Bo Xilai on Sina Weibo
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Xi Jinping's War on Corruption
University of Mississippi eGrove Honors College (Sally McDonnell Barksdale Honors Theses Honors College) 2015 The Chinese Inquisition: Xi Jinping's War on Corruption Harriet E. Fisher University of Mississippi. Sally McDonnell Barksdale Honors College Follow this and additional works at: https://egrove.olemiss.edu/hon_thesis Part of the Political Science Commons Recommended Citation Fisher, Harriet E., "The Chinese Inquisition: Xi Jinping's War on Corruption" (2015). Honors Theses. 375. https://egrove.olemiss.edu/hon_thesis/375 This Undergraduate Thesis is brought to you for free and open access by the Honors College (Sally McDonnell Barksdale Honors College) at eGrove. It has been accepted for inclusion in Honors Theses by an authorized administrator of eGrove. For more information, please contact [email protected]. The Chinese Inquisition: Xi Jinping’s War on Corruption By Harriet E. Fisher A thesis presented in partial fulfillment of the requirements for completion Of the Bachelor of Arts degree in International Studies at the Croft Institute for International Studies and the Sally McDonnell Barksdale Honors College The University of Mississippi University, Mississippi May 2015 Approved by: ______________________________ Advisor: Dr. Gang Guo ______________________________ Reader: Dr. Kees Gispen ______________________________ Reader: Dr. Peter K. Frost i © 2015 Harriet E. Fisher ALL RIGHTS RESERVED ii For Mom and Pop, who taught me to learn, and Helen, who taught me to teach. iii Acknowledgements I am indebted to a great many people for the completion of this thesis. First, I would like to thank my advisor, Dr. Gang Guo, for all his guidance during the thesis- writing process. His expertise in China and its endemic political corruption were invaluable, and without him, I would not have had a topic, much less been able to complete a thesis. -
The Chongqing Model - Analyzing Regional Politics Since 2007
A/596916 Jonathan Vogelsang The Chongqing Model - Analyzing Regional Politics Since 2007 Verlag Dr. Kovac Hamburg 2013 TABLE OF CONTENTS PREFACE TO J. VOGELSANG'S THE CHONGQING MODEL 1 by Prof. Dr. Sarah Kirchberger PREFACE BY THE AUTHOR 3 1 INTRODUCTION 5 1.1 Current State of Research 11 1.2 Methodology 12 1.2.1 Quantitative Analysis 14 1.2.1.1 The "red songs" 15 1.2.1.2 Reading the Classics 17 1.2.1.3 Word Count 18 1.2.2 Qualitative Analysis 18 2 BACKGROUND: CHINA'S MODERN SOCIETY 21 2.1 Societal Issues of modern China 21 2.1.1 Corruption 22 2.1.1.1 Excursus: The administrative Structure of the PRC 24 2.1.1.2 Causes of Corruption in China 26 2.1.2 Inequality 29 2.1.3 Urban-Rural Divide 31 2.1.4 Imbalanced Growth-Model and East-West Disparity 34 2.1.5 Environmental Degradation 35 2.2 The Policy Environment 36 2.2.1 "Scientific Development" and the "Harmonious Society" 37 2.3 Propaganda and "Thought Work" since 1989 39 2.3.1 Main Currents of Propaganda since 1989 41 2.4 BoXilai 42 2.4.1 Bo Xilai and the "Princeling"-Faction 44 3 "SINGING RED" 47 3.1 The Campaign of "red songs" 50 3.1.1 Results of quantitative Content Analysis 50 3.1.1.1 The 80 old Songs 50 3.1.1.1.1 Word Frequencies 55 V 3.1.1.2 The 36 new Songs 57 3.1.1.2.1 Word Frequencies 58 3.1.2 Qualitative Analysis of the 36 new songs 59 3.1.2.1 General commonalities 60 3.1.2.2 Nationalism with Chinese characteristics 62 3.1.2.3 "Party, oh party, great party" 69 3.1.2.4 "Warm China, happy China" 75 3.1.2.5 "A good man should be a soldier" 77 3.1.2.6 "Saving the Nation" 2.0 80 3.1.3 -
Shedding Light on Mobile App Store Censorship
