Skip to main content

Home/ Memedia/ Group items tagged of

Rss Feed Group items tagged

isaac Mao

Internet Helps Liberate, Create Music in China : NPR Music - 0 views

shared by isaac Mao on 26 Jun 08 - Cached
  • When America was rocking to the Beatles and Jimi Hendrix, the airwaves in China were dominated by songs with lyrics from Chairman Mao's Little Red Book.
  •  
    Internet Helps Liberate, Create Music in China By Laura Sydell Listen Now [7 min 48 sec] add to playlist Chinese electronic musician B6 B6, a Shanghai-based electronic musician, explored Western music first on pirated CDs and then at music-sharing sites on the Web. Now he collaborates online with other performers. B6's studio equipment -- a jumble of keyboards, etc. Enlarge B6 works out of a home studio in a Shanghai high-rise. Above, some of his musical arsenal. Discover China's Indie Music Neocha Web site image Neocha.com With Sean Leow, B6 co-founded the music-sharing site Neocha.com, an ad-supported service that lets listeners discover music and pays musicians a share of advertising revenue. * Neocha.com * Neocha's "Next" Player Morning Edition, June 25, 2008 - Second in a three-part series. When America was rocking to the Beatles and Jimi Hendrix, the airwaves in China were dominated by songs with lyrics from Chairman Mao's Little Red Book. It's more open today, but the Communist government still bans anything that mentions sex or violence, or that has "low class humor" - which bans an awful lot of American music. So the music most likely to come pouring out of the radio in China is syrupy ballads usually produced in Hong Kong or Taiwan. But Chinese musicians and fans are finding a whole new universe of sound on the Internet. And it's helping to create and nourish a new generation of independent artists in China. From Black-Market Discs to Napster and Beyond One of them is B6, a 27-year-old electronic musician. He lives and works on the first floor of a high-rise on the outskirts of Shanghai. He's part of China's burgeoning electronic-music scene. Growing up, the CDs B6 listened to were mostly sold on the black market. "When I was in high school, I used to listen to rock 'n' roll music," he says. "At that time, it was very difficult to get foreign or Western music." And then, in 1999, the Internet came to China - and B6 and his fr
feng37

Change you can download: a billion in secret Congressional reports - Wikileaks - 0 views

  • Wikileaks has released nearly a billion dollars worth of quasi-secret reports commissioned by the United States Congress. Frontpage of sample CRS report, RL31555: China and Proliferation of Weapons of Mass Destruction and Missiles: Policy Issues, dated January 7, 2009. A full listing of reports is available here.
  • The 6,780 reports, current as of this month, comprise over 127,000 pages of material on some of the most contentious issues in the nation, from the U.S. relationship with Israel to the financial collapse.
  • The Federation of American Scientists, in pushing for the reports to be made public, stated that the "CRS is Congress' Brain and it's useful for the public to be plugged into it,"[2]. While Wired magazine called their concealment "The biggest Congressional scandal of the digital age"[3]. Although all CRS reports are legally in the public domain, they are quasi-secret because the CRS, as a matter of policy, makes the reports available only to members of Congress, Congressional committees and select sister agencies such as the GAO.
  • ...1 more annotation...
  • Opportunists smuggle out nearly all reports and sell them to cashed up special interests--lobbyists, law firms, multi-nationals, and presumably, foreign governments. Congress has turned a blind eye to special interest access, while continuing to vote down public access.
feng37

Digital Resistance and the Orange Revolution « iRevolution - 0 views

  • Maidan was a group of tech-savvy pro-democracy activists who used the Internet as a tool to support their movement. Maidan in Ukranian means public square and Maidan’s website features the slogal “You CAN chnage the world you live in. And you can do it now. In Ukraine.”
    • feng37
       
