Digital Authoritarianism and the Global Threat to Free Speech Hearing
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
His Brothers' Keeper
His Brothers’ Keeper Lawyer Gregory Stanton refuses to let the world ignore the genocide of two million Kampucheans. This is the story of their tragedy and his dedication. By Michael Matza There is a compelling sense of mission about 35-year-old Gregory Howard Stanton, a 1982 graduate of Yale Law School. This past April, Stanton launched a one- man effort he calls the Kampuchean Genocide Project, through which he hopes to raise $300,000 to send researchers and scientists to Southeast Asia to gather evidence that would document—precisely and for posterity—the crimes of the Pol Pot government in Democratic Kampuchea (Cambodia) from April 1975 through the end of 1978. Although it was thrown out of power by a Vietnamese-backed invasion in 1979, the government that was named for Khmer Rouge leader Pol Pot still represents Kampuchea as part of a united front in the United Nations. That it does so belies a past that survivors of Khmer Rouge brutalities remember with dread. In the three and a half years that it was in power, the Pol Pot regime is said to have intentionally murdered at least one million Kampucheans and to have imposed conditions of slave labor, starvation, and forced evacuations that resulted in the deaths of more than one million others. In a country of approximately eight million people, one quarter of the population was systematically exterminated through a maniacal program that seemed like the Final Solution writ small. For Greg Stanton, such mind-boggling carnage imposes a personal obligation. “There are people who can become numb to the killing. -
Standoff at Tiananmen: Recollections of 1989: the Making of Goddess of Democracy
2019/4/23 Standoff At Tiananmen: Recollections of 1989: The Making of Goddess of Democracy 更多 创建博客 登录 Standoff At Tiananmen How Chinese Students Shocked the World with a Magnificent Movement for Democracy and Liberty that Ended in the Tragic Tiananmen Massacre in 1989. Relive the history with this blog and my book, "Standoff at Tiananmen", a narrative history of the movement. Home Days People Documents Pictures Books Recollections Memorials Monday, May 30, 2011 "Standoff at Tiananmen" English Language Edition Recollections of 1989: The Making of Goddess of Democracy Click on the image to buy at Amazon "Standoff at Tiananmen" Chinese Language Edition On May 30, 1989, the statue Goddess of Democracy was erected at Tiananmen Square and became one of the lasting symbols of the 1989 student movement. The following is a re-telling of the making of that statue, originally published in the book Children of Dragon, by a sculptor named Cao Xinyuan: Nothing excites a sculptor as much as seeing a work of her own creation take shape. But although I was watching the creation of a sculpture that I had had no part in making, I nevertheless felt the same excitement. It was the "Goddess of Democracy" statue that stood for five days in Tiananmen Square. Until last year I was a graduate student at the Central Academy of Fine Arts in Beijing, where the sculpture was made. I was living there when these events took place. 点击图像去Amazon购买 Students and faculty of the Central Academy of Fine Arts, which is located only a short distance from Tiananmen Square, had from the beginning been actively involved in the demonstrations. -
Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest
Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest Patricia Moloney Figliola Specialist in Internet and Telecommunications Policy May 18, 2018 Congressional Research Service 7-5700 www.crs.gov R45200 Internet Freedom in China: U.S. Government and Private Sector Activity Summary By the end of 2017, the People’s Republic of China (PRC) had the world’s largest number of internet users, estimated at over 750 million people. At the same time, the country has one of the most sophisticated and aggressive internet censorship and control regimes in the world. PRC officials have argued that internet controls are necessary for social stability, and intended to protect and strengthen Chinese culture. However, in its 2017 Annual Report, Reporters Without Borders (Reporters Sans Frontières, RSF) called China the “world’s biggest prison for journalists” and warned that the country “continues to improve its arsenal of measures for persecuting journalists and bloggers.” China ranks 176th out of 180 countries in RSF’s 2017 World Press Freedom Index, surpassed only by Turkmenistan, Eritrea, and North Korea in the lack of press freedom. At the end of 2017, RSF asserted that China was holding 52 journalists and bloggers in prison. The PRC government employs a variety of methods to control online content and expression, including website blocking and keyword filtering; regulating and monitoring internet service providers; censoring social media; and arresting “cyber dissidents” and bloggers who broach sensitive social or political issues. The government also monitors the popular mobile app WeChat. WeChat began as a secure messaging app, similar to WhatsApp, but it is now used for much more than just messaging and calling, such as mobile payments, and all the data shared through the app is also shared with the Chinese government. -
