Chinese Covert Social Media Propaganda and Disinformation Related to Hong Kong by John Dotson
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Changing Political Economy of the Hong Kong Media
China Perspectives 2018/3 | 2018 Twenty Years After: Hong Kong's Changes and Challenges under China's Rule Changing Political Economy of the Hong Kong Media Francis L. F. Lee Electronic version URL: https://journals.openedition.org/chinaperspectives/8009 DOI: 10.4000/chinaperspectives.8009 ISSN: 1996-4617 Publisher Centre d'étude français sur la Chine contemporaine Printed version Date of publication: 1 September 2018 Number of pages: 9-18 ISSN: 2070-3449 Electronic reference Francis L. F. Lee, “Changing Political Economy of the Hong Kong Media”, China Perspectives [Online], 2018/3 | 2018, Online since 01 September 2018, connection on 21 September 2021. URL: http:// journals.openedition.org/chinaperspectives/8009 ; DOI: https://doi.org/10.4000/chinaperspectives. 8009 © All rights reserved Special feature China perspectives Changing Political Economy of the Hong Kong Media FRANCIS L. F. LEE ABSTRACT: Most observers argued that press freedom in Hong Kong has been declining continually over the past 15 years. This article examines the problem of press freedom from the perspective of the political economy of the media. According to conventional understanding, the Chinese government has exerted indirect influence over the Hong Kong media through co-opting media owners, most of whom were entrepreneurs with ample business interests in the mainland. At the same time, there were internal tensions within the political economic system. The latter opened up a space of resistance for media practitioners and thus helped the media system as a whole to maintain a degree of relative autonomy from the power centre. However, into the 2010s, the media landscape has undergone several significant changes, especially the worsening media business environment and the growth of digital media technologies. -
Icons, Culture and Collective Identity of Postwar Hong Kong
Intercultural Communication Studies XXII: 1 (2013) R. MAK & C. CHAN Icons, Culture and Collective Identity of Postwar Hong Kong Ricardo K. S. MAK & Catherine S. CHAN Hong Kong Baptist University, Hong Kong S.A.R., China Abstract: Icons, which take the form of images, artifacts, landmarks, or fictional figures, represent mounds of meaning stuck in the collective unconsciousness of different communities. Icons are shortcuts to values, identity or feelings that their users collectively share and treasure. Through the concrete identification and analysis of icons of post-war Hong Kong, this paper attempts to highlight not only Hong Kong people’s changing collective needs and mental or material hunger, but also their continuous search for identity. Keywords: Icons, Hong Kong, Hong Kong Chinese, 1997, values, identity, lifestyle, business, popular culture, fusion, hybridity, colonialism, economic takeoff, consumerism, show business 1. Introduction: Telling Hong Kong’s Story through Icons It seems easy to tell the story of post-war Hong Kong. If merely delineating the sky-high synopsis of the city, the ups and downs, high highs and low lows are at once evidently remarkable: a collective struggle for survival in the post-war years, tremendous social instability in the 1960s, industrial take-off in the 1970s, a growth in economic confidence and cultural arrogance in the 1980s and a rich cultural upheaval in search of locality before the handover. The early 21st century might as well sum up the development of Hong Kong, whose history is long yet surprisingly short- propelled by capitalism, gnawing away at globalization and living off its elastic schizophrenia. -
Official Record of Proceedings
LEGISLATIVE COUNCIL ─ 3 November 2010 1399 OFFICIAL RECORD OF PROCEEDINGS Wednesday, 3 November 2010 The Council met at Eleven o'clock MEMBERS PRESENT: THE PRESIDENT THE HONOURABLE JASPER TSANG YOK-SING, G.B.S., J.P. THE HONOURABLE ALBERT HO CHUN-YAN IR DR THE HONOURABLE RAYMOND HO CHUNG-TAI, S.B.S., S.B.ST.J., J.P. THE HONOURABLE LEE CHEUK-YAN DR THE HONOURABLE DAVID LI KWOK-PO, G.B.M., G.B.S., J.P. THE HONOURABLE FRED LI WAH-MING, S.B.S., J.P. DR THE HONOURABLE MARGARET NG THE HONOURABLE JAMES TO KUN-SUN THE HONOURABLE CHEUNG MAN-KWONG THE HONOURABLE CHAN KAM-LAM, S.B.S., J.P. THE HONOURABLE MRS SOPHIE LEUNG LAU YAU-FUN, G.B.S., J.P. THE HONOURABLE LEUNG YIU-CHUNG DR THE HONOURABLE PHILIP WONG YU-HONG, G.B.S. 1400 LEGISLATIVE COUNCIL ─ 3 November 2010 THE HONOURABLE WONG YUNG-KAN, S.B.S., J.P. THE HONOURABLE LAU KONG-WAH, J.P. THE HONOURABLE LAU WONG-FAT, G.B.M., G.B.S., J.P. THE HONOURABLE MIRIAM LAU KIN-YEE, G.B.S., J.P. THE HONOURABLE EMILY LAU WAI-HING, J.P. THE HONOURABLE ANDREW CHENG KAR-FOO THE HONOURABLE TIMOTHY FOK TSUN-TING, G.B.S., J.P. THE HONOURABLE TAM YIU-CHUNG, G.B.S., J.P. THE HONOURABLE ABRAHAM SHEK LAI-HIM, S.B.S., J.P. THE HONOURABLE LI FUNG-YING, S.B.S., J.P. THE HONOURABLE TOMMY CHEUNG YU-YAN, S.B.S., J.P. THE HONOURABLE FREDERICK FUNG KIN-KEE, S.B.S., J.P. -