      买单?
  • The main activity of Maidan was election monitoring and networking with other pro-democracy organizations around Eastern Europe.
  • “websites cannot produce an activist organization.”
  • ...16 more annotations...
  • it was crucial for Maidan to frequently host real world meetings as their membership base increased. The human element was particularly important. This explains why Maidan encouraged users to disclose their identity whenever possible.
  • The community benefited from centralized leadership that developed the organization’s culture, controlled its assets and provided the strategy to achieve desired goals. The Maidan experience thus demonstrates a hybrid organization.
  • Pora, meaning “It’s Time” in Ukranian, was a well-organized group of  pro-democracy volunteers that “emerged as an information sharing campaign and during the elections morphed into coordinators of mass protest centered around tent cities in towns throughout Ukraine. The grassroots movement took its inspiration from Serbia’s Otpor movements as well as “older civic movements in Hungary and Czechoslovakia.”
  • “the active use of modern communication systems in the campaign’s management,” and “mobile phones played an important role for mobile fleet of activists.”
  • “a ssytem of immedate dissemination of information by SMS was put in place and proved important.” In addition, “some groups provided the phones themselves, while others provided SIM cards, and most provided airtime.”
  • roviding rapid reporting in a way that no other medium could. As tent cities across the Ukraine became the sign of the revolution,
  • The news feed from the regions [became] vitally important. Every 10 to 15 minutes another tent city appeared in some town or other, and the fact was soon reported on the air.
  • While the government certainly saw the Internet as a threat, the government had not come to consensus regarding the “legal and political frameworks it would use to silence journalists that published openly on this new medium.”
  • many online journalists unlike mainstream journalists were free from the threat of defamation charges.
  • one of the earliest examples of what Steven Mann calls “sousveillance,” meaning, “the monitoring of authority figures by grassroots groups, using the technologies and techniques of surveillance.”
  • Technology certainly does not make possible a direct democracy, where everyone can participate in a decision, nor representative democracy where decision makers are elected; nor is it really a one-person-one-vote referendum style democracy. Instead it is a consultative process known as ‘rough consensus and running code.’
  • the real power of traditional media. Natalia Dmytruk worked for the Ukraine’s state-run television news program as an interpreter of sign language for the hearing-impaired. As the revolution picked up momentum, she decided she couldn’t lie anymore and broke from the script with the following message: I am addressing everybody who is deaf in the Ukraine. Our president is Victor Yushchenko. Do not trust the results of the central election committee. They are all lies. . . . And I am very ashamed to translate such lies to you. Maybe you will see me again…
  • “Dmytruk’s live silent signal helped spread the news, and more people began spilling into the streets to contest the vote.”
  • itizen journalists and digital activists participated in civil resistance trainings across the country, courtesy of Otpor. The use of humor and puns directed at the regime is a classic civil resistance tactic.
  • one of key reasons that explains the success of the revolution has to do with the fact that “the protesters were very well trained and very good at protesting… very, very good.”
  • Digital activists need to acquire the tactical and strategic know-how developed over decades of civil resistance movements. Otherwise, tactical victories by digital activists may never translate into overall strategic victory for a civil resistance movement.
arden dzx

Victim or Victor? China's Olympic Odyssey - WSJ.com - 0 views

  • Modern Chinese nationalism often veers between Mr. Coubertin's and Mr. Maurras's ideas of nationhood. Officially, the government likes to talk about friendship between peoples, and harmony and peace, while at the same time promoting an injured sense of historical Chinese victimhood at the hands of foreign powers. When demonstrations of Chinese nationalism run out of control, with or without official encouragement, the feeling of national hurt can turn to violent aggression. It has been happening of late in the U.S., among other places, when Chinese students attacked Tibetans, or indeed anyone who "offended the feelings of the Chinese people."
  • This type of official patriotism is based on a peculiarly skewed view of history. Rather than celebrate the high points of Chinese civilization, the emphasis falls entirely on suffering at the hands of foreigners. The sense of victimhood runs so deep that it is impossible for most Chinese to view themselves as aggressors. The idea that Tibetans, for example, might have some reason to see themselves as victims of the Chinese, is absurd. More than that, many Chinese genuinely believe that this type of Tibetan "propaganda" has been deliberately taken up by the Western press to inflict yet another humiliation on the Chinese people.
  • This does not mean, however, that democracy would be an automatic cure. In the unlikely event that China were suddenly to have a peaceful transformation to a liberal democracy, nationalism would not go away. No party seen to be soft on foreign powers, especially Japan and the U.S., would be. Modern Chinese history has been so bloody that the scars will take a long time to heal. Ethnic nationalism can be a kind of poison, especially when it is based on a feeling of victimhood. Political freedom should help to soothe such feelings in the long run, but this will not happen in time for the Beijing Olympics.
  • ...1 more annotation...
  • Aggressive nationalism usually goes together with authoritarian politics. When people have no legitimate means to show dissent, vent their frustrations, express critical opinions in public, and generally take part in politics, nationalism fills the void. As long as they can control it, this suits authoritarian rulers. In China, a certain unspoken sense of guilt may also play a role. The same people who demanded democracy in 1989, when they were students, are now often among the fiercest nationalists. The educated urban elite has prospered since the Tiananmen Massacre, and when people are reminded of the political compromises this involved, resentment can flare up easily.
evawoo