Bbg), 2011-2015
Description of document: FOIA Logs for the Broadcasting Board of Governors (BBG), 2011-2015 Requested date: 02-March-2016 Released date: 06-May-2016 Posted date: 08-August-2016 Source of document: BBG FOIA Office Room 3349 330 Independence Ave. SW Washington, D.C. 20237 Fax: (202) 203-4585 The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. Broadcasting 330 Independence Ave.SW T 202.203.4550 Board of Cohen Building, Room 3349 F 202.203.4585 Governors Washington, DC 20237 Office ofthe General Counsel Freedom ofInformation and Privacy Act Office May6, 2016 RE: Request Pursuant to the Freedom of Information Act-FOIA #16-035 This letter is in response to your Freedom of Information Act (FOIA) request dated March 2, 2016 to the Broadcasting Board of Governors (BBG), which the Agency received on March 14, 2016. -
Legal Regime of Persona Non Grata and the Namru-2 Case
Journal of Law, Policy and Globalization www.iiste.org ISSN 2224-3240 (Paper) ISSN 2224-3259 (Online) Vol.32, 2014 Legal Regime of Persona Non Grata and the Namru-2 Case Marcel Hendrapati* Law Faculty, Hasanuddin University, Jalan Perintis Kemerdekaan, Kampus Unhas Tamalanrea KM.10, Makassar-90245, Republic of Indonesia * E-mail of the corresponding author: [email protected] Abstract Just like the diplomatic immunity principle, the principle of persona non grata aims to ensure justice for both the state seeking to evict a diplomat (receiving state) and the state whose diplomat is being evicted (sending state). This is because both principles can guarantee the dignity and equality of sovereign states when resolving issues in international relation. Not every statement of persona non grata has to culminate in expulsion because a statement may be issued by the receiving state both after the diplomatic agent has started performing his functions and even before he arrives at the receiving state. If such a statement is followed by the expulsion of the diplomat, it should be based on article 41 of the Vienna Convention, 1961 (infringement on laws of receiving state and/or espionage actions). Also, expulsion may occur due to war and severance of diplomatic relation between two states. Indonesia has had to deal with issues of persona non grata on several occasions both as receiving and sending state. This paper analyses several cases of declaration of persona non grata involving several countries, especially Indonesia in order to give a better understanding of how the declaration of persona non grata plays out between states, and the significance of the Vienna Convention of 1961 on diplomatic relations. -
Amnesty International
amnesty international PEOPLE'S REPUBLIC OF CHINA No Improvement in Human Rights: The Imprisonment of dissidents in 1998 4 March 1999 AI Index: ASA 17/14/99 Despite the marking of the 50th anniversary of the adoption of the United Nations Declaration of Human Rights in 1998 and despite the recent signing by China of the two United Nations Covenants on Human Rights there are still no guarantees for the Chinese people that they will not be detained or arrested for seeking the freedoms of association and expression enshrined in the UN Declaration. In the past twelve months, many scores of people throughout China have been detained, harassed and imprisoned solely for exercising these rights. The Chinese government’s signing of the International Covenant on Civil and Political Rights (ICCPR) in October 1998, the visits to China of American President Bill Clinton, and the UN High Commissioner for Human Rights, Mary Robinson were heralded as triumphs for diplomacy and human rights ‘dialogue’. International opinion began to suggest that the Chinese authorities were making improvements in human rights. However, as the prospect of international censure recedes and the international spotlight faded, the Chinese authorities once again began to crack down on dissidents and activists. During the last few weeks of 1998, over 29 dissidents were detained, four leading dissidents sentenced to lengthy terms of imprisonment and several other dissidents and labour activists have been sentenced to re-education through labour terms and lengthy terms of imprisonment. Since October 1998 when China signed the ICCPR it is estimated that over 80 dissidents have been detained and at least 15 high profile dissidents have been given heavy prison sentences or assigned to re-education through labour. -
The Limits of Commercialized Censorship in China
