China Media Bulletin
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
EP SAKHAROV PRIZE NETWORK NEWSLETTER May 2014
EP SAKHAROV PRIZE NETWORK NEWSLETTER May 2014 EUROPEAN YOUTH EVENT (EYE) ATTENDED BY SAKHAROV LAUREATES Olivier Basille, representing 2005 Sakharov Prize Laureate Reporters Without Borders, and Kirill Koroteev representing Memorial, the 2009 Laureate, took part in the EYE in Strasbourg from 9-11 May. The event brought together 5,000 Europeans aged 16-30. Basille urged Europe's youth to get involved in the promotion of human rights saying that "courage has to be learnt; people should not be afraid to adopt non-anonymity when tackling issues that require courage"; he also highlighted the importance of social media for democracy, and the need to fight restrictive media laws. Koroteev suggested that young people use social media to spread the word about rights contraventions, and that the EU not condone violations: "those who do not take measures against those who do not respect human rights are considered supporters of the wrongdoings of non-democratic regimes". Memorial to register as a foreign agent; criticises the Justice Ministry's proposal to close NGOs extra-judicially and expresses concerns about the possibility of turning off social media 23-03-2014: A District Court of Moscow confirmed the Prosecutor's order that Memorial Human Rights Centre, the 2009 Sakharov Laureate, is obliged to register as a "foreign agent". The decision came on the same day as the adoption by the Russian Duma of provisions that will allow the Ministry of Justice to register NGOs as “foreign agents” at its own initiative, without a court decision. 2009 Sakharov Prize Laureates Lyudmila Alexeyeva and Memorial have spoken out against the proposal. -
Trapped in a Virtual Cage: Chinese State Repression of Uyghurs Online
Trapped in a Virtual Cage: Chinese State Repression of Uyghurs Online Table of Contents I. Executive Summary..................................................................................................................... 2 II. Methodology .............................................................................................................................. 5 III. Background............................................................................................................................... 6 IV. Legislation .............................................................................................................................. 17 V. Ten Month Shutdown............................................................................................................... 33 VI. Detentions............................................................................................................................... 44 VII. Online Freedom for Uyghurs Before and After the Shutdown ............................................ 61 VIII. Recommendations................................................................................................................ 84 IX. Acknowledgements................................................................................................................. 88 Cover image: Composite of 9 Uyghurs imprisoned for their online activity assembled by the Uyghur Human Rights Project. Image credits: Top left: Memetjan Abdullah, courtesy of Radio Free Asia Top center: Mehbube Ablesh, courtesy of -
The Versatility of Microblogging
www.spireresearch.com Side Click: The versatility of microblogging Microblogging is well-established globally as a way of keeping in touch with others about events occurring in their lives in real-time. Popular microblogging sites include Twitter in the U.S., Tencent QQ in China and Me2day in South Korea. Twitter has 140 million active users1, while China’s Tencent QQ has a staggering 721 million active user accounts2, ranking only behind Facebook in terms of being the most used social networking service worldwide. Microblogging allows users to combine blogging and instant messaging to post short messages on their profiles3; including small and conversational talk, self-promotion, spam and news 4 . On a deeper level, microblogging has altered the way people consume and generate information – not only democratizing the broadcasting of information but also enabling it to be done in real-time. Connecting to stakeholders There are several benefits to integrating microblogging into a business’s regular stakeholder communication regime. Consumers who “follow” a company’s products or services would be the first to know of any promotions. The company also benefits through obtaining prompt feedback and suggestions for improvement. A concerned investor 1 Twitter turns six, Twitter Blog, 21 March 21 2012 2 QQ Continues to Dominate Instant Messaging in China, eMarketer Inc., 27 April 2012 3 An Insight Into Microblogging Trends And Toolbars, ArticlesXpert,21 January 2012 4 Twitter Study – August 2009, PearAnalytics.com, August 2009 © 2012 Spire Research and Consulting Pte Ltd would want to be the first to know of any important news which might impact her returns. -
