Open Networks, Closed Regimes: the Impact of the Internet On
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
ENISA Threat Landscape Report 2016 15 Top Cyber-Threats and Trends
ENISA Threat Landscape Report 2016 15 Top Cyber-Threats and Trends FINAL VERSION 1.0 ETL 2016 JANUARY 2017 www.enisa.europa.eu European Union Agency For Network and Information Security ENISA Threat Landscape Report 2016 Final version | 1.0 | OPSEC | January 2017 About ENISA The European Union Agency for Network and Information Security (ENISA) is a centre of network and information security expertise for the EU, its member states, the private sector and Europe’s citizens. ENISA works with these groups to develop advice and recommendations on good practice in information security. It assists EU member states in implementing relevant EU legislation and works to improve the resilience of Europe’s critical information infrastructure and networks. ENISA seeks to enhance existing expertise in EU member states by supporting the development of cross-border communities committed to improving network and information security throughout the EU. More information about ENISA and its work can be found at www.enisa.europa.eu. Contact For queries on this paper, please use [email protected] or [email protected] For media enquiries about this paper, please use [email protected]. Acknowledgements ENISA would like to thank the members of the ENISA ETL Stakeholder group: Pierluigi Paganini, Chief Security Information Officer, IT, Paul Samwel, Banking, NL, Tom Koehler, Consulting, DE, Jason Finlayson, Consulting, IR, Stavros Lingris, CERT, EU, Jart Armin, Worldwide coalitions/Initiatives, International, Thomas Häberlen, Member State, DE, Neil Thacker, Consulting, UK, Shin Adachi, Security Analyst, US, R. Jane Ginn, Consulting, US, Polo Bais, Member State, NL. The group has provided valuable input, has supported the ENISA threat analysis and has reviewed ENISA material. -
THE BUSINESS of CENSORSHIP: CONTENT MANAGEMENT and the CHINESE ECONOMY By
THE BUSINESS OF CENSORSHIP: CONTENT MANAGEMENT AND THE CHINESE ECONOMY by JOSHUA CLARK B.A. (Hons.), Queen's University at Kingston, 2009 MASTER OF ARTS in THE FACULTY OF GRADUATE STUDIES (Political Science) THE UNIVERSITY OF BRITISH COLUMBIA (Vancouver) August 2010 ©Joshua Clark, 2010 Abstract Content control and censorship on the Internet are increasingly important topics for scholars of democratization, media and communications. Most studies have examined the relationship between the Internet, content management and various elements important to democratization such as the formation of civil society organizations. This thesis attempts to expand this discussion by examining the effects of online content management on economic systems, using the People's Republic of China as an example. China features a globally integrated economy that is increasing dependent on manufacturing and services while simultaneously maintaining one of the most extensive online content management systems in the world. This paper attempts to show how the Communist Party of China is able to reconcile the need for connectivity in order to drive their economy while maintaining political control. It also discusses the long-term implications of this strategy. The first section consists of a series of quantitative and qualitative tests to determine how various classes of websites are managed. These tests reveal that in order to maintain the flow of information necessary for a globally integrated economy, the Chinese Communist Party utilizes strategies that manage but not block the information flows related to business. This survey is followed by a case study examining the relationship between Google and China, and the implications of Chinese regulation and control for the broader economy. -
Research Perspectives on Online Radicalisation a Literature Review, 2006–2016