Stability and Arms Control in Europe: the Role of Military Forces Within a European Security System
Stability and Arms Control in Europe: The Role of Military Forces within a European Security System A SIPRI Research Report Edited by Dr Gerhard Wachter, Lt-General (Rtd) and Dr Axel Krohn sipri Stockholm International Peace Research Institute July 1989 Copyright © 1989 SIPRI All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owner. ISBN 91-85114-50-2 Typeset and originated by Stockholm International Peace Research Institute Printed and bound in Sweden by Ingeniörskopia Solna Abstract Wachter, G. and Krohn, A., eds, Stability and Arms Control in Europe: The Role of Military Forces within a European Security System, A SIPRI Research Report (SIPRI: Solna, Sweden, 1989), 113 pp. This report presents the outcome of a project which was initiated at SIPRI in 1987. It was supported by a grant from the Volkswagen Stiftung of the Federal Republic of Germany. The introductory chapter by the editors presents a scenario for a possible future European security system. Six essays by active NATO and WTO military officers focus on the role of military forces in such a system. Various approaches to the tasks and size of military forces in this regime of strict non-provocative defence are presented with the intent of providing new ideas for the debate on restructuring of forces in Europe. There are 3 maps, 7 tables and 11 figures. Sponsored by the Volkswagen Stiftung. Contents Preface vi Acknowledgements viii The role of military forces within a European security system 1 G. -
Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government. -
Information Warfare, International Law, and the Changing Battlefield
ARTICLE INFORMATION WARFARE, INTERNATIONAL LAW, AND THE CHANGING BATTLEFIELD Dr. Waseem Ahmad Qureshi* ABSTRACT The advancement of technology in the contemporary era has facilitated the emergence of information warfare, which includes the deployment of information as a weapon against an adversary. This is done using a numBer of tactics such as the use of media and social media to spread propaganda and disinformation against an adversary as well as the adoption of software hacking techniques to spread viruses and malware into the strategically important computer systems of an adversary either to steal confidential data or to damage the adversary’s security system. Due to the intangible nature of the damage caused By the information warfare operations, it Becomes challenging for international law to regulate the information warfare operations. The unregulated nature of information operations allows information warfare to Be used effectively By states and nonstate actors to gain advantage over their adversaries. Information warfare also enhances the lethality of hyBrid warfare. Therefore, it is the need of the hour to arrange a new convention or devise a new set of rules to regulate the sphere of information warfare to avert the potential damage that it can cause to international peace and security. ABSTRACT ................................................................................................. 901 I. INTRODUCTION ......................................................................... 903 II. WHAT IS INFORMATION WARFARE? ............................. -
The Impact of Disinformation on Democratic Processes and Human Rights in the World
STUDY Requested by the DROI subcommittee The impact of disinformation on democratic processes and human rights in the world @Adobe Stock Authors: Carme COLOMINA, Héctor SÁNCHEZ MARGALEF, Richard YOUNGS European Parliament coordinator: Policy Department for External Relations EN Directorate General for External Policies of the Union PE 653.635 - April 2021 DIRECTORATE-GENERAL FOR EXTERNAL POLICIES POLICY DEPARTMENT STUDY The impact of disinformation on democratic processes and human rights in the world ABSTRACT Around the world, disinformation is spreading and becoming a more complex phenomenon based on emerging techniques of deception. Disinformation undermines human rights and many elements of good quality democracy; but counter-disinformation measures can also have a prejudicial impact on human rights and