Developments in China's Military Force Projection and Expeditionary Capabilities
DEVELOPMENTS IN CHINA'S MILITARY FORCE PROJECTION AND EXPEDITIONARY CAPABILITIES HEARING BEFORE THE U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION ONE HUNDRED FOURTEENTH CONGRESS SECOND SESSION THURSDAY, JANUARY 21, 2016 Printed for use of the United States-China Economic and Security Review Commission Available via the World Wide Web: www.uscc.gov UNITED STATES-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION WASHINGTON: 2016 ii U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION HON. DENNIS C. SHEA, Chairman CAROLYN BARTHOLOMEW, Vice Chairman Commissioners: PETER BROOKES HON. JAMES TALENT ROBIN CLEVELAND DR. KATHERINE C. TOB IN HON. BYRON L. DORGAN MICHAEL R. WESSEL JEFFREY L. FIEDLER DR. LARRY M. WORTZEL HON. CARTE P. GOODWIN MICHAEL R. DANIS, Executive Director The Commission was created on October 30, 2000 by the Floyd D. Spence National Defense Authorization Act for 2001 § 1238, Public Law No. 106-398, 114 STAT. 1654A-334 (2000) (codified at 22 U.S.C. § 7002 (2001), as amended by the Treasury and General Government Appropriations Act for 2002 § 645 (regarding employment status of staff) & § 648 (regarding changing annual report due date from March to June), Public Law No. 107-67, 115 STAT. 514 (Nov. 12, 2001); as amended by Division P of the “Consolidated Appropriations Resolution, 2003,” Pub L. No. 108-7 (Feb. 20, 2003) (regarding Commission name change, terms of Commissioners, and responsibilities of the Commission); as amended by Public Law No. 109- 108 (H.R. 2862) (Nov. 22, 2005) (regarding responsibilities of Commission and applicability of FACA); as amended by Division J of the “Consolidated Appropriations Act, 2008,” Public Law Nol. -
The Limits of Commercialized Censorship in China
The Limits of Commercialized Censorship in China Blake Miller∗ September 27, 2018 Abstract Despite massive investment in China's censorship program, internet platforms in China are rife with criticisms of the government and content that seeks to organize opposition to the ruling Communist Party. Past works have attributed this \open- ness" to deliberate government strategy or lack of capacity. Most, however, do not consider the role of private social media companies, to whom the state delegates information controls. I suggest that the apparent incompleteness of censorship is largely a result of principal-agent problems that arise due to misaligned incentives of government principals and private media company agents. Using a custom dataset of annotated leaked documents from a social media company, Sina Weibo, I find that 16% of directives from the government are disobeyed by Sina Weibo and that disobedience is driven by Sina's concerns about censoring more strictly than com- petitor Tencent. I also find that the fragmentation inherent in the Chinese political system exacerbates this principal agent problem. I demonstrate this by retrieving actual censored content from large databases of hundreds of millions of Sina Weibo posts and measuring the performance of Sina Weibo's censorship employees across a range of events. This paper contributes to our understanding of media control in China by uncovering how market competition can lead media companies to push back against state directives and increase space for counterhegemonic discourse. ∗Postdoctoral Fellow, Program in Quantitative Social Science, Dartmouth College, Silsby Hall, Hanover, NH 03755 (E-mail: [email protected]). 1 Introduction Why do scathing criticisms, allegations of government corruption, and content about collective action make it past the censors in China? Past works have theorized that regime strategies or state-society conflicts are the reason for incomplete censorship. -
Statistical Data Mining for Sina Weibo, a Chinese Micro-Blog: Sentiment Modelling and Randomness Reduction for Topic Modelling
Statistical Data Mining for Sina Weibo, a Chinese Micro-blog: Sentiment Modelling and Randomness Reduction for Topic Modelling London School of Economics and Political Sciences Wenqian Cheng A thesis submitted to the Department of Statistics of the London School of Economics for the degree of Doctor of Philosophy, London, March 2017 2 Declaration I certify that the thesis I have presented for examination for the MPhil/PhD degree of the London School of Economics and Political Science is solely my own work other than where I have clearly indicated that it is the work of others (in which case the extent of any work carried out jointly by me and any other person is clearly identified in it). The copyright of this thesis rests with the author. Quotation from it is permitted, provided that full acknowledgement is made. This thesis may not be reproduced without my prior written consent. I warrant that this authorisation does not, to the best of my belief, infringe the rights of any third party. I declare that my thesis consists of approximately 50,000 words. 1 Abstract Before the arrival of modern information and communication technology, it was not easy to capture people's thoughts and sentiments; however, the development of statistical data mining techniques and the prevalence of mass social media provide opportunities to capture those trends. Among all types of social media, micro-blogs make use of the word limit of 140 characters to force users to get straight to the point, thus making the posts brief but content-rich resources for investigation. -