RGE - Adapting to the state's growing role in global equity markets - 0 views

  • Central bank purchases of traditional reserve assets still dwarf sovereign wealth fund purchases of riskier assets -- as well as central bank purchases of equities. But over time, it is reasonable to expect that many over-reserved sovereigns will diversify their portfolios. The recent decision to increase the share of the CIC's initial $205-210 billion in capital that it can invest abroad and SAFE's increased willingness to purchase equities as well as bonds are examples.
  • A far more challenging issue is how the huge increase in financial assets managed by potentially non-economic agents will affect the efficiency of the global capital market and the allocation of risk and resources. ….
  • And then there is China. China enormous foreign asset growth in the first quarter implies that it might be able to add more to its reserves and sovereign fund in 2008 than all the oil-exporters combined even if oil stays at its current levels.
  • ...6 more annotations...
  • China consequently has an enormous latent capacity to alter the composition of global capital flows by changing the composition of its portfolio:
  • The offsetting risk is that state owners of assets will in some sense abuse their ownership rights, and use their rights to promote “state” objectives.
  • Qatar’s advertising in Forbes says as much: the QIA's evaluation criteria include “added value to the State of Qatar" such as "economic synergies or benefits for Qatar and its people."  Mubadala has made a string of investments (Ferrari, the “National”) designed to elevate the profile of Abu Dhabi.
  • China’s fund, like Singapore’s fund, reports directly to the top levels of China’s state. It has yet to build up enough of a track record to show how it will be used. However, China’s management of its state stakes in domestic industries suggests the need for some caution. One example: Three of China's four large state commercial banks have been listed, but they still aren’t managed in a fully commercial manner.
  • The Peterson Institute’s Ted Truman recently updated his “sovereign wealth fund scorecard.” His impressive and detailed work is worth reading carefully. Truman’s latest scorecard illustrates how the practices of many large existing sovereign funds – particularly those originating in non-democratic countries – differ from the practices of US state pension funds as well as Norway's government fund.
  • Kjaer’s framing implicitly raises a third issue, one that I don’t think has gotten enough attention. The surge in sovereign investment in safe government bonds that accompanied the surge in global reserve growth likely contributed to a “bond market bubble” – one that pushed down the real yields on government bonds in both the US. That contributed to a host of additional market distortions, as private investors scrambled to find higher returns.
  •  
    中国外储投资对于世界资本市场的终极影响
evawoo

The Hypocrisy and Danger of Anti-China Demonstrations - CommonDreams.org - 0 views

shared by evawoo on 20 Apr 08 - Cached
  • We hear that Tibetans suffer “demographic aggression” and “cultural genocide”. But we do not hear those terms applied to Spanish and French policies toward the Basque minority. We do not hear those terms applied to the US annexation of the Kingdom of Hawaii in 1898. And Diego Garcia? In 1973, not so long ago, the UK forcibly deported the entire native Chagossian population from the Indian Ocean island of Diego Garcia. People were allowed one suitcase of clothing. Nothing else. Family pets were gassed, then cremated. Complete ethnic cleansing. Complete cultural destruction. Why? In order to build a big US air base. It has been used to bomb Afghanistan and Iraq, and soon maybe to bomb Iran and Pakistan. Diego Garcia, with nobody there but Brits and Americans, is also a perfect place for rendition, torture and other illegal actions.
  • The Chinese Context The Chinese government is responsible for the well-being and security of one-fourth of humanity. Race riots and rebellion cannot be tolerated, not even when done by Buddhist monks. Chinese Civilization was already old when the Egyptians began building pyramids. But the last 200 years have not gone well, what with two Opium Wars forcing China to import drugs, and Europeans seizing coastal ports as a step to complete colonial control, then the Boxer Rebellion, the collapse of the Manchu Dynasty, civil war, a brutal invasion and occupation by Japan, more civil war, then Communist consolidation and transformation of society, then Mao’s Cultural Revolution. Such events caused tens of millions of people to die. Thus, China’s recent history has good reasons why social order is a higher priority than individual rights. Race riots and rebellion cannot be tolerated. Considering this context, China’s treatment of its minorities has been exemplary compared to what the Western world has done to its minorities. After thousands of years of Chinese dominance, there still are more than 50 minorities in China. After a few hundred years of European dominance in North and South America, the original minority cultures have been exterminated, damaged, or diminished.
  • China’s one-child-policy seems oppressive to Westerners, but it has not applied to minorities, only to the Han Chinese. Tibetans can have as many children as they choose. If Han people have more than one child, they are punished. There is a similar preference given to minorities when it comes to admission to universities. For example, Tibetan students enter China’s elite Peking University with lower exam scores than Han Chinese students. China is not a perfect nation, but on matters of minority rights, it has been better than most Western nations. And China achieved this in the historical context of restoring itself and recovering from 200 years of continual crisis and foreign invasion.
  •  
    一篇还算公道的为所谓中国对西藏"种族侵略""文化清洗"做辩护的英文文章
feng37

