported:“In 2014…two Uighur The New York Times offers an militants staged a suicide bombing opportunity to answer these questions. outside a train station in Urumqi that Based on the text of “leaked files” injured nearly 80 people, one fatally. from The New York Times, this research Weeks earlier, militants with knives had will be conducted from the following gone on a rampage at another railway questions: station, in southwest China, killing 31 1.According to the text of “leaked people and injuring more than 140. And files”, what ethnic and religious policies less than a month later, assailants are applied by Chinese government in tossed explosives into a vegetable Xinjiang? market in Urumqi, wounding 94 people 2. Is there any difference between and killing at least 39.” the document’s version of ethnic and In 2014, The New York Times religious policies in China’s in Xinjiang reported two attacks in Urumqi, the and official version? If there is, what’s "April 30" train station bombing, and the specific difference? the "March 01" attacks in the Kunming 3. Some western media claim that Railway Station. These two attacks had the measures of Chinese government been defined as terrorist attacks by against terrorism is repression toward Chinese public security departments. certain minorities. Do the “leaked files” Due to ideological bias, The New York prove this? Times did not use the phrase “terrorist 4. Does the “leaked files” from The attacks” in regard to these cases, but New York Times provide valuable clues terms, such as “militants”, “suicide or not for future research? bombings”, “rampage”, and “toss explosives.” This reporting did show the The situation of anti-terrorism reality of violence and the threat of The background of the policies terrorism brought by militants since Chinese government pursues in 2012. Xinjiang were introduced in the “leaked These two cases as mentioned by files.” The main content is a series of The New York Times’s report, like all violent terrorist attacks that occurred in cases of violence and terrorism related Xinjiang in the last few years. These to Xinjiang, are influential and widely attacks were a catalyst for Xinjiang’s known. How many cases have taken new policies in this period. With regard place, but are not widely known? 2 According to The Fight Against Terrorism inside but also from abroad.“A senior and Extremism and Human Rights Chinese leader” was quoted by the New Protection in Xinjiang White Paper York Times as saying, “After the United issued by the State Council Information States pulls troops out of Afghanistan, Office of the People’s Republic of China terrorist organizations positioned on in 2019, “incomplete statistics show the frontiers of Afghanistan and that from 1990 to the end of 2016, Pakistan may quickly infiltrate into separatist, terrorist and extremist forces Central Asia. East Turkestan’s terrorists launched thousands of terrorist attacks who have received real-war training in in Xinjiang, killing large numbers of Syria and Afghanistan could at any time innocent people and hundreds of police launch terrorist attacks in Xinjiang.” For officers, and causing immeasurable the situation of “East Turkistan” damage to property.”2 As mentioned in terrorist organization activities, White Paper, these “several thousand” international scholars and think tanks terrorist attacks spanned more than 20 have produced from results, but the years. The description of these cases in overall degree of concern stays low for White Paper is quite simple so requires some reasons. For instance, American further research. Though the number Jamestown Foundation regularly “several thousand” seems fuzzy, people publicizes the activities of “East who understand the context of China Turkistan” terrorist organization in can feel the seriousness of the problem. China;3 another US terrorism research Xinjiang is faced with a severe terrorism website, Long War Journal, also often threat which has spilled over to other publishes research about the provinces. It is one of the important international activities of “East logical starting points of various aspects Turkistan” terrorist organization;4 a of Xinjiang governance. research institution in France published The terrorism threat that China a report about the “East Turkistan” faces not only comes from country terrorist organization in Syria.5 2http://www.gov.cn/zhengce/2019- 4 Weiss, C. (2015). Turkistan Islamic 03/18/content_5374643.htm Party had significant role in recent 3 Jacob Zenn. 2011. Jihad in Idlib offensive. Retrieved from China? Marketing the Turkistan https://www.longwarjournal.org/arc Islamic Party. Jamestown hives/2015/04/turkistan-islamic- Foundation. party-had-significant-role-recent- https://jamestown.org/wp- idlib-offensive.php content/uploads/2011/03/TM0090 5 Vagneur-Jones, A. (2017). War 6.pdf?x87069 and opportunity: the Turkistan Islamic Party and the Syrian conflict. 