Protocols of Control in Chinese Online News Media: the Case of Wenzhou News

Total Page:16

File Type:pdf, Size:1020Kb

Protocols of Control in Chinese Online News Media: the Case of Wenzhou News Protocols of Control in Chinese Online News Media: The Case of Wenzhou News A thesis submitted to the Department of Journalism Studies of the University of Sheffield, UK for the degree of Doctor of Philosophy presented by Yiran Zhao Supervisor: Dr. John Steel Sheffield, November 2015 Abstract This thesis explores censorship and self-censorship in online news production in China. It presents an analysis drawn from observation in the online newsroom and interviews with online news workers and cyber police officers in China. In addition, it studies the mechanisms of online censorship and protocols of news censorship in an online newsroom context. This involves an analysis of journalistic activities in the process of online news production, self-censorship of online news workers, and power flows between the Chinese authorities and online news media in determining the output of online news content. Although the Chinese “free press” is enshrined in the Constitution of The People’s Republic of China as a right, the mechanism of online news censorship is shaped under the influence of an anti-liberal theory of limited freedom of speech. Confucius, the proclaimer of this theory, devalues individual liberty, advocating the ‘right to speak’ is a benefaction of the ruling class, and this “freedom” can be compromised for the welfare of the state. It is a view shared by Confucius’ successors. This theory, therefore, conceptually sets up a distinctive paternalistic protocol of online news censorship in China, as the online news workers are instructed to censor and self-censor online content under the influence of administrative interference. Through thematic analysis of field notes, which covers a four-week period of observation and recording in the online newsroom of Wenzhou News, a local online news organisation in China, the hierarchical structure and general workflow in this online newsroom are 2 illustrated. By further analysing interviews conducted with online journalists, editors, web administrators and cyber police officers, this thesis draws on the perspectives of online news workers and censors towards the protocol of online news censorship, through which the power matrix between the Chinese government, the Communist Party of China, and online news media are triangulated. By analysing and constructing technological and social modes of censorship in the online environment, this thesis sets up a conceptual framework of the protocols of online news censorship in China, draws detailed processes of online news production under the pressure of censorship, and explores the concept of “harmonisation” within the online newsroom where specific ideological motivations and structural operationalisation influence the output of online news content. 3 Content Abstract .......................................................................................................................... 2 Content .......................................................................................................................... 4 Content of figures and tables ........................................................................................ 8 Chapter 1 Introduction .................................................................................................. 9 1.1 Objectives and research questions .................................................................. 9 1.2 Research Questions in focus .......................................................................... 11 1.2.1 The hierarchy of online news media................................................... 11 1.2.2 The Commentary function of online news workers ........................... 11 1.2.3 The role of the supervisor of online news production ....................... 12 1.2.4 Triangular model of online news censorship ...................................... 13 1.2.5 Protocols of online news censorship .................................................. 14 1.2.6 Perspectives of the censors (the cyber police) ................................... 15 1.3 The scope of the study ................................................................................... 16 1.4 Structure of the thesis ................................................................................... 18 Chapter 2 Theoretical Framework ............................................................................... 26 2.1 Introduction ................................................................................................... 26 2.2 Defining censorship and self-censorship ....................................................... 28 2.3 Professionalism in Chinese journalism .......................................................... 31 2.4 Gatekeeping in Chinese news media ............................................................. 34 2.5 News values: the Communist Party’s interest as a news value ..................... 38 2.6 The Organisation of news and online news media in China .......................... 44 2.7 Conclusion ...................................................................................................... 51 Chapter 3 Literature review ......................................................................................... 53 3.1 Introduction ................................................................................................... 53 3.2 Confucianism and its relationship to freedom of speech and freedom of the press in China ....................................................................................................... 56 3.2.1 The divine theory and channelisation theory in Pre-Confucian times ...................................................................................................................... 56 3.2.2 Morality as the centre of Confucianism ............................................. 59 3.2.3 The Legacy of Confucius...................................................................... 62 3.3 Maoism, media control and propaganda before online news in China ........ 66 3.3.1 The May 4th Movement: introducing free speech and freedom of the press to China .............................................................................................. 66 3.3.2 The Communist Party’s criticism and self-criticism in journalism ...... 68 4 3.3.3 Propaganda in Communist China: nationalism and salvation in journalism .................................................................................................... 