The Limits of Commercialized Censorship in China Blake Miller∗ September 27, 2018 Abstract Despite massive investment in China's censorship program, internet platforms in China are rife with criticisms of the government and content that seeks to organize opposition to the ruling Communist Party. Past works have attributed this \open- ness" to deliberate government strategy or lack of capacity. Most, however, do not consider the role of private social media companies, to whom the state delegates information controls. I suggest that the apparent incompleteness of censorship is largely a result of principal-agent problems that arise due to misaligned incentives of government principals and private media company agents. Using a custom dataset of annotated leaked documents from a social media company, Sina Weibo, I find that 16% of directives from the government are disobeyed by Sina Weibo and that disobedience is driven by Sina's concerns about censoring more strictly than com- petitor Tencent. I also find that the fragmentation inherent in the Chinese political system exacerbates this principal agent problem. I demonstrate this by retrieving actual censored content from large databases of hundreds of millions of Sina Weibo posts and measuring the performance of Sina Weibo's censorship employees across a range of events. This paper contributes to our understanding of media control in China by uncovering how market competition can lead media companies to push back against state directives and increase space for counterhegemonic discourse. ∗Postdoctoral Fellow, Program in Quantitative Social Science, Dartmouth College, Silsby Hall, Hanover, NH 03755 (E-mail: [email protected]). 1 Introduction Why do scathing criticisms, allegations of government corruption, and content about collective action make it past the censors in China? Past works have theorized that regime strategies or state-society conflicts are the reason for incomplete censorship. -
Tragic Anniversary of the 1989 Tiananmen Square Protests and Massacre
TRAGIC ANNIVERSARY OF THE 1989 TIANANMEN SQUARE PROTESTS AND MASSACRE HEARING BEFORE THE SUBCOMMITTEE ON AFRICA, GLOBAL HEALTH, GLOBAL HUMAN RIGHTS, AND INTERNATIONAL ORGANIZATIONS OF THE COMMITTEE ON FOREIGN AFFAIRS HOUSE OF REPRESENTATIVES ONE HUNDRED THIRTEENTH CONGRESS FIRST SESSION JUNE 3, 2013 Serial No. 113–69 Printed for the use of the Committee on Foreign Affairs ( Available via the World Wide Web: http://www.foreignaffairs.house.gov/ or http://www.gpo.gov/fdsys/ U.S. GOVERNMENT PRINTING OFFICE 81–341PDF WASHINGTON : 2013 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate 0ct 09 2002 10:13 Nov 03, 2013 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 F:\WORK\_AGH\060313\81341 HFA PsN: SHIRL COMMITTEE ON FOREIGN AFFAIRS EDWARD R. ROYCE, California, Chairman CHRISTOPHER H. SMITH, New Jersey ELIOT L. ENGEL, New York ILEANA ROS-LEHTINEN, Florida ENI F.H. FALEOMAVAEGA, American DANA ROHRABACHER, California Samoa STEVE CHABOT, Ohio BRAD SHERMAN, California JOE WILSON, South Carolina GREGORY W. MEEKS, New York MICHAEL T. MCCAUL, Texas ALBIO SIRES, New Jersey TED POE, Texas GERALD E. CONNOLLY, Virginia MATT SALMON, Arizona THEODORE E. DEUTCH, Florida TOM MARINO, Pennsylvania BRIAN HIGGINS, New York JEFF DUNCAN, South Carolina KAREN BASS, California ADAM KINZINGER, Illinois WILLIAM KEATING, Massachusetts MO BROOKS, Alabama DAVID CICILLINE, Rhode Island TOM COTTON, Arkansas ALAN GRAYSON, Florida PAUL COOK, California JUAN VARGAS, California GEORGE HOLDING, North Carolina BRADLEY S. -
2019 International Religious Freedom Report
CHINA (INCLUDES TIBET, XINJIANG, HONG KONG, AND MACAU) 2019 INTERNATIONAL RELIGIOUS FREEDOM REPORT Executive Summary Reports on Hong Kong, Macau, Tibet, and Xinjiang are appended at the end of this report. The constitution, which cites the leadership of the Chinese Communist Party and the guidance of Marxism-Leninism and Mao Zedong Thought, states that citizens have freedom of religious belief but limits protections for religious practice to “normal religious activities” and does not define “normal.” Despite Chairman Xi Jinping’s decree that all members of the Chinese Communist Party (CCP) must be “unyielding Marxist atheists,” the government continued to exercise control over religion and restrict the activities and personal freedom of religious adherents that it perceived as threatening state or CCP interests, according to religious groups, nongovernmental organizations (NGOs), and international media reports. The government recognizes five official religions – Buddhism, Taoism, Islam, Protestantism, and Catholicism. Only religious groups belonging to the five state- sanctioned “patriotic religious associations” representing these religions are permitted to register with the government and officially permitted to hold worship services. There continued to be reports of deaths in custody and that the government tortured, physically abused, arrested, detained, sentenced to prison, subjected to forced indoctrination in CCP ideology, or harassed adherents of both registered and unregistered religious groups for activities related to their religious beliefs and practices. There were several reports of individuals committing suicide in detention, or, according to sources, as a result of being threatened and surveilled. In December Pastor Wang Yi was tried in secret and sentenced to nine years in prison by a court in Chengdu, Sichuan Province, in connection to his peaceful advocacy for religious freedom. -
Canadian Politics of the Economy and the Environment 1867-2017
