The Great Firewallof China

Total Page:16

File Type:pdf, Size:1020Kb

The Great Firewallof China Social Education 71(3), pp 158–162 ©2007 National Council for the Social Studies Looking at the Law The Great Firewall of China Shawn Healy Senators John McCain and John Kyl, both Arizona Republicans, argue that Of the websites blocked by Chinese the Internet by its very nature promotes grassroots democracy. In an op-ed piece they censors, pornographic sites lead the wrote, “By enabling discussion, debate and criticism of our governments, the Internet list (39 percent), followed by mention allows us to practice in cyberspace the essence of democracy.” 1 Their comments were of major historical events (14 percent), directed toward the Communist Party in China and American technology companies hate speech (13 percent), gay and lesbian that enable and execute government censorship in the digital realm. sites (11 percent) and email providers (10 percent). Sex education sites (8 percent), Although China has made notable preferred path isn’t paved in black and gambling sites (8 percent), those that progress in liberalizing its economy over white, although the information super- sell provocative attire (6 percent), news the past three decades, the Communist highway itself may ultimately provide outlets (6 percent) and sites enabling the Party maintains a stranglehold on politi- the answers. China appears to be fighting circumvention of censors (5 percent, see cal freedom, and in no place is this more a losing battle in an increasingly inter- below) complete the list.11 apparent than the roadblocks it places on connected world that outwits the censors In the second half of 2004, for example, the Information Superhighway. Indeed, from near and afar. police closed more than 1,400 porno- according to Reporters Without Borders, graphic websites and arrested 420 people China stands as “... the world’s most The Great Firewall as a result. Another 700 gambling suspects advanced country in Internet filtering.”2 Dubbed the “Golden Shield,” the were arrested in a similar crackdown in Of the 55 online dissidents imprisoned Chinese Internet censorship system does 2005.12 Last June, homosexual websites worldwide, 48 are detained in China.3 not aim for complete control, but only were purged by a mainland domain China has an estimated 137 million to prevent “major breaches in the fire- company under pressure from the police. citizens who access the Internet, sec- wall.” Specifically, the Chinese National One administrator protested: “It is great ond only to the United States.4 While People’s Congress claims it is criminal to humiliation to classify all gay forums ... as 92 percent of Chinese citizens have not “incite subversion,” “divulge state secrets” pornography, adult-only, and sex forums.” gone online, analysts predict 400 mil- or “organize cults” on the Internet. Such Many such sites are dedicated to sex edu- lion mainland web users over the next laws are necessary “to promote the good cation, providing methods for condom decade.5 From 2001 through 2004 alone and eliminate the bad, encourage the usage and HIV knowledge.13 the percentage of the Chinese population healthy development of the Internet Sites that reveal official corruption are accessing the Internet nearly tripled, from (and) safeguard the security of the State also targeted by state censors. On January 2.57 percent to 7.23 percent.6 and the public interest.”7 8, 2007, Xiamen police blocked access The essay that follows describes in Policies target pornographic websites to a site that revealed local corruption detail China’s censorship machine, the along with sites critical of the Communist and monitored city politics. It reportedly reaction of its citizenry to this arsenal and Party, including other governments, published “bad information.”14 the complicity of American companies religious groups and political organi- The censorship regime is executed in enabling the process. Does admit- zations.8 This extends to sites related by both public and private entities. The tance to the world’s largest market trump to freedom in Tibet, Taiwanese inde- Chinese government, through nine state- concerns about unencumbered access pendence and the Tiananmen Square licensed companies, employs between to information? Some companies have Massacre.9 Moreover, one encounters 30,000 to 35,000 members of an Internet struck deals with the proverbial devil an error message when trying to access police force who effectively block access (Google, Microsoft, Yahoo), while others Wikipedia or BBC Chinese language to thousands of sites.15 Additionally, 11 have stuck to their guns (Wikipedia). The news service.10 leading news websites in China enforce S OCIAL E DUCATION 158 the principles established by President and Secretary General Hu Jintau, a new concept of socialist morality labeled the “Eight Honors and Disgraces.” The policy states, “We are in stern opposition to indecent on-line messages that under- mine public morality and the cultures and fine traditions of the Chinese people. No indecent texts and photos, no search engines for such content, no links to inde- cent websites, and no games involving sex and violence.” 