3 In China, it is rare to see research instructions to Syria “jihad” from al- about the “East Turkistan” terrorist Qaida, the “East Turkistan Islamic organization in Central Asia, West Asia Movement”, with orders from al-Qaida, and the Middle East. So far, it could only deploy capable personnel from be seen from some reports of media. For Afghanistan and the border region of instance, Global Times reporters got a Pakistan in batches in Syria. The piece of material about “East Turkistan” militants join forces with other jihadi terrorists training in the south of groups Syria, and then make up an Turkey and the north of Syria during an independent group to war.” 7 The interview in Qatar. Viewing from the “China Youth network” quoted an photos and videos, “East Turkistan” official of the anti-terrorist branch in activities in Syria and southern Turkey Chinese government: terrorist has reached a certain scale. In the organization “East Turkistan Islamic photos, their training camp occupies a Movement” began operations after al- considerable area surrounded by the Qaida issued an order. There are two walls, a camera probing above walls. main purposes of the "East Turkistan" Except for the militants, their families group. One is “training” and another are also in the camp. Wearing one is an attempting to seek camouflage uniforms, equipment, “recognition” and “help” from machine guns, AK-47 assault rifles and international terrorist forces. The grenades, some "East Turkistan" international community should militants sit cross-legged to discuss the quickly help Syria to eliminate the matter, or arms around eating and conflict, and if the international drinking together. In addition, there are terrorism forces get united, it could not some "explosion pictures" of bomb be a gospel for any country”.8 attacks in Syria, as well as a picture The scattered report about the showing a "East Turkistan" militant "East Turkistan" organization of carrying a banner of al-Qaida outside international activities from media, 6 the camp. The Global Times quoted a coupled with the lack of domestic Chinese national counterterrorism academic research means this problem official’s words: “After issuing secret has not effectively got attention from Retrieved from 6http://www.chinanews.com/mil/20 https://www.frstrategie.org/publicat 13/12-17/5626485.shtml ions/notes/war-and-opportunity- 7http://www.chinanews.com/mil/20 the-turkistan-islamic-party-and-the- 12/10-29/4283515.shtml syrian-conflict-07-2017 8http://pinglun.youth.cn/wztt/20121 0/t20121030_2562869.htm 4 China.
Recommended publications
  • Who Set the Narrative? Assessing the Influence of Chinese Media in News Coverage of COVID-19 in 30 African Countries the Size Of
    Who Set the Narrative? Assessing the Influence of Chinese Media in News Coverage of COVID-19 in 30 African Countries The size of China’s State-owned media’s operations in Africa has grown significantly since the early 2000s. Previous research on the impact of increased Sino-African mediated engagements has been inconclusive. Some researchers hold that public opinion towards China in African nations has been improving because of the increased media presence. Others argue that the impact is rather limited, particularly when it comes to affecting how African media cover China- related stories. This paper seeks to contribute to this debate by exploring the extent to which news media in 30 African countries relied on Chinese news sources to cover China and the COVID-19 outbreak during the first half of 2020. By computationally analyzing a corpus of 500,000 news stories, I show that, compared to other major global players (e.g. Reuters, AFP), content distributed by Chinese media (e.g. Xinhua, China Daily, People’s Daily) is much less likely to be used by African news organizations, both in English and French speaking countries. The analysis also reveals a gap in the prevailing themes in Chinese and African media’s coverage of the pandemic. The implications of these findings for the sub-field of Sino-African media relations, and the study of global news flows is discussed. Keywords: China-Africa, Xinhua, news agencies, computational text analysis, big data, intermedia agenda setting Beginning in the mid-2010s, Chinese media began to substantially increase their presence in many African countries, as part of China’s ambitious going out strategy that covered a myriad of economic activities, including entertainment, telecommunications and news content (Keane, 2016).
