Open Networks, Closed Regimes: the Impact of the Internet On

Total Page:16

File Type:pdf, Size:1020Kb

Open Networks, Closed Regimes: the Impact of the Internet On ADVANCE PRAISE for Open Networks, Closed Regimes “Many hope that information technology will generate new opportuni- ties for global communications, breaking down national barriers even in dictatorial regimes with minimal freedom of the press. Kalathil and Boas provide a path-breaking and thoughtful analysis of this issue. A fascinating study, this should be widely read by all concerned with un- derstanding and promoting democratization, regime change, and new information technology.” —Pippa Norris, John F. Kennedy School of Government, Harvard University “Through a country-by-country analysis, Kalathil and Boas shed light on practices formerly known only by anecdote, and their findings chip away at the apocryphal notion that going digital necessarily means go- ing democratic. Their work answers a number of important questions, and frames a worthy challenge to those who wish to deploy technology for the cause of political openness.” —Jonathan Zittrain, Berkman Center for Internet & Society, Harvard University Open Networks Closed Regimes GLOBAL POLICY BOOKS FROM THE CARNEGIE ENDOWMENT FOR INTERNATIONAL PEACE Africa’s New Leaders: Democracy or State Reconstruction? Marina Ottaway Aiding Democracy Abroad: The Learning Curve Thomas Carothers Democracy Challenged: The Rise of Semi-Authoritarianism Marina Ottaway Funding Virtue: Civil Society Aid and Democracy Promotion Marina Ottaway and Thomas Carothers, Editors Managing Global Issues: Lessons Learned P. J. Simmons and Chantal de Jonge Oudraat, Editors A Public Role for the Private Sector: Industry Self-Regulation in a Global Economy Virginia Haufler The Third Force: The Rise of Transnational Civil Society Copublished with Japan Center for International Exchange Ann M. Florini, Editor FOR THESE AND OTHER PUBLICATIONS FROM THE CARNEGIE ENDOWMENT, VISIT www.ceip.org/pubs Open Networks Closed Regimes The Impact of the Internet on Authoritarian Rule Shanthi Kalathil Taylor C. Boas carnegie endowment for international peace Washington, D.C. © 2003 Carnegie Endowment for International Peace All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means without permission in writing from the Carnegie Endowment. Carnegie Endowment for International Peace 1779 Massachusetts Avenue, N.W., Washington, D.C. 20036 202-483-7600 www.ceip.org The Carnegie Endowment normally does not take institutional positions on public policy issues; the views and recommendations presented in this publication do not necessarily represent the views of the Carnegie Endowment, its officers, staff, or trustees. To order, contact Carnegie’s distributor: The Brookings Institution Press Department 029, Washington, D.C. 20042-0029, USA 1-800-275-1447 or 1-202-797-6258 Fax 202-797-2960, E-mail [email protected] Text set in Sabon. Composition by AlphaWebTech, Mechanicsville, Md. Printed by Malloy Lithographing of Ann Arbor, Mich., on acid-free paper (85% recycled content). Library of Congress Cataloging-in-Publication Data Kalathil, Shanthi. Open networks, closed regimes : the impact of the internet on authoritar- ian rule / Shanthi Kalathil and Taylor C. Boas. p. cm. Includes bibliographical references (p. ) and index. ISBN 0-87003-194-5 (pbk.) 1. Authoritarianism—Case studies. 2. Internet—Political aspects—Case studies. I. Boas, Taylor C. II. Title. JC480 .K35 2002 320.53—dc21 2002013713 10 09 08 07 06 05 04 5 4 3 2 1 1st Printing 2003 Contents Foreword ix Acknowledgments xi Acronyms xiii CHAPTER ONE The Conventional Wisdom: What Lies Beneath? 1 CHAPTER TWO Wired for Modernization in China 13 CHAPTER THREE Channeling a “Limited” Resource in Cuba 43 CHAPTER FOUR Catching Up and Cracking Down in Singapore, Vietnam, and Burma 70 CHAPTER FIVE Technology and Tradition in the United Arab Emirates, Saudi Arabia, and Egypt 103 CHAPTER SIX Beyond Blind Optimism 135 vii viii CONTENTS Notes 155 Glossary 179 Works Cited 183 Index 201 About the Authors 217 The Carnegie Endowment for International Peace 218 Foreword As the information revolution rapidly unfolds, Internet use is profoundly affecting governments, corporations, and societies around the world. Many of these effects, while widely assumed to be significant, have yet to be fully explored. In the absence of thorough analysis, unexamined assumptions about the Internet’s likely impact have become