RESEARCH PERSPECTIVES ON ONLINE RADICALISATION A LITERATURE REVIEW, 2006–2016 Alexander Meleagrou-Hitchens and Nick Kaderbhai RESEARCH PERSPECTIVES ON ONLINE RADICALISATION A LITERATURE REVIEW, 2006–2016 Alexander Meleagrou-Hitchens and Nick Kaderbhai International Centre for the Study of Radicalisation (ICSR), King’s College London About the authors Alexander Meleagrou-Hitchens (PhD) is currently Research Director at the Program on Extremism at George Washington University. He was previously Head of Research at the International Centre for the Study of Radicalisation (ICSR) at King’s College London, a VOX-Pol Researcher and a lecturer in the King’s Department of War Studies. Nick Kaderbhai is an Associate Fellow at the International Centre for the Study of Radicalisation (ICSR) at King’s College London. He was previously a full-time Research Fellow, where he focused on the radicalisation and recruitment of western foreign fighters to extremist groups in Iraq and Syria. He is currently a doctoral candidate in the Department of War Studies at King’s College London, where his is studying the interplay between British grand strategy and national identity. Acknowledgements The authors are grateful to Professor Maura Conway and Lisa McInerney of Dublin City University and Professor John Bew of King’s College London for their support and advice. We must also thank Christina Mitsiali of ICSR for her tireless efforts in proofreading the various iterations of this report. ISBN: 978-1-873769-66-9 © VOX-Pol Network of Excellence, 2017 This material is offered free of charge for personal and non-commercial use, provided the source is acknowledged. For commercial or any other use, prior written permission must be obtained from VOX-Pol. -
The Indonesian Archipelago's IT Growth on the Path to the Digital Economy Era MOHAMMAD YASIN
The Indonesian Archipelago's IT Growth on the Path to the Digital Economy Era MOHAMMAD YASIN Preface Indonesia is still struggling to overcome its weak macroeconomic condition, reflected in a budget deficit that threatens macro stability and both international and domestic market confidence in the government's medium-term policies for restoring the economy. The exchange rate appreciated about 18.7 percent between February and December 1999 and then depreciated by around 29 percent from January to December 2000 due to domestic and political instability. The open unemployment rate reached 6.3% in 2000, up from 4.5% in 1999, while the inflation rate increased from 2.01% in 1999 to 9.35% for 2000. Policies for the medium -term include stabilizing the exchange rate, reducing the inflation rate, creating more jobs, and maintaining economic growth. Despite the internal macroeconomic problems, Indonesia's growth reached 4.77% up from 0.5% in 1999, primarily due to firm oil prices, rising exports of non-primary goods, and a moderate upturn in investment. Also, there were noticeable steps made toward re-capitalizing, restructuring, and consolidating the banking system. At 3.8% of GDP, the current account surplus was slightly below the 1999 level of 4.8%. Despite the country's economic problems, the flow of information through information technology could not be stopped. This new technology has been put to use in almost every segment of human activity from electronic commerce to education, medicine, transportation, tourism, the environment, and entertainment. As a country comprised of many islands with a land area as large as that of the United States, Indonesia has encountered a lot of problems in preparing its population for global competition in the new era of the digital economy. -
The Filtering Matrix
The Filtering Matrix Filtering and Surveillance Practices Worldwide Nart Villeneuve Director of Technical Research The Citizen Lab / OpenNet Initiative University of Toronto Internet Challenges Bloggers and independent media challenge traditional corporate and state-owned media VoIP is seen as a threat by traditional tele-communications companies Offshore gambling and banking sites challenge existing laws and regulations File sharing services have significantly impacted the area of copyright and intellectual property Spam, child pornography, identity theft, computer break-ins and terrorism present significant security concerns Borders in Cyberspace In an effort to counter the once borderless Internet, states are seeking to create informational boundaries in cyberspace. Informational Borders Although decentralized there are significant ªchoke pointsº at which controls can be placed on the Internet Technical & non-technical mechanisms used to censor and control access to the Internet Filtering is the technical mechanism through which such controls are operationalized Internet Filtering Internet content filtering is a term that refers to the techniques by which control is imposed on access to information on