Exclusive Report

Total Page:16

File Type:pdf, Size:1020Kb

Exclusive Report SPECIAL EDITION | December 2018 TRUTH AND TRADITION EXCLUSIVE REPORT Huawei plays a key role in China’s programs of mass surveillance, human rights abuse, and technological dominance. Jasper Fakkert, Editor-in-Chief IS CHINA’S HUAWEI WATCHING YOU? A global media in 23 languages and 35 countries. A world leader in reporting on China. THEEPOCHTIMES.COM 2 December 2018 often poorly substantiated, From is the ongoing concern that the company may pose a security threat to foreign Stephen Gregory, Publisher Table of the Editor nations by sharing data Jasper Fakkert, Editor-in-Chief with Chinese authorities. Channaly Philipp, At Home, Travel Editor Chinese telecom company Included in this special Chrisy Trudeau, Mind & Body Editor Huawei has a controver- edition is information that Crystal Shi, Food Editor sial brand, yet details that should end this confusion, Sharon Kilarski, Arts & Culture Editor Contents explain this controversy are as we explain how Chinese rarely made clear in news laws require companies, Huawei Is Cornerstone of CCP Initiative to stories. With the recent including Huawei, to grant arrest of Meng Wanzhou, control over data to the CONTACT US Overtake the United States......3 chief financial officer and state and allow authorities Epoch Times Inc. The Relationship Between Huawei and the vice chairperson of Huawei, access to their systems. We 229 W. 28th St., Floor 5 Chinese Regime’s Factional Politics......5 Te Epoch Times is publish- also detail terms-of-service New York, NY 10001 ing this special edition to agreements for products 212-239-2808 Meng Wanzhou, Chief Financial Ofcer and shed light on the company’s from Chinese companies Advertising opaque operations. that have users abroad often Vice Chair of Huawei......6 [email protected] Some may wonder who unknowingly agreeing to A Brief History of Huawei......7 Meng is and why her ar- abide by Chinese law. Subscriptions rest is significant. In this Huawei also plays a key [email protected] Chinese User Agreements Force You to Abide edition, we explain her role in the Chinese Com- General Inquiries by Chinese Censorship......9 link to Huawei President munist Party’s programs of [email protected] Ren Zhengfei as well as mass surveillance, human Controlling Data: The CCP’s National Security why it matters that she has rights abuse, and techno- Letters to the Editor Law......10 multiple passports. We also logical dominance. Tis is [email protected] offer insight into how the fundamental to Huawei’s Role in Underhanded Deals and company operates within understanding the nature Influence Operations......11 the Chinese system, and of the company’s guidance how that affects the nature and operations—all of which Pentagon Technology Found Its Way to the of her role. we explain in this special Chinese Military......12 Among the least-known edition. Exporting Tyranny: Telecom Role in the CCP’s aspects of Huawei’s opera- tions are its leadership and One Belt, One Road......14 finances. Here, we provide information about the ‘F7’: Huawei’s Alleged Codename......14 Chinese Communist Party’s Tools Huawei Developed to Persecute Falun role in the company’s lead- ership, along with details Gong Now Repress All of China......19 about its financing, origins, US Technology Used for Mass Surveillance in and direction from the Chi- China, Say US Lawmakers......20 nese regime. Another major contro- SUBSCRIBE Suicide of Chinese Scientist Sparks versy surrounding Huawei Jasper Fakkert Controversy......22 that is often mentioned, yet Editor-in-Chief TODAY FRONT PAGE ILLUSTRATION: SHUTTERSTOCK & THE EPOCH TIMES Get the broaden and uplift minds. We believe that by communism, including the harm done to independent news About Us rational, balanced debate is key for fostering cultures around the world. a healthy democracy and a compassionate We are inspired in this by our own you won’t find The Epoch Times is a media organization society. experience. The Epoch Times was founded in dedicated to seeking the truth through As an independent media outlet, we 2000 to bring honest and uncensored news anywhere else. insightful and independent journalism. use our freedom to investigate issues to people oppressed by the lies and violence overlooked—or avoided—by other media in communist China. Standing outside of political interests and Subscribe and get the outlets. We seek to highlight solutions and We still believe journalism is a noble insights only The Epoch Times the pursuit of profit, our starting point and what’s good in society rather than what vocation, but only when it genuinely seeks can provide, delivered to your our goal is to create a media for the public divides us. to serve its communities and help them door every week. benefit, to be truly responsible to society. We report