Obama's support for the FISA "compromise" - Glenn Greenwald - Salon.com - 0 views

shared by feng37 on 22 Jun 08 - Cached
  • This bill doesn't legalize every part of Bush's illegal warrantless eavesdropping program but it takes a large step beyond FISA towards what Bush did. There was absolutely no reason to destroy the FISA framework, which is already an extraordinarily pro-Executive instrument that vests vast eavesdropping powers in the President, in order to empower the President to spy on large parts of our international communications with no warrants at all. This was all done by invoking the scary spectre of Terrorism -- "you must give up your privacy and constitutional rights to us if you want us to keep you safe" -- and it is Obama's willingness to embrace that rancid framework, the defining mindset of the Bush years, that is most deserving of intense criticism here.
  • Beyond that, this attitude that we should uncritically support Obama in everything he does and refrain from criticizing him is unhealthy in the extreme. No political leader merits uncritical devotion -- neither when they are running for office nor when they occupy it -- and there are few things more dangerous than announcing that you so deeply believe in the Core Goodness of a political leader, or that we face such extreme political crises that you trust and support whatever your Leader does, even when you don't understand it or think that it's wrong. That's precisely the warped authoritarian mindset that defined the Bush Movement and led to the insanity of the post-9/11 Era, and that uncritical reverence is no more attractive or healthy when it's shifted to a new Leader.
  •  
    This bill doesn't legalize every part of Bush's illegal warrantless eavesdropping program but it takes a large step beyond FISA towards what Bush did. There was absolutely no reason to destroy the FISA framework, which is already an extraordinarily pro-Executive instrument that vests vast eavesdropping powers in the President, in order to empower the President to spy on large parts of our international communications with no warrants at all. This was all done by invoking the scary spectre of Terrorism -- "you must give up your privacy and constitutional rights to us if you want us to keep you safe" -- and it is Obama's willingness to embrace that rancid framework, the defining mindset of the Bush years, that is most deserving of intense criticism here.
arden dzx

Message on the Twentieth Anniversary of Tiananmen Square - 0 views

  • Message on the Twentieth Anniversary of Tiananmen SquareHillary Rodham Clinton Secretary of State Washington, DC June 3, 2009On this the 20th anniversary of the violent suppression of demonstrations in Tiananmen Square by Chinese authorities, we should remember the tragic loss of hundreds of innocent lives and reflect upon the meaning of the events that preceded that day. Hundreds of thousands of protesters took to the streets for weeks, in Beijing and around the country, first to honor the late reformist leader Hu Yaobang and then to demand basic rights denied to them.A China that has made enormous progress economically, and that is emerging to take its rightful place in global leadership, should examine openly the darker events of its past and provide a public accounting of those killed, detained or missing, both to learn and to heal. This anniversary provides an opportunity for Chinese authorities to release from prison all those still serving sentences in connection with the events surrounding June 4, 1989. We urge China to cease the harassment of participants in the demonstrations and begin dialogue with the family members of victims, including the Tiananmen Mothers. China can honor the memory of that day by moving to give the rule of law, protection of internationally-recognized human rights, and democratic development the same priority as it has given to economic reform.
feng37

Impact of ICTs on Repressive Regimes: Findings « iRevolution - 0 views

  • whether digital resistance poses a threat to authoritarian rule?
  • test whether the diffusion of information communication technology—measured by increasing numbers of Internet and mobile phone users—is a statistically significant predictor of anti-government protests after controlling for other causes of protests.
  • The cluster of countries with high levels of mobile phones produced a statistically significant and positive relationship between the number of mobile phone users and protest frequency. In other words, an increase in the number of mobile phones is associated with an increase in the number of protests.
  • ...2 more annotations...
  • The number of Internet users was not significant for any of the five models.
  • The results may suggest that the information revolution empowers civil resistance movements at the expense of repressive regimes in countries with relatively high levels of access to technology. On the other hand, repressive regimes appear to maintain the upper hand in countries with low levels of protest.
feng37

Magazine Preview - Malwebolence - The World of Web Trolling - NYTimes.com - 0 views