73 3.4 Social background of online censorship in China .......................................... 76 3.4.1 The Great Firewall and online Censorship .......................................... 76 3.4.2 The Internet in China in 2008 ............................................................. 82 3.4.3 Google China’s dispute with the Chinese government ...................... 89 3.4.4 Weibo and high profile scandals ......................................................... 94 3.4.5 The southern media .......................................................................... 109 3.5 Conclusion .................................................................................................... 111 Chapter 4 Methodology ............................................................................................. 114 4.1 Introduction ................................................................................................. 114 4.2 Aims and scope ............................................................................................ 114 4.3 Theoretical Approach ................................................................................... 116 4.3.1 Research philosophy ......................................................................... 117 4.3.2 Framework ........................................................................................ 117 4.4 Observation .................................................................................................. 119 4.4.1 Aims and objectives .......................................................................... 119 4.4.2 Questions and focus.......................................................................... 121 4.4.3 Approach to observation .................................................................. 124 4.4.4 Choice of place .................................................................................. 125 4.4.5 Planning............................................................................................. 127 4.4.6 Pilot study ......................................................................................... 128 4.4.7 Limitations......................................................................................... 129 4.5 In-depth interviews ...................................................................................... 130 4.5.1 Aim and objectives ............................................................................ 130 4.5.2 Design ................................................................................................ 131 4.5.3 Participants and sampling ................................................................. 132 4.5.4 Interview guide ................................................................................. 136 4.5.5 Strategies and considerations in conducting interviews .................. 138 4.5.6 Pilot study ......................................................................................... 141 4.5.7 Limitations......................................................................................... 142
Recommended publications
  • How Russia Tried to Start a Race War in the United States
    Michigan Journal of Race and Law Volume 24 2019 Virtual Hatred: How Russia Tried to Start a Race War in the United States William J. Aceves California Western School of Law Follow this and additional works at: https://repository.law.umich.edu/mjrl Part of the Communications Law Commons, Internet Law Commons, and the Law and Race Commons Recommended Citation William J. Aceves, Virtual Hatred: How Russia Tried to Start a Race War in the United States, 24 MICH. J. RACE & L. 177 (2019). Available at: https://repository.law.umich.edu/mjrl/vol24/iss2/2 This Article is brought to you for free and open access by the Journals at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in Michigan Journal of Race and Law by an authorized editor of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. VIRTUAL HATRED: HOW RUSSIA TRIED TO START A RACE WAR in the UNITED STATES William J. Aceves* During the 2016 U.S. presidential election, the Russian government engaged in a sophisticated strategy to influence the U.S. political system and manipulate American democracy. While most news reports have focused on the cyber-attacks aimed at Democratic Party leaders and possible contacts between Russian officials and the Trump presidential campaign, a more pernicious intervention took place. Throughout the campaign, Russian operatives created hundreds of fake personas on social media platforms and then posted thousands of advertisements and messages that sought to promote racial divisions in the United States. This was a coordinated propaganda effort.
    [Show full text]
  • Hate Speech and Persecution: a Contextual Approach
    V anderbilt Journal of Transnational Law VOLUME 46 March 2013 NUMBER 2 Hate Speech and Persecution: A Contextual Approach Gregory S. Gordon∗ ABSTRACT Scholarly work on atrocity-speech law has focused almost exclusively on incitement to genocide. But case law has established liability for a different speech offense: persecution as a crime against humanity (CAH). The lack of scholarship regarding this crime is puzzling given a split between the International Criminal Tribunal for Rwanda and the International Criminal Tribunal for the former Yugoslavia on the issue of whether hate speech alone can serve as an actus reus for CAH-persecution. This Article fills the gap in the literature by analyzing the split between the two tribunals and concluding that hate speech alone may be the basis for CAH- persecution charges. First, this is consistent with precedent going as far back as the Nuremberg trials. Second, it takes into account the CAH requirement that the speech be uttered as part of a widespread or systematic attack against a civilian population. Third, the defendant must be aware that his speech ∗ Associate Professor of Law, University of North Dakota School of Law, and Director, UND Center for Human Rights and Genocide Studies; former Prosecutor, International Criminal Tribunal for Rwanda; J.D., UC Berkeley School of Law. The author would like to thank his research assistants, Lilie Schoenack and Moussa Nombre, for outstanding work. The piece also benefited greatly from the insights of Kevin Jon Heller, Joseph Rikhof, and Benjamin Brockman-Hawe. Thanks, as always, to my family, especially my wife, whose incredible support made this article possible.