democracy. COVID-19 compounds both these dynamics and has unleashed more intense waves of disinformation, allied to human rights and democracy setbacks. Effective responses to disinformation are needed at multiple levels, including formal laws and regulations, corporate measures and civil society action. While the EU has begun to tackle disinformation in its external actions, it has scope to place greater stress on the human rights dimension of this challenge. In doing so, the EU can draw upon best practice examples from around the world that tackle disinformation through a human rights lens. This study proposes steps the EU can take to build counter-disinformation more seamlessly into its global human rights and democracy policies. -
Taming the Trolls: the Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media
Taming the Trolls: The Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media * ASHLEY C. NICOLAS INTRODUCTION Consider a hypothetical scenario in which hundreds of agents of the Russian GRU arrive in the United States months prior to a presidential election.1 The Russian agents spend the weeks leading up to the election going door to door in vulnerable communities, spreading false stories intended to manipulate the population into electing a candidate with policies favorable to Russian positions. The agents set up television stations, use radio broadcasts, and usurp the resources of local newspapers to expand their reach and propagate falsehoods. The presence of GRU agents on U.S. soil is an incursion into territorial integrity⎯a clear invasion of sovereignty.2 At every step, Russia would be required to expend tremendous resources, overcome traditional media barriers, and risk exposure, making this hypothetical grossly unrealistic. Compare the hypothetical with the actual actions of the Russians during the 2016 U.S. presidential election. Sitting behind computers in St. Petersburg, without ever setting foot in the United States, Russian agents were able to manipulate the U.S. population in the most sacred of domestic affairs⎯an election. Russian “trolls” targeted vulnerable populations through social media, reaching millions of users at a minimal cost and without reliance on established media institutions.3 Without using * Georgetown Law, J.D. expected 2019; United States Military Academy, B.S. 2009; Loyola Marymount University M.Ed. 2016. © 2018, Ashley C. Nicolas. The author is a former U.S. Army Intelligence Officer. -
Changing Political Economy of the Hong Kong Media
Special feature China perspectives Changing Political Economy of the Hong Kong Media FRANCIS L. F. LEE ABSTRACT: Most observers argued that press freedom in Hong Kong has been declining continually over the past 15 years. This article examines the problem of press freedom from the perspective of the political economy of the media. According to conventional understanding, the Chinese government has exerted indirect influence over the Hong Kong media through co-opting media owners, most of whom were entrepreneurs with ample business interests in the mainland. At the same time, there were internal tensions within the political economic system. The latter opened up a space of resistance for media practitioners and thus helped the media system as a whole to maintain a degree of relative autonomy from the power centre. However, into the 2010s, the media landscape has undergone several significant changes, especially the worsening media business environment and the growth of digital media technologies. These changes have affected the cost-benefit calculations of media ownership and led to the entrance of Chinese capital into the Hong Kong media scene. The digital media arena is also facing the challenge of intrusion by the state. KEYWORDS: press freedom, political economy, self-censorship, digital media, media business, Hong Kong. wo decades after the handover, many observers, academics, and jour- part follows past scholarship to outline the ownership structure of the Hong nalists would agree that press freedom in Hong Kong has declined over Kong media system, while noting how several counteracting forces have Ttime. The titles of the annual reports by the Hong Kong Journalists As- prevented the media from succumbing totally to political power. -
Three Theories of Just War: Understanding Warfare As a Social Tool Through Comparative Analysis of Western, Chinese, and Islamic Classical Theories of War