  • That the Internet is now capacious enough to host an entire subculture of users who enjoy undermining its founding values is yet another symptom of its phenomenal success. It may not be a bad thing that the least-mature users have built remote ghettos of anonymity where the malice is usually intramural. But how do we deal with cases like An Hero, epilepsy hacks and the possibility of real harm being inflicted on strangers?
  • n June, Lori Drew pleaded not guilty to charges that she violated federal fraud laws by creating a false identity “to torment, harass, humiliate and embarrass” another user, and by violating MySpace’s terms of service. But hardly anyone bothers to read terms of service, and millions create false identities.
  •  
    That the Internet is now capacious enough to host an entire subculture of users who enjoy undermining its founding values is yet another symptom of its phenomenal success. It may not be a bad thing that the least-mature users have built remote ghettos of anonymity where the malice is usually intramural. But how do we deal with cases like An Hero, epilepsy hacks and the possibility of real harm being inflicted on strangers?
feng37

…My heart's in Accra » Studying Twitter and the Moldovan protests - 0 views

  • At some point on Friday, we hit a peak tweet density - 410 of 100,000 tweets included the #pman tag. Had I been scraping results by iterating 100,000 tweets at a time, I would have had four pages of new results - my script is only looking at the first page, so I’d be dropping results. If I ran the script again, I’d try to figure out the maximum tweet density by looking for the moment where the meme was most hyped, try to do a back of the envelope calculation as to an optimum step size and then halve it - that would probably have me using 20,000 steps for this set.
  • Density of tweets charted against blocks of 100,000 tweets
  • http://search.twitter.com/search?max_id=1511783811&page=2&q=%23pman&rpp=100 Picking apart the URL: max_id=1511783811 - Only return results up to tweet #1511783811 in the database page=2 - Hand over the second page of results q=%23pman - The query is for the string #pman, encoded to escape the hash rpp=100 - Give the user 100 results per page While you can manipulate these variables to your heart’s content, you can’t get more than 100 results per page. And if you retrieve 100 results per page, your results will stop at around 15 pages - the engine, by default, wants to give you only 1500 results on any search. This makes sense from a user perspective - it’s pretty rare that you actually want to read the last 1500 posts that mention the fail whale - but it’s a pain in the ass for researchers.
  • ...3 more annotations...
  • What you need to do is figure out the approximate tweet ID number that was current when the phenomenon you’re studying was taking place. If you’re a regular twitterer, go to your personal timeline, find a tweet you posted on April 7th, and click on the date to get the ID of the tweet. In the early morning (GMT) of the 7th, the ID for a new tweet was roughly 1468000000 - the URL http://search.twitter.com/search?max_id=1468000000&q=%23pman&rpp=100 retrieves the first four tweets to use the tag #pman, including our Ur-tweet: evisoft: neata, propun sa utilizam tag-ul #pman pentru mesajele din piata marii adunari nationale My Romanian’s a little rusty, but Vitalie Eşanu appears to be suggesting we use the tag #pman - short for Piata Marii Adunari Nationale, the main square in Chisinau where the protests were slated to begin - in reference to posts about the protests. His post is timestamped 4:40am GMT, suggesting that there were at least some discussions about promoting the protests on Twitter before protesters took to the streets.
  • Now the key is to grab URLs from Twitter, increasing the max_id variable in steps so that we’re getting all results from the start tweet ID to the current tweet ID. My perl script to do this steps by 10,000 results at a time, scraping the results I get from Twitter (using the Atom feed, not the HTML) and dumping novel results into a database. This seems like a pretty fine-toothed comb to use… but if you want to be comprehensive, it’s important to figure out what maximum “tweet density” is before running your code.
  •  
    http://search.twitter.com/search?max_id=1511783811&page=2&q=%23pman&rpp=100 Picking apart the URL: max_id=1511783811 - Only return results up to tweet #1511783811 in the database page=2 - Hand over the second page of results q=%23pman - The query is for the string #pman, encoded to escape the hash rpp=100 - Give the user 100 results per page While you can manipulate these variables to your heart's content, you can't get more than 100 results per page. And if you retrieve 100 results per page, your results will stop at around 15 pages - the engine, by default, wants to give you only 1500 results on any search. This makes sense from a user perspective - it's pretty rare that you actually want to read the last 1500 posts that mention the fail whale - but it's a pain in the ass for researchers. What you need to do is figure out the approximate tweet ID number that was current when the phenomenon you're studying was taking place. If you're a regular twitterer, go to your personal timeline, find a tweet you posted on April 7th, and click on the date to get the ID of the tweet. In the early morning (GMT) of the 7th, the ID for a new tweet was roughly 1468000000 - the URL http://search.twitter.com/search?max_id=1468000000&q=%23pman&rpp=100 retrieves the first four tweets to use the tag #pman, including our Ur-tweet: evisoft: neata, propun sa utilizam tag-ul #pman pentru mesajele din piata marii adunari nationale My Romanian's a little rusty, but Vitalie Eşanu appears to be suggesting we use the tag #pman - short for Piata Marii Adunari Nationale, the main square in Chisinau where the protests were slated to begin - in reference to posts about the protests. His post is timestamped 4:40am GMT, suggesting that there were at least some discussions about promoting the protests on Twitter before protesters took to the streets. Now the key is to grab URLs from Twitter, increasing the max_id variable in steps so that we're getting all results from the st
feng37

