Open Source Activism Self Activating, Self Organising Activism That Crosses the Boundary Between the Internet and the Streets

Total Page:16

File Type:pdf, Size:1020Kb

Open Source Activism Self Activating, Self Organising Activism That Crosses the Boundary Between the Internet and the Streets OPEN SOURCE ACTIVISM SELF ACTIVATING, SELF ORGANISING ACTIVISM THAT CROSSES THE BOUNDARY BETWEEN THE INTERNET AND THE STREETS By Dieuwertje Albertine Roosmarijn Bijker DISSERTATION SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF BACHELOR OF COMMUNICATION IN THE DEPARTMENT OF COMMUNICATION MANAGEMENT AT THE HOGESCHOOL VAN UTRECHT UTRECHT, June 7, 2010 Abstract This dissertation examines three cases of 'Open source activism' – activism where people rose up to take action without having been externally motivated or organised, and each activist acted according to their own abilities and insights to further a common goal. In these three cases the activism came into existence spontaneously, gathered momentum, and successfully crossed the boundary from online action to offline activism. This dissertation examines the commonalities and the differences between the movements, and uses theory of animal models of self organisation (Jaap van Ginneken) and the Motivaction Mentality model (Motivaction) to draw conclusions about how this phenomenon works, and its significance to communicators. At present we find that the application of open source activism as a communication tool is limited; it cannot be created, though if circumstances are already existing, it could be encouraged to come into existence, as in the presidential campaign of president Obama. Even then it is an unpredictable process and most organisations will find that in most situations, open source activism could sooner be a risk than an asset to their communication strategy. However as organisations and communication styles move ever more toward the principles of co-creation and other forms of interactive producer - user relationships, it is likely that open source activism will become more common, and that organisations will develop means to communicate with activists and make use of the creative energy present in such campaigns. For these reasons open source activism is relevant to communicators; it can be both an asset to an organisation and a danger, and in both cases it is vital that organisations know how to react to such activism and how not to adopt a siege mentality but to keep communication lines with activists open. 2 Open Source Activism - D.A.R. Bijker Table of contents ABSTRACT................................................................................................................................................ 2 TABLE OF CONTENTS ............................................................................................................................ 3 TABLE OF FIGURES ................................................................................................................................ 4 ACKNOWLEDGEMENTS .......................................................................................................................... 5 CHAPTER 1 INTRODUCTION ............................................................................................................ 6 1.A: INTRODUCTION ................................................................................................................................. 6 1.B: RESEARCH QUESTION ............................................................................................................... 7 CHAPTER 2: THEORY ......................................................................................................................... 9 2.A: JAAP VAN GINNEKEN 'S ANIMAL MODELS OF SELF -ORGANISATION ................................................... 9 2.B: MOTIVACTION ....................................................................................................................... 12 CHAPTER 3: CASE ANONYMOUS VS. SCIENTOLOGY ................................................................ 15 3.A SOURCES ................................................................................................................................ 15 3.B ORIGINE .................................................................................................................................. 16 3.C EVOLUTION .............................................................................................................................. 17 3.D SELF ANALYSIS ........................................................................................................................ 18 3.E INTERNAL COMMUNICATION CONVENTIONS OF THE MOVEMENT .................................................... 19 3.F COMMUNICATION PATHS ............................................................................................................ 22 3.G EXTERNAL COMMUNICATION CONVENTIONS OF THE MOVEMENT ................................................... 23 CHAPTER 4: CASE OBAMA CAMPAIGN ......................................................................................... 24 4.A: SOURCES ................................................................................................................................. 24 4.B: START /ORIGINE ......................................................................................................................... 