conventional wisdom. Tales of wired dissidents toppling strong-armed leaders, along with long-held be- liefs about the medium’s inherently democratic nature, have lent credibil- ity to the idea that the Internet inexorably undermines authoritarian re- gimes. Having outlasted the initial euphoria surrounding the information age, this notion has now solidified into a truism. It is an assumption that informs the speeches of politicians, creeps into policy debates, and pops up as fact in press reports. Few serious studies have yet tested this view. While new research has focused on individual countries or particular types of users, none has looked for patterns of effects across a broad sample of authoritarian regimes, giving equal consideration to Internet use by government, business, and civil society groups. In this book, Shanthi Kalathil and Taylor C. Boas carefully examine the full range of Internet use under eight authoritarian regimes. They dem- onstrate how the Internet’s net impact on authoritarian rule has often been obscured by conventional wisdom. In China, for instance, the Internet- enabled protests of the Falun Gong must be weighed against the government’s efforts to channel online discourse and extend its own au- ix x FOREWORD thority through Internet use. In Cuba, independent journalists may post their stories on web servers outside the country, but most citizens are shielded from the global Internet and encouraged to use a national com- puter network with government-authorized content. In some Southeast Asian countries, globally wired activist networks square off against gov- ernments who use the Internet to drive economic development and boost standards of living. And in many parts of the Middle East, the Internet increases access to Western images and ideas but also offers a soapbox for Islamic fundamentalists who oppose broadening civil liberties. Overall, as Kalathil and Boas note, the Internet is challenging and help- ing to transform authoritarianism. Yet they also argue that information technology alone is unlikely to bring about its demise. Their study is a valuable corrective to the blind optimism equating the Internet with free- dom, and it invites readers to realistically reflect on how the Internet might be better leveraged for democratic aims. This book builds on research conducted over the past three years at the Carnegie Endowment. It will serve as an innovative and useful guide for policy makers, activists, and anyone else who wants to use the potent information tools of the twenty- first century to promote greater global integration and understanding. Jessica T. Mathews President Carnegie Endowment for International Peace Acknowledgments This book could not have been written without the support of a number of individuals and organizations. We would like to thank Jessica Mathews, Paul Balaran, George Perkovich, and Thomas Carothers for creating a welcoming institutional environment at the Carnegie Endowment and for steadfastly encouraging our research efforts in an emerging field. Maria Carlo and Pavani Reddy deftly handled the administrative and research assistance that we needed to keep the project organized and on track. Trish Reynolds, Sherry Pettie, and Catherine Wigginton guided us through the publication process, while Carmen MacDougall and Scott Nathanson expertly publicized our research. Carnegie librarians Kathleen Higgs and Chris Henley and former librarian Jennifer Little amassed many of the sources upon which this study relies. We are also indebted to the Ford Foundation, the John D. and Catherine T. MacArthur Foundation, and the Rockefeller Foundation, whose generous support of the Carnegie Endowment’s Global Policy Program made this project possible. In particular we wish to recognize William J. Drake, founding director of the Information Revolution and World Politics Project at the Carnegie Endowment, for his key role in launching this initiative and guiding it through its early stages. Our frequent discussions with Bill helped shape the framework and argument of this study in countless ways. We absolve him of responsibility for any shortcomings in the final product, but he can deservedly take credit for opening many of the doors that have helped make this book a reality. xi xii ACKNOWLEDGMENTS We owe a special debt of gratitude to colleagues who read portions of the manuscript and offered feedback during the revision process, includ- ing Jon Alterman, Thomas Carothers, Peter