The paradox of growth and the promise of unsettled times: Canadian politics of the economy and the environment 1867-2017 Christopher James Orr Department of Natural Resource Sciences McGill University, Montreal August 2020 A thesis submitted to McGill University in partial fulfillment of the requirements of the degree of Doctor of Philosophy © Christopher James Orr 2020 Abstract Why does economic growth persist as a primary policy objective of nation states that is pursued and overwhelmingly supported? Accumulating evidence indicates that after a certain point economic growth does not contribute to social wellbeing, and undermines global ecological integrity. The persistence of economic growth as a primary policy objective is a paradox. This paradox is an important research gap that demands explanation. Explaining this paradox is important because, unless we are able to explain why growth persists, policies cannot enable humanity to live in harmony with this finite Earth. The overarching purpose of this thesis is to explain the paradox of growth in Canadian federal politics. The study has four specific objectives: (1) to map the dominant belief system in Canadian federal politics 1867-2017, and show how the persistence of economic growth as part of that system is a paradox; (2) to develop a conceptual framework to understand how society and nature coevolve, and the role of belief systems in that coevolving relationship; (3) to use this framework to explain the persistence of economic growth in Canadian federal politics; and (4) to identify barriers and opportunities for how Canada can move towards an ecologically sustainable economy and ways of life. First, I use Canadian political manifestos (party platforms) to map the dominant belief system in Canadian federal politics 1867-2017, and to show how the evolution of ideas about economic growth and the environment is a paradox. -
Peer-To-Peer Protocol and Application Detection Support
Peer-to-Peer Protocol and Application Detection Support This appendix lists all the protocols and applications currently supported by Cisco ASR 5500 ADC. • Supported Protocols and Applications, page 1 Supported Protocols and Applications This section lists all the supported P2P protocols, sub-protocols, and the applications using these protocols. Important Please note that various client versions are supported for the protocols. The client versions listed in the table below are the latest supported version(s). Important Please note that the release version in the Supported from Release column has changed for protocols/applications that are new since the ADC plugin release in August 2015. This will now be the ADC Plugin Build number in the x.xxx.xxx format. The previous releases were versioned as 1.1 (ADC plugin release for December 2012 ), 1.2 (ADC plugin release for April 2013), and so on for consecutive releases. New in this Release This section lists the supported P2P protocols, sub-protocols and applications introduced in the ADC Plugin release for December 1, 2017. ADC Administration Guide, StarOS Release 21.6 1 Peer-to-Peer Protocol and Application Detection Support New in this Release Protocol / Client Client Version Group Classification Supported from Application Release 6play 6play (Android) 4.4.1 Streaming Streaming-video ADC Plugin 2.19.895 Unclassified 6play (iOS) 4.4.1 6play — (Windows) BFM TV BFM TV 3.0.9 Streaming Streaming-video ADC Plugin 2.19.895 (Android) Unclassified BFM TV (iOS) 5.0.7 BFM — TV(Windows) Clash Royale -
Everyone's Guide to Bypassing Internet Censorship
EVERYONE’S GUIDE TO BY-PASSING INTERNET CENSORSHIP FOR CITIZENS WORLDWIDE A CIVISEC PROJECT The Citizen Lab The University of Toronto September, 2007 cover illustration by Jane Gowan Glossary page 4 Introduction page 5 Choosing Circumvention page 8 User self-assessment Provider self-assessment Technology page 17 Web-based Circumvention Systems Tunneling Software Anonymous Communications Systems Tricks of the trade page 28 Things to remember page 29 Further reading page 29 Circumvention Technologies Circumvention technologies are any tools, software, or methods used to bypass Inter- net filtering. These can range from complex computer programs to relatively simple manual steps, such as accessing a banned website stored on a search engine’s cache, instead of trying to access it directly. Circumvention Providers Circumvention providers install software on a computer in a non-filtered location and make connections to this computer available to those who access the Internet from a censored location. Circumvention providers can range from large commercial organi- zations offering circumvention services for a fee to individuals providing circumven- tion services for free. Circumvention Users Circumvention users are individuals who use circumvention technologies to bypass Internet content filtering. 4 Internet censorship, or content filtering, has become a major global problem. Whereas once it was assumed that states could not control Internet communications, according to research by the OpenNet Initiative (http://opennet.net) more than 25 countries now engage in Internet censorship practices. Those with the most pervasive filtering policies have been found to routinely block access to human rights organi- zations, news, blogs, and web services that challenge the status quo or are deemed threatening or undesirable.