16 Chinese Internet patrols secured pledges of self-censorship from 43 Beijing-based websites resulting in the closure of more than 200 chat rooms and the deletion of 1.5 million comments in April 2005 alone. 17 According to New York Times writer Olive Thompson, “One mistake Westerners frequently make about China is to assume that the government is furtive about its censorship. On the contrary, the party is quite matter- of-fact about it—proud, even.” The government went so far as to introduce two anime-style cartoon characters, “Jingjing” and “Chacha,” in order “to publicly remind all ‘Netizens’ to be conscious of safe and healthy use of the Internet, self-regulate their online behavior and maintain harmonious Internet order together.” This places A sign posted at the entrance of an Internet cafe reads: “You should not spread antisocial the burden of censorship on the users material on the Internet” (top), and “Please come with me because you published materi- als to harm the unity of the nation” (bottom), in Beijing, China, July 20, 2006. themselves, and reinforces the classic (AP Photo /Elizabeth Dalziel) truth that “self-censorship is always far more comprehensive than formal one such locale. Zhang Guobia, party According to Ji Chenchen, another censorship.” 18 secretary of the surrounding Fangshan student moderator: “Our job consists Internet cafes are immensely popular County, implemented a ban in the of guidance, not control. Our bulletin amongst China’s youth, mostly because spring of 2006 under the assumption board’s character is that of an official they are unable to afford home comput- that “Internet cafes bring more harm website, which means it represents the ers.19 The cafes themselves are a criti- than good to young people.” Zhang school. This means that no topics related cal component in the state censorship claims that “the harm to children is no to politics may appear.” machinery. The establishments employ less than drugs.”22 Students show surprise when the security guards to monitor the activity Censorship also lurks in China’s insti- details of the system are revealed. of online patrons by watching closed- tutions of higher learning. Initiated by According to one male undergraduate: circuit televisions linked to the local Shanghai Normal University and staffed “Five hundred members sounds unbe- police station. They use software called by an all-volunteer corps of 500 fel- lievable. It feels very weird to think that Internet Detective to record site visits, low students, the body is known as the there are 500 people out there anony- emails, and message boards.20 Licenses “harmful-information defense system.” mously trying to guide you.” are required to operate the cafes; 47,000 Students like Hu Yingying enter online Another student was more supportive were closed in 2004 alone for failure to bulletin boards and act as “part traffic of their efforts: “A bulletin board is like meet this requirement.21 cop, part informer, part discussion mod- a family, and in a family, I want my room Moreover, local bans have resulted erator—and all without the knowledge to be clean and well-lighted, without in across-the-board closings. Gedong is of her fellow students....” dirty or dangerous things in it.” 23 A PRIL 2 0 0 7 159 Web Logs Bloom formidable companies as Cisco Systems, This coziness with the Chinese censors China’s surveillance of the Internet Sun Microsystems and 3Com for filter- invoked the wrath of the United States reaches into the exploding world of web ing purposes.30 More extensive relation- Congress last February. Representative logs. All bloggers must register with the ships exist between Yahoo, Microsoft Tom Lantos (D-CA) was among the fierc- government and filter tools block sub- and Google, and this is where the true est critics. During congressional hearings, versive word strings.24 Moreover, private controversy lies. he opined, “I simply don’t understand companies that host these web logs are Yahoo was the first American Internet how your corporate leadership [Cisco, pressured to maintain a level of decorum company to enter the Chinese market Microsoft, Yahoo, and Google] sleeps managed by a staff of site moderators.25 in 1999. They misunderstood Chinese at night.”35 Yet 17.5 million Chinese citizens blog culture from the beginning, failing to real- Representatives of the cornered nonetheless, and 75 million consult these ize that Chinese citizens rarely rely on companies insisted that their actions sites for information relevant to pop cul- email, finding such messages impersonal. are based upon two suboptimal choices. ture and occasionally political stories. Instead, they prefer cell phones and text Michael Callahan, senior vice president Qiao Ho, a Chinese teacher, reads and messaging along with live chat rooms. and general counsel for Yahoo, argued, contributes to web logs to learn “..