the Internet The motivations for state-directed Internet filtering include those with: a specific emphasis on e-commerce: tax, copyright, VoIP a specific emphasis on children: child pornography, violence a specific emphasis on content cultural: pornography and gambling political: dissidents and independent media security: (cyber)terrorism and hacking Filtering Techniques DNS filtering: modification to DNS servers to prevent a domain name from resolving to the correct IP address. IP filtering: entries are made in routing equipment that stop all outgoing requests for a specific IP address URL filtering: filtering technology that (a) reassembles the packets for traffic flowing through its network, (b) reads each http request, and (c) if the URL in the request matches one of the URLs (or keywords) specified in a blocklist, block the http request. -
The First Amendment, the Public-Private Distinction, and Nongovernmental Suppression of Wartime Political Debate Gregory P
Working Paper Series Villanova University Charles Widger School of Law Year 2004 The First Amendment, The Public-Private Distinction, and Nongovernmental Suppression of Wartime Political Debate Gregory P. Magarian Villanova University School of Law, [email protected] This paper is posted at Villanova University Charles Widger School of Law Digital Repository. http://digitalcommons.law.villanova.edu/wps/art6 THE FIRST AMENDMENT, THE PUBLIC -PRIVA TE DISTINCTION, AND NONGOVERNMENTAL SUPPRESSION OF WARTIME POLITICAL DEBATE 1 BY GREGORY P. MAGARIAN DRAFT 5-12-04 TABLE OF CONTENTS INTRODUCTION ......................................................................................... 1 I. CONFRONTING NONGOVERNMENTAL CENSORSHIP OF POLITICAL DEBATE IN WARTIME .................. 5 A. The Value and Vulnerability of Wartime Political Debate ........................................................................... 5 1. The Historical Vulnerability of Wartime Political Debate to Nongovernmental Suppression ....................................................................... 5 2. The Public Rights Theory of Expressive Freedom and the Necessity of Robust Political Debate for Democratic Self -Government........................ 11 B. Nongovernmental Censorship of Political Speech During the “War on Terrorism” ............................................... 18 1. Misinformation and Suppression of Information by News Media ............................................ 19 2. Exclusions of Political Speakers from Privately Owned Public Spaces. -
[2020] SGCA 16 Civil Appeal No 99 of 2019 Between Wham Kwok Han
IN THE COURT OF APPEAL OF THE REPUBLIC OF SINGAPORE [2020] SGCA 16 Civil Appeal No 99 of 2019 Between Wham Kwok Han Jolovan … Appellant And The Attorney-General … Respondent Civil Appeal No 108 of 2019 Between Tan Liang Joo John … Appellant And The Attorney-General … Respondent Civil Appeal No 109 of 2019 Between The Attorney-General … Appellant And Wham Kwok Han Jolovan … Respondent Civil Appeal No 110 of 2019 Between The Attorney-General … Appellant And Tan Liang Joo John … Respondent In the matter of Originating Summons No 510 of 2018 Between The Attorney-General And Wham Kwok Han Jolovan In the matter of Originating Summons No 537 of 2018 Between The Attorney-General And Tan Liang Joo John ii JUDGMENT [Contempt of Court] — [Scandalising the court] [Contempt of Court] — [Sentencing] iii This judgment is subject to final editorial corrections approved by the court and/or redaction pursuant to the publisher’s duty in compliance with the law, for publication in LawNet and/or the Singapore Law Reports. Wham Kwok Han Jolovan v Attorney-General and other appeals [2020] SGCA 16 Court of Appeal — Civil Appeals Nos 99, 108, 109 and 110 of 2019 Sundaresh Menon CJ, Andrew Phang Boon Leong JA, Judith Prakash JA, Tay Yong Kwang JA and Steven Chong JA 22 January 2020 16 March 2020 Judgment reserved. Sundaresh Menon CJ (delivering the judgment of the court): Introduction 1 These appeals arise out of HC/OS 510/2018 (“OS 510”) and HC/OS 537/2018 (“OS 537”), which were initiated by the Attorney-General (“the AG”) to punish Mr Wham Kwok Han Jolovan (“Wham”) and Mr Tan Liang Joo John (“Tan”) respectively for contempt by scandalising the court (“scandalising contempt”) under s 3(1)(a) of the Administration of Justice (Protection) Act 2016 (Act 19 of 2016) (“the AJPA”). -