respectfully, compassionately, to flourish. In all that we do, we will hold We endeavor to educate readers about and rigorously. ourselves to the highest standards of today’s most important topics, seeking to We stand against the destruction wrought integrity. This is our promise to you. subscribe.epochtimes.com 212-239-2808 December 2018 3 WANG ZHAO/AFP/GETTY IMAGES GLOBAL DOMINANCE Huawei Is the Cornerstone of a CCP Initiative to Overtake the US JOSHUA PHILIPP he Chinese Communist Party crime, they can also be used to monitor ac- company, and three Taiwanese nationals— (CCP) is pushing a goal, under tivists and protests.” including Stephen Chen, a former president the banner of sovereignty, of Huawei plays In addition to Nairobi, the report stated, of Micron Memory Taiwan, a Micron sub- eliminating reliance on foreign “Huawei has deployed its systems across 100 sidiary in Taiwan, who went on to work at systems within China and then a key role in cities in approximately 30 countries world- the CCP’s United Microelectronics Corp. ensuring Chinese-made systems China’s goal wide. Exports of such technology are being Weeks later, in late November, CCP offi- dominate the global landscape. coupled with Chinese government-backed cials claimed they had found evidence that In the push to dominate this to surpass grants that create dependency of the im- Micron was price-fixing, along with Sam- domain, the CCP has identified porting country on Chinese-produced gear sung and Hynix, and—without providing core technologies, including satellite GPS, the United and incentivize further purchases of such public evidence—claimed the companies Tinternet infrastructure, and superconduc- equipment.” were involved in anti-competitive behavior. tors, with Huawei playing a key role in States as the A core aspect of this push is a new CCP-led Tat came on the heels of temporary U.S. this agenda. world leader internet framework that is separate from, sanctions that banned ZTE from the U.S. Te Jamestown Foundation’s China Brief yet interconnected with, the global inter- superconductor market, after ZTE was noted June 5 that Chinese leader Xi Jinping in technology, net. Included in this technology is the CCP’s found to have violated U.S. sanctions on recently has been promoting this concept massive systems for internet censorship and Iran. Tough the ban was quickly lifted, it as an approach to “technology, the internet, under its online monitoring—and again, coupled with acted as a warning shot about the effect that and governance, one that seeks to embed it is Huawei’s internet infrastructure and U.S. sanctions could have on the Chinese [China’s] concept of ‘cyber sovereignty’ ... Project 863 systems for totalitarian social control. tech industry. in the institutions of global internet gov- Huawei plays a major role in the CCP’s With Huawei now facing a similar fraud ernance.” and “Made in programs for human rights abuse and do- case related to Iran, the stakes have grown, In the past, the CCP’s concept of cy- China” 2025 mestic surveillance. A 172-page internal and the CCP’s programs to replace and sur- bersovereignty often referred to its push document from Huawei in 2015, which pass the United States as the global tech- to dominate the global internet space, programs. was leaked to the internet, was a training nology leader are front and center again, an effort dating to at least 2010, which manual for Chinese internet police to moni- with initiatives to compete in 5G internet included a play to gain control of the in- tor, analyze, and process video content. It technology, new energy, quantum comput- ternet globally through the United Na- also showed Huawei’s involvement with the ing, and others. tions in 2015. CCP’s Golden Shield Project for censorship In China, there’s a concept of “surpass- As the program has advanced, however, it and Skynet System for surveillance. ing you at the curve,” and that’s become a has broadened to include the foundational Te company’s technology is also part guiding concept for the CCP’s aim to over- technologies that make the internet and of the CCP’s Social Credit System, which take the United States as the world leader global technology systems work, while creates a database on each person, tracks in technology, under its Project 863 and maintaining the CCP’s spirit of social tyr- all available data about the individual, and China 2025 programs. Te idea is that it’s anny and global market domination. calculates a “citizen score” that determines very difficult to surpass someone already Trough the CCP’s “One Belt One Road” their level of freedom in society. ahead in a certain area, but when the whole initiative, it’s constructing core infrastruc- Te CCP is also making substantial ef- world is making a turn, that person can be ture that includes an export of the “China forts to replace the U.S.