Congressional-Executive Commission on China Annual
CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA ANNUAL REPORT 2016 ONE HUNDRED FOURTEENTH CONGRESS SECOND SESSION OCTOBER 6, 2016 Printed for the use of the Congressional-Executive Commission on China ( Available via the World Wide Web: http://www.cecc.gov U.S. GOVERNMENT PUBLISHING OFFICE 21–471 PDF WASHINGTON : 2016 For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Mar 15 2010 19:58 Oct 05, 2016 Jkt 000000 PO 00000 Frm 00003 Fmt 5011 Sfmt 5011 U:\DOCS\AR16 NEW\21471.TXT DEIDRE CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA LEGISLATIVE BRANCH COMMISSIONERS House Senate CHRISTOPHER H. SMITH, New Jersey, MARCO RUBIO, Florida, Cochairman Chairman JAMES LANKFORD, Oklahoma ROBERT PITTENGER, North Carolina TOM COTTON, Arkansas TRENT FRANKS, Arizona STEVE DAINES, Montana RANDY HULTGREN, Illinois BEN SASSE, Nebraska DIANE BLACK, Tennessee DIANNE FEINSTEIN, California TIMOTHY J. WALZ, Minnesota JEFF MERKLEY, Oregon MARCY KAPTUR, Ohio GARY PETERS, Michigan MICHAEL M. HONDA, California TED LIEU, California EXECUTIVE BRANCH COMMISSIONERS CHRISTOPHER P. LU, Department of Labor SARAH SEWALL, Department of State DANIEL R. RUSSEL, Department of State TOM MALINOWSKI, Department of State PAUL B. PROTIC, Staff Director ELYSE B. ANDERSON, Deputy Staff Director (II) VerDate Mar 15 2010 19:58 Oct 05, 2016 Jkt 000000 PO 00000 Frm 00004 Fmt 0486 Sfmt 0486 U:\DOCS\AR16 NEW\21471.TXT DEIDRE C O N T E N T S Page I. Executive Summary ............................................................................................. 1 Introduction ...................................................................................................... 1 Overview ............................................................................................................ 5 Recommendations to Congress and the Administration .............................. -
Daily Current Affair Quiz – 06.05.2019 to 08.05.2019
DAILY CURRENT AFFAIR QUIZ – 06.05.2019 TO 08.05.2019 DAILY CURRENT AFFAIR QUIZ : ( 06-08 MAY 2019) No. of Questions: 20 Correct: Full Mark: 20 Wrong: Time: 10 min Mark Secured: 1. What is the total Foreign Exchange B) Niketan Srivastava Reserves of India as on April 23, as per C) Arun Chaudhary the data by RBI? D) Vikas Verma A) USD 320.222 billion 8. Which among the following countries B) USD 418.515 billion will become the first in the world to C) USD 602.102 billion open the Crypto Powered City? D) USD 511.325 billion A) China 2. Name the newly appointed Supreme B) Nepal Allied Commander Europe (SACEUR) C) Malaysia of NATO? D) United States A) James G. Stavridis 9. Which of these network operators has B) Wesley Clark launched optical fibre-based high-speed C) Curtis M. Scaparrotti broadband service ‘Bharat Fibre’ in D) Tod D. Wolters Pulwama? 3. Which of these countries currency has A) Airtel been awarded with the best bank note B) BSNL for 2018 by the International Bank Note C) Reliance Society (IBNS) ? D) Vodafone A) Canada 10. Rani Abbakka Force is an all women B) India police patrol unit of which of these C) Singapore cities? D) Germany A) Srinagar 4. Maramraju Satyanarayana Rao who B) Pune passed away recently was a renowned C) Kolkata ___________ D) Mangaluru A) Judge 11. What was the name of the last captive B) Journalist White Tiger of Sanjay Gandhi National C) Writer Park (SGNP) that passed away recently? D) Scientist A) Bheem 5. -
Shedding Light on Mobile App Store Censorship
Shedding Light on Mobile App Store Censorship Vasilis Ververis Marios Isaakidis Humboldt University, Berlin, Germany University College London, London, UK [email protected] [email protected] Valentin Weber Benjamin Fabian Centre for Technology and Global Affairs University of Telecommunications Leipzig (HfTL) University of Oxford, Oxford, UK Humboldt University, Berlin, Germany [email protected] [email protected] ABSTRACT KEYWORDS This paper studies the availability of apps and app stores across app stores, censorship, country availability, mobile applications, countries. Our research finds that users in specific countries do China, Russia not have access to popular app stores due to local laws, financial reasons, or because countries are on a sanctions list that prohibit ACM Reference Format: Vasilis