Ferdinand, Will Foster, Nina Hachigian, Veron Hung, Philip Peters, Garry Rodan, and Deborah Wheeler. In addition, we would like to thank the numerous individuals around the world who generously provided us with information and insight during on- and off-the-record interviews. Their contributions proved invaluable in shaping the conclusions of this study. Last but certainly not least, we are grateful to all those who have of- fered intellectual guidance, moral support, and encouragement during this research endeavor. They include David Collier, Terry Karl, Laura Krejsa, James Mulvenon, Helen Oliver, Minxin Pei, P. J. Simmons, Jon Wolfsthal, John Zysman, the members of the Chinese Internet Research Group, and our
Recommended publications
  • ENISA Threat Landscape Report 2016 15 Top Cyber-Threats and Trends
    ENISA Threat Landscape Report 2016 15 Top Cyber-Threats and Trends FINAL VERSION 1.0 ETL 2016 JANUARY 2017 www.enisa.europa.eu European Union Agency For Network and Information Security ENISA Threat Landscape Report 2016 Final version | 1.0 | OPSEC | January 2017 About ENISA The European Union Agency for Network and Information Security (ENISA) is a centre of network and information security expertise for the EU, its member states, the private sector and Europe’s citizens. ENISA works with these groups to develop advice and recommendations on good practice in information security. It assists EU member states in implementing relevant EU legislation and works to improve the resilience of Europe’s critical information infrastructure and networks. ENISA seeks to enhance existing expertise in EU member states by supporting the development of cross-border communities committed to improving network and information security throughout the EU. More information about ENISA and its work can be found at www.enisa.europa.eu. Contact For queries on this paper, please use [email protected] or [email protected] For media enquiries about this paper, please use [email protected]. Acknowledgements ENISA would like to thank the members of the ENISA ETL Stakeholder group: Pierluigi Paganini, Chief Security Information Officer, IT, Paul Samwel, Banking, NL, Tom Koehler, Consulting, DE, Jason Finlayson, Consulting, IR, Stavros Lingris, CERT, EU, Jart Armin, Worldwide coalitions/Initiatives, International, Thomas Häberlen, Member State, DE, Neil Thacker, Consulting, UK, Shin Adachi, Security Analyst, US, R. Jane Ginn, Consulting, US, Polo Bais, Member State, NL. The group has provided valuable input, has supported the ENISA threat analysis and has reviewed ENISA material.
    [Show full text]
  • THE BUSINESS of CENSORSHIP: CONTENT MANAGEMENT and the CHINESE ECONOMY By
    THE BUSINESS OF CENSORSHIP: CONTENT MANAGEMENT AND THE CHINESE ECONOMY by JOSHUA CLARK B.A. (Hons.), Queen's University at Kingston, 2009 MASTER OF ARTS in THE FACULTY OF GRADUATE STUDIES (Political Science) THE UNIVERSITY OF BRITISH COLUMBIA (Vancouver) August 2010 ©Joshua Clark, 2010 Abstract Content control and censorship on the Internet are increasingly important topics for scholars of democratization, media and communications. Most studies have examined the relationship between the Internet, content management and various elements important to democratization such as the formation of civil society organizations. This thesis attempts to expand this discussion by examining the effects of online content management on economic systems, using the People's Republic of China as an example. China features a globally integrated economy that is increasing dependent on manufacturing and services while simultaneously maintaining one of the most extensive online content management systems in the world. This paper attempts to show how the Communist Party of China is able to reconcile the need for connectivity in order to drive their economy while maintaining political control. It also discusses the long-term implications of this strategy. The first section consists of a series of quantitative and qualitative tests to determine how various classes of websites are managed. These tests reveal that in order to maintain the flow of information necessary for a globally integrated economy, the Chinese Communist Party utilizes strategies that manage but not block the information flows related to business. This survey is followed by a case study examining the relationship between Google and China, and the implications of Chinese regulation and control for the broader economy.