Recommended publications
  • Internet Surveillance in China
    The Architecture of Control: Internet Su rveillance in China James A. Lewis , Center for Strategic and International Studies July 200 6 Security concerns shape China’s official internet and information technology strateg ies . Th ese include concerns shared by many cou nt ries: promoting a strong and growing economy , providing information assurance , and defending against foreign intrusions into China’s information space . Most importantly for the Chinese, information security include s a political element not foun d in many other nations – c ontrol by the party and the state over communications and the flow of informa tion . The rapid spread of internet access and mobile communications pose a serious challenge to this goal. In response, China’s security apparatus is reorienting its informational defenses. In the past, the emphasi s was on blocking access - the “great firewall.” In the future, the emphasis will be on the monitoring and surveillance of online activities. China’s primary objective in internet securi ty is political – preventing IT from eroding the regime’s authority. Information security is defined in China as “a comprehensive concept understood in a broad sense, and it involves political, economic, cultural, ideological, media, social and military l evel or field. ” It includes “data, system, network, infrastructure .”1 Chin ese officials worry about the potential of the Internet to contribute to the loss of state secrets , offer new avenues for organizing dissent and opposition , and spread “harmful inf ormation. ” This makes controlling access to "harmful network information” and the ability to monitor and intercept communications top priorities .2 For China’s leadership, one particular set of event s demonstrated the risks of not securing networks.
    [Show full text]
  • Hong Kong SAR
    China Data Supplement November 2006 J People’s Republic of China J Hong Kong SAR J Macau SAR J Taiwan ISSN 0943-7533 China aktuell Data Supplement – PRC, Hong Kong SAR, Macau SAR, Taiwan 1 Contents The Main National Leadership of the PRC 2 LIU Jen-Kai The Main Provincial Leadership of the PRC 30 LIU Jen-Kai Data on Changes in PRC Main Leadership 37 LIU Jen-Kai PRC Agreements with Foreign Countries 47 LIU Jen-Kai PRC Laws and Regulations 50 LIU Jen-Kai Hong Kong SAR 54 Political, Social and Economic Data LIU Jen-Kai Macau SAR 61 Political, Social and Economic Data LIU Jen-Kai Taiwan 65 Political, Social and Economic Data LIU Jen-Kai ISSN 0943-7533 All information given here is derived from generally accessible sources. Publisher/Distributor: GIGA Institute of Asian Affairs Rothenbaumchaussee 32 20148 Hamburg Germany Phone: +49 (0 40) 42 88 74-0 Fax: +49 (040) 4107945 2 November 2006 The Main National Leadership of the PRC LIU Jen-Kai Abbreviations and Explanatory Notes CCP CC Chinese Communist Party Central Committee CCa Central Committee, alternate member CCm Central Committee, member CCSm Central Committee Secretariat, member PBa Politburo, alternate member PBm Politburo, member Cdr. Commander Chp. Chairperson CPPCC Chinese People’s Political Consultative Conference CYL Communist Youth League Dep. P.C. Deputy Political Commissar Dir. Director exec. executive f female Gen.Man. General Manager Gen.Sec. General Secretary Hon.Chp. Honorary Chairperson H.V.-Chp. Honorary Vice-Chairperson MPC Municipal People’s Congress NPC National People’s Congress PCC Political Consultative Conference PLA People’s Liberation Army Pol.Com.
