Skip to main content

Home/ Geopolitics Weekly/ Group items tagged Internet

Rss Feed Group items tagged

Pedro Gonçalves

BBC NEWS | Asia-Pacific | China defends screening software - 0 views

  • China has defended the use of new screening software that has to be installed on all computers.Foreign ministry spokesman Qin Gang said the software would filter out pornographic or violent material.
  • All computers sold in China - even those that are imported - will have to be pre-installed with the "Green Dam Youth Escort" software.
  • The directive says the newest version of the software has to be pre-installed on Chinese-made computers before they leave the factory. Imported computers must contain the software before they are sold.
  • ...2 more annotations...
  • "The Chinese government pushes forward the healthy development of the internet. But it lawfully manages the internet," he added.
  • Critics fear this new software could be used by the government to enhance its internet censorship system, known as the Great Firewall of China.
Pedro Gonçalves

China tells military to ignore rumours, shuts pro-Bo website | Reuters - 0 views

  • The Liberation Army Daily did not mention outlandish rumours of a foiled coup in Beijing that spread on the Internet in past weeks, after the abrupt ousting of Bo, an ambitious contender for a spot in the new central leadership to be unveiled at a party congress later this year.
  • Although the coup rumours were unfounded, their spread and the government's tightening of Internet controls and warnings to ignore such talk have reflected jitters about stability after Bo's fall.The Communist Party has always regarded its absolute grip on the PLA as its ultimate bulwark of power, and so the government is acutely sensitive about any signs of discord in the military.
  • The PLA has also been shaken by a separate corruption scandal in the run-up to the party leadership change, said Chen Ziming, an independent scholar of politics in Beijing."I think both incidents generated tensions and uncertainty, and in the military the case of Gu Junshan is a source of tensions," said Chen, referring to PLA Lieutenant General Gu, whose downfall for apparent corruption emerged this year."Before previous recent party congresses, the Internet was not such a factor, and structural factors, including the big turnover of leaders, are adding to uncertainty now," he said.
  • ...2 more annotations...
  • Utopia and other ardently leftist Chinese websites have spread documents claiming to prove that Bo's downfall was engineered by the United States, and have also blasted comments by Premier Wen Jiabao critical of Bo.
  • In late March, authorities shut 16 Chinese websites and detained six people accused of spreading rumours about unusual military movements and security in the capital, feeding talk of an attempted coup or schism in the leadership.The rumours fed on speculation about the ousting of Bo, who in mid-March was removed as party boss of Chongqing, over a month after his vice mayor, Wang Lijun, fled to a U.S. consulate, triggering a scandal exposing accusations of infighting and abuses of power.
Alex Jhon

Internet service provider agreement - 0 views

  •  
    This is a comprehensive business agreement for you to buy from an individual or a company or any other organisation. If you are buying the actual company, this agreement is not suitable. See our company sale document section.
Argos Media

Personalized Ads Pack Bigger Punch - eMarketer - 0 views

  • US ad viewers want to be targeted, but privacy concerns linger.
  • According to ChoiceStream, 41% of US Internet users surveyed said they paid more attention to advertising that was personalized. And nearly the same proportion of respondents (39%) said they were more willing to click on such personalized ads.
  • Forty-five percent of Internet users surveyed in a 2008 Harris Interactive study said they were uncomfortable with Website policies that allow behavioral targeting. Some 57% of respondents in a TNS Global and TRUSTe poll indicated they were worried about advertisers using their browsing history to serve them relevant ads.
  • ...1 more annotation...
  • Still, Internet users respond to personalization, and according to ChoiceStream, the more money viewers spend online, the more likely they are to respond
Pedro Gonçalves

China orders PC makers to install blocking software | World news | The Guardian - 0 views