Ververis, Marios Isaakidis, Valentin Weber, and Benjamin Fabian. foreign businesses to operate within its jurisdiction. Furthermore, 2019. Shedding Light on Mobile App Store Censorship. In 27th Conference this paper presents a novel methodology for querying the public on User Modeling, Adaptation and Personalization Adjunct (UMAP’19 Ad- search engines and APIs of major app stores (Google Play Store, junct), June 9–12, 2019, Larnaca, Cyprus. ACM, New York, NY, USA, 6 pages. Apple App Store, Tencent MyApp Store) that is cross-verified by https://doi.org/10.1145/3314183.3324965 network measurements. This allows us to investigate which apps are available in which country. We primarily focused on the avail- ability of VPN apps in Russia and China. Our results show that 1 INTRODUCTION despite both countries having restrictive VPN laws, there are still The widespread adoption of smartphones over the past decade saw many VPN apps available in Russia and only a handful in China. -
Internet Infrastructure Review Vol.27
Internet Infrastructure Vol.27 Review May 2015 Infrastructure Security Increasingly Malicious PUAs Messaging Technology Anti-Spam Measure Technology and DMARC Trends Web Traffic Report Report on Access Log Analysis Results for Streaming Delivery of the 2014 Summer Koshien Inte r ne t In f r ast r uc t ure Review Vol.27 May 2015 Executive Summary ———————————————————3 1. Infrastructure Security ———————————————4 Table of Contents Table 1.1 Introduction —————————————————————— 4 1.2 Incident Summary ——————————————————— 4 1.3 Incident Survey ——————————————————— 11 1.3.1 DDoS Attacks —————————————————————— 11 1.3.2 Malware Activities ———————————————————— 13 1.3.3 SQL Injection Attacks —————————————————— 16 1.3.4 Website Alterations ——————————————————— 17 1.4 Focused Research —————————————————— 18 1.4.1 Increasingly Malicious PUAs —————————————— 18 1.4.2 ID Management Technology: From a Convenience and Security Perspective ————— 22 1.4.3 Evaluating the IOCs of Malware That Reprograms HDD Firmware —————————————————————— 25 1.5 Conclusion —————————————————————— 27 2. Messaging Technology —————————————— 28 2.1 Introduction ————————————————————— 28 2.2 Spam Trends ————————————————————— 28 2.2.1 Spam Ratios Decline Further in FY2014 ————————— 28 2.2.2 Higher Risks Despite Lower Volumes —————————— 29 2.3 Trends in Email Technologies ——————————— 29 2.3.1 The DMARC RFC ————————————————————— 29 2.3.2 Problems with DMARC and Reporting —————————— 30 2.3.3 Use of DMARC by Email Recipients ——————————— 30 2.3.4 Domain Reputation ——————————————————— 31 2.3.5 -
Threat Modeling and Circumvention of Internet Censorship by David Fifield
Threat modeling and circumvention of Internet censorship By David Fifield A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J.D. Tygar, Chair Professor Deirdre Mulligan Professor Vern Paxson Fall 2017 1 Abstract Threat modeling and circumvention of Internet censorship by David Fifield Doctor of Philosophy in Computer Science University of California, Berkeley Professor J.D. Tygar, Chair Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities|such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations. My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements. -
World Trends in Freedom of Expression and Media Development: 2017/2018 Global Report
Published in 2018 by the United Nations Educational, Scientific and Cultural Organization 7, place de Fontenoy, 7523 Paris 07 SP, France © UNESCO and University of Oxford, 2018 ISBN 978-92-3-100242-7 Attribution-ShareAlike 3.0 IGO (CC-BY-SA 3.0 IGO) license (http://creativecommons.org/licenses/by-sa/3.0/igo/). By using the content of this publication, the users accept to be bound by the terms of use of the UNESCO Open Access Repos- itory (http://www.unesco.org/open-access/terms-use-ccbysa-en). The present license applies exclusively to the textual content of the publication. For the use of any material not clearly identi- fied as belonging to UNESCO, prior permission shall be requested from: [email protected] or UNESCO Publishing, 7, place de Fontenoy, 75352 Paris 07 SP France. Title: World Trends in Freedom of Expression and Media Development: 2017/2018 Global Report This complete World Trends Report Report (and executive summary in six languages) can be found at en.unesco.org/world- media-trends-2017 The complete study should be cited as follows: UNESCO. 2018. World Trends in Freedom of Expression and Media Development: 2017/2018 Global Report, Paris The designations employed and the presentation of material throughout this publication do not imply the expression of any opinion whatsoever on the part of UNESCO concerning the legal status of any country, territory, city or area or of its authori- ties, or concerning the delimiation of its frontiers or boundaries. The ideas and opinions expressed in this publication are those of the authors; they are not necessarily those of UNESCO and do not commit the Organization.