    [Show full text]
  • Effective Censorship: Maintaining Control in China
    University of Pennsylvania ScholarlyCommons CUREJ - College Undergraduate Research Electronic Journal College of Arts and Sciences 2010 Effective Censorship: Maintaining Control In China Michelle (Qian) Yang University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/curej Part of the Political Science Commons Recommended Citation Yang, Michelle (Qian), "Effective Censorship: Maintaining Control In China" 01 January 2010. CUREJ: College Undergraduate Research Electronic Journal, University of Pennsylvania, https://repository.upenn.edu/curej/118. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/curej/118 For more information, please contact [email protected]. Effective Censorship: Maintaining Control In China Keywords censorship, china, incentives, Social Sciences, Political Science, Devesh Kapur, Kapur, Devesh Disciplines Political Science This article is available at ScholarlyCommons: https://repository.upenn.edu/curej/118 Effective Censorship: Maintaining Control in China Michelle Yang April 09, 2010 Acknowledgments My initial interest in this thesis topic was generated during the summer of 2009 when I was interning in Beijing. There, I had found myself unable to access a large portion of the websites I’ve grown so accustomed to in my everyday life. I knew from then that I wanted to write about censorship in China. Since that summer, the scope of the topic has changed greatly under the careful guidance of Professor Devesh Kapur. I am incredibly grateful for all the support he has given me during this entire process. This final thesis wouldn’t be what it is today without his guidance. Professor Kapur, thank you for believing in me and for pushing me to complete this thesis! I would also like to extend my gratitude to both Professor Doherty-Sil and Professor Goldstein for taking time out of their busy schedules to meet with me and for providing me with indispensible advice.
    [Show full text]
  • Journal of Current Chinese Affairs
    3/2006 Data Supplement PR China Hong Kong SAR Macau SAR Taiwan CHINA aktuell Journal of Current Chinese Affairs Data Supplement People’s Republic of China, Hong Kong SAR, Macau SAR, Taiwan ISSN 0943-7533 All information given here is derived from generally accessible sources. Publisher/Distributor: Institute of Asian Affairs Rothenbaumchaussee 32 20148 Hamburg Germany Phone: (0 40) 42 88 74-0 Fax:(040)4107945 Contributors: Uwe Kotzel Dr. Liu Jen-Kai Christine Reinking Dr. Günter Schucher Dr. Margot Schüller Contents The Main National Leadership of the PRC LIU JEN-KAI 3 The Main Provincial Leadership of the PRC LIU JEN-KAI 22 Data on Changes in PRC Main Leadership LIU JEN-KAI 27 PRC Agreements with Foreign Countries LIU JEN-KAI 30 PRC Laws and Regulations LIU JEN-KAI 34 Hong Kong SAR Political Data LIU JEN-KAI 36 Macau SAR Political Data LIU JEN-KAI 39 Taiwan Political Data LIU JEN-KAI 41 Bibliography of Articles on the PRC, Hong Kong SAR, Macau SAR, and on Taiwan UWE KOTZEL / LIU JEN-KAI / CHRISTINE REINKING / GÜNTER SCHUCHER 43 CHINA aktuell Data Supplement - 3 - 3/2006 Dep.Dir.: CHINESE COMMUNIST Li Jianhua 03/07 PARTY Li Zhiyong 05/07 The Main National Ouyang Song 05/08 Shen Yueyue (f) CCa 03/01 Leadership of the Sun Xiaoqun 00/08 Wang Dongming 02/10 CCP CC General Secretary Zhang Bolin (exec.) 98/03 PRC Hu Jintao 02/11 Zhao Hongzhu (exec.) 00/10 Zhao Zongnai 00/10 Liu Jen-Kai POLITBURO Sec.-Gen.: Li Zhiyong 01/03 Standing Committee Members Propaganda (Publicity) Department Hu Jintao 92/10 Dir.: Liu Yunshan PBm CCSm 02/10 Huang Ju 02/11
    [Show full text]
  • The Internet Beyond Borderless Versus Balkanized
    POROUS TERRITORIES: THE INTERNET BEYOND BORDERLESS VERSUS BALKANIZED LUKE MUNN Western Sydney University (Australia) [email protected] Abstract: If the internet was once viewed as a borderless realm, critics now warn it is in danger of being “balkanized”, splintering into nationalized fragments. Certainly nation-states increasingly see the Internet as “their” internet, a national space to be regulated and actively shaped. The first half of this article charts the technologies that appear to place this vision within reach: data localization, internet shutdowns, and internet filtering. These moves promise to exert sovereign control, to make the inter- net an extension of national territory. Yet by drawing on two recent events in China, this article argues that these territories are messy and their borders are permeable. Pro-government activists jump across the firewall in order to attack individuals and organizations who threaten the stability and security of their motherland. Simultane- ously, individuals scale the firewall in order to question the party line and express solidarity with democratic movements, undermining the political and technical boundaries established by their nation. Internet architectures create a condition where territorialization is constantly being both amplified and undermined by “extra- territorial” activities. These practices demonstrate the everyday porosity of internet territories, providing a messier portrait that goes beyond the dichotomy of borderless vs balkanized. Keywords: territory, fragmentation, balkanization, internet, China. When nations speak of the internet today, they no longer use the language of the virtual, but of soil. At the dawn of the internet, cyberspace was framed as a new realm decoupled from the state. This digital sphere stretched across the globe, making it essentially ungovernable.