  • Computer makers in China have been instructed to pre-install blocking software on every PC hard drive from next month, under a government push to control access to the internet.The new software, which has been developed by companies working with the Chinese military, is specifically aimed at restricting online pornography, but it could also be used to strengthen barriers to politically sensitive websites.
  • China's authorities currently block overseas-based sites they disapprove of, such as those relating to Tibetan independence, or the Falun Gong spiritual movement, with a mesh of filters and keyword restrictions, widely known as the Great Firewall.
  • The new software – called Green Dam Youth Escort – potentially adds a powerful new tool at the level of the individual computer. It updates a list of forbidden sites from an online database, much as network security programs automatically download the latest defences against new worms, trojans and viruses.The software, designed to work with the Microsoft Windows operating system, also collects private user data.
  • ...6 more annotations...
  • A separate instruction on the ministry's website obliged schools to install Green Dam on every computer in their institutions by the end of last month.
  • China's ministry of industry and information technology issued a notice to personal computer-makers on 19 May that every machine sold from 1 July must be preloaded with the software. Last year 40m PCs were sold in China, the world's second biggest market after the US.
  • Optional programs that allow parents to restrict internet access by their children have existed for some time, but this is the first time the government has instructed that every computer be installed with a single centralised system.
  • The software was developed by Jinhui Computer System Engineering in Henan under a 21m yuan (£2.2m) deal with the government.
  • Bryan Zhang, the founder of Jinhui, told reporters his company was compiling a database of forbidden sites, all related to pornography. He claimed users would have the option of uninstalling the software, or choosing to unblock sites, though they will not be permitted to see the list.
  • China periodically launches campaigns against online porn. In the latest drive more than 1,900 websites have been shut down and search engines, such as Google and Baidu, have been castigated for failing to self-regulate. Rights groups say the same techniques, along with cruder methods, are used to stifle websites that embarrass, irritate or threaten the government.Last week the authorities blocked Twitter and Hotmail in the run-up to the 20th anniversary of the Tiananmen Square crackdown.
Argos Media

Computer Spies Breach Fighter-Jet Project - WSJ.com - 0 views

  • Computer spies have broken into the Pentagon's $300 billion Joint Strike Fighter project -- the Defense Department's costliest weapons program ever -- according to current and former government officials familiar with the attacks.
  • Similar incidents have also breached the Air Force's air-traffic-control system in recent months, these people say. In the case of the fighter-jet program, the intruders were able to copy and siphon off several terabytes of data related to design and electronics systems, officials say, potentially making it easier to defend against the craft.
  • The latest intrusions provide new evidence that a battle is heating up between the U.S. and potential adversaries over the data networks that tie the world together. The revelations follow a recent Wall Street Journal report that computers used to control the U.S. electrical-distribution system, as well as other infrastructure, have also been infiltrated by spies abroad.
  • ...18 more annotations...
  • Attacks like these -- or U.S. awareness of them -- appear to have escalated in the past six months, said one former official briefed on the matter.
  • while the spies were able to download sizable amounts of data related to the jet-fighter, they weren't able to access the most sensitive material, which is stored on computers not connected to the Internet.
  • The Joint Strike Fighter, also known as the F-35 Lightning II, is the costliest and most technically challenging weapons program the Pentagon has ever attempted. The plane, led by Lockheed Martin Corp.
  • A Pentagon report issued last month said that the Chinese military has made "steady progress" in developing online-warfare techniques. China hopes its computer skills can help it compensate for an underdeveloped military, the report said.
  • The Chinese Embassy said in a statement that China "opposes and forbids all forms of cyber crimes." It called the Pentagon's report "a product of the Cold War mentality" and said the allegations of cyber espionage are "intentionally fabricated to fan up China threat sensations."
  • The U.S. has no single government or military office responsible for cyber security. The Obama administration is likely to soon propose creating a senior White House computer-security post to coordinate policy and a new military command that would take the lead in protecting key computer networks from intrusions, according to senior officials.
  • The Bush administration planned to spend about $17 billion over several years on a new online-security initiative and the Obama administration has indicated it could expand on that.
  • Former U.S. officials say the attacks appear to have originated in China. However it can be extremely difficult to determine the true origin because it is easy to mask identities online.
  • Six current and former officials familiar with the matter confirmed that the fighter program had been repeatedly broken into. The Air Force has launched an investigation.
  • Foreign allies are helping develop the aircraft, which opens up other avenues of attack for spies online. At least one breach appears to have occurred in Turkey and another country that is a U.S. ally, according to people familiar with the matter.
  • Joint Strike Fighter test aircraft are already flying, and money to build the jet is included in the Pentagon's budget for this year and next.
  • Computer systems involved with the program appear to have been infiltrated at least as far back as 2007, according to people familiar with the matter. Evidence of penetrations continued to be discovered at least into 2008. The intruders appear to have been interested in data about the design of the plane, its performance statistics and its electronic systems, former officials said.
  • The intruders compromised the system responsible for diagnosing a plane's maintenance problems during flight, according to officials familiar with the matter. However, the plane's most vital systems -- such as flight controls and sensors -- are physically isolated from the publicly accessible Internet, they said.
  • The intruders entered through vulnerabilities in the networks of two or three contractors helping to build the high-tech fighter jet, according to people who have been briefed on the matter. Lockheed Martin is the lead contractor on the program, and Northrop Grumman Corp. and BAE Systems PLC also play major roles in its development.
  • The spies inserted technology that encrypts the data as it's being stolen; as a result, investigators can't tell exactly what data has been taken. A former Pentagon official said the military carried out a thorough cleanup.
  • Investigators traced the penetrations back with a "high level of certainty" to known Chinese Internet protocol, or IP, addresses and digital fingerprints that had been used for attacks in the past, said a person briefed on the matter.
  • As for the intrusion into the Air Force's air-traffic control systems, three current and former officials familiar with the incident said it occurred in recent months. It alarmed U.S. national security officials, particularly at the National Security Agency, because the access the spies gained could have allowed them to interfere with the system, said one former official. The danger is that intruders might find weaknesses that could be exploited to confuse or damage U.S. military craft.
  • In his speech in Austin, Mr. Brenner, the U.S. counterintelligence chief, issued a veiled warning about threats to air traffic in the context of Chinese infiltration of U.S. networks. He spoke of his concerns about the vulnerability of U.S. air traffic control systems to cyber infiltration, adding "our networks are being mapped." He went on to warn of a potential situation where "a fighter pilot can't trust his radar."
Pedro Gonçalves