24 4.C LIFE CYCLE ............................................................................................................................... 25 4.D INTERNAL COMMUNICATION CONVENTIONS OF THE MOVEMENT ..................................................... 26 4.E COMMUNICATION PATHS ............................................................................................................ 28 4.F EXTERNAL COMMUNICATION CONVENTIONS OF THE MOVEMENT .................................................... 29 CHAPTER 5: CASE CHRISTMAS CHARTS CAMPAIGN .................................................................. 31 5.A: SOURCES ................................................................................................................................ 31 5.B ORIGINS OF THE MOVEMENT ..................................................................................................... 31 5.C LIFESPAN OF THE MOVEMENT .................................................................................................... 32 5.D INTERNAL COMMUNICATION CONVENTIONS OF THE MOVEMENT .................................................... 32 5.E COMMUNICATION PATHS ........................................................................................................... 34 5.F EXTERNAL COMMUNICATION CONVENTIONS OF THE MOVEMENT .................................................... 34 CHAPTER 6: PROCESS REQUIREMENTS ....................................................................................... 35 1) SELF ACTIVATING / SELF SELECTING PARTICIPANTS .............................................................................. 35 2) SELF ORGANISING ACTIVISM ............................................................................................................... 36 3) BOTH ONLINE AND OFFLINE ACTIVISM .................................................................................................. 36 CHAPTER 7 COMMON FACTORS IN OPEN SOURCE ACTIVISTS ................................................ 39 7.A THE INTERNET GENERATION ...................................................................................................... 39 7.B THE INTERNET EVOLVES - WEB 2.0 ............................................................................................ 40 7.C INTERNET TO OFFLINE PRECEDENTS ........................................................................................... 41 7.D SHARED COMMON CONSCIOUSNESS . .......................................................................................... 43 CHAPTER 8. COMMON FACTORS IN OPEN SOURCE ACTIVISM MOVEMENTS ......................... 46 CHAPTER 9 WHERE DO THE CASES DIFFER? .............................................................................. 54 CHAPTER 10 CONCLUSION ............................................................................................................... 61 10.A WHAT ARE THE CRUCIAL FACTORS THAT MAKE OPEN SOURCE ACTIVISM HAPPEN ? ........................ 61 10.B CAN THOSE FIVE CIRCUMSTANCES BE CREATED ? ........................................................................ 64 3 Open Source Activism - D.A.R. Bijker 10.C IF OPEN SOURCE ACTIVISM CAN BE CREATED , IS THIS ACTUALLY DESIRABLE ? ............................... 64 10.D IN WHICH SITUATIONS IS OPEN SOURCE ACTIVISM IN ITS ORIGINAL FORM APPLICABLE ? .................. 66 10.E HOW COULD OPEN SOURCE ACTIVISM BE ADAPTED TO MAKE IT MORE USEFUL TO COMMUNICATORS , OR , WHICH ELEMENTS OF OPEN SOURCE ACTIVISM CAN BE ADOPTED BY COMMUNICATORS ? .......... 66 10.F HOW COULD OPEN SOURCE ACTIVISM BE A DANGER TO ORGANISATIONS ? .................................... 69 10.G ANSWERING THE RESEARCH QUESTION : ..................................................................................... 70 CHAPTER 11: RECOMMENDATIONS.................................................................................................. 72 BIBLIOGRAPHY ...................................................................................................................................... 74 Table of figures Figure 1: Dutch model. Source: www.en.motivaction.nl 13 Figure 2: International Model source: www.en.motivaction.nl 14 Figure 3: iconic image from the film 'V for Vendetta' 44 Figure 4: Diagram of the differences in the three movements 54 Figure 5: Venn diagram of coinciding circumstances 63 4 Open Source Activism - D.A.R. Bijker Acknowledgements I'd like
Recommended publications
  • UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations
    UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations Title A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Permalink https://escholarship.org/uc/item/6w76f8x7 Author Swift, Kathy Publication Date 2017 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Santa Barbara A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Education by Kathleen Anne Swift Committee in charge: Professor Richard Duran, Chair Professor Diana Arya Professor William Robinson September 2017 The dissertation of Kathleen Anne Swift is approved. ................................................................................................................................ Diana Arya ................................................................................................................................ William Robinson ................................................................................................................................ Richard Duran, Committee Chair June 2017 A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Copyright © 2017 by Kathleen Anne Swift iii ACKNOWLEDGEMENTS I would like to thank the members of my committee for their advice and patience as I worked on gathering and analyzing the copious amounts of research necessary to