    [Show full text]
  • Research Perspectives on Online Radicalisation a Literature Review, 2006–2016
    RESEARCH PERSPECTIVES ON ONLINE RADICALISATION A LITERATURE REVIEW, 2006–2016 Alexander Meleagrou-Hitchens and Nick Kaderbhai RESEARCH PERSPECTIVES ON ONLINE RADICALISATION A LITERATURE REVIEW, 2006–2016 Alexander Meleagrou-Hitchens and Nick Kaderbhai International Centre for the Study of Radicalisation (ICSR), King’s College London About the authors Alexander Meleagrou-Hitchens (PhD) is currently Research Director at the Program on Extremism at George Washington University. He was previously Head of Research at the International Centre for the Study of Radicalisation (ICSR) at King’s College London, a VOX-Pol Researcher and a lecturer in the King’s Department of War Studies. Nick Kaderbhai is an Associate Fellow at the International Centre for the Study of Radicalisation (ICSR) at King’s College London. He was previously a full-time Research Fellow, where he focused on the radicalisation and recruitment of western foreign fighters to extremist groups in Iraq and Syria. He is currently a doctoral candidate in the Department of War Studies at King’s College London, where his is studying the interplay between British grand strategy and national identity. Acknowledgements The authors are grateful to Professor Maura Conway and Lisa McInerney of Dublin City University and Professor John Bew of King’s College London for their support and advice. We must also thank Christina Mitsiali of ICSR for her tireless efforts in proofreading the various iterations of this report. ISBN: 978-1-873769-66-9 © VOX-Pol Network of Excellence, 2017 This material is offered free of charge for personal and non-commercial use, provided the source is acknowledged. For commercial or any other use, prior written permission must be obtained from VOX-Pol.
    [Show full text]
  • The Indonesian Archipelago's IT Growth on the Path to the Digital Economy Era MOHAMMAD YASIN
    The Indonesian Archipelago's IT Growth on the Path to the Digital Economy Era MOHAMMAD YASIN Preface Indonesia is still struggling to overcome its weak macroeconomic condition, reflected in a budget deficit that threatens macro stability and both international and domestic market confidence in the government's medium-term policies for restoring the economy. The exchange rate appreciated about 18.7 percent between February and December 1999 and then depreciated by around 29 percent from January to December 2000 due to domestic and political instability. The open unemployment rate reached 6.3% in 2000, up from 4.5% in 1999, while the inflation rate increased from 2.01% in 1999 to 9.35% for 2000. Policies for the medium -term include stabilizing the exchange rate, reducing the inflation rate, creating more jobs, and maintaining economic growth. Despite the internal macroeconomic problems, Indonesia's growth reached 4.77% up from 0.5% in 1999, primarily due to firm oil prices, rising exports of non-primary goods, and a moderate upturn in investment. Also, there were noticeable steps made toward re-capitalizing, restructuring, and consolidating the banking system. At 3.8% of GDP, the current account surplus was slightly below the 1999 level of 4.8%. Despite the country's economic problems, the flow of information through information technology could not be stopped. This new technology has been put to use in almost every segment of human activity from electronic commerce to education, medicine, transportation, tourism, the environment, and entertainment. As a country comprised of many islands with a land area as large as that of the United States, Indonesia has encountered a lot of problems in preparing its population for global competition in the new era of the digital economy.
    [Show full text]
  • The Filtering Matrix
    The Filtering Matrix Filtering and Surveillance Practices Worldwide Nart Villeneuve Director of Technical Research The Citizen Lab / OpenNet Initiative University of Toronto Internet Challenges Bloggers and independent media challenge traditional corporate and state-owned media VoIP is seen as a threat by traditional tele-communications companies Offshore gambling and banking sites challenge existing laws and regulations File sharing services have significantly impacted the area of copyright and intellectual property Spam, child pornography, identity theft, computer break-ins and terrorism present significant security concerns Borders in Cyberspace In an effort to counter the once borderless Internet, states are seeking to create informational boundaries in cyberspace. Informational Borders Although decentralized there are significant ªchoke pointsº at which controls can be placed on the Internet Technical & non-technical mechanisms used to censor and control access to the Internet Filtering is the technical mechanism through which such controls are operationalized Internet Filtering Internet content filtering is a term that refers to the techniques by which control is imposed on access to information on the Internet The motivations for state-directed Internet filtering include those with: a specific emphasis on e-commerce: tax, copyright, VoIP a specific emphasis on children: child pornography, violence a specific emphasis on content cultural: pornography and gambling political: dissidents and independent media security: (cyber)terrorism and hacking Filtering Techniques DNS filtering: modification to DNS servers to prevent a domain name from resolving to the correct IP address. IP filtering: entries are made in routing equipment that stop all outgoing requests for a specific IP address URL filtering: filtering technology that (a) reassembles the packets for traffic flowing through its network, (b) reads each http request, and (c) if the URL in the request matches one of the URLs (or keywords) specified in a blocklist, block the http request.