Stephen Fry » Blog Archive » The BBC and the future of broadcasting - 0 views

shared by feng37 on 19 Jun 08 - Cached
  • Here was a report that really delivered a blow to the BBC’s solar plexus. Peacock began to foresee the possibility of digital diversity on an unimagined scale, it also put forward the ideas of a consumer-led, market driven broadcasting world, one in which the very principles of a licence fee funded public service broadcasting system would naturally be seen as obsolete. This suited the tenor of the times: deregulation, privatisation and a rigorous dismantling of the frontiers of the state – it was happening in the city and in industry and the utilities, why not broadcasting? The BBC, long seen as harbouring tendencies and personnel that were socialistic at best, Marxist at worst, was suddenly no longer a secure and unassailable acropolis. It was no secret that Norman Tebbit and some of the more fundamentalist free-marketeers and red-baiters of the administration would have been very happy indeed to dismantle the entire structure of the BBC. Peacock prevaricated and the charter appeared safe, but at a great price. Nothing would ever be the same again, the old certainties were dead and the harsh realities of capitalism arrived at Wood Lane and Portland Place. Whole departments were razed and working practices abolished, and something called an internal market was put in place. Radio Times was outsourced, the permanent make-up staff went, engineers, editors and set-designers were suddenly out of a job. Twenty-five percent of the BBC’s output was commanded to be produced from outside sources and a whole new independent sector was born. Companies like Hat Trick and Talk Back achieved almost instant success.
evawoo

Transcript: James Miles interview on Tibet - CNN.com - 0 views

  • BEIJING, China (CNN) -- James Miles, of The Economist, has just returned from Lhasa, Tibet. The following is a transcript of an interview he gave to CNN. James Miles
  • So in effect what they did was sacrifice the livelihoods of many, many ethnic Han Chinese in the city for the sake of letting the rioters vent their anger. And then being able to move in gradually with troops with rifles that they occasionally let off with single shots, apparently warning shots, in order to scare everybody back into their homes and put an end to this.
  • Well the Chinese response to this was very interesting. B
  • ...7 more annotations...
  • What I saw was calculated targeted violence against an ethnic group, or I should say two ethnic groups, primarily ethnic Han Chinese living in Lhasa, but also members of the Muslim Hui minority in Lhasa.
  • Well we didn't see any evidence of any organized activity, at least there was nothing in what I sensed and saw during those couple of days of unrest in Lhasa, there was anything organized behind it.
  • Now numerous Hans that I spoke to say that they are so afraid they may leave the city, which may have very damaging consequences for Lhasa's economy, Tibet's economy.
  • But their fear now is that Tibetans will blow up the railway line. That it is now actually safer to fly out of Tibet than to go by railway.
  • And also many troops there whose uniforms were distinctly lacking in the usual insignia of either the police or the riot police. So my very, very strong suspicion is that the army is out there and is in control in Lhasa. A
  • I've been a journalist in China now for 15 years altogether. This is the first time that I've ever got official approval to go to Tibet. And it's remarkable I think that they decided to let me stay there and probably they felt that it was a bit of a gamble. But as the protests went on I think they also probably felt that having me there would help to get across the scale of the ethnically-targeted violence that the Chinese themselves have also been trying to highlight.
  • And the authorities were responding to these occasional clashes with Tibetans not by moving forward rapidly with either riot police and truncheons and shields, or indeed troops with rifles. But for a long time, just with occasional, with the very occasional round of tear gas
  •  
    Save Bookmark
feng37