    [Show full text]
  • Jan. 21St Babbage’S Son IBM Antitrust Calculates Jan
    mirror with a $10 cylindrical In his spare time, Starkweather lens. was an avid model railroader. Jan. 21st Babbage’s Son IBM Antitrust Calculates Jan. 21, 1952 The US Department of Justice’s Jan. 21, 1888 (DOJ) filed an antitrust suit Charles Babbage [Dec 26] never against IBM [Feb 14], charging it constructed an Analytical Engine with unlawful restraint of trade, [Dec 23], but his youngest son, and domination of the punch Henry Prevost Babbage (1824- card industry. At the time, IBM 1918), did get around to owned more than 90% of all the building the mill portion (the tabulating machines in the US, arithmetic logic unit) from his and manufactured and sold father’s plans. about 90% of all the cards. On this day, it produced a table Gary Starkweather (2009). A consent decree was issued in of multiples of , complete to 29 Photo by Dcoetzee. CC0. 1956, instructing the company digits, arguably making it the to reduce its share of the market first successful test of a Incredibly, his work generated to a more reasonable 50%. This computer. Over twenty years almost no interest at Webster, was fortuitous timing for Tom later, in April 1910, the results and his manager actually Watson, Jr. [Jan 14] who had just were published in The Monthly threatened to sack anyone who taken over as IBM's CEO; he Notices of the Royal Astronomical 'wasted their time' on the wanted to move the company's Society, followed by errata in the project. focus away from punched card June issue. systems towards computers.
    [Show full text]
  • Hard-Coded Censorship in Open Source Mastodon Clients — How Free Is Open Source?
    Proceedings of the Conference on Technology Ethics 2020 - Tethics 2020 Hard-coded censorship in Open Source Mastodon clients — How Free is Open Source? Long paper Juhani Naskali 0000-0002-7559-2595 Information Systems Science, Turku School of Economics, University of Turku Turku, Finland juhani.naskali@utu.fi Abstract. This article analyses hard-coded domain blocking in open source soft- ware, using the GPL3-licensed Mastodon client Tusky as a case example. First, the question of whether such action is censorship is analysed. Second, the licensing compliance of such action is examined using the applicable open-source software and distribution licenses. Domain blocking is found to be censorship in the literal definition of the word, as well as possibly against some the used Google distribu- tion licenses — though some ambiguity remains, which calls for clarifications in the agreement terms. GPL allows for functionalities that limit the use of the software, as long as end-users are free to edit the source code and use a version of the appli- cation without such limitations. Such software is still open source, but no longer free (as in freedom). A multi-disciplinary ethical examination of domain blocking will be needed to ascertain whether such censorship is ethical, as all censorship is not necessarily wrong. Keywords: open source, FOSS, censorship, domain blocking, licensing terms 1 Introduction New technologies constantly create new challenges. Old laws and policies cannot al- ways predict future possibilities, and sometimes need to be re-examined. Open source software is a licensing method to freely distribute software code, but also an ideology of openness and inclusiveness, especially when it comes to FOSS (Free and Open-source software).
    [Show full text]
  • Deciphering L33tspeak
    Ghent University Faculty of Arts and Philosophy Thesis Deciphering L33t5p34k Internet Slang on Message Boards Supervisor: Master Paper submitted in partial fulfilment of Prof. Anne-Marie Simon-Vandenbergen the requirements for the degree of ―Master in de Taal- en Letterkunde – Afstudeerrichting: Engels‖ By Eveline Flamand 2007-2008 i Acknowledgements I would like to thank my promoter, professor Anne-Marie Vandenbergen, for agreeing on supervising this perhaps unconventional thesis. Secondly I would like to mention my brother, who recently graduated as a computer engineer and who has helped me out when my knowledge on electronic technology did not suffice. Niels Cuelenaere also helped me out by providing me with some material and helping me with a Swedish translation. The people who came up to me and told me they would like to read my thesis, have encouraged me massively. In moments of doubt, they made me realize that there is an audience for this kind of research, which made me even more determined to finish this thesis successfully. Finally, I would also like to mention the members of the Filologica forum, who have been an inspiration for me. ii Index 1. Introduction .......................................................................................................................... 1 2. Methodology ......................................................................................................................... 1 2.1 4chan ...............................................................................................................................