Shedding Light on Mobile App Store Censorship Vasilis Ververis Marios Isaakidis Humboldt University, Berlin, Germany University College London, London, UK [email protected] [email protected] Valentin Weber Benjamin Fabian Centre for Technology and Global Affairs University of Telecommunications Leipzig (HfTL) University of Oxford, Oxford, UK Humboldt University, Berlin, Germany [email protected] [email protected] ABSTRACT KEYWORDS This paper studies the availability of apps and app stores across app stores, censorship, country availability, mobile applications, countries. Our research finds that users in specific countries do China, Russia not have access to popular app stores due to local laws, financial reasons, or because countries are on a sanctions list that prohibit ACM Reference Format: Vasilis Ververis, Marios Isaakidis, Valentin Weber, and Benjamin Fabian. foreign businesses to operate within its jurisdiction. Furthermore, 2019. Shedding Light on Mobile App Store Censorship. In 27th Conference this paper presents a novel methodology for querying the public on User Modeling, Adaptation and Personalization Adjunct (UMAP’19 Ad- search engines and APIs of major app stores (Google Play Store, junct), June 9–12, 2019, Larnaca, Cyprus. ACM, New York, NY, USA, 6 pages. Apple App Store, Tencent MyApp Store) that is cross-verified by https://doi.org/10.1145/3314183.3324965 network measurements. This allows us to investigate which apps are available in which country. We primarily focused on the avail- ability of VPN apps in Russia and China. Our results show that 1 INTRODUCTION despite both countries having restrictive VPN laws, there are still The widespread adoption of smartphones over the past decade saw many VPN apps available in Russia and only a handful in China. -
Internet Infrastructure Review Vol.27
Internet Infrastructure Vol.27 Review May 2015 Infrastructure Security Increasingly Malicious PUAs Messaging Technology Anti-Spam Measure Technology and DMARC Trends Web Traffic Report Report on Access Log Analysis Results for Streaming Delivery of the 2014 Summer Koshien Inte r ne t In f r ast r uc t ure Review Vol.27 May 2015 Executive Summary ———————————————————3 1. Infrastructure Security ———————————————4 Table of Contents Table 1.1 Introduction —————————————————————— 4 1.2 Incident Summary ——————————————————— 4 1.3 Incident Survey ——————————————————— 11 1.3.1 DDoS Attacks —————————————————————— 11 1.3.2 Malware Activities ———————————————————— 13 1.3.3 SQL Injection Attacks —————————————————— 16 1.3.4 Website Alterations ——————————————————— 17 1.4 Focused Research —————————————————— 18 1.4.1 Increasingly Malicious PUAs —————————————— 18 1.4.2 ID Management Technology: From a Convenience and Security Perspective ————— 22 1.4.3 Evaluating the IOCs of Malware That Reprograms HDD Firmware —————————————————————— 25 1.5 Conclusion —————————————————————— 27 2. Messaging Technology —————————————— 28 2.1 Introduction ————————————————————— 28 2.2 Spam Trends ————————————————————— 28 2.2.1 Spam Ratios Decline Further in FY2014 ————————— 28 2.2.2 Higher Risks Despite Lower Volumes —————————— 29 2.3 Trends in Email Technologies ——————————— 29 2.3.1 The DMARC RFC ————————————————————— 29 2.3.2 Problems with DMARC and Reporting —————————— 30 2.3.3 Use of DMARC by Email Recipients ——————————— 30 2.3.4 Domain Reputation ——————————————————— 31 2.3.5 -
Threat Modeling and Circumvention of Internet Censorship by David Fifield
Threat modeling and circumvention of Internet censorship By David Fifield A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J.D. Tygar, Chair Professor Deirdre Mulligan Professor Vern Paxson Fall 2017 1 Abstract Threat modeling and circumvention of Internet censorship by David Fifield Doctor of Philosophy in Computer Science University of California, Berkeley Professor J.D. Tygar, Chair Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities|such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations. My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements. -
Style Counsel: Seeing the (Random) Forest for the Trees in Adversarial Code Stylometry∗