Tds National Reports Itu Telecom World 2003 and Canton Ofgeneva Hosted by Therepublic
2003 ORLD W ELECOM TDS NATIONAL REPORTS TDS NATIONAL International Telecommunication Union Place des Nations, CH-1211 Geneva 20, Switzerland Tel.: +41 22 730 6161 – Fax: +41 22 730 6444 E-mail: [email protected] TDS NATIONAL REPORTS TDS NATIONAL ITU T HOSTED BY THE REPUBLIC www.itu.int/itutelecom AND CANTON OF GENEVA TDS NATIONAL REPORTS The Republic and Canton of Geneva sponsors of the Telecom Development Symposium (TDS) Table of contents Page Page Albania ................................................. 1 Moldova................................................ 145 Angola .................................................. 5 Mongolia............................................... 147 Armenia................................................ 9 Myanmar .............................................. 155 Bangladesh .......................................... 11 Nepal .................................................... 159 Benin .................................................... 17 Nicaragua ............................................. 165 Bhutan.................................................. 21 Pakistan................................................ 167 Bosnia and Herzegovina ...................... 27 Papua New Guinea .............................. 179 Burkina Faso ........................................ 31 Paraguay .............................................. 183 Burundi................................................. 41 Cambodia............................................. 43 Peru ................................................... -
The War on Terrorism and the Internal Security Act of Singapore
Damien Cheong ____________________________________________________________ Selling Security: The War on Terrorism and the Internal Security Act of Singapore DAMIEN CHEONG Abstract The Internal Security Act (ISA) of Singapore has been transformed from a se- curity law into an effective political instrument of the Singapore government. Although the government's use of the ISA for political purposes elicited negative reactions from the public, it was not prepared to abolish, or make amendments to the Act. In the wake of September 11 and the international campaign against terrorism, the opportunity to (re)legitimize the government's use of the ISA emerged. This paper argues that despite the ISA's seeming importance in the fight against terrorism, the absence of explicit definitions of national security threats, either in the Act itself, or in accompanying legislation, renders the ISA susceptible to political misuse. Keywords: Internal Security Act, War on Terrorism. People's Action Party, Jemaah Islamiyah. Introduction In 2001/2002, the Singapore government arrested and detained several Jemaah Islamiyah (JI) operatives under the Internal Security Act (ISA) for engaging in terrorist activities. It was alleged that the detained operatives were planning to attack local and foreign targets in Singa- pore. The arrests outraged human rights groups, as the operation was reminiscent of the government's crackdown on several alleged Marxist conspirators in1987. Human rights advocates were concerned that the current detainees would be dissuaded from seeking legal counsel and subjected to ill treatment during their period of incarceration (Tang 1989: 4-7; Frank et al. 1991: 5-99). Despite these protests, many Singaporeans expressed their strong support for the government's actions. -
The Internet and Everyday Life in Indonesia: a New Moral Panic?
bki Bijdragen tot de Taal-, Land- en Volkenkunde 169 (2013) 133-147 brill.com/bki The Internet and Everyday Life in Indonesia: A New Moral Panic? Merlyna Lim Arizona State University [email protected] A. Yogaswara, The power of facebook: Gerakan 1,000,000 facebookers. Yogyakarta: Mediakom, 2010, 160 pp. ISBN 9788771028. Abuh Muhammad Waskito, Wajah salafiji ekstrem di dunia internet: Propa- ganda salafiji ekstrem di dunia internet. Bandung: Ad Difa’ Press, 2009, viii + 163 pp. Achmad Desmon Asiku, Cybersex: Finally exposed. Jakarta: Mahenjo Daro Publishing, 2005, xvii +234 pp. ISBN 9792500006. Akbar Kaelola, Black hacker vs. white hacker: Kisah para hacker jenius-gila dengan reputasi dunia dan hackers Indonesia. Yogyakarta: MediaKom, 2010, 128 pp. ISBN 9798770932. Barda Nawawi Arief, Pornografiji, pornoaksi dan cyberporn. Semarang: Pener- bit Pustaka Magister, 2007, xii + 98 pp. ISBN 9789790971594059. Dikdik M. Arief Mansur and Elisastris Gultom Cyber Law: Aspek hukum teknologi informasi. Bandung: Refijika Aditama, 2009. [First edition, 2005]. Ellis Lestari Pambayun, Birahi Maya: Mengintip perempuan di cyberporn. Bandung: Nuansa Cendekia, 2010, 332 pp. ISBN: 9786028394291. Feri Sulianta, Cyberporn: Bisnis atau kriminal. Jakarta: Elex Media, 2010, vii + 184 pp. ISBN 9789792792287. © 2013 Merlyna Lim DOI: 10.1163/22134379-12340008 This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial 3.0 Unported (CC BY-NC 3.0) License, http://creativecommons.org/licenses/by-nc/3.0/ 134 Review Essays Sony Set, 500 + Gelombang video porno: Jangan bugil di depan kamera! Yogyakarta: Penerbit Andi, 2007, viii + 200 pp. ISBN 9789792901474. Sulistyo, H. Sutanto and T. Sugiarso (eds), Cybercrime, motif dan penindakan. -
Blood, Sweat, and Fear: Workers' Rights in U.S. Meat and Poultry Plants
BLOOD, SWEAT, AND FEAR Workers’ Rights in U.S. Meat and Poultry Plants Human Rights Watch Copyright © 2004 by Human Rights Watch. All rights reserved. Printed in the United States of America ISBN: 1-56432-330-7 Cover photo: © 1999 Eugene Richards/Magnum Photos Cover design by Rafael Jimenez Human Rights Watch 350 Fifth Avenue, 34th floor New York, NY 10118-3299 USA Tel: 1-(212) 290-4700, Fax: 1-(212) 736-1300 [email protected] 1630 Connecticut Avenue, N.W., Suite 500 Washington, DC 20009 USA Tel:1-(202) 612-4321, Fax:1-(202) 612-4333 [email protected] 2nd Floor, 2-12 Pentonville Road London N1 9HF, UK Tel: 44 20 7713 1995, Fax: 44 20 7713 1800 [email protected] Rue Van Campenhout 15, 1000 Brussels, Belgium Tel: 32 (2) 732-2009, Fax: 32 (2) 732-0471 [email protected] 8 rue des Vieux-Grenadiers 1205 Geneva Tel: +41 22 320 55 90, Fax: +41 22 320 55 11 [email protected] Web Site Address: http://www.hrw.org Listserv address: To receive Human Rights Watch news releases by email, subscribe to the HRW news listserv of your choice by visiting http://hrw.org/act/subscribe-mlists/subscribe.htm Human Rights Watch is dedicated to protecting the human rights of people around the world. We stand with victims and activists to prevent discrimination, to uphold political freedom, to protect people from inhumane conduct in wartime, and to bring offenders to justice. We investigate and expose human rights violations and hold abusers accountable. We challenge governments and those who hold power to end abusive practices and respect international human rights law. -
Hard-Rock Mining, Labor Unions, and Irish Nationalism in the Mountain West and Idaho, 1850-1900
UNPOLISHED EMERALDS IN THE GEM STATE: HARD-ROCK MINING, LABOR UNIONS AND IRISH NATIONALISM IN THE MOUNTAIN WEST AND IDAHO, 1850-1900 by Victor D. Higgins A thesis submitted in partial fulfillment of the requirements for the degree of Master of Arts in History Boise State University August 2017 © 2017 Victor D. Higgins ALL RIGHTS RESERVED BOISE STATE UNIVERSITY GRADUATE COLLEGE DEFENSE COMMITTEE AND FINAL READING APPROVALS of the thesis submitted by Victor D. Higgins Thesis Title: Unpolished Emeralds in the Gem State: Hard-rock Mining, Labor Unions, and Irish Nationalism in the Mountain West and Idaho, 1850-1900 Date of Final Oral Examination: 16 June 2017 The following individuals read and discussed the thesis submitted by student Victor D. Higgins, and they evaluated his presentation and response to questions during the final oral examination. They found that the student passed the final oral examination. John Bieter, Ph.D. Chair, Supervisory Committee Jill K. Gill, Ph.D. Member, Supervisory Committee Raymond J. Krohn, Ph.D. Member, Supervisory Committee The final reading approval of the thesis was granted by John Bieter, Ph.D., Chair of the Supervisory Committee. The thesis was approved by the Graduate College. ACKNOWLEDGEMENTS The author appreciates all the assistance rendered by Boise State University faculty and staff, and the university’s Basque Studies Program. Also, the Idaho Military Museum, the Idaho State Archives, the Northwest Museum of Arts and Culture, and the Wallace District Mining Museum, all of whom helped immensely with research. And of course, Hunnybunny for all her support and patience. iv ABSTRACT Irish immigration to the United States, extant since the 1600s, exponentially increased during the Irish Great Famine of 1845-52.