    [Show full text]
  • Andy Higgins, BA
    Andy Higgins, B.A. (Hons), M.A. (Hons) Music, Politics and Liquid Modernity How Rock-Stars became politicians and why Politicians became Rock-Stars Thesis submitted for the degree of Ph.D. in Politics and International Relations The Department of Politics, Philosophy and Religion University of Lancaster September 2010 Declaration I certify that this thesis is my own work and has not been submitted in substantially the same form for the award of a higher degree elsewhere 1 ProQuest Number: 11003507 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a com plete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. uest ProQuest 11003507 Published by ProQuest LLC(2018). Copyright of the Dissertation is held by the Author. All rights reserved. This work is protected against unauthorized copying under Title 17, United States C ode Microform Edition © ProQuest LLC. ProQuest LLC. 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, Ml 48106- 1346 Abstract As popular music eclipsed Hollywood as the most powerful mode of seduction of Western youth, rock-stars erupted through the counter-culture as potent political figures. Following its sensational arrival, the politics of popular musical culture has however moved from the shared experience of protest movements and picket lines and to an individualised and celebrified consumerist experience. As a consequence what emerged, as a controversial and subversive phenomenon, has been de-fanged and transformed into a mechanism of establishment support.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Pivot to Coronavirus: How Meme Factories Are Crafting Public Health Messaging 28 July 2020, by Crystal Abidin
    Pivot to coronavirus: How meme factories are crafting public health messaging 28 July 2020, by Crystal Abidin Through this, they can have a huge influence in shaping social media. And—using the language of internet visual pop culture—meme factories can shift public opinion. When meme factories were born The first mention of meme factories seems to have been a slide in a 2010 TED talk by Christopher Poole, the founder of the controversial uncensored internet forum 4chan. 4chan, said Poole, was "completely raw, completely unfiltered." He introduced his audience to the new internet phenomenon of "memes" coming out of the forum, including LOLcats and Rickrolling – the largest memes to have emerged in the 2000s. ‘LOLcats’ were one of the meme forms of the 2000s. Credit: Clancy Ratliff/Wikimedia Commons, CC BY-SA Today, corporate meme factories systematically churn out posts to hundreds of millions of followers. Memes might seem like they emerge "naturally," They commissioned artists to "live-GIF" the 2012 circulated by like-minded social media users and US Presidential Election debates in an assembly independently generating momentum. But line of soft political content. They congregated on a successful memes often don't happen by accident. closed Facebook group to decide who could "take credit" for a school shooting. They created I've spent the past two years studying the history sponsored political posts for Michael Bloomberg's and culture of "meme factories," especially in Presidential campaign. Singapore and Malaysia. On reddit's gaming communities, activating a meme Meme factories are a coordinated network of factory (sincerely or in jest) requires willing creators or accounts who produce and host members to react with coordinated (and at times, memes.