Style Counsel: Seeing the (Random) Forest for the Trees in Adversarial Code Stylometry∗ Christopher McKnight Ian Goldberg Magnet Forensics University of Waterloo [email protected] [email protected] ABSTRACT worm based on an examination of the reverse-engineered code [17], The results of recent experiments have suggested that code stylom- casting style analysis as a forensic technique. etry can successfully identify the author of short programs from This technique, however, may be used to chill speech for soft- among hundreds of candidates with up to 98% precision. This poten- ware developers. There are several cases of developers being treated tial ability to discern the programmer of a code sample from a large as individuals of suspicion, intimidated by authorities and/or co- group of possible authors could have concerning consequences for erced into removing their software from the Internet. In the US, the open-source community at large, particularly those contrib- Nadim Kobeissi, the Canadian creator of Cryptocat (an online se- utors that may wish to remain anonymous. Recent international cure messaging application) was stopped, searched, and questioned events have suggested the developers of certain anti-censorship by Department of Homeland Security officials on four separate oc- and anti-surveillance tools are being targeted by their governments casions in 2012 about Cryptocat and the algorithms it employs [16]. and forced to delete their repositories or face prosecution. In November 2014, Chinese developer Xu Dong was arrested, pri- In light of this threat to the freedom and privacy of individual marily for political tweets, but also because he allegedly “committed programmers around the world, we devised a tool, Style Counsel, to crimes of developing software to help Chinese Internet users scale aid programmers in obfuscating their inherent style and imitating the Great Fire Wall of China” [4] in relation to proxy software he another, overt, author’s style in order to protect their anonymity wrote. -
Taking Bo Xilai's Bribery Crime As an Example
ISSN 1923-0176 [Print] Studies in Sociology of Science ISSN 1923-0184 [Online] Vol. 5, No. 3, 2014, pp. 118-123 www.cscanada.net DOI: 10.3968/5302 www.cscanada.org A Cognitive Analysis of Crime: Taking Bo Xilai’s Bribery Crime as an Example ZHANG Chenquan[a],* [a]Guangdong University of Education, Guangzhou, China. Bo denied the bribery charge in court, arguing that he had *Corresponding author. no knowledge of what his wife and son had done, there Received 15 March 2014; accepted 18 July 2014 was no special relationship between him and the bribers 2 Published online 27 August 2014 and he had never used his power to help the bribers. The following is a cognitive analysis of Bo’s bribery Abstract crime charged in the judgment of the first instance by the In the judgment of the first instance for Bo Xilai’s case, Intermediate People’s Court of Jinan. the space-builder “The court herein believes…”activates a conceptual integration network of criminal judgment, 1. CONCEPTUAL INTEGRATION which involves four mental spaces: two input spaces, the generic space and the blended space. Its cognitive NETWORK OF CRIMINAL JUDGMENT outcome is the blended space, in which the core content ACTIVATED BY “THE COURT HEREIN is: Bo Xilai is convicted of bribery and sentenced to life imprisonment as well as life deprivation of political rights BELIEVES…” and confiscation of all personal property. The cognitive The court herein believes that the defenfant’s act has constituted analysis of this conceptual integration network justifies the crime of bribery with the justification of the facts that Bo that the defendant`s act constitutes a bribery crime. -
Digital Authoritarianism and the Global Threat to Free Speech Hearing
DIGITAL AUTHORITARIANISM AND THE GLOBAL THREAT TO FREE SPEECH HEARING BEFORE THE CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION APRIL 26, 2018 Printed for the use of the Congressional-Executive Commission on China ( Available at www.cecc.gov or www.govinfo.gov U.S. GOVERNMENT PUBLISHING OFFICE 30–233 PDF WASHINGTON : 2018 VerDate Nov 24 2008 12:25 Dec 16, 2018 Jkt 081003 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 C:\USERS\DSHERMAN1\DESKTOP\VONITA TEST.TXT DAVID CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA LEGISLATIVE BRANCH COMMISSIONERS Senate House MARCO RUBIO, Florida, Chairman