    [Show full text]
  • The First Amendment, the Public-Private Distinction, and Nongovernmental Suppression of Wartime Political Debate Gregory P
    Working Paper Series Villanova University Charles Widger School of Law Year 2004 The First Amendment, The Public-Private Distinction, and Nongovernmental Suppression of Wartime Political Debate Gregory P. Magarian Villanova University School of Law, [email protected] This paper is posted at Villanova University Charles Widger School of Law Digital Repository. http://digitalcommons.law.villanova.edu/wps/art6 THE FIRST AMENDMENT, THE PUBLIC -PRIVA TE DISTINCTION, AND NONGOVERNMENTAL SUPPRESSION OF WARTIME POLITICAL DEBATE 1 BY GREGORY P. MAGARIAN DRAFT 5-12-04 TABLE OF CONTENTS INTRODUCTION ......................................................................................... 1 I. CONFRONTING NONGOVERNMENTAL CENSORSHIP OF POLITICAL DEBATE IN WARTIME .................. 5 A. The Value and Vulnerability of Wartime Political Debate ........................................................................... 5 1. The Historical Vulnerability of Wartime Political Debate to Nongovernmental Suppression ....................................................................... 5 2. The Public Rights Theory of Expressive Freedom and the Necessity of Robust Political Debate for Democratic Self -Government........................ 11 B. Nongovernmental Censorship of Political Speech During the “War on Terrorism” ............................................... 18 1. Misinformation and Suppression of Information by News Media ............................................ 19 2. Exclusions of Political Speakers from Privately Owned Public Spaces.
    [Show full text]
  • [2020] SGCA 16 Civil Appeal No 99 of 2019 Between Wham Kwok Han
    IN THE COURT OF APPEAL OF THE REPUBLIC OF SINGAPORE [2020] SGCA 16 Civil Appeal No 99 of 2019 Between Wham Kwok Han Jolovan … Appellant And The Attorney-General … Respondent Civil Appeal No 108 of 2019 Between Tan Liang Joo John … Appellant And The Attorney-General … Respondent Civil Appeal No 109 of 2019 Between The Attorney-General … Appellant And Wham Kwok Han Jolovan … Respondent Civil Appeal No 110 of 2019 Between The Attorney-General … Appellant And Tan Liang Joo John … Respondent In the matter of Originating Summons No 510 of 2018 Between The Attorney-General And Wham Kwok Han Jolovan In the matter of Originating Summons No 537 of 2018 Between The Attorney-General And Tan Liang Joo John ii JUDGMENT [Contempt of Court] — [Scandalising the court] [Contempt of Court] — [Sentencing] iii This judgment is subject to final editorial corrections approved by the court and/or redaction pursuant to the publisher’s duty in compliance with the law, for publication in LawNet and/or the Singapore Law Reports. Wham Kwok Han Jolovan v Attorney-General and other appeals [2020] SGCA 16 Court of Appeal — Civil Appeals Nos 99, 108, 109 and 110 of 2019 Sundaresh Menon CJ, Andrew Phang Boon Leong JA, Judith Prakash JA, Tay Yong Kwang JA and Steven Chong JA 22 January 2020 16 March 2020 Judgment reserved. Sundaresh Menon CJ (delivering the judgment of the court): Introduction 1 These appeals arise out of HC/OS 510/2018 (“OS 510”) and HC/OS 537/2018 (“OS 537”), which were initiated by the Attorney-General (“the AG”) to punish Mr Wham Kwok Han Jolovan (“Wham”) and Mr Tan Liang Joo John (“Tan”) respectively for contempt by scandalising the court (“scandalising contempt”) under s 3(1)(a) of the Administration of Justice (Protection) Act 2016 (Act 19 of 2016) (“the AJPA”).