Parma mayor becomes Italy's most-watched politician | Reuters - 0 views

  • Pizzarotti's leap to fame comes thanks to the grassroots Five-Star Movement, led by comedian Beppe Grillo, which dealt a stunning blow to the parties that have governed Italy for the past two decades in this month's local elections.
  • The movement, which was created just three years ago and relies extensively on the Internet, has become the country's second most popular party with more than 18 percent support and more than half of Italians would consider voting for it, according to opinion polls.
  • Something like an Italian Michael Moore, Grillo's language is irreverent and outlandish. He uses the most vulgar Italian swear words without hesitation, and awards his political rivals colourful nicknames.Monti is "Rigor Montis," and former Premier Silvio Berlusconi is the "psycho-midget". Italy's established parties are dead, he says, and their leaders are "zombies, vampires, mummies".
  • ...3 more annotations...
  • The bear-like Grillo, who sports a beard and a mop of tangled white hair, says Italy should dump the euro, devalue the lira, and force foreign banks to accept debt payments - at a loss - in the new currency.
  • Pizzarotti chooses his words carefully and does not swear. Instead of attacking rivals, he talks about finding "common ground". He sidesteps the question of the euro, saying he is not an economist."We do different jobs," Pizzarotti said of the movement's leader. "He's our loudspeaker, he shakes up people's consciences. He is like a plough that shifts the earth. We are the ones planting the seeds."
  • Grillo refuses to call the movement a party, and bans his candidates from going on TV talk shows. The Internet, his blog and social networks are the movement's main means of communication.It accepts no public campaign financing, unlike the millions of euros pocketed by the established parties every year, funding itself instead from the proceeds of Grillo's stand up shows, and sales of books, videos and T shirts. Pizzarotti spent just over 6,000 euros ($7,500) on his entire campaign.
findanotary

Mobile Notary Devices like Smartphones - 1 views

With the advent of mobile devices like smartphones and tablets, trying to find a notary public online has never been easier. And with that, many notaries public have now taken their local notary se...