CHRIS SMITH, New Jersey, Cochairman TOM COTTON, Arkansas ROBERT PITTENGER, North Carolina STEVE DAINES, Montana RANDY HULTGREN, Illinois JAMES LANKFORD, Oklahoma MARCY KAPTUR, Ohio TODD YOUNG, Indiana TIM WALZ, Minnesota DIANNE FEINSTEIN, California TED LIEU, California JEFF MERKLEY, Oregon GARY PETERS, Michigan ANGUS KING, Maine EXECUTIVE BRANCH COMMISSIONERS Not yet appointed ELYSE B. ANDERSON, Staff Director PAUL B. PROTIC, Deputy Staff Director (ii) VerDate Nov 24 2008 12:25 Dec 16, 2018 Jkt 081003 PO 00000 Frm 00002 Fmt 0486 Sfmt 0486 C:\USERS\DSHERMAN1\DESKTOP\VONITA TEST.TXT DAVID C O N T E N T S STATEMENTS Page Opening Statement of Hon. Marco Rubio, a U.S. Senator from Florida; Chair- man, Congressional-Executive Commission on China ...................................... 1 Statement of Hon. Christopher Smith, a U.S. Representative from New Jer- sey; Cochairman, Congressional-Executive Commission on China .................. 4 Cook, Sarah, Senior Research Analyst for East Asia and Editor, China Media Bulletin, Freedom House ..................................................................................... 6 Hamilton, Clive, Professor of Public Ethics, Charles Sturt University (Aus- tralia) and author, ‘‘Silent Invasion: China’s Influence in Australia’’ ............ -
COAL CONFERENCE University of Pittsburgh · Swanson School of Engineering ABSTRACTS BOOKLET
Thirty-Fifth Annual INTERNATIONAL PITTSBURGH COAL CONFERENCE University of Pittsburgh · Swanson School of Engineering ABSTRACTS BOOKLET Clean Coal-based Energy/Fuels and the Environment October 15-18, 2018 New Century Grand Hotel Xuzhou Hosted by: The conference acknowledges the support of Co-hosted by: K. C. Wong Education Foundation, Hong Kong A NOTE TO THE READER This Abstracts Booklet is prepared solely as a convenient reference for the Conference participants. Abstracts are arranged in a numerical order of the oral and poster sessions as published in the Final Conference Program. In order to facilitate the task for the reader to locate a specific abstract in a given session, each paper is given two numbers: the first designates the session number and the second represents the paper number in that session. For example, Paper No. 25.1 is the first paper to be presented in the Oral Session #25. Similarly, Paper No. P3.1 is the first paper to appear in the Poster Session #3. It should be cautioned that this Abstracts Booklet is prepared based on the original abstracts that were submitted, unless the author noted an abstract change. The contents of the Booklet do not reflect late changes made by the authors for their presentations at the Conference. The reader should consult the Final Conference Program for any such changes. Furthermore, updated and detailed full manuscripts, published in the Conference Proceedings, will be sent to all registered participants following the Conference. On behalf of the Thirty-Fifth Annual International Pittsburgh Coal Conference, we wish to express our sincere appreciation and gratitude to Ms. -
Chinese Politics in the Xi Jingping Era: Reassessing Collective Leadership
CHAPTER 1 Governance Collective Leadership Revisited Th ings don’t have to be or look identical in order to be balanced or equal. ڄ Maya Lin — his book examines how the structure and dynamics of the leadership of Tthe Chinese Communist Party (CCP) have evolved in response to the chal- lenges the party has confronted since the late 1990s. Th is study pays special attention to the issue of leadership se lection and composition, which is a per- petual concern in Chinese politics. Using both quantitative and qualitative analyses, this volume assesses the changing nature of elite recruitment, the generational attributes of the leadership, the checks and balances between competing po liti cal co ali tions or factions, the behavioral patterns and insti- tutional constraints of heavyweight politicians in the collective leadership, and the interplay between elite politics and broad changes in Chinese society. Th is study also links new trends in