    [Show full text]
  • Xi Jinping's Address to the Central Conference On
    Xi Jinping’s Address to the Central Conference on Work Relating to Foreign Affairs: Assessing and Advancing Major- Power Diplomacy with Chinese Characteristics Michael D. Swaine* Xi Jinping’s speech before the Central Conference on Work Relating to Foreign Affairs—held November 28–29, 2014, in Beijing—marks the most comprehensive expression yet of the current Chinese leadership’s more activist and security-oriented approach to PRC diplomacy. Through this speech and others, Xi has taken many long-standing Chinese assessments of the international and regional order, as well as the increased influence on and exposure of China to that order, and redefined and expanded the function of Chinese diplomacy. Xi, along with many authoritative and non-authoritative Chinese observers, presents diplomacy as an instrument for the effective application of Chinese power in support of an ambitious, long-term, and more strategic foreign policy agenda. Ultimately, this suggests that Beijing will increasingly attempt to alter some of the foreign policy processes and power relationships that have defined the political, military, and economic environment in the Asia- Pacific region. How the United States chooses to respond to this challenge will determine the Asian strategic landscape for decades to come. On November 28 and 29, 2014, the Central Chinese Communist Party (CCP) leadership convened its fourth Central Conference on Work Relating to Foreign Affairs (中央外事工作会)—the first since August 2006.1 The meeting, presided over by Premier Li Keqiang, included the entire Politburo Standing Committee, an unprecedented number of central and local Chinese civilian and military officials, nearly every Chinese ambassador and consul-general with ambassadorial rank posted overseas, and commissioners of the Foreign Ministry to the Hong Kong Special Administrative Region and the Macao Special Administrative Region.
    [Show full text]
  • Framing International Education in Global Times
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Scholarship@Western Western University Scholarship@Western Education Publications Education Faculty 2019 Framing International Education in Global Times Paul Tarc Western University, [email protected] Follow this and additional works at: https://ir.lib.uwo.ca/edupub Part of the Education Commons Citation of this paper: Tarc, P. (2019). Internationalization of Education as an Emerging Field of Study? A Conceptualization of International Education for Cross-domain Analyses. Policy Futures in Education, 17(6), 732-744. Framing International Education in Global Times – WORKING PAPER by Paul Tarc, PhD [email protected] International education (IE) is a complex and historically-inflected term, which means that its meanings and uses shift in relation to larger geopolitical, economic and social conditions. Indeed, the ebb and flow of IE somewhat mirrors or follows the larger historical conditions of conflict, war, resolution, nationalisms, internationalisms and protectionisms as energized by the most powerful nation-states and blocs. In the 20th Century, in parallel with internationalist and peace movements, IE gained traction in the aftermath of large-scale war. One of the most radical institutional expressions of internationalism for its time—the League of Nations—emerged in the 1920s in the wake of the devastation and unresolved animosities of the First World War. The creation of the League of Nations and the International Labour Organization in Geneva Switzerland, produced the conditions for the birth of what is now considered the longest-running international school, the International School of Geneva. The next period where internationalism and international education peaked in the 1960s and early 1970s occurred, again, in the decades following a ‘world war’ with the reconstruction of Europe and the decolonization of European empires.