THREE THEORIES OF JUST WAR: UNDERSTANDING WARFARE AS A SOCIAL TOOL THROUGH COMPARATIVE ANALYSIS OF WESTERN, CHINESE, AND ISLAMIC CLASSICAL THEORIES OF WAR A THESIS SUBMITTED TO THE GRADUATE DIVISION OF THE UNIVERSITY OF HAWAI‘I AT MĀNOA IN PARTIAL FULFILMENT OF THE REQUIREMENT FOR THE DEGREE OF MASTER OF ARTS IN PHILOSOPHY MAY 2012 By Faruk Rahmanović Thesis Committee: Tamara Albertini, Chairperson Roger T. Ames James D. Frankel Brien Hallett Keywords: War, Just War, Augustine, Sunzi, Sun Bin, Jihad, Qur’an DEDICATION To my parents, Ahmet and Nidžara Rahmanović. To my wife, Majda, who continues to put up with me. To Professor Keith W. Krasemann, for teaching me to ask the right questions. And to Professor Martin J. Tracey, for his tireless commitment to my success. 1 ABSTRACT The purpose of this analysis was to discover the extent to which dictates of war theory ideals can be considered universal, by comparing the Western (European), Classical Chinese, and Islamic models. It also examined the contextual elements that drove war theory development within each civilization, and the impact of such elements on the differences arising in war theory comparison. These theories were chosen for their differences in major contextual elements, in order to limit the impact of contextual similarities on the war theories. The results revealed a great degree of similarities in the conception of warfare as a social tool of the state, utilized as a sometimes necessary, albeit tragic, means of establishing peace justice and harmony. What differences did arise, were relatively minor, and came primarily from the differing conceptions of morality and justice within each civilization – thus indicating a great degree of universality to the conception of warfare. -
Civilians in Cyberwarfare: Conscripts
Civilians in Cyberwarfare: Conscripts Susan W. Brenner* with Leo L. Clarke** ABSTRACT Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation’s infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their cyberwarfare response structures if a state is to be able to respond effectively to cyberattacks. While many companies may voluntarily elect to participate in such an effort, others may decline to do so, which creates a need, in effect, to conscript companies for this purpose. This Article explores how the U.S. government can go about compelling civilian cooperation in cyberwarfare without violating constitutional guarantees and limitations on the power of the Legislature and the Executive. * NCR Distinguished Professor of Law and Technology, University of Dayton School of Law. ** Associate, Drew, Cooper & Anding, P.C., Grand Rapids, Michigan. 1011 1012 Vanderbilt Journal of Transnational Law [Vol. 43:1011 TABLE OF CONTENTS I. INTRODUCTION ............................................................. -
Cultural Intelligence in Covert Operatives
OVERT ACCEPTANCE: CULTURAL INTELLIGENCE IN COVERT OPERATIVES CHIP MICHAEL BUCKLEY A Thesis Submitted to the Faculty of Mercyhurst University In Partial Fulfillment of the Requirements for The Degree of MASTER OF SCIENCE IN APPLIED INTELLIGENCE RIDGE SCHOOL FOR INTELLIGENCE STUDIES AND INFORMATION SCIENCE MERCYHURST UNIVERSITY ERIE, PENNSYLVANIA JANUARY 2015 RIDGE SCHOOL FOR INTELLIGENCE STUDIES AND INFORMATION SCIENCE MERCYHURST UNIVERSITY ERIE, PENNSYLVANIA OVERT ACCEPTANCE: CULTURAL INTELLIGENCE IN COVERT OPERATIVES A Thesis Submitted to the Faculty of Mercyhurst University In Partial Fulfillment of the Requirements for The Degree of MASTER OF SCIENCE IN APPLIED INTELLIGENCE Submitted By: CHIP MICHAEL BUCKLEY Certificate of Approval: ___________________________________ Stephen Zidek, M.A. Assistant Professor The Ridge School of Intelligence Studies and Information Science ___________________________________ James G. Breckenridge, Ph.D. Associate Professor The Ridge School of Intelligence Studies and Information Science ___________________________________ Phillip J. Belfiore, Ph.D. Vice President Office of Academic Affairs January 2015 Copyright © 2015 by Chip Michael Buckley All rights reserved. iii DEDICATION To my father. iv ACKNOWLEDGEMENTS I would like to acknowledge a number of important individuals who have provided an extraordinary amount of support throughout this process. The faculty at Mercyhurst University, particularly Professor Stephen Zidek, provided invaluable guidance when researching and developing this thesis. My friends and classmates also volunteered important ideas and guidance throughout this time. Lastly, my family’s support, patience, and persistent inquiries regarding my progress cannot be overlooked. v ABSTRACT OF THE THESIS Overt Acceptance: Cultural Intelligence in Covert Operatives A Critical Examination By Chip Michael Buckley Master of Science in Applied Intelligence Mercyhurst University, 2014 Professor S.