elite politics to emerging currents within the Chinese intellectual discourse on the tension between strongman politics and collective leadership and its implications for po liti cal reforms. A systematic analy sis of these developments— and some seeming contradictions— will help shed valuable light on how the world’s most populous country will be governed in the remaining years of the Xi Jinping era and beyond. Th is study argues that the survival of the CCP regime in the wake of major po liti cal crises such as the Bo Xilai episode and rampant offi cial cor- ruption is not due to “authoritarian resilience”— the capacity of the Chinese communist system to resist po liti cal and institutional changes—as some foreign China analysts have theorized. -
U.S. Statement of Interest in Li Weixum V Bo Xilai
UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA LI WEIXUM et. al., Plaintiffs, Civ. No. 04-0649 (RJL) v BO XILAI, Defendant. SUGGESTION OF IMMUNITY AND STATEMENT OF INTEREST OF THE UNITED STATES PETER D. KEISLER Assistant Attorney General KENNETH L. WAINSTEIN United States Attorney JOSEPH H. HUNT Director, Federal Programs Branch VINCENT M. GARVEY Deputy Director, Federal Programs Branch ALEXANDER K HAAS (CA Bar 220932) TnaJ Attorney, U S. Dep't of Justice Civil Division, Federal Programs Br. 20 Massachusetts Ave., NW, Rm. 7328 Washington, D.C. 20530 Tel. 202-307-3937 Fax. 202-616-8470 alexander. haas@usdoj. gov Attorneys for the United States of America TABLE OF CONTENTS PAGE(S) INTRODUCTION 1 BACKGROUND 2 ARGUMENT 4 I. Minister Bo Is Immune From The Court's Jurisdiction Because The Secretary Of State Has Determined That He Was In The United States On A Special Diplomatic Mission When Service Was Attempted 4 II. Foreign Policy Considerations Also Warrant Dismissal Of This Action . .. .11 III The Court Need Not, And Should Not, Address The FSIA Or Act Of State Doctrine In Resolving This Case 17 CONCLUSION 19 TABLE OF AUTHORITIES CASES PAGE(S) Abiola v. Abubakar. 267 F. Supp. 2d 907 (N.D. 111. 2003) 7 Ahcog v. Kingdom of Saudi Arabia, 860 F. Supp. 379 (S.D. Tex. 1994) 8 American Insurance Association v. Garamendi. 539 U S. 396 (2003) 12 Anonymous v. Anonymous. 581 N.Y.S.2d 776 (1st Dept 1992) 8 Banco Nacional de Cuba v. Sabbatino. 376 U.S. 398 (1964) 10 Baker v. -
The Illegality of China's Falun Gong Crackdown and Its Relevance to the Recent Political Turmoil
The illegality of China's Falun Gong crackdown and its relevance to the recent political turmoil Hearing of the Congressional-Executive Commission on China, December 18, 2012 Written Statement by Yiyang Xia, Senior Director of Policy and Research at the Human Rights Law Foundation and Director of the Investigation Division for the World Organization to Investigate the Persecution of Falun Gong I would like to express my appreciation to the members of CECC, particularly Chairman Smith and Co-Chairman Brown, for holding this hearing for FLG In recent years, the world has witnessed deteriorating human rights conditions and growing disregard for the rule of law in China, whether it is in cases involving activists, democracy advocates, or even high-ranking officials. But what are the underlying causes of the current situation? In essence, it began 13 years ago when the Chinese Communist Party (CCP) launched its campaign to eliminate Falun Gong, a spiritual practice with followers numbering in the tens of millions. In my remarks, I will explore three dimensions of the persecution: 1. How the party has systematically violated Chinese laws for the purposes of implementing the persecution of Falun Gong practitioners. 2. How Wang Lijun, a centerpiece of recent political turmoil in China, was involved in the persecution of Falun Gong practitioners and organ transplant abuses. 3. The challenge facing the new leadership when it comes to the ongoing campaign against Falun Gong. How the persecution operates without a legal basis The Chinese government never legally banned Falun Gong and there is, in fact, no law on the books prohibiting this religious practice.