Recommended publications
  • Internet Surveillance in China
    The Architecture of Control: Internet Su rveillance in China James A. Lewis , Center for Strategic and International Studies July 200 6 Security concerns shape China’s official internet and information technology strateg ies . Th ese include concerns shared by many cou nt ries: promoting a strong and growing economy , providing information assurance , and defending against foreign intrusions into China’s information space . Most importantly for the Chinese, information security include s a political element not foun d in many other nations – c ontrol by the party and the state over communications and the flow of informa tion . The rapid spread of internet access and mobile communications pose a serious challenge to this goal. In response, China’s security apparatus is reorienting its informational defenses. In the past, the emphasi s was on blocking access - the “great firewall.” In the future, the emphasis will be on the monitoring and surveillance of online activities. China’s primary objective in internet securi ty is political – preventing IT from eroding the regime’s authority. Information security is defined in China as “a comprehensive concept understood in a broad sense, and it involves political, economic, cultural, ideological, media, social and military l evel or field. ” It includes “data, system, network, infrastructure .”1 Chin ese officials worry about the potential of the Internet to contribute to the loss of state secrets , offer new avenues for organizing dissent and opposition , and spread “harmful inf ormation. ” This makes controlling access to "harmful network information” and the ability to monitor and intercept communications top priorities .2 For China’s leadership, one particular set of event s demonstrated the risks of not securing networks.
    [Show full text]
  • Annual Report 2015–2016
    ANNUAL REPORT 2015–2016 NEW YORK PHILHARMONIC 2015–16 ANNUAL REPORT 1 CONTENTS Reflections on the 2015–16 Season 2 Oscar S. Schafer, Chairman 4 Matthew VanBesien, President 6 Alan Gilbert, Music Director 8 Year at a Glance 10 Our Audiences 12 The Orchestra 14 The Board of Directors 20 The Administration 22 Conductors, Soloists, and Ensembles 24 Serving the Community 26 Education 28 Expanding Access 32 Global Immersion 36 Innovation and Preservation 40 At Home and Online 42 Social Media 44 The Archives 47 The Year in Pictures 48 The Benefactors 84 Lifetime Gifts 86 Leonard Bernstein Circle 88 Annual Fund 90 Education Donors 104 Heritage Society 106 Volunteer Council 108 Independent Auditor’s Report 110 2 NEW YORK PHILHARMONIC 2015–16 ANNUAL REPORT THE SEASON AT A GLANCE Second Line Title Case Reflections on the 2015–16 Season 2 NEW YORK PHILHARMONIC 2015–16 ANNUAL REPORT NEW YORK PHILHARMONIC 2015–16 ANNUAL REPORT 3 REFLECTIONS ON THE 2015–16 SEASON From the New York Philharmonic’s Leadership I look back on the Philharmonic’s 2015–16 season and remember countless marvelous concerts that our audiences loved, with repertoire ranging from the glory of the Baroque to the excitement of the second NY PHIL BIENNIAL. As our Music Director, Alan Gilbert has once again brought excitement and inspiration to music lovers across New York City and the world. I also look back on the crucial, impactful developments that took place offstage. Throughout the season our collaboration with Lincoln Center laid a strong foundation for the renovation of our home.