    [Show full text]
  • The Danger of Deconsolidation Roberto Stefan Foa and Yascha Mounk Ronald F
    July 2016, Volume 27, Number 3 $14.00 The Danger of Deconsolidation Roberto Stefan Foa and Yascha Mounk Ronald F. Inglehart The Struggle Over Term Limits in Africa Brett L. Carter Janette Yarwood Filip Reyntjens 25 Years After the USSR: What’s Gone Wrong? Henry E. Hale Suisheng Zhao on Xi Jinping’s Maoist Revival Bojan Bugari¡c & Tom Ginsburg on Postcommunist Courts Clive H. Church & Adrian Vatter on Switzerland Daniel O’Maley on the Internet of Things Delegative Democracy Revisited Santiago Anria Catherine Conaghan Frances Hagopian Lindsay Mayka Juan Pablo Luna Alberto Vergara and Aaron Watanabe Zhao.NEW saved by BK on 1/5/16; 6,145 words, including notes; TXT created from NEW by PJC, 3/18/16; MP edits to TXT by PJC, 4/5/16 (6,615 words). AAS saved by BK on 4/7/16; FIN created from AAS by PJC, 4/25/16 (6,608 words). PGS created by BK on 5/10/16. XI JINPING’S MAOIST REVIVAL Suisheng Zhao Suisheng Zhao is professor at the Josef Korbel School of International Studies, University of Denver. He is executive director of the univer- sity’s Center for China-U.S. Cooperation and editor of the Journal of Contemporary China. When Xi Jinping became paramount leader of the People’s Republic of China (PRC) in 2012, some Chinese intellectuals with liberal lean- ings allowed themselves to hope that he would promote the cause of political reform. The most optimistic among them even thought that he might seek to limit the monopoly on power long claimed by the ruling Chinese Communist Party (CCP).
    [Show full text]
  • Freedom on the Net 2016
    FREEDOM ON THE NET 2016 China 2015 2016 Population: 1.371 billion Not Not Internet Freedom Status Internet Penetration 2015 (ITU): 50 percent Free Free Social Media/ICT Apps Blocked: Yes Obstacles to Access (0-25) 18 18 Political/Social Content Blocked: Yes Limits on Content (0-35) 30 30 Bloggers/ICT Users Arrested: Yes Violations of User Rights (0-40) 40 40 TOTAL* (0-100) 88 88 Press Freedom 2016 Status: Not Free * 0=most free, 100=least free Key Developments: June 2015 – May 2016 • A draft cybersecurity law could step up requirements for internet companies to store data in China, censor information, and shut down services for security reasons, under the aus- pices of the Cyberspace Administration of China (see Legal Environment). • An antiterrorism law passed in December 2015 requires technology companies to cooperate with authorities to decrypt data, and introduced content restrictions that could suppress legitimate speech (see Content Removal and Surveillance, Privacy, and Anonymity). • A criminal law amendment effective since November 2015 introduced penalties of up to seven years in prison for posting misinformation on social media (see Legal Environment). • Real-name registration requirements were tightened for internet users, with unregistered mobile phone accounts closed in September 2015, and app providers instructed to regis- ter and store user data in 2016 (see Surveillance, Privacy, and Anonymity). • Websites operated by the South China Morning Post, The Economist and Time magazine were among those newly blocked for reporting perceived as critical of President Xi Jin- ping (see Blocking and Filtering). www.freedomonthenet.org FREEDOM CHINA ON THE NET 2016 Introduction China was the world’s worst abuser of internet freedom in the 2016 Freedom on the Net survey for the second consecutive year.
    [Show full text]
  • China's Quest for Global Primacy: an Analysis of Chinese International
    C O R P O R A T I O N TIMOTHY R. HEATH, DEREK GROSSMAN, ASHA CLARK China’s Quest for Global Primacy An Analysis of Chinese International and Defense Strategies to Outcompete the United States For more information on this publication, visit www.rand.org/t/RRA447-1 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0615-6 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2021 RAND Corporation R® is a registered trademark. Cover images: prospective56/iStock/ Getty Images Plus; MF3d/iStock/Getty Images Plus Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface This research explores possible international and defense strategies that China might employ to outcompete the United States and achieve a position of international primacy.