Notary Service

started by findanotary on 02 Jul 12 no follow-up yet
yosefong

What are Online Notary Services? - 2 views

With the advent of mobile devices like smartphones and tablets, trying to find a notary public online has never been easier. And with that, many notaries public have now taken their local notary se...

notary public

started by yosefong on 11 Jun 12 no follow-up yet
Argos Media

Pope Admits Online News Can Provide Infallible Aid - NYTimes.com - 0 views

  • The letter released Thursday in which Pope Benedict XVI admitted that the Vatican had made “mistakes” in handling the case of a Holocaust-denying bishop was unprecedented in its directness, its humanity and its acknowledgment of papal fallibility. But it also contained two sentences unique in the annals of church history. “I have been told that consulting the information available on the Internet would have made it possible to perceive the problem early on,” Benedict wrote. “I have learned the lesson that in the future in the Holy See we will have to pay greater attention to that source of news.”
  • The Vatican, a 2,000-year-old monarchy built on the ruins of the Roman Empire and run by octogenarians, has officially recognized the demands of the 24-hour news cycle, not a 24-century one.
Pedro Gonçalves

2 Chinese Schools Said to Be Linked to Online Attacks - NYTimes.com - 0 views

  • A series of online attacks on Google and dozens of other American corporations have been traced to computers at two educational institutions in China, including one with close ties to the Chinese military, say people involved in the investigation.
  • the attacks, aimed at stealing trade secrets and computer codes and capturing e-mail of Chinese human rights activists, may have begun as early as April, months earlier than previously believed.
  • Computer security experts, including investigators from the National Security Agency, have been working since then to pinpoint the source of the attacks. Until recently, the trail had led only to servers in Taiwan.
  • ...6 more annotations...
  • The Chinese schools involved are Shanghai Jiaotong University and the Lanxiang Vocational School
  • Lanxiang, in east China’s Shandong Province, is a huge vocational school that was established with military support and trains some computer scientists for the military. The school’s computer network is operated by a company with close ties to Baidu, the dominant search engine in China and a competitor of Google.
  • Within the computer security industry and the Obama administration, analysts differ over how to interpret the finding that the intrusions appear to come from schools instead of Chinese military installations or government agencies. Some analysts have privately circulated a document asserting that the vocational school is being used as camouflage for government operations. But other computer industry executives and former government officials said it was possible that the schools were cover for a “false flag” intelligence operation being run by a third country. Some have also speculated that the hacking could be a giant example of criminal industrial espionage, aimed at stealing intellectual property from American technology firms.
  • Independent researchers who monitor Chinese information warfare caution that the Chinese have adopted a highly distributed approach to online espionage, making it almost impossible to prove where an attack originated. “We have to understand that they have a different model for computer network exploit operations,” said James C. Mulvenon, a Chinese military specialist and a director at the Center for Intelligence Research and Analysis in Washington. Rather than tightly compartmentalizing online espionage within agencies as the United States does, he said, the Chinese government often involves volunteer “patriotic hackers” to support its policies.
  • Google’s decision to step forward and challenge China over the intrusions has created a highly sensitive issue for the United States government. Shortly after the company went public with its accusations, Secretary of State Hillary Rodham Clinton challenged the Chinese in a speech on Internet censors, suggesting that the country’s efforts to control open access to the Internet were in effect an information-age Berlin Wall.
  • A report on Chinese online warfare prepared for the U.S.-China Economic Security Review Commission in October 2009 by Northrop Grumman identified six regions in China with military efforts to engage in such attacks. Jinan, site of the vocational school, was one of the regions.
Pedro Gonçalves

France24 - IT school denies role in cyber-attack on Google - 0 views

  • A Chinese vocational school which trains IT technicians for the army has denied US media reports that it was behind recent cyber-attacks against Internet giant, Google.
  • the Lanxiang Vocational School in Shandong Province,
  • The New York Times reported on Thursday that the cyber-attacks aimed at Google and dozens of other firms were reportedly traced to computers at two Chinese schools.
  • ...1 more annotation...
  • newspaper said trails led to Shanghai Jiaotong University and the Lanxiang Vocational School, which was created with military backing and trains some of its computer scientists.
Pedro Gonçalves