    [Show full text]
  • From Symbolic Values to Symbolic Innovations
    Paper to be presented at DRUID15, Rome, June 15-17, 2015 (Coorganized with LUISS) FROM SYMBOLIC VALUES TO SYMBOLIC INNOVATIONS EVIDENCE BASED ON INTERNET-MEMES Mickael Benaim University of Manchester/MBS Manchester Institute of Innovation Research [email protected] Abstract Technological assets capture the attention of many scholars in innovation studies, while leaving other sources and forms of innovation less tackled. Among this neglected corpus, this article stresses the important role played by symbolic value in the production and consumption processes of innovative goods and services. We focus more especially on Internet-memes - such as lolcats - that represent iconic productions of the Internet ?lead culture? i.e. embed significant symbolic values. Therefore, this article refers to the economic sociology and strategic management literature to emphasis the force of the symbolic values? creation by new culture-lead communities, through their not so trivial productions: the Internet-memes. We especially aim to contribute to innovation studies and to refine the concept of symbolic innovation, by applying it to both physical and digital goods and services. We argue that Internet-memes are symbolic innovations per-se, but we also emphasise that they represent an almost boundless source of innovative goods and services in various sectors from cultural industries to less expected ones like finance. Jelcodes:O31,O33 ** Please do not cite without permission ** FROM SYMBOLIC VALUES TO SYMBOLIC INNOVATIONS EVIDENCE BASED ON INTERNET-MEMES Abstract: Many innovation scholars focused on technological assets, while leaving other sources and forms of innovation less tackled. Among this neglected corpus, this article stresses the important role plays by symbolic value in the production and consumption processes of innovative goods and services.
    [Show full text]
  • 3.5 Years of Augmented 4Chan Posts from the Politically Incorrect Board
    Proceedings of the Fourteenth International AAAI Conference on Web and Social Media (ICWSM 2020) Raiders of the Lost Kek: 3.5 Years of Augmented 4chan Posts from the Politically Incorrect Board Antonis Papasavva,*,§ Savvas Zannettou,†,§ Emiliano De Cristofaro,*,§ Gianluca Stringhini,‡,§ Jeremy Blackburn#,§ *University College London, †Max-Planck-Institut fur¨ Informatik, ‡Boston University, #Binghamton University, §iDRAMA Lab {antonis.papasavva.19, e.decristofaro}@ucl.ac.uk, [email protected], [email protected], [email protected] Abstract tion of users who committed mass shootings (Austin 2019; Ali Breland 2019; Evans 2018). This paper presents a dataset with over 3.3M threads and 4chan is an imageboard where users (aka Original Posters, 134.5M posts from the Politically Incorrect board (/pol/) of or OPs) can create a thread by posting an image and a mes- the imageboard forum 4chan, posted over a period of al- most 3.5 years (June 2016-November 2019). To the best of sage to a board; others can post in the OP’s thread, with a our knowledge, this represents the largest publicly available message and/or an image. Among 4chan’s key features are 4chan dataset, providing the community with an archive of anonymity and ephemerality; users do not need to register to posts that have been permanently deleted from 4chan and are post content, and in fact the overwhelming majority of posts otherwise inaccessible. We augment the data with a set of ad- are anonymous. At most, threads are archived after they be- ditional labels, including toxicity scores and the named enti- come inactive and deleted within 7 days.
    [Show full text]
  • Cybershaming: the Shallowing Hypothesis in Action
    https://doi.org/10.48009/2_iis_2016_65-75 Issues in Information Systems Volume 17, Issue II, pp. 65-75, 2016 CYBERSHAMING: THE SHALLOWING HYPOTHESIS IN ACTION William Stanley Pendergrass, American Public University System, [email protected] Carrie A. Payne, Penn State University, [email protected] Gregory R. Buretz, Liberated Syndication, [email protected] ABSTRACT Once confined to the classroom, playground, or the walk home, bullying has become immediate, constant, and unrelenting through the use of social media and mobile devices. Cybershaming is both perceived social justice and sport to a growing part of the public. Information sharers and gatherers have become more impulsive and reactive; and less introspective, empathetic, and kind, thus feeding the voracious cybershaming trend. In an attempt to understand why and how the cybershaming trend is growing, the researchers examine three recent cases of cybershaming and their fit within Nicholas Carr’s Shallowing Hypothesis. Keywords: Cybershaming, Cyberbullying, Shallowing Hypothesis, Shame, Bullying INTRODUCTION The once powerful communication barriers of space and distance are gone. Information is instantly available online; communication is immediate and global. One can easily make connections with perfect strangers and long-lost friends through social media and wireless devices. People hide behind a perceived force field—the computer or mobile device screen. Responses and reactions, based on impulsivity and ethnocentrism rather than sound judgment and compassion, have become common and accepted forms of online communication. This greater access, opportunity for instant gratification, and perceived force field are enabling, and perhaps encouraging bullying.as, society has become faster, quicker, less introspective, less empathetic, and less nice Once confined to the classroom, playground, or the walk home, bullying has become immediate, constant, and unrelenting.