    [Show full text]
  • Responses to Information Requests - Immigration and Refugee Board of Canada
    Responses to Information Requests - Immigration and Refugee Board of Canada Canada.ca Services Departments Français Immigration and Refugee Board of Canada Refugee Claims Refugee Appeals Admissibility Hearings Detention Reviews HomeImmigrationResearch Appeals Program Responses to Information Requests National Responses to Information Requests Documentation Packages Recent Research Responses to Information Requests (RIR) respond to focused Requests for Information that are submitted to the Research Directorate in the course of the Responses to refugee protection determination process. The database contains a seven-year Information Requests archive of English and French RIRs. Earlier RIRs may be found on the UNHCR's Refworld website. Please note that some RIRs have attachments which are not electronically accessible. To obtain a PDF copy of an RIR attachment, please email the Knowledge and Information Management Unit. 29 June 2016 CHN105545.E China: Information on birth registration for children born out of wedlock; whether the name of the father appears on the birth certificate if the child is born out of wedlock; what information may appear on the birth certificate if the father is unknown; whether the father's name may be added to the child's birth certificate by referring to the father's Resident Identity Card, particularly relating to Henan Province birth certificates (2010-June 2016) Research Directorate, Immigration and Refugee Board of Canada, Ottawa 1. Overview of Birth Registration Requirements 1.1 Birth Permit Sources report that a "birth permit" [also known as a "birth service certificate," "family planning certificate" or "family planning service permit"] is required before the birth of a child in China (The Telegraph 2 Jan.
    [Show full text]
  • A Global Contest for Power and Influence
    CHAPTER 1 U.S.-CHINA GLOBAL COMPETITION SECTION 1: A GLOBAL CONTEST FOR POWER AND INFLUENCE: CHINA’S VIEW OF STRA- TEGIC COMPETITION WITH THE UNITED STATES Key Findings • Beijing has long held the ambition to match the United States as the world’s most powerful and influential nation. Over the past 15 years, as its economic and technological prowess, dip- lomatic influence, and military capabilities have grown, China has turned its focus toward surpassing the United States. Chi- nese leaders have grown increasingly aggressive in their pur- suit of this goal following the 2008 global financial crisis and General Secretary of the Chinese Communist Party (CCP) Xi Jinping’s ascent to power in 2012. • Chinese leaders regard the United States as China’s primary adversary and as the country most capable of preventing the CCP from achieving its goals. Over the nearly three decades of the post-Cold War era, Beijing has made concerted efforts to diminish the global strength and appeal of the United States. Chinese leaders have become increasingly active in seizing op- portunities to present the CCP’s one-party, authoritarian gover- nance system and values as an alternative model to U.S. global leadership. • China’s approach to competition with the United States is based on the CCP’s view of the United States as a dangerous ideologi- cal opponent that seeks to constrain its rise and undermine the legitimacy of its rule. In recent years, the CCP’s perception of the threat posed by Washington’s championing of liberal demo- cratic ideals has intensified as the Party has reemphasized the ideological basis for its rule.
    [Show full text]
  • Section 3: China's Strategic Aims in Africa
    SECTION 3: CHINA’S STRATEGIC AIMS IN AFRICA Key Findings • Beijing has long viewed African countries as occupying a cen- tral position in its efforts to increase China’s global influence and revise the international order. Over the last two decades, and especially under General Secretary of the Chinese Com- munist Party (CCP) Xi Jinping’s leadership since 2012, Beijing has launched new initiatives to transform Africa into a testing ground for the export of its governance system of state-led eco- nomic growth under one-party, authoritarian rule. • Beijing uses its influence in Africa to gain preferential access to Africa’s natural resources, open up markets for Chinese exports, and enlist African support for Chinese diplomatic priorities on and beyond the continent. The CCP flexibly tailors its approach to different African countries with the goal of instilling admira- tion and at times emulation of China’s alternative political and governance regime. • China is dependent on Africa for imports of fossil fuels and commodities constituting critical inputs in emerging technology products. Beijing has increased its control of African commodi- ties through strategic direct investment in oil fields, mines, and production facilities, as well as through resource-backed loans that call for in-kind payments of commodities. This control threatens the ability of U.S. companies to access key supplies. • As the top bilateral financier of infrastructure projects across Africa, China plays an important role in addressing the short- age of infrastructure on the continent. China’s financing is opaque and often comes with onerous terms, however, leading to rising concerns of economic exploitation, dependency, and po- litical coercion.