    [Show full text]
  • Proquest Dissertations
    The diffusion of the Internet in China Item Type text; Dissertation-Reproduction (electronic) Authors Foster, William Abbott Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 04/10/2021 12:10:22 Link to Item http://hdl.handle.net/10150/289812 INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality Illustrations and photographs, print bleedthrough. substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand comer and continuing from left to right in equal sections with small overiaps. Photographs included in the original manuscript have been reproduced xerographically in this copy. Higher quality 6" x 9" black and white photographic prints are available for any photographs or illustrations appearing in this copy for an additional charge.
    [Show full text]
  • Redalyc.Characterizing E-Government in China
    Desafíos ISSN: 0124-4035 [email protected] Universidad del Rosario Colombia Baquero-Hernández, Ricardo Alberto Characterizing E-Government in China Desafíos, vol. 24, núm. 2, julio-diciembre, 2012, pp. 233-257 Universidad del Rosario Bogotá, Colombia Disponible en: http://www.redalyc.org/articulo.oa?id=359633172009 Cómo citar el artículo Número completo Sistema de Información Científica Más información del artículo Red de Revistas Científicas de América Latina, el Caribe, España y Portugal Página de la revista en redalyc.org Proyecto académico sin fines de lucro, desarrollado bajo la iniciativa de acceso abierto Characterizing E-Government in China RICARDO ALBERTO BAQUERO-HERNÁNDEZ* Artículo recibido: 10 de noviembre de 2010 Artículo aprobado: 12 de febrero de 2011 Para citar este artículo: Baquero Hernández, R. A. (2012). Characterizing E-Government in China. Desafíos, 24 (2), pp. 233-257. Abstract Although E-Government (E-G) is one public policy in China, it still has a long way to go in terms of diffusion across the country and interactive participation from citizens. It constitutes a double sided sword since it enhances the features that China needs to show to the world in international competitiveness and status, but also poses challenges to the Communist rule inasmuch as it has to be controlled. Therefore, E-G is both a political and a managerial issue: it is sensitive to the Chinese Communist Party but also leads to economical and administrative pros- perity and efficiency. Some of the keys would be the development of the middle class, further penetration of the Internet, and more education about virtual tools in government issues and services.
    [Show full text]
  • Redefining Digital Citizenship in the Cyber Era
    Cybersoverignty: Redefining Digital Citizenship in the Cyber Era By: Sophie Laurence AP Gov May 20, 2019 Cyber: a combining form meaning “computer,” “computer network,” or “virtual reality,” ​ used in the formation of compound words (cybertalk; cyberart; cyberspace) and, by extension, meaning “expressing visions of the future.” Sovereignty: supreme power especially over a body politic; freedom from external ​ control; autonomy. A search in dictionary.com yields the following result: “No results found for cybersovereignty.” Neither this word nor its variations (cyber-sovereignty, cyber sovereignty) appears in any English language dictionary. Yet, the rise of China as the world’s dominant cyber-superpower amplifies the urgent need for international discourse on its meaning and implications. Even as the West is wondering if a change in the global paradigm is underway, China has already dramatically redefined what it means to be a digital citizen in the 21st century. The working meaning of “cybersovereignty” is the full right and power of a governing body over the internet within its own borders, without any interference from outside entities. In the material world, national borders are physical boundaries protected by border guards, demarcated by country lines on maps, and governed by national laws. There is no equivalent universal system to regulate internet borders. Though utopianists routinely frame the internet as an open and free instrument of democracy, this is an ideological fiction; the reality is that the internet is a commodified entity owned by a privileged few and, in the case of China, state-controlled. Correspondingly, it has become a battleground in the struggle for international economic dominance and domestic political control.