freedomhouse.org: Press Release - 0 views

  • Thirteen years ago in Beijing, you spoke eloquently about the duty of all governments to respect the fundamental human rights of women and men. Respect for human rights, you said, means “not taking citizens away from their loved ones and jailing them, mistreating them, or denying them their freedom or dignity because of the peaceful expression of their ideas and opinions.” In recent years, however, human rights concerns have been pushed progressively further to the margins of the U.S.-China relationship. The Chinese government’s growing financial, diplomatic, and military strength, coupled with its hostility to reforms that challenge the Chinese Communist Party’s grip on power, make China a difficult country in which to effect change. But the advancement of human rights in, and with, China is arguably more central to U.S. interests than ever before. Press censorship in China makes it possible for toxic food and public health crises to spread globally. Suppression of dissent removes internal checks against environmental damage that has global impact. Abuses of low-wage labor implicate international firms operating inside China and compromise goods that come into the United States. The government’s control of mass media and the internet allow it to stoke nationalist anger against the United States in moments of crisis. The export from China of internet-censoring technologies and its provision of unconditional aid to repressive regimes increases the United States' burdens in fighting censorship and human rights crises worldwide. As much as the Chinese government appears to resist outside pressure to improve its record, experience suggests that it does respond to such pressure.
feng37

Cory Doctorow: Big Brother is not watching | Technology | guardian.co.uk - 0 views

  • Needles in a haystackThe problem of sifting through vast amounts of data was highlighted by the US 9/11 Commission, which concluded that the American intelligence community knew in advance that the attacks on the World Trade Center and Pentagon were in the offing, they just didn't know they knew it. The pieces were all there for anyone who knew to look for them, needles buried in a haystack of irrelevancies. The answer in both America and Britain has been to collect more haystacks: useless, indiscriminately acquired information onpeople who've done nothing to arouse suspicion. We even inveigle our citizens to become amateur curtain-twitchers and pecksniffs, demanding that they report "suspicious" activity to the authorities.
  •  
    Needles in a haystack The problem of sifting through vast amounts of data was highlighted by the US 9/11 Commission, which concluded that the American intelligence community knew in advance that the attacks on the World Trade Center and Pentagon were in the offing, they just didn't know they knew it. The pieces were all there for anyone who knew to look for them, needles buried in a haystack of irrelevancies. The answer in both America and Britain has been to collect more haystacks: useless, indiscriminately acquired information on people who've done nothing to arouse suspicion. We even inveigle our citizens to become amateur curtain-twitchers and pecksniffs, demanding that they report "suspicious" activity to the authorities.
feng37

The Crackdown to Come - WSJ.com - 0 views

  • As a key element of the revival of Chairman Mao Zedong's "people's warfare," Beijing and a number of other cities have revived the vigilante and spying functions of neighborhood committees. Municipal administrations along the coast -- and in the autonomous regions of Tibet and Xinjiang -- have recently earmarked additional budget to maintain the "spying" functions of neighborhood committees and similar vigilante outfits after the Olympics. Moreover, the Politburo's Central Political and Legal Commission, China's highest law-enforcement agency, has urged the courts and prosecutors to do more in fulfilling the party's priority task of thwarting anti-Beijing conspiracies and upholding sociopolitical stability. That the courts will comply in this is evident from a just-released article by the President of the Supreme People's Court, Wang Shengjun. Writing in this week's edition of the official Seeking Truth journal, Mr. Wang said: "We must pay more attention to maintaining state security and social stability. . . We must boost our consciousness of [safeguarding] the power of the regime . . . and fully develop our functions as a department for [proletarian] dictatorship."
feng37

Mutant Palm » Blog Archive » Chinese & Western Overreactions to Charter 08 - 0 views

  • On the other hand, I’ve seen no one addressing the questions of actual political and bureaucratic process. What comes first? Elections in major urban centers like Shanghai, a sort of Special Democratic Zone? Loosening of Internet controls? Judiciary reform? Privatization of state media? Releasing political prisoners? Local officials already abuse existing structures, how much more will they abuse transitional processes? If you don’t want a revolution, then there has to be some sort of proposed process that the current government can work with and Chinese citizens can feel both moves reform forward and doesn’t threaten to unravel society. If you don’t say anything about how you might accomplish such a thing, but simply describe the end result in which the government becomes something unrecognizable from the existing one, you may not have explicitly called for its overthrow but you sure didn’t call for something else instead. Not to mention its difficult not to see it as just a wish list. Anybody can make a wishlist - who’s going to do the real work?
  • I think the commenter who asks whether Charter 08 is really calling for a revolution has a point, and it’s not fair to riposte “well, if this all happened it would be revolutionary”. It wouldn’t be if the changes happened gradually or in a controlled and orderly way (as they did in other countries). The party itself, after all, keeps promising political reform, and many of the people who support it so heartily do so on the assumption that it is serious about eventually keeping that promise. The people I spoke to (and quoted) did not think this was a substitute for tackling concrete real life issues, but thought it important to have a framework within which to do so.
  • Notice, also that I said a “revolution of the system of government”. Not the government, the system. The problems I’m referring to is that when the system, the way things are done, from paying your electricity bill to detemining holders of public office, changes radically, 180 degrees, then there can be terrible consequences. How should one try to avoid those consequences? How can you make the transition smoothly? These are the things that ought to be discussed, and these are the things that will persuade people that your ideals can actually be realized. That might get you a groundswell of demand for change - abstract philosophical manifestos, though, don’t cut it.
feng37