    [Show full text]
  • AFRICA in CHINA's FOREIGN POLICY
    AFRICA in CHINA’S FOREIGN POLICY YUN SUN April 2014 Yun Sun is a fellow at the East Asia Program of the Henry L. Stimson Center. NOTE: This paper was produced during the author’s visiting fellowship with the John L. Thornton China Center and the Africa Growth Initiative at Brookings. ABOUT THE JOHN L. THORNTON CHINA CENTER: The John L. Thornton China Center provides cutting-edge research, analysis, dialogue and publications that focus on China’s emergence and the implications of this for the United States, China’s neighbors and the rest of the world. Scholars at the China Center address a wide range of critical issues related to China’s modernization, including China’s foreign, economic and trade policies and its domestic challenges. In 2006 the Brookings Institution also launched the Brookings-Tsinghua Center for Public Policy, a partnership between Brookings and China’s Tsinghua University in Beijing that seeks to produce high quality and high impact policy research in areas of fundamental importance for China’s development and for U.S.-China relations. ABOUT THE AFRICA GROWTH INITIATIVE: The Africa Growth Initiative brings together African scholars to provide policymakers with high-quality research, expertise and innovative solutions that promote Africa’s economic development. The initiative also collaborates with research partners in the region to raise the African voice in global policy debates on Africa. Its mission is to deliver research from an African perspective that informs sound policy, creating sustained economic growth and development for the people of Africa. ACKNOWLEDGMENTS: I would like to express my gratitude to the many people who saw me through this paper; to all those who generously provided their insights, advice and comments throughout the research and writing process; and to those who assisted me in the research trips and in the editing, proofreading and design of this paper.
    [Show full text]
  • Detecting Digital Fingerprints: Tracing Chinese Disinformation in Taiwan
    Detecting Digital Fingerprints: Tracing Chinese Disinformation in Taiwan By: A Joint Report from: Nick Monaco Institute for the Future’s Digital Intelligence Lab Melanie Smith Graphika Amy Studdart The International Republican Institute 08 / 2020 Acknowledgments The authors and organizations who produced this report are deeply grateful to our partners in Taiwan, who generously provided time and insights to help this project come to fruition. This report was only possible due to the incredible dedication of the civil society and academic community in Taiwan, which should inspire any democracy looking to protect itself from malign actors. Members of this community For their assistance in several include but are not limited to: aspects of this report the authors also thank: All Interview Subjects g0v.tw Projects Gary Schmitt 0archive Marina Gorbis Cofacts Nate Teblunthuis DoubleThink Lab Sylvie Liaw Taiwan FactCheck Center Sam Woolley The Reporter Katie Joseff Taiwan Foundation for Democracy Camille François Global Taiwan Institute Daniel Twining National Chengchi University Election Johanna Kao Study Center David Shullman Prospect Foundation Adam King Chris Olsen Hsieh Yauling The Dragon’s Digital Fingerprint: Tracing Chinese Disinformation in Taiwan 2 Graphika is the network Institute for the Future’s The International Republican analysis firm that empowers (IFTF) Digital Intelligence Lab Institute (IRI) is one of the Fortune 500 companies, (DigIntel) is a social scientific world’s leading international Silicon Valley, human rights research entity conducting democracy development organizations, and universities work on the most pressing organizations. The nonpartisan, to navigate the cybersocial issues at the intersection of nongovernmental institute terrain. With rigorous and technology and society.
    [Show full text]
  • Country of Origin Information Report China
    Country of origin information report China July 2020 Country of origin information report China | May 2020 Publication details Location The Hague Assembled by Country of Origin Information Reports Section (AB) The Dutch version of this report is leading. The Ministry of Foreign Affairs of the Netherlands cannot be held accountable for misinterpretations based on the English version of the report. Country of origin information report China | May 2020 Table of contents Publication details ............................................................................................2 Table of contents .............................................................................................3 Introduction ....................................................................................................6 1 Political developments ................................................................................ 8 1.1 General ..........................................................................................................8 1.2 Xi Jinping .......................................................................................................8 1.3 The Shuanggui system .....................................................................................9 1.4 The security situation .......................................................................................9 1.5 Social credit system ....................................................................................... 10 1.5.1 Companies ..................................................................................................
    [Show full text]