    [Show full text]
  • The Velocity of Censorship
    The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Tao Zhu, Independent Researcher; David Phipps, Bowdoin College; Adam Pridgen, Rice University; Jedidiah R. Crandall, University of New Mexico; Dan S. Wallach, Rice University This paper is included in the Proceedings of the 22nd USENIX Security Symposium. August 14–16, 2013 • Washington, D.C., USA ISBN 978-1-931971-03-4 Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Tao Zhu David Phipps Adam Pridgen [email protected] Computer Science Computer Science Independent Researcher Bowdoin College Rice University Jedidiah R. Crandall Dan S. Wallach Computer Science Computer Science University of New Mexico Rice University Abstract terconnected through their social graph and tend to post about sensitive topics. This biases us towards the content Weibo and other popular Chinese microblogging sites are posted by these particular users, but enables us to mea- well known for exercising internal censorship, to comply sure with high fidelity the speed of the censorship and with Chinese government requirements. This research discern interesting patterns in censor behaviors. seeks to quantify the mechanisms of this censorship: Sina Weibo (weibo.com, referred to in this paper sim- how fast and how comprehensively posts are deleted. ply as “Weibo”) has the most active user community of Our analysis considered 2.38 million posts gathered over any microblog site in China [39]. Weibo provides ser- roughly two months in 2012, with our attention focused vices which are similar to Twitter, with @usernames, on repeatedly visiting “sensitive” users.
    [Show full text]
  • Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest
    Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest Patricia Moloney Figliola Specialist in Internet and Telecommunications Policy May 18, 2018 Congressional Research Service 7-5700 www.crs.gov R45200 Internet Freedom in China: U.S. Government and Private Sector Activity Summary By the end of 2017, the People’s Republic of China (PRC) had the world’s largest number of internet users, estimated at over 750 million people. At the same time, the country has one of the most sophisticated and aggressive internet censorship and control regimes in the world. PRC officials have argued that internet controls are necessary for social stability, and intended to protect and strengthen Chinese culture. However, in its 2017 Annual Report, Reporters Without Borders (Reporters Sans Frontières, RSF) called China the “world’s biggest prison for journalists” and warned that the country “continues to improve its arsenal of measures for persecuting journalists and bloggers.” China ranks 176th out of 180 countries in RSF’s 2017 World Press Freedom Index, surpassed only by Turkmenistan, Eritrea, and North Korea in the lack of press freedom. At the end of 2017, RSF asserted that China was holding 52 journalists and bloggers in prison. The PRC government employs a variety of methods to control online content and expression, including website blocking and keyword filtering; regulating and monitoring internet service providers; censoring social media; and arresting “cyber dissidents” and bloggers who broach sensitive social or political issues. The government also monitors the popular mobile app WeChat. WeChat began as a secure messaging app, similar to WhatsApp, but it is now used for much more than just messaging and calling, such as mobile payments, and all the data shared through the app is also shared with the Chinese government.