BBC NEWS | UK | MI6 boss in Facebook entry row - 0 views

  • Personal details about the life of the next head of MI6, Sir John Sawers, have been removed from social networking site Facebook amid security concerns. The Mail on Sunday said his wife put details about their children and the location of their flat on the site. The details were removed after the paper contacted the Foreign Office.
  • Foreign Secretary David Miliband told the BBC's Andrew Marr programme: "Are you leading the news with that? The fact that there's a picture that the head of the MI6 goes swimming - wow, that really is exciting. "It is not a state secret that he wears Speedo swimming trunks, for goodness sake let's grow up.
  • Sir John is due to replace Sir John Scarlett as head of the overseas Secret Intelligence Service (MI6). He has been the UK's Permanent Representative to the UN since 2007. Before that he was political director at the Foreign Office, an envoy in Baghdad and a foreign affairs adviser to former Prime Minister Tony Blair. He was in that post from 1999 to 2001 and was involved in the Kosovo conflict and Northern Ireland peace process. Elsewhere overseas he worked in the British embassy in Washington, as an ambassador in Cairo and to South Africa from 1988 and 1991 when apartheid was ending. Bookmark with: Delicious Digg reddit Facebook StumbleUpon What are these? E-mail this to a friend Printable version Print Sponsor BBC.adverts.write("storyprintsponsorship"); BBC.adverts.show("storyprintsponsorship"); bbc_adsense_slot = "adsense_middle";"pt" == "us" ? bbc_adsense_country = "pt" : bbc_adsense_country = "rest"; google_protectAndRun("ads_core.google_render_ad", google_handleError, google_render_ad);Ads by GoogleZON TVCABOAdira já ao 3Play ZON TVCABO e veja os seus canais preferidos!www.ZON.pt/Pacotes_ZON3Spanish Lessons For YouStep-By-Step Audio Lessons. Get Them Now! Learn Fast.www.How-To-Speak.com/SpanishUK Embassy Visa ServicesFast track your visa application. Appoint Migration Expert today.migrationexpert.com/UK BBC.adverts.show("adsense_middle"); BBC.adverts.write("mpu");Advertisementhttp://ad.doubleclick.net/adj/bbccom.live.site.news/news_uk_content;sectn=news;ctype=content;news=uk;adsense_middle=adsense_middle;adsense_mpu=adsense_mpu;rsi=J08781_10008;rsi=J08781_10
Argos Media

Electricity Grid in U.S. Penetrated By Spies - WSJ.com - 0 views

  • Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials.
  • The spies came from China, Russia and other countries, these officials said, and were believed to be on a mission to navigate the U.S. electrical system and its controls. The intruders haven't sought to damage the power grid or other key infrastructure, but officials warned they could try during a crisis or war.
  • Many of the intrusions were detected not by the companies in charge of the infrastructure but by U.S. intelligence agencies, officials said. Intelligence officials worry about cyber attackers taking control of electrical facilities, a nuclear power plant or financial networks via the Internet.
  • ...9 more annotations...
  • "The Chinese have attempted to map our infrastructure, such as the electrical grid," said a senior intelligence official. "So have the Russians."
  • "Over the past several years, we have seen cyberattacks against critical infrastructures abroad, and many of our own infrastructures are as vulnerable as their foreign counterparts," Director of National Intelligence Dennis Blair recently told lawmakers. "A number of nations, including Russia and China, can disrupt elements of the U.S. information infrastructure."
  • Officials said water, sewage and other infrastructure systems also were at risk.
  • Authorities investigating the intrusions have found software tools left behind that could be used to destroy infrastructure components, the senior intelligence official said. He added, "If we go to war with them, they will try to turn them on."
  • protecting the electrical grid and other infrastructure is a key part of the Obama administration's cybersecurity review, which is to be completed next week
  • It is nearly impossible to know whether or not an attack is government-sponsored because of the difficulty in tracking true identities in cyberspace. U.S. officials said investigators have followed electronic trails of stolen data to China and Russia.
  • Russian and Chinese officials have denied any wrongdoing. "These are pure speculations," said Yevgeniy Khorishko, a spokesman at the Russian Embassy. "Russia has nothing to do with the cyberattacks on the U.S. infrastructure, or on any infrastructure in any other country in the world."
  • A spokesman for the Chinese Embassy in Washington, Wang Baodong, said the Chinese government "resolutely oppose[s] any crime, including hacking, that destroys the Internet or computer network" and has laws barring the practice. China was ready to cooperate with other countries to counter such attacks, he said, and added that "some people overseas with Cold War mentality are indulged in fabricating the sheer lies of the so-called cyberspies in China."
  • Specialists at the U.S. Cyber Consequences Unit, a nonprofit research institute, said attack programs search for openings in a network, much as a thief tests locks on doors. Once inside, these programs and their human controllers can acquire the same access and powers as a systems administrator.
Pedro Gonçalves