    [Show full text]
  • Tds National Reports Itu Telecom World 2003 and Canton Ofgeneva Hosted by Therepublic
    2003 ORLD W ELECOM TDS NATIONAL REPORTS TDS NATIONAL International Telecommunication Union Place des Nations, CH-1211 Geneva 20, Switzerland Tel.: +41 22 730 6161 – Fax: +41 22 730 6444 E-mail: [email protected] TDS NATIONAL REPORTS TDS NATIONAL ITU T HOSTED BY THE REPUBLIC www.itu.int/itutelecom AND CANTON OF GENEVA TDS NATIONAL REPORTS The Republic and Canton of Geneva sponsors of the Telecom Development Symposium (TDS) Table of contents Page Page Albania ................................................. 1 Moldova................................................ 145 Angola .................................................. 5 Mongolia............................................... 147 Armenia................................................ 9 Myanmar .............................................. 155 Bangladesh .......................................... 11 Nepal .................................................... 159 Benin .................................................... 17 Nicaragua ............................................. 165 Bhutan.................................................. 21 Pakistan................................................ 167 Bosnia and Herzegovina ...................... 27 Papua New Guinea .............................. 179 Burkina Faso ........................................ 31 Paraguay .............................................. 183 Burundi................................................. 41 Cambodia............................................. 43 Peru ...................................................
    [Show full text]
  • The War on Terrorism and the Internal Security Act of Singapore
    Damien Cheong ____________________________________________________________ Selling Security: The War on Terrorism and the Internal Security Act of Singapore DAMIEN CHEONG Abstract The Internal Security Act (ISA) of Singapore has been transformed from a se- curity law into an effective political instrument of the Singapore government. Although the government's use of the ISA for political purposes elicited negative reactions from the public, it was not prepared to abolish, or make amendments to the Act. In the wake of September 11 and the international campaign against terrorism, the opportunity to (re)legitimize the government's use of the ISA emerged. This paper argues that despite the ISA's seeming importance in the fight against terrorism, the absence of explicit definitions of national security threats, either in the Act itself, or in accompanying legislation, renders the ISA susceptible to political misuse. Keywords: Internal Security Act, War on Terrorism. People's Action Party, Jemaah Islamiyah. Introduction In 2001/2002, the Singapore government arrested and detained several Jemaah Islamiyah (JI) operatives under the Internal Security Act (ISA) for engaging in terrorist activities. It was alleged that the detained operatives were planning to attack local and foreign targets in Singa- pore. The arrests outraged human rights groups, as the operation was reminiscent of the government's crackdown on several alleged Marxist conspirators in1987. Human rights advocates were concerned that the current detainees would be dissuaded from seeking legal counsel and subjected to ill treatment during their period of incarceration (Tang 1989: 4-7; Frank et al. 1991: 5-99). Despite these protests, many Singaporeans expressed their strong support for the government's actions.
    [Show full text]
  • The Internet and Everyday Life in Indonesia: a New Moral Panic?
    bki Bijdragen tot de Taal-, Land- en Volkenkunde 169 (2013) 133-147 brill.com/bki The Internet and Everyday Life in Indonesia: A New Moral Panic? Merlyna Lim Arizona State University [email protected] A. Yogaswara, The power of facebook: Gerakan 1,000,000 facebookers. Yogyakarta: Mediakom, 2010, 160 pp. ISBN 9788771028. Abuh Muhammad Waskito, Wajah salafiji ekstrem di dunia internet: Propa- ganda salafiji ekstrem di dunia internet. Bandung: Ad Difa’ Press, 2009, viii + 163 pp. Achmad Desmon Asiku, Cybersex: Finally exposed. Jakarta: Mahenjo Daro Publishing, 2005, xvii +234 pp. ISBN 9792500006. Akbar Kaelola, Black hacker vs. white hacker: Kisah para hacker jenius-gila dengan reputasi dunia dan hackers Indonesia. Yogyakarta: MediaKom, 2010, 128 pp. ISBN 9798770932. Barda Nawawi Arief, Pornografiji, pornoaksi dan cyberporn. Semarang: Pener- bit Pustaka Magister, 2007, xii + 98 pp. ISBN 9789790971594059. Dikdik M. Arief Mansur and Elisastris Gultom Cyber Law: Aspek hukum teknologi informasi. Bandung: Refijika Aditama, 2009. [First edition, 2005]. Ellis Lestari Pambayun, Birahi Maya: Mengintip perempuan di cyberporn. Bandung: Nuansa Cendekia, 2010, 332 pp. ISBN: 9786028394291. Feri Sulianta, Cyberporn: Bisnis atau kriminal. Jakarta: Elex Media, 2010, vii + 184 pp. ISBN 9789792792287. © 2013 Merlyna Lim DOI: 10.1163/22134379-12340008 This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial 3.0 Unported (CC BY-NC 3.0) License, http://creativecommons.org/licenses/by-nc/3.0/ 134 Review Essays Sony Set, 500 + Gelombang video porno: Jangan bugil di depan kamera! Yogyakarta: Penerbit Andi, 2007, viii + 200 pp. ISBN 9789792901474. Sulistyo, H. Sutanto and T. Sugiarso (eds), Cybercrime, motif dan penindakan.