    [Show full text]
  • Let One Hundered Flowers Bloom, One Hundred Schools Contend: Debating Rule of Law in China
    Michigan Journal of International Law Volume 23 Issue 3 2002 Let One Hundered Flowers Bloom, One Hundred Schools Contend: Debating Rule of Law in China Randall Peerenboom University of California, Los Angeles Follow this and additional works at: https://repository.law.umich.edu/mjil Part of the Comparative and Foreign Law Commons, and the Rule of Law Commons Recommended Citation Randall Peerenboom, Let One Hundered Flowers Bloom, One Hundred Schools Contend: Debating Rule of Law in China, 23 MICH. J. INT'L L. 471 (2002). Available at: https://repository.law.umich.edu/mjil/vol23/iss3/1 This Article is brought to you for free and open access by the Michigan Journal of International Law at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in Michigan Journal of International Law by an authorized editor of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. LET ONE HUNDRED FLOWERS BLOOM, ONE HUNDRED SCHOOLS CONTEND: DEBATING RULE OF LAW IN CHINAt Randall Peerenboom* I. THIN VERSIONS OF RULE OF LAW ................................................ 477 A. Advantages of Thin Theories................................................ 480 B. Normative Concerns About Thin Theories and the Relation Between Thin and Thick Theories .................... 482 II. FOUR IDEAL TYPES: STATIST SOCIALIST, NEO-AUTHORITARIAN, COMMUNITARIAN, LIBERAL DEMOCRATIC .................................... 486 A . The Economic Regim e .........................................................
    [Show full text]
  • Nation-State Cyber Surveillance Options: the Role of Suppliers
    Nation-State Cyber Surveillance Options: The role of suppliers Eirik Bae Master’s Thesis Master of Science in Information Security 30 ECTS Department of Computer Science and Media Technology Gjøvik University College, 2014 Avdeling for informatikk og medieteknikk Høgskolen i Gjøvik Postboks 191 2802 Gjøvik Department of Computer Science and Media Technology Gjøvik University College Box 191 N-2802 Gjøvik Norway Nation-State Cyber Surveillance Options: The role of suppliers Abstract When Edward Snowden in 2013 leaked documents about U.S. surveillance, the focus shifted to how nation-states perform surveillance of Internet and telecom communications, and it was then a need for educated information about the topic. In this master thesis we investigate how nation-states can perform their cyber surveillance, how suppliers of products or services can sup- port the nation-states’ cyber surveillance, and how we can protect ourselves against it. We found that the most prominent way consists of collecting data from central points of communication, e.g. Internet and telecom providers. In some cases, it is necessary for the nation-state to perform targeted surveillance by installing surveillance software onto their suspects’ devices. The infor- mation they collect from centralized and targeted surveillance can lead to big data issues that relate to collecting, storing, and processing the massive amounts of data. A supplier can decide to help nation-states in their cyber surveillance, and by exploiting the trust we lay in the supplier it would result in that we would face a completely different threat landscape, where we find it difficult to protect our privacy and security.
    [Show full text]
  • New Media in New China
    NEW MEDIA IN NEW CHINA: AN ANALYSIS OF THE DEMOCRATIZING EFFECT OF THE INTERNET __________________ A University Thesis Presented to the Faculty of California State University, East Bay __________________ In Partial Fulfillment of the Requirements for the Degree Master of Arts in Communication __________________ By Chaoya Sun June 2013 Copyright © 2013 by Chaoya Sun ii NEW MEOlA IN NEW CHINA: AN ANALYSIS OF THE DEMOCRATIlING EFFECT OF THE INTERNET By Chaoya Sun III Table of Contents INTRODUCTION ............................................................................................................. 1 PART 1 NEW MEDIA PROMOTE DEMOCRACY ................................................... 9 INTRODUCTION ........................................................................................................... 9 THE COMMUNICATION THEORY OF HAROLD INNIS ........................................ 10 NEW MEDIA PUSH ON DEMOCRACY .................................................................... 13 Offering users the right to choose information freely ............................................... 13 Making free-thinking and free-speech available ....................................................... 14 Providing users more participatory rights ................................................................. 15 THE FUTURE OF DEMOCRACY IN THE CONTEXT OF NEW MEDIA ................ 16 PART 2 2008 IN RETROSPECT: FRAGILE CHINESE MEDIA UNDER THE SHADOW OF CHINA’S POLITICS ...........................................................................
