av Kate Fitz Gibbon, Artikel i Cultural Property News, maj 2019 om den kinesiska regeringens förtryck av uigurerna i Xinjang.
The Security State and Destruction of Uyghur Culture in Xinjiang
The Chinese government’s campaign to eradicate identity, religion, and culture.
Presentation of Surveillance StateInside China's Quest to Launch a New Era of Social Control Author: Josh Chin and Liza Lin; read by Brian Nishii
The authors of Surveillance State" discuss what the West misunderstands about Chinese state control and whether the invasive trajectory of surveillance tech can still be reversed.
the old social contract, which promised better returns from an economy steered by an authoritarian government, is strained—and a new one is needed.
As Chin and Lin observe, the Chinese government is now proposing that by collecting every Chinese citizen’s data extensively, it can find out what the people want (without giving them votes) and build a society that meets their needs.
Reportage från Rongcheng. Orwellian? "The party is using both coercion and cooperation to integrate the scheme into people’s lives and have it bring benefits to them. “To me, that’s what makes it Orwellian,” says Hoffman of IISS. The social credit system provides incentives for people to not want to be on a blacklist. “It’s a preemptive way of shaping the way people think and shaping the way people act,” she says. And to the extent that people believe they can benefit socially and economically from the Communist Party staying in power, the system is working."
Governments and companies pushing for greater monitoring of Internet activity pose a major threat to freedom and democracy, according to Tim Berners-Lee, inventor of the World Wide Web. Questions: 1) Net neutrality. 2) Government data. ("t's better if dat
Si le filtrage du moteur Google.cn était un arrangement d’ordre pratique avec un pouvoir qui entend lutter contre le free flow of information, Google a fini par reconnaître que les exigences du gouvernement chinois entraient de manière fondamentale en con
Systems such as ‘Semantic Archive’ are, in fact, what the Russian security services and Ministry of the Interior (MVD) use to monitor open sources (i.e. the media) and the Internet, including the blogosphere and social networks. The FSB and MVD started buying these systems extensively in the middle of the 2000s. In 2006, for example, during the run up to the G8 summit in St. Petersburg, the Interior Ministry bought a ‘Random Information Collection System’ from the Russian software company Smartware, as a precaution, it claimed, against extremism. ‘Instead of Facebook we have XiaoNei, and instead of Twitter, Weibo. The usual policy in China for introducing Internet technology is to allow people to use a new product just until a Chinese equivalent is developed. So now Facebook is banned, and so is Twitter. And the servers for the Chinese versions are in Beijing.’
By DAVID E. SANGER and THOM SHANKERJAN. 14, 2014 the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet with no comments: "There is no evidence that the N.S.A. has implanted its software or used its radio frequency technology inside the United States. While refusing to comment on the scope of the Quantum program, the N.S.A. said its actions were not comparable to China’s."
Reuters 19 May 14 According to the indictment, Chinese state-owned companies "hired" Unit 61398 of the People's Liberation Army "to provide information technology services" including assembling a database of corporate intelligence. Federal prosecutors said the suspects targeted companies including Alcoa Inc, Allegheny Technologies Inc, United States Steel Corp, Toshiba Corp unit Westinghouse Electric Co, the U.S. subsidiaries of SolarWorld AG, and a steel workers' union.
"Manning’s and Snowden’s leaks mark the beginning of a new era in which the U.S. government can no longer count on keeping its secret behavior secret." Foreign Affairs, November-December 2013 The End of Hypocrisy American Foreign Policy in the Age of Leaks By Henry Farrell and Martha Finnemore