    [Show full text]
  • Blood, Sweat, and Fear: Workers' Rights in U.S. Meat and Poultry Plants
    BLOOD, SWEAT, AND FEAR Workers’ Rights in U.S. Meat and Poultry Plants Human Rights Watch Copyright © 2004 by Human Rights Watch. All rights reserved. Printed in the United States of America ISBN: 1-56432-330-7 Cover photo: © 1999 Eugene Richards/Magnum Photos Cover design by Rafael Jimenez Human Rights Watch 350 Fifth Avenue, 34th floor New York, NY 10118-3299 USA Tel: 1-(212) 290-4700, Fax: 1-(212) 736-1300 [email protected] 1630 Connecticut Avenue, N.W., Suite 500 Washington, DC 20009 USA Tel:1-(202) 612-4321, Fax:1-(202) 612-4333 [email protected] 2nd Floor, 2-12 Pentonville Road London N1 9HF, UK Tel: 44 20 7713 1995, Fax: 44 20 7713 1800 [email protected] Rue Van Campenhout 15, 1000 Brussels, Belgium Tel: 32 (2) 732-2009, Fax: 32 (2) 732-0471 [email protected] 8 rue des Vieux-Grenadiers 1205 Geneva Tel: +41 22 320 55 90, Fax: +41 22 320 55 11 [email protected] Web Site Address: http://www.hrw.org Listserv address: To receive Human Rights Watch news releases by email, subscribe to the HRW news listserv of your choice by visiting http://hrw.org/act/subscribe-mlists/subscribe.htm Human Rights Watch is dedicated to protecting the human rights of people around the world. We stand with victims and activists to prevent discrimination, to uphold political freedom, to protect people from inhumane conduct in wartime, and to bring offenders to justice. We investigate and expose human rights violations and hold abusers accountable. We challenge governments and those who hold power to end abusive practices and respect international human rights law.
    [Show full text]
  • Hard-Rock Mining, Labor Unions, and Irish Nationalism in the Mountain West and Idaho, 1850-1900
    UNPOLISHED EMERALDS IN THE GEM STATE: HARD-ROCK MINING, LABOR UNIONS AND IRISH NATIONALISM IN THE MOUNTAIN WEST AND IDAHO, 1850-1900 by Victor D. Higgins A thesis submitted in partial fulfillment of the requirements for the degree of Master of Arts in History Boise State University August 2017 © 2017 Victor D. Higgins ALL RIGHTS RESERVED BOISE STATE UNIVERSITY GRADUATE COLLEGE DEFENSE COMMITTEE AND FINAL READING APPROVALS of the thesis submitted by Victor D. Higgins Thesis Title: Unpolished Emeralds in the Gem State: Hard-rock Mining, Labor Unions, and Irish Nationalism in the Mountain West and Idaho, 1850-1900 Date of Final Oral Examination: 16 June 2017 The following individuals read and discussed the thesis submitted by student Victor D. Higgins, and they evaluated his presentation and response to questions during the final oral examination. They found that the student passed the final oral examination. John Bieter, Ph.D. Chair, Supervisory Committee Jill K. Gill, Ph.D. Member, Supervisory Committee Raymond J. Krohn, Ph.D. Member, Supervisory Committee The final reading approval of the thesis was granted by John Bieter, Ph.D., Chair of the Supervisory Committee. The thesis was approved by the Graduate College. ACKNOWLEDGEMENTS The author appreciates all the assistance rendered by Boise State University faculty and staff, and the university’s Basque Studies Program. Also, the Idaho Military Museum, the Idaho State Archives, the Northwest Museum of Arts and Culture, and the Wallace District Mining Museum, all of whom helped immensely with research. And of course, Hunnybunny for all her support and patience. iv ABSTRACT Irish immigration to the United States, extant since the 1600s, exponentially increased during the Irish Great Famine of 1845-52.
    [Show full text]