    [Show full text]
  • Edited LOEBS Cites Plus List of Elements 1 30
    C MCYMK Y K Nxxx,2012-10-26,A,001,Bs-BK,E3Nxxx,2012-10-26,A,001,Bs-BK,E3 C M Y K Nxxx,2012-10-26,A,001,Bs-BK,E3 Late EditionLate Edition C M Y K Nxxx,2012-10-26,A,001,Bs-BK,E3 Today, morning fog and clouds, par- Today, morning fog and clouds, par- tial clearing,Late high 68. Edition Tonight, most- tial clearing, high 68. Tonight, most- ly cloudy,Today, morning mild, low fog 56.and Tomorrow, clouds, par- ly cloudy, mild, low 56. Tomorrow, periodictial clearing, clouds high and 68. sunshine, Tonight, most-high Late Edition periodic clouds and sunshine, high 66. lyWeather cloudy, mild,map lowis on 56. PageTomorrow, Today,B12.morning fog and clouds, par- 66. Weather map is ontial clearing,Page high B12. 68. Tonight, most- periodic clouds and sunshine,ly high cloudy, mild, low 56. Tomorrow, 66. Weather map is on Pageperiodic B12. clouds and sunshine, high 66. Weather map is on Page B12. VOL. CLXII . No. 55,936 © 2012 The New York Times NEW YORK, FRIDAY, OCTOBER 26, 2012 $2.50 VOL. CLXII . No. 55,936 © 2012 The New York Times NEW YORK, FRIDAY, OCTOBER 26, 2012 $2.50 VOL. CLXII . No. 55,936 © 2012 The New York Times NEW YORK, FRIDAY, OCTOBER 26, 2012 $2.50 VOL. CLXII . No. 55,936 © 2012 The New York Times NEW YORK, FRIDAY, OCTOBER 26, 2012 $2.50 POLITICAL MEMO POLITICALPOLITICAL MEMO MEMO 2 CHILDREN SLAIN Billions Amassed in the Shadows POLITICAL MEMO 2 CHILDREN2 CHILDREN SLAINObama SLAINBillions Campaign Endgame: Amassed in the Shadows 2 CHILDREN SLAIN Billions Amassed AmassedAT HOME IN CITY; in inBy the thethe ShadowsFamily Shadows of China’s Premier ObamaObama Campaign Campaign Endgame: Endgame: Grunt Work and Cold Math NANNY ARRESTED Obama Campaign Endgame:AT HOMEAT HOME IN CITY; IN CITY; Many relatives of Wen Jiabao, including his son, daughter, younger brother and AT HOME IN CITY; By JIMBy RUTENBERG the Family of brother-in-law,China’s have become extraordinarily Premier wealthy during his leadership.