    [Show full text]
  • THE EVOLUTIONARY GLOBAL VISION of CHINESE POLITICAL PHILOSOPHY; China's Socio-Economic Transformation in the 21St Century
    The University of San Francisco USF Scholarship: a digital repository @ Gleeson Library | Geschke Center Master's Projects and Capstones Theses, Dissertations, Capstones and Projects Fall 12-20-2020 THE EVOLUTIONARY GLOBAL VISION of CHINESE POLITICAL PHILOSOPHY; China's Socio-Economic Transformation in The 21st Century Meryem Gurel University of San Francisco, [email protected] Follow this and additional works at: https://repository.usfca.edu/capstone Part of the Asian Studies Commons, International Economics Commons, International Relations Commons, Other Philosophy Commons, Other Political Science Commons, Political Economy Commons, and the Regional Economics Commons Recommended Citation Gurel, Meryem, "THE EVOLUTIONARY GLOBAL VISION of CHINESE POLITICAL PHILOSOPHY; China's Socio-Economic Transformation in The 21st Century" (2020). Master's Projects and Capstones. 1069. https://repository.usfca.edu/capstone/1069 This Project/Capstone is brought to you for free and open access by the Theses, Dissertations, Capstones and Projects at USF Scholarship: a digital repository @ Gleeson Library | Geschke Center. It has been accepted for inclusion in Master's Projects and Capstones by an authorized administrator of USF Scholarship: a digital repository @ Gleeson Library | Geschke Center. For more information, please contact [email protected]. THE EVOLUTIONARY GLOBAL VISION OF CHINESE POLITICAL PHILOSOPHY China’s Socio-Economic Transformation in the 21st Century Meryem Gurel APS 650 Capstone Project July 16, 2020 2 Abstract Evolving relations of East Asia due to trade liberalization raised the search for financial stability for institutional development. It also increased the importance of China integrating the global economy into renewing its political philosophy in the new century. This capstone project aims to examine why China has transformed its socio-economic structure by generating outward investments and how it has affected international political relations in terms of the role of the economic institution Asian Infrastructure Investment Bank (AIIB).
    [Show full text]
  • The Limits of Commercialized Censorship in China
    The Limits of Commercialized Censorship in China Blake Miller∗ September 27, 2018 Abstract Despite massive investment in China's censorship program, internet platforms in China are rife with criticisms of the government and content that seeks to organize opposition to the ruling Communist Party. Past works have attributed this \open- ness" to deliberate government strategy or lack of capacity. Most, however, do not consider the role of private social media companies, to whom the state delegates information controls. I suggest that the apparent incompleteness of censorship is largely a result of principal-agent problems that arise due to misaligned incentives of government principals and private media company agents. Using a custom dataset of annotated leaked documents from a social media company, Sina Weibo, I find that 16% of directives from the government are disobeyed by Sina Weibo and that disobedience is driven by Sina's concerns about censoring more strictly than com- petitor Tencent. I also find that the fragmentation inherent in the Chinese political system exacerbates this principal agent problem. I demonstrate this by retrieving actual censored content from large databases of hundreds of millions of Sina Weibo posts and measuring the performance of Sina Weibo's censorship employees across a range of events. This paper contributes to our understanding of media control in China by uncovering how market competition can lead media companies to push back against state directives and increase space for counterhegemonic discourse. ∗Postdoctoral Fellow, Program in Quantitative Social Science, Dartmouth College, Silsby Hall, Hanover, NH 03755 (E-mail: [email protected]). 1 Introduction Why do scathing criticisms, allegations of government corruption, and content about collective action make it past the censors in China? Past works have theorized that regime strategies or state-society conflicts are the reason for incomplete censorship.