    [Show full text]
  • Internet Censorship and Resistance May 15, 2009 1 / 32 Historical Censorship
    INTERNET CENSORSHIP AND RESISTANCE Joseph Bonneau [email protected] (thanks to Steven Murdoch) Computer Laboratory Gates Scholars' Symposium 2010 Joseph Bonneau (University of Cambridge) Internet Censorship and Resistance May 15, 2009 1 / 32 Historical Censorship He who controls the past controls the future, and he who controls the present controls the past —George Orwell, Nineteen Eighty Four, 1949 Joseph Bonneau (University of Cambridge) Internet Censorship and Resistance May 15, 2009 2 / 32 Historical Censorship He who controls the past controls the future, and he who controls the present controls the past —George Orwell, Nineteen Eighty Four, 1949 Joseph Bonneau (University of Cambridge) Internet Censorship and Resistance May 15, 2009 2 / 32 Information as a Human Right Everyone has the right to freedom of opinion and expres- sion; this right includes freedom to hold opinions without inter- ference and to seek, receive and impart information and ideas through any media and regardless of frontiers. —Article 19, UN Declaration of Human Rights (1948) Joseph Bonneau (University of Cambridge) Internet Censorship and Resistance May 15, 2009 3 / 32 Information as a Human Right The final freedom, one that was probably inherent in what both President and Mrs. Roosevelt thought about and wrote about all those years ago, ... is the freedom to connect—the idea that governments should not prevent people from con- necting to the internet, to websites, or to each other... a new information curtain is descending across much of the world. —Hillary Clinton, US Secretary of State (2010) Joseph Bonneau (University of Cambridge) Internet Censorship and Resistance May 15, 2009 3 / 32 The Internet Dream The Net treats censorship as damage and routes around it.
    [Show full text]
  • Retweeting Through the Great Firewall a Persistent and Undeterred Threat Actor
    Retweeting through the great firewall A persistent and undeterred threat actor Dr Jake Wallis, Tom Uren, Elise Thomas, Albert Zhang, Dr Samantha Hoffman, Lin Li, Alex Pascoe and Danielle Cave Policy Brief Report No. 33/2020 About the authors Dr Jacob Wallis is a Senior Analyst working with the International Cyber Policy Centre. Tom Uren is a Senior Analyst working with the International Cyber Policy Centre. Elise Thomas is a Researcher working with the International Cyber Policy Centre. Albert Zhang is a Research Intern working with the International Cyber Policy Centre. Dr Samanthan Hoffman is an Analyst working with the International Cyber Policy Centre. Lin Li is a Researcher working with the International Cyber Policy Centre. Alex Pascoe is a Research Intern working with the International Cyber Policy Centre. Danielle Cave is Deputy Director of the International Cyber Policy Centre. Acknowledgements ASPI would like to thank Twitter for advanced access to the takedown dataset that formed a significant component of this investigation. The authors would also like to thank ASPI colleagues who worked on this report. What is ASPI? The Australian Strategic Policy Institute was formed in 2001 as an independent, non‑partisan think tank. Its core aim is to provide the Australian Government with fresh ideas on Australia’s defence, security and strategic policy choices. ASPI is responsible for informing the public on a range of strategic issues, generating new thinking for government and harnessing strategic thinking internationally. ASPI International Cyber Policy Centre ASPI’s International Cyber Policy Centre (ICPC) is a leading voice in global debates on cyber and emerging technologies and their impact on broader strategic policy.