NSA collecting phone records of millions of Verizon customers daily | World news | The ... - 0 views

  • The National Security Agency is currently collecting the telephone records of millions of US customers of Verizon, one of America's largest telecoms providers, under a top secret court order issued in April.The order, a copy of which has been obtained by the Guardian, requires Verizon on an "ongoing, daily basis" to give the NSA information on all telephone calls in its systems, both within the US and between the US and other countries.The document shows for the first time that under the Obama administration the communication records of millions of US citizens are being collected indiscriminately and in bulk – regardless of whether they are suspected of any wrongdoing.The secret Foreign Intelligence Surveillance Court (Fisa) granted the order to the FBI on April 25, giving the government unlimited authority to obtain the data for a specified three-month period ending on July 19.Under the terms of the blanket order, the numbers of both parties on a call are handed over, as is location data, call duration, unique identifiers, and the time and duration of all calls. The contents of the conversation itself are not covered.
  • The unlimited nature of the records being handed over to the NSA is extremely unusual. Fisa court orders typically direct the production of records pertaining to a specific named target who is suspected of being an agent of a terrorist group or foreign state, or a finite set of individually named targets.
  • The order, signed by Judge Roger Vinson, compels Verizon to produce to the NSA electronic copies of "all call detail records or 'telephony metadata' created by Verizon for communications between the United States and abroad" or "wholly within the United States, including local telephone calls".
  • ...5 more annotations...
  • The court order expressly bars Verizon from disclosing to the public either the existence of the FBI's request for its customers' records, or the court order itself.
  • The information is classed as "metadata", or transactional information, rather than communications, and so does not require individual warrants to access. The document also specifies that such "metadata" is not limited to the aforementioned items. A 2005 court ruling judged that cell site location data – the nearest cell tower a phone was connected to – was also transactional data, and so could potentially fall under the scope of the order.
  • The court order appears to explain the numerous cryptic public warnings by two US senators, Ron Wyden and Mark Udall, about the scope of the Obama administration's surveillance activities.For roughly two years, the two Democrats have been stridently advising the public that the US government is relying on "secret legal interpretations" to claim surveillance powers so broad that the American public would be "stunned" to learn of the kind of domestic spying being conducted.
  • In a letter to attorney general Eric Holder last year, they argued that "there is now a significant gap between what most Americans think the law allows and what the government secretly claims the law allows.""We believe," they wrote, "that most Americans would be stunned to learn the details of how these secret court opinions have interpreted" the "business records" provision of the Patriot Act.
  • The NSA, as part of a program secretly authorized by President Bush on 4 October 2001, implemented a bulk collection program of domestic telephone, internet and email records. A furore erupted in 2006 when USA Today reported that the NSA had "been secretly collecting the phone call records of tens of millions of Americans, using data provided by AT&T, Verizon and BellSouth" and was "using the data to analyze calling patterns in an effort to detect terrorist activity." Until now, there has been no indication that the Obama administration implemented a similar program.These recent events reflect how profoundly the NSA's mission has transformed from an agency exclusively devoted to foreign intelligence gathering, into one that focuses increasingly on domestic communications.
Pedro Gonçalves

GCHQ intercepted foreign politicians' communications at G20 summits | UK news | The Gua... - 0 views

  • Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts, according to documents seen by the Guardian. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic.
  • The G20 spying appears to have been organised for the more mundane purpose of securing an advantage in meetings. Named targets include long-standing allies such as South Africa and Turkey.
  • According to the material seen by the Guardian, GCHQ generated this product by attacking both the computers and the telephones of delegates.
  • ...4 more annotations...
  • The documents suggest that the operation was sanctioned in principle at a senior level in the government of the then prime minister, Gordon Brown, and that intelligence, including briefings for visiting delegates, was passed to British ministers.
  • A detailed report records the efforts of the NSA's intercept specialists at Menwith Hill in North Yorkshire to target and decode encrypted phone calls from London to Moscow which were made by the Russian president, Dmitry Medvedev, and other Russian delegates.
  • Another document records that when G20 finance ministers met in London in September, GCHQ again took advantage of the occasion to spy on delegates, identifying the Turkish finance minister, Mehmet Simsek, as a target and listing 15 other junior ministers and officials in his delegation as "possible targets". As with the other G20 spying, there is no suggestion that Simsek and his party were involved in any kind of criminal offence. The document explicitly records a political objective – "to establish Turkey's position on agreements from the April London summit" and their "willingness (or not) to co-operate with the rest of the G20 nations".
  • A second review implies that the analysts' findings were being relayed rapidly to British representatives in the G20 meetings, a negotiating advantage of which their allies and opposite numbers may not have been aware: "In a live situation such as this, intelligence received may be used to influence events on the ground taking place just minutes or hours later. This means that it is not sufficient to mine call records afterwards – real-time tip-off is essential."
Pedro Gonçalves

World economies prepare for panic after Greek polls | Reuters - 0 views

  • Officials from the G20 nations, whose leaders are meeting in Mexico next week, said that central banks were ready to take steps to stabilize financial markets - if needed - by providing liquidity and prevent any credit squeeze after Sunday's election. Canada is "ready to act" if the situation takes a serious turn for the worse of there is "an external shock," Andrew MacDougall, a spokesman for Prime Minister Stephen Harper, said on Thursday.
  • Greek banking stocks soared more than 20 percent on Thursday amid market talk that secret opinion polls were showing that a government favourable to the international bailout agreement was likely to emerge after the June 17 election.
  • Central bankers are ready to ensure enough cash is flowing through the financial system if severe market strains emerge after the elections in Greece, which coincide with votes in Egypt and France, G20 officials said."The central banks are preparing for coordinated action to provide liquidity," said a senior G20 aide familiar with discussions among international financial diplomats.
  • ...8 more annotations...
  • Britain did not wait for the elections to announce action. Bank of England Governor Mervyn King said the country would launch a scheme to provide cheap long-term funding to banks to encourage them to lend to businesses and consumers.
  • King said the euro zone's problems were causing a crisis of confidence in Britain that was leading to a self-reinforcing weaker picture of growth."The black cloud has dampened animal spirits so that businesses and households are battening down the hatches to prepare for the storms ahead," he said.
  • Faced with Greek defiance, officials said the euro zone would not tear up the main targets of the bailout no matter who wins the elections, but it might consider giving a new government in Athens some leeway on how it reaches them.
  • "The headline targets cannot be changed," one senior EU official told Reuters. "There could be some tweaks to the path to get there, but not the goals.
  • One euro-zone official said that the main concern, if SYRIZA overwhelmingly won the election, was the risk of large capital outflows from Greece if depositors worry their savings in euros could later be frozen or converted into new drachmas."It is not even about a bank run on Monday morning after the elections. People can now log on to Internet banking and make transfers on Sunday evening as well," an official said, explaining the rationale of the ministerial call.
  • Visiting Rome, Hollande called for the euro zone to adopt bold new mechanisms to insulate member states and their banks from market turmoil, such as a joint fund to pay down debt, putting him on a collision course with Berlin."We need imagination and creativity to find new financial instruments," Hollande told a news conference. "To deepen financial union, there are many options such as a financial transactions tax and joint debt issuance, including euro bonds, euro bills or a debt redemption fund."
  • However, Merkel rejected "miracle solutions" such as issuing joint euro bonds or creating a Europe-wide deposit guarantee scheme. Such proposals were "counterproductive" and would violate the German constitution, she told parliament.
  • She warned against overstraining the resources of Europe's biggest economy, saying: "Germany is putting this strength and this power to use for the well-being of people, not just in Germany but also t
Pedro Gonçalves