Joho the Blog » McCain models tech policy on our oh-so-successful energy policy - 0 views

  • THE MCCAIN NEGATIVE WORDCLOUDWords Not in McCain’s Tech Policy | blog |social network | collaboration | hyperlink | democracy | google | wikipedia | open access | open source | standards | gnu | linux | | BitTorrent | anonymity | facebook | wiki | free speech | games | comcast | media concentration | media | lolcats |
  • Even if we ignore the cultural, social, and democratic aspects of the Net, even if we consider the Net to be nothing but a way to move content to “consumers” (his word), McCain still gets it wrong. There’s nothing in his policy about encouraging the free flow of ideas. Instead, when McCain thinks about ideas, he thinks about how to increase the walls around them by cracking down on “pirates” and ensuring ” fair rewards to intellectual property” (which, technically speaking, I think isn’t even English). Ideas and culture are, to John McCain, business commodities. He totally misses the dramatic and startling success of the Web in generating new value via open access to ideas and cultural products. The two candidates’ visions of the Internet could not be clearer. We can have a national LAN designed first and foremost to benefit business, and delivered to passive consumers for whom the Net is a type of cable TV. Or, we can have an Internet that is of the people, by the people, for the people. Is it going to be our Internet or theirs?
  • “Senator McCain’s technology plan doesn’t put Americans first—it is a rehash of tax breaks and giveaways to the big corporations and their lobbyists who advise the McCain campaign. This plan won’t do enough for hardworking Americans who are still waiting for competitive and affordable broadband service at their homes and businesses. It won’t do enough to ensure a free and open Internet that guarantees freedom of speech. It won’t do anything to ensure that we use technology to bring transparency to government and free Washington from the grip of lobbyists and special interests. Senator McCain’s plan would continue George Bush’s neglect of this critical sector and relegate America’s communications infrastructure to second-class status. That’s not acceptable,” said William Kennard, Former Chairman, Federal Communications Commission.
isaac Mao

U.N. agency eyes curbs on Internet anonymity | Politics and Law - CNET News - 0 views

  • A United Nations agency is quietly drafting technical standards, proposed by the Chinese government, to define methods of tracing the original source of Internet communications and potentially curbing the ability of users to remain anonymous.
  • The Chinese author of the document, Huirong Tian, did not respond to repeated interview requests. Neither did Jiayong Chen of China's state-owned ZTE Corporation, the vice chairman of the Q6/17's parent group who suggested in an April 2007 meeting that it address IP traceback.
  • Another technologist, Jacob Appelbaum, one of the developers of the Tor anonymity system, also was alarmed. "The technical nature of this 'feature' is such a beast that it cannot and will not see the light of day on the Internet," Appelbaum said. "If such a system was deployed, it would be heavily abused by precisely those people that it would supposedly trace. No blackhat would ever be caught by this."
feng37

Digital renegades, or captives? - International Herald Tribune - 0 views

shared by feng37 on 12 Dec 08 - Cached
  • We have to be aware of the fact that the Internet has given the youth living in controlled societies infinite venues for digital entertainment - without any religious or social censorship - that may not necessarily be enhancing their digital sense of citizenship and civic engagement. Risking the comfort of their bedrooms - with their hard-drives full of digital goodies - for the gloom of a prison cell does not appeal to many of them. The governments are all too happy to promote this new cult of "cyber-hedonism." Whatever keeps these troubled youths from the streets is inherently a good thing.
  • The fact that existing political activists embraced the Internet as a tool of mobilization is fairly noncontroversial. What's less obvious is how many digital natives the Internet has turned into digital renegades - and how many into digital captives. It's precisely this balance that will determine what the political landscape of Russia, China or Iran will look like in 10 years.
1 - 20 of 209 Next › Last »
Showing 20 items per page