    [Show full text]
  • Effective Censorship: Maintaining Control in China
    University of Pennsylvania ScholarlyCommons CUREJ - College Undergraduate Research Electronic Journal College of Arts and Sciences 2010 Effective Censorship: Maintaining Control In China Michelle (Qian) Yang University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/curej Part of the Political Science Commons Recommended Citation Yang, Michelle (Qian), "Effective Censorship: Maintaining Control In China" 01 January 2010. CUREJ: College Undergraduate Research Electronic Journal, University of Pennsylvania, https://repository.upenn.edu/curej/118. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/curej/118 For more information, please contact [email protected]. Effective Censorship: Maintaining Control In China Keywords censorship, china, incentives, Social Sciences, Political Science, Devesh Kapur, Kapur, Devesh Disciplines Political Science This article is available at ScholarlyCommons: https://repository.upenn.edu/curej/118 Effective Censorship: Maintaining Control in China Michelle Yang April 09, 2010 Acknowledgments My initial interest in this thesis topic was generated during the summer of 2009 when I was interning in Beijing. There, I had found myself unable to access a large portion of the websites I’ve grown so accustomed to in my everyday life. I knew from then that I wanted to write about censorship in China. Since that summer, the scope of the topic has changed greatly under the careful guidance of Professor Devesh Kapur. I am incredibly grateful for all the support he has given me during this entire process. This final thesis wouldn’t be what it is today without his guidance. Professor Kapur, thank you for believing in me and for pushing me to complete this thesis! I would also like to extend my gratitude to both Professor Doherty-Sil and Professor Goldstein for taking time out of their busy schedules to meet with me and for providing me with indispensible advice.
    [Show full text]
  • Iclab: a Global, Longitudinal Internet Censorship Measurement Platform
    ICLab: A Global, Longitudinal Internet Censorship Measurement Platform Arian Akhavan Niaki∗y Shinyoung Cho∗yz Zachary Weinberg∗x Nguyen Phong Hoangz Abbas Razaghpanahz Nicolas Christinx Phillipa Gilly yUniversity of Massachusetts, Amherst zStony Brook University xCarnegie Mellon University {arian, shicho, phillipa}@cs.umass.edu {shicho, nghoang, arazaghpanah}@cs.stonybrook.edu {zackw, nicolasc}@cmu.edu Abstract—Researchers have studied Internet censorship for remains elusive. We highlight three key challenges that must nearly as long as attempts to censor contents have taken place. be addressed to make progress in this space: Most studies have however been limited to a short period of time and/or a few countries; the few exceptions have traded off detail Challenge 1: Access to Vantage Points. With few ex- for breadth of coverage. Collecting enough data for a compre- ceptions,1 measuring Internet censorship requires access to hensive, global, longitudinal perspective remains challenging. “vantage point” hosts within the region of interest. In this work, we present ICLab, an Internet measurement The simplest way to obtain vantage points is to recruit platform specialized for censorship research. It achieves a new balance between breadth of coverage and detail of measurements, volunteers [37], [43], [73], [80]. Volunteers can run software by using commercial VPNs as vantage points distributed around that performs arbitrary network measurements from each the world. ICLab has been operated continuously since late vantage point, but recruiting more than a few volunteers per 2016. It can currently detect DNS manipulation and TCP packet country and retaining them for long periods is difficult. Further, injection, and overt “block pages” however they are delivered.
    [Show full text]
  • Everyone's Guide to Bypassing Internet Censorship
    EVERYONE’S GUIDE TO BY-PASSING INTERNET CENSORSHIP FOR CITIZENS WORLDWIDE A CIVISEC PROJECT The Citizen Lab The University of Toronto September, 2007 cover illustration by Jane Gowan Glossary page 4 Introduction page 5 Choosing Circumvention page 8 User self-assessment Provider self-assessment Technology page 17 Web-based Circumvention Systems Tunneling Software Anonymous Communications Systems Tricks of the trade page 28 Things to remember page 29 Further reading page 29 Circumvention Technologies Circumvention technologies are any tools, software, or methods used to bypass Inter- net filtering. These can range from complex computer programs to relatively simple manual steps, such as accessing a banned website stored on a search engine’s cache, instead of trying to access it directly. Circumvention Providers Circumvention providers install software on a computer in a non-filtered location and make connections to this computer available to those who access the Internet from a censored location. Circumvention providers can range from large commercial organi- zations offering circumvention services for a fee to individuals providing circumven- tion services for free. Circumvention Users Circumvention users are individuals who use circumvention technologies to bypass Internet content filtering. 4 Internet censorship, or content filtering, has become a major global problem. Whereas once it was assumed that states could not control Internet communications, according to research by the OpenNet Initiative (http://opennet.net) more than 25 countries now engage in Internet censorship practices. Those with the most pervasive filtering policies have been found to routinely block access to human rights organi- zations, news, blogs, and web services that challenge the status quo or are deemed threatening or undesirable.