China will implode if it doesn't change its authoritarian ways | Will Hutton | Comment ... - 0 views

  • when the People's Daily, the party's mouthpiece, declares that China can no longer generate "blood-smeared" GDP, a rubicon has been crossed.
  • The internet is proving an instrument that not even the authoritarian Chinese can control.
  • China, as I once was memorably told by a group of lawyers in Beijing, is a volcano waiting to explode. It is difficult for those not familiar with the country to comprehend the scale of corruption, the waste of capital, the sheer inefficiency, the ubiquity of the party and the obeisance to hierarchy that is today's China. The mass of Chinese are proud and pleased with what has been achieved since Deng Xiaoping began the era of the "socialist market economy". But there is a widespread and growing recognition that the authoritarian model has to change, a fact that every disaster dramatises.
  • ...3 more annotations...
  • Productivity, efficiency and safety are secondary to two overwhelming needs: to complete the network fast, so creating crucially needed jobs, and to be able to boast that China's capability is cheaper than anybody else's.
  • China is discovering that a sophisticated knowledge economy operating at the frontiers of technology is incompatible with an authoritarian one-party state.
  • There will be a Chinese Spring. And sooner than anyone expects.
Argos Media

BBC NEWS | Europe | Anti-government clash in Georgia - 0 views

  • Languages
    Page last updated at 00:22 GMT, Thursday, 7 May 2009 01:22 UK

    Anti-government clash in Georgia

    Advertisement

    Tensions appear to be rising in Tbilisi

    Anti-government protesters and police have clashed in the Georgian capital, Tbilisi, amid rising national tensions.

    Riot police used batons on protesters trying to enter a police compound where three people were being held over the alleged beating of a local journalist.

    The clashes were the first major unrest since anti-government demonstrations began in early April.

    They come a day after the authorities said they had thwarted an army mutiny at a base outside the capital.

  • Later in the evening, opposition leaders and supporters gathered outside parliament for a rally, as they have daily since 9 April.
  • On Tuesday, Mr Saakashvili claimed his government had put down a brief mutiny among a tank battalion. Tbilisi had said it was part of a Russian-linked coup attempt to kill Mr Saakashvili. But opposition parties said the alleged mutiny was a deliberate attempt by the government to distract attention from the new phase of anti-government protests.
  • ...2 more annotations...
  • The latest unrest comes as Georgia hosts a series of Nato training exercises amid angry condemnation from Russia. They are taking place close to areas where Russian troops are stationed in Georgia's breakaway region of South Ossetia. Russia's President Dmitry Medvedev said the drills, involving more than 1,000 soldiers from 18 countries, were "an overt provocation".
  • Anti-government protesters and police have clashed in the Georgian capital, Tbilisi, amid rising national tensions. Riot police used batons on protesters trying to enter a police compound where three people were being held over the alleged beating of a local journalist. The clashes were the first major unrest since anti-government demonstrations began in early April. They come a day after the authorities said they had thwarted an army mutiny at a base outside the capital.
Pedro Gonçalves

How Iran Protests Threaten Arab Rulers | Newsweek Voices - Christopher Dickey | Newswee... - 0 views

  • The specter of Tiananmen still haunts the Beijing leadership after 20 years, and the idea of a replay fueled this time by the Internet and cell phones clearly horrifies the old guard. So last week, with littler fanfare but a pervasive impact, propaganda authorities issued an emergency notice telling Chinese newspapers and Web sites to cut back their coverage of events in Iran. According to the South China Morning Post, based in Hong Kong, major portals like Sina.com dropped the news agencies' video and deleted comments, replacing them with material from the official People's Daily and Xinhua news service.
1 - 20 of 30 Next ›
Showing 20 items per page