    [Show full text]
  • Artificial Intelligence, China, Russia, and the Global Order Technological, Political, Global, and Creative Perspectives
    AIR UNIVERSITY LIBRARY AIR UNIVERSITY PRESS Artificial Intelligence, China, Russia, and the Global Order Technological, Political, Global, and Creative Perspectives Shazeda Ahmed (UC Berkeley), Natasha E. Bajema (NDU), Samuel Bendett (CNA), Benjamin Angel Chang (MIT), Rogier Creemers (Leiden University), Chris C. Demchak (Naval War College), Sarah W. Denton (George Mason University), Jeffrey Ding (Oxford), Samantha Hoffman (MERICS), Regina Joseph (Pytho LLC), Elsa Kania (Harvard), Jaclyn Kerr (LLNL), Lydia Kostopoulos (LKCYBER), James A. Lewis (CSIS), Martin Libicki (USNA), Herbert Lin (Stanford), Kacie Miura (MIT), Roger Morgus (New America), Rachel Esplin Odell (MIT), Eleonore Pauwels (United Nations University), Lora Saalman (EastWest Institute), Jennifer Snow (USSOCOM), Laura Steckman (MITRE), Valentin Weber (Oxford) Air University Press Muir S. Fairchild Research Information Center Maxwell Air Force Base, Alabama Opening remarks provided by: Library of Congress Cataloging-in- Publication Data Brig Gen Alexus Grynkewich (JS J39) Names: TBD. and Lawrence Freedman (King’s College, Title: Artificial Intelligence, China, Russia, and the Global Order : Techno- London) logical, Political, Global, and Creative Perspectives / Nicholas D. Wright. Editor: Other titles: TBD Nicholas D. Wright (Intelligent Biology) Description: TBD Identifiers: TBD Integration Editor: Subjects: TBD Mariah C. Yager (JS/J39/SMA/NSI) Classification: TBD LC record available at TBD AIR UNIVERSITY PRESS COLLABORATION TEAM Published by Air University Press in October
    [Show full text]
  • The Impact of Media Censorship: Evidence from a Field Experiment in China
    The Impact of Media Censorship: Evidence from a Field Experiment in China Yuyu Chen David Y. Yang* January 4, 2018 — JOB MARKET PAPER — — CLICK HERE FOR LATEST VERSION — Abstract Media censorship is a hallmark of authoritarian regimes. We conduct a field experiment in China to measure the effects of providing citizens with access to an uncensored Internet. We track subjects’ me- dia consumption, beliefs regarding the media, economic beliefs, political attitudes, and behaviors over 18 months. We find four main results: (i) free access alone does not induce subjects to acquire politically sen- sitive information; (ii) temporary encouragement leads to a persistent increase in acquisition, indicating that demand is not permanently low; (iii) acquisition brings broad, substantial, and persistent changes to knowledge, beliefs, attitudes, and intended behaviors; and (iv) social transmission of information is statis- tically significant but small in magnitude. We calibrate a simple model to show that the combination of low demand for uncensored information and the moderate social transmission means China’s censorship apparatus may remain robust to a large number of citizens receiving access to an uncensored Internet. Keywords: censorship, information, media, belief JEL classification: D80, D83, L86, P26 *Chen: Guanghua School of Management, Peking University. Email: [email protected]. Yang: Department of Economics, Stanford University. Email: [email protected]. Yang is deeply grateful to Ran Abramitzky, Matthew Gentzkow, and Muriel Niederle
    [Show full text]
  • A Survey of Defensive Measures for Digital Persecution in the Global South
    future internet Article A Survey of Defensive Measures for Digital Persecution in the Global South Louis Edward Papa 1,2 and Thaier Hayajneh 2,* 1 Graduate School of Arts and Science, Fordham University, New York, NY 10023, USA; [email protected] 2 Fordham Center for Cybersecurity, Fordham University, New York, NY 10023, USA * Correspondence: [email protected] Received: 27 July 2020; Accepted: 25 September 2020; Published: 29 September 2020 Abstract: This paper examines the phenomenon of digital persecution in the Global South and evaluates tools that defend against it. First, the paper explains the nature of persecution and its digital incarnation. It then provides a contextual overview of real-world instances of digital persecution in seven Global South countries. The possible defensive technologies against censorship and surveillance are discussed. The article goes on to discuss barriers to technology adoption in the Global South, explains the security implication of these difficulties, and examines the role that human computer interaction (HCI) metrics could play in overcoming these challenges. Finally, the paper surveys the viability of sixteen security tools in a Global South context. The survey results were mixed, with 37.5% of the reviewed tools being deemed to be inviable for use in the Global South to defend against persecution. Prescriptive recommendations are provided for creating security tools that are universal, simple, and effective. Keywords: persecution; oppression; free software; global south; cybersecurity; HCI; human rights 1. Introduction In a few short years, most internet users will be the poor of the Global South. Internet technology is often presented as a panacea for the common troubles in developing economies.
    [Show full text]