    [Show full text]
  • Computational Propaganda in Taiwan: Where Digital Democracy Meets Automated Autocracy
    Working Paper No. 2017.2 Computational Propaganda in Taiwan: Where Digital Democracy Meets Automated Autocracy Nicholas J. Monaco, Google Jigsaw Table of Contents Abstract ....................................................................................................................... 3 Introduction ................................................................................................................. 3 Case study ................................................................................................................... 5 Media and social media landscape in Taiwan ................................................................... 5 Overview of computational propaganda in Taiwan .......................................................... 9 Automation and propaganda .......................................................................................... 10 Fake news ........................................................................................................................ 13 Cross-Strait propaganda ................................................................................................. 15 The 2016 Diba Facebook expedition .............................................................................. 22 Conclusion ................................................................................................................. 25 About the Author ...................................................................................................... 27 References ................................................................................................................
    [Show full text]
  • Shedding Light on Mobile App Store Censorship
    Shedding Light on Mobile App Store Censorship Vasilis Ververis Marios Isaakidis Humboldt University, Berlin, Germany University College London, London, UK [email protected] [email protected] Valentin Weber Benjamin Fabian Centre for Technology and Global Affairs University of Telecommunications Leipzig (HfTL) University of Oxford, Oxford, UK Humboldt University, Berlin, Germany [email protected] [email protected] ABSTRACT KEYWORDS This paper studies the availability of apps and app stores across app stores, censorship, country availability, mobile applications, countries. Our research finds that users in specific countries do China, Russia not have access to popular app stores due to local laws, financial reasons, or because countries are on a sanctions list that prohibit ACM Reference Format: Vasilis Ververis, Marios Isaakidis, Valentin Weber, and Benjamin Fabian. foreign businesses to operate within its jurisdiction. Furthermore, 2019. Shedding Light on Mobile App Store Censorship. In 27th Conference this paper presents a novel methodology for querying the public on User Modeling, Adaptation and Personalization Adjunct (UMAP’19 Ad- search engines and APIs of major app stores (Google Play Store, junct), June 9–12, 2019, Larnaca, Cyprus. ACM, New York, NY, USA, 6 pages. Apple App Store, Tencent MyApp Store) that is cross-verified by https://doi.org/10.1145/3314183.3324965 network measurements. This allows us to investigate which apps are available in which country. We primarily focused on the avail- ability of VPN apps in Russia and China. Our results show that 1 INTRODUCTION despite both countries having restrictive VPN laws, there are still The widespread adoption of smartphones over the past decade saw many VPN apps available in Russia and only a handful in China.
    [Show full text]
  • An Analysis of Contributions to Wikipedia from Tor
    Are anonymity-seekers just like everybody else? An analysis of contributions to Wikipedia from Tor Chau Tran Kaylea Champion Andrea Forte Department of Computer Science & Engineering Department of Communication College of Computing & Informatics New York University University of Washington Drexel University New York, USA Seatle, USA Philadelphia, USA [email protected] [email protected] [email protected] Benjamin Mako Hill Rachel Greenstadt Department of Communication Department of Computer Science & Engineering University of Washington New York University Seatle, USA New York, USA [email protected] [email protected] Abstract—User-generated content sites routinely block contri- butions from users of privacy-enhancing proxies like Tor because of a perception that proxies are a source of vandalism, spam, and abuse. Although these blocks might be effective, collateral damage in the form of unrealized valuable contributions from anonymity seekers is invisible. One of the largest and most important user-generated content sites, Wikipedia, has attempted to block contributions from Tor users since as early as 2005. We demonstrate that these blocks have been imperfect and that thousands of attempts to edit on Wikipedia through Tor have been successful. We draw upon several data sources and analytical techniques to measure and describe the history of Tor editing on Wikipedia over time and to compare contributions from Tor users to those from other groups of Wikipedia users. Fig. 1. Screenshot of the page a user is shown when they attempt to edit the Our analysis suggests that although Tor users who slip through Wikipedia article on “Privacy” while using Tor. Wikipedia’s ban contribute content that is more likely to be reverted and to revert others, their contributions are otherwise similar in quality to those from other unregistered participants and to the initial contributions of registered users.