    [Show full text]
  • From Notice-And-Takedown to Notice-And-Delist: Implementing Google Spain
    FINAL KUCZERAWY AND AUSLOOS 4.5.16 (DO NOT DELETE) 5/9/16 11:51 AM FROM NOTICE-AND-TAKEDOWN TO NOTICE-AND-DELIST: IMPLEMENTING GOOGLE SPAIN ALEKSANDRA KUCZERAWY AND JEF AUSLOOS* INTRODUCTION ...................................................................................... 220 A. Media Storm ........................................................................... 220 B. Internet Law Crossroads ........................................................ 221 I. HOW DID WE GET HERE? .............................................................. 223 A. Google Spain .......................................................................... 223 1. Facts of the Case ............................................................... 223 2. Scope ............................................................................... 224 3. Right to be Delisted .......................................................... 224 4. Balancing .......................................................................... 225 B. Implementation of Google Spain ............................................ 226 1. Online Form ...................................................................... 226 2. Advisory Council .............................................................. 227 3. Article 29 Working Party ................................................. 228 4. Emerging Body of Case Law ........................................... 228 II. HAVE WE MET BEFORE? ............................................................... 229 A. Dazed and Confused: Criticism of Google
    [Show full text]
  • Effective Censorship: Maintaining Control in China
    University of Pennsylvania ScholarlyCommons CUREJ - College Undergraduate Research Electronic Journal College of Arts and Sciences 2010 Effective Censorship: Maintaining Control In China Michelle (Qian) Yang University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/curej Part of the Political Science Commons Recommended Citation Yang, Michelle (Qian), "Effective Censorship: Maintaining Control In China" 01 January 2010. CUREJ: College Undergraduate Research Electronic Journal, University of Pennsylvania, https://repository.upenn.edu/curej/118. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/curej/118 For more information, please contact [email protected]. Effective Censorship: Maintaining Control In China Keywords censorship, china, incentives, Social Sciences, Political Science, Devesh Kapur, Kapur, Devesh Disciplines Political Science This article is available at ScholarlyCommons: https://repository.upenn.edu/curej/118 Effective Censorship: Maintaining Control in China Michelle Yang April 09, 2010 Acknowledgments My initial interest in this thesis topic was generated during the summer of 2009 when I was interning in Beijing. There, I had found myself unable to access a large portion of the websites I’ve grown so accustomed to in my everyday life. I knew from then that I wanted to write about censorship in China. Since that summer, the scope of the topic has changed greatly under the careful guidance of Professor Devesh Kapur. I am incredibly grateful for all the support he has given me during this entire process. This final thesis wouldn’t be what it is today without his guidance. Professor Kapur, thank you for believing in me and for pushing me to complete this thesis! I would also like to extend my gratitude to both Professor Doherty-Sil and Professor Goldstein for taking time out of their busy schedules to meet with me and for providing me with indispensible advice.
    [Show full text]
  • Congressional-Executive Commission on China
    CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA ANNUAL REPORT 2008 ONE HUNDRED TENTH CONGRESS SECOND SESSION OCTOBER 31, 2008 Printed for the use of the Congressional-Executive Commission on China ( Available via the World Wide Web: http://www.cecc.gov VerDate Aug 31 2005 23:54 Nov 06, 2008 Jkt 000000 PO 00000 Frm 00001 Fmt 6011 Sfmt 5011 U:\DOCS\45233.TXT DEIDRE 2008 ANNUAL REPORT VerDate Aug 31 2005 23:54 Nov 06, 2008 Jkt 000000 PO 00000 Frm 00002 Fmt 6019 Sfmt 6019 U:\DOCS\45233.TXT DEIDRE CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA ANNUAL REPORT 2008 ONE HUNDRED TENTH CONGRESS SECOND SESSION OCTOBER 31, 2008 Printed for the use of the Congressional-Executive Commission on China ( Available via the World Wide Web: http://www.cecc.gov U.S. GOVERNMENT PRINTING OFFICE ★ 44–748 PDF WASHINGTON : 2008 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Aug 31 2005 23:54 Nov 06, 2008 Jkt 000000 PO 00000 Frm 00003 Fmt 5011 Sfmt 5011 U:\DOCS\45233.TXT DEIDRE CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA LEGISLATIVE BRANCH COMMISSIONERS House Senate SANDER LEVIN, Michigan, Chairman BYRON DORGAN, North Dakota, Co-Chairman MARCY KAPTUR, Ohio MAX BAUCUS, Montana TOM UDALL, New Mexico CARL LEVIN, Michigan MICHAEL M. HONDA, California DIANNE FEINSTEIN, California TIMOTHY J. WALZ, Minnesota SHERROD BROWN, Ohio CHRISTOPHER H. SMITH, New Jersey CHUCK HAGEL, Nebraska EDWARD R. ROYCE, California SAM BROWNBACK, Kansas DONALD A.
    [Show full text]