    [Show full text]
  • Church of Scientology Judicial Review
    HO.ME OFFICE - Feu 03 0001/0029/003/ -.." RELATED PAPERS FILE BEGINS: __ __ ENDS: FILE TITLE: - : POLICY (REVIEW AFTER 25 YEARS) CULTS I NEW RELIGIOUS MOVEMENTS s: . '- CHURCH OF SCIENTOLOGY JUDICIAL REVIEW - SEND TO I DATE - SEND TO DATE SEND TO -- DATE . ZO,3 -. , - -- 0 0 - -- 0 . 0 - " -0 . 0 0 -- 0 HOF000647241 ese 8111 .. .. --- _ .. - - - -- - -- - _. , - AnnexA Press Office to take Subject: Judicial Review Case: Recognition of Scientology as a religion in prison Tuesday 21 October - permissions hearing for a judicial review on HRA grounds of Prison Service policy not to recognise Scientology as a religion for the purpose of facilitating religious ministry in prisons. Background Prisoner Roger Charles Heaton and the Church of Scientology have made an application for jUdicial review of this policy. Unes to take The applicants, having seen our witness statement and outline argument, have offered to withdraw their case, with no order as to costs. This means that the non-recognition policy being followed by prison service is reasonable .and secure. It has been our long-standing policy to withhold recognition of scientology as a religion. However, in order to meet the needs of individual prisoners, the Prison Service allows any prisoner registered as a Scientologist to have access to a representative of the Church of Scientology if he wishes to receive its ministry. This is the approach which was followed in the case of Mr Heaton. The Home Office considers that its policy respects the rights of Mr Heaton under the ECHR and is reasonable in view of concerns of which the department is aware about some of the practices of the Church.
    [Show full text]
  • March 24, 2008 the Free-Content News Source That You Can Write! Page 1
    March 24, 2008 The free-content news source that you can write! Page 1 Top Stories Cheney meets with Israeli and state. Cheney noted "Terror and Palestinian leaders rockets do not merely kill innocent Ma Ying-jeou wins 2008 United States Vice President Dick civilians, they also kill the Taiwan presidential election Cheney met with the leaders as legitimate hopes and aspirations of Ma Ying-jeou, former Mayor of part of a tour of the Middle East the Palestinian people." Taipei, has been elected as the which is part of a plan to get a new President of the Republic of peace agreement between Israel The Vice President remarked he is China (Taiwan) with a landslide and the Palestinian by the end of committed towards a Palestinian victory of 58.45% of the popular Bush's term in January 2009. state, quoting President George W. vote. Bush, "The establishment of the Wikipedia Current Events state of Palestine is long overdue. Major US presidential The Palestinian people deserve it." candidates have passport files Farouk Abdulhak, prime suspect Cheney also noted that "Achieving breached in the murder of Martine Vik that vision will require tremendous Just hours after firing two Magnussen, turns up in Yemen. effort at the negotiating table and contract employees for •Kimi Räikkönen (Finland) wins painful concessions on both sides." inappropriately examining the the Malaysian Grand Prix in passport file of Democratic Sepang. Abbas condemned rocket attacks presidential candidate Barack against Israel from the Hamas- •An agreement on talks to resolve Obama, US Secretary of State controlled Gaza Strip, but also told the Fatah-Hamas conflict is Condoleezza Rice told Hillary Israel to ease their restrictions on reached in Sanaa, Yemen.
    [Show full text]