    [Show full text]
  • Psiphon User Guide
    PSIPHON USER GUIDE Psiphon is a free and open source web proxy that helps internet users bypass content-filtering systems used by governments in countries like China, Iran, Saudi Arabia, and Vietnam. It was developed by the Citizen Lab's CiviSec Project at the University of Toronto and was first released in December 2006. In this how to guide, learn how to provide a proxy service to someone behind a firewall with psiphon . If you are behind a firewall and want to learn how to connect to psiphon and access blocked content, check out this how to guide . Psiphon, unlike other circumvention services, is not intended to be a public, open proxy service. It’s based on a “web of trust” system so psiphon nodes are harder to block. What this means is that a person in an unrestricted location (one that is not behind a firewall) provides a psiphon proxy service to a person they are familiar with who is going online in a place where online access is limited. This is known as a psiphonode . A psiphonite is a psiphon user living in a censored country. The psiphonite connects to a psiphonode (set up by someone they know and trust) to access information freely. NOTE: Psiphon only works on Windows and Linux. There is no Mac version yet. Step 1. First, you should be in a location where you have open access to the internet. You should know someone in another location where access is limited. You will be providing a psiphonode for this person. Tip! If you do not know any psiphon users, but still want to provide a psiphonode, you can find users on psiphon’s Facebook page or Twitter page.
    [Show full text]
  • W Shekatkar Committee Report W Atmanirbhar Bharat Abhiyan W
    MONTHLY MAGAZINE FOR TNPSC EXAMS MAY–2020 w Atmanirbhar Bharat Abhiyan w Cleanest City List w Shekatkar Committee Report w Konark Sun Temple w Char Dham Project w Samagra Shiksha Abhiyan VETRII IAS STUDY CIRCLE TNPSC CURRENT AFFAIRS MAY - 2020 An ISO 9001 : 2015 Institution | Providing Excellence Since 2011 Head Office Old No.52, New No.1, 9th Street, F Block, 1st Avenue Main Road, (Near Istha siddhi Vinayakar Temple), Anna Nagar East – 600102. Phone: 044-2626 5326 | 98844 72636 | 98844 21666 | 98844 32666 Branches SALEM KOVAI No.189/1, Meyanoor Road, Near ARRS Multiplex, (Near Salem New No.347, D.S.Complex (3rd floor), Nehru Street,Near Gandhipuram bus Stand), Opp. Venkateshwara Complex, Salem - 636004. Central Bus Stand, Ramnagar, Kovai - 9 0427-2330307 | 95001 22022 75021 65390 Educarreerr Location Vivekanandha Educational Institutions for Women, Elayampalayam, Tiruchengode - TK Namakkal District - 637 205. 04288 - 234670 | 91 94437 34670 Patrician College of Arts and Science, 3, Canal Bank Rd, Gandhi Nagar, Opposite to Kotturpuram Railway Station, Adyar, Chennai - 600020. 044 - 24401362 | 044 - 24426913 Sree Saraswathi Thyagaraja College Palani Road, Thippampatti, Pollachi - 642 107 73737 66550 | 94432 66008 | 90951 66009 www.vetriias.com My Dear Aspirants, Greetings to all of you! “What we think we become” Gautama Buddha. We all have dreams. To make dreams come into reality it takes a lot of determination, dedication, self discipline and continuous effort. We at VETRII IAS Study Circle are committed to provide the right guidance, quality coaching and help every aspirants to achieve his or her life’s cherished goal of becoming a civil servant.
    [Show full text]