A Crackdown on Vietnam’s Press

The Economist:

LIKE their counterparts in China, Vietnam’s ruling Communists seem even more than usually sensitive to criticism. This month two leading reformist newspaper editors, Nguyen Cong Khe, of Thanh Nien (Young People), and Le Hoang, of Tuoi Tre (Youth Daily), were both told that their contracts would not be renewed, apparently because they were too good at their jobs. Their papers have assiduously uncovered official corruption, most notably with a joint exposé in 2006 about a crooked transport-ministry road-building unit. The journalists behind that story were punished by a Hanoi court last October for “abusing democratic freedoms”. Now it looks as if their editors, too, have been culled. A spate of other arrests last year suggests a wider clampdown.
AFP Read all about it (or not)

Ever since the start of doi moi (renewal) reforms in 1986, economic liberalisation has been accompanied by a gradual political loosening. There are around 700 newspapers in circulation. All are government controlled, but some are relatively outspoken. Meanwhile, a young, tech-savvy population has taken to reading opinion on the internet, in blogs penned by pseudonymous authors. These commentators are questioning government policy with increasing zeal. A day after the two journalists were arrested last year, their newspapers openly attacked the government’s actions, hitting a few raw nerves. The government now also wants to curb the pesky bloggers, announcing rules in December restricting politically sensitive content on the internet.

“Counter Blog”

Noah Shachtman:

Bloggers: If you suddenly find Air Force officers leaving barbed comments after one of your posts, don’t be surprised. They’re just following the service’s new “counter-blogging” flow chart. In a twelve-point plan, put together by the emerging technology division of the Air Force’s public affairs arm, airmen are given guidance on how to handle “trolls,” “ragers” — and even well-informed online writers, too. It’s all part of an Air Force push to “counter the people out there in the blogosphere who have negative opinions about the U.S. government and the Air Force,” Captain David Faggard says.

Over the last couple of years, the armed forces have tried, in fits and starts, to connect more with bloggers. The Army and the Office of the Secretary of Defense now hold regular “bloggers’ roundatbles” with generals, colonels, and key civilian leaders. The Navy invited a group of bloggers to embed with them on a humanitarian mission to Central and South America, last summer. Military blogger Michael Yon recently traveled to Afghanistan with Defense Secretary Robert Gates.

In contrast, the Air Force has largely kept the blogosphere at arms’ length. Most of the sites are banned from Air Force networks. And the service has mostly stayed away from the Pentagon’s blog outreach efforts. Captain Faggard, who’s become the Air Force Public Affairs Agency’s designated social media guru, has made strides in shifting that attitude. The air service now has a Twitter feed, a blog of its own — and marching orders, for how to comment on other sites. “We’re trying to get people to understand that they can do this,” he tells Danger Room.

Vietnam imposes new blogging restrictions

AP:

The rules ban any posts that undermine national security, incite violence or crime, disclose state secrets, or include inaccurate information that could damage the reputation of individuals and organizations, according to a copy of the regulations obtained Wednesday by The Associated Press.

The rules, which were approved Dec. 18, attempt to rein in Vietnam’s booming blogosphere. It has become an alternative source of news for many in the communist country, where the media is state-controlled.

The new rules require Internet companies that provide blogging platforms to report to the government every six months and provide information about bloggers on request.

The companies are also required to prevent and remove content the government deems harmful.

2008 Wisconsin Public Records Audit: 3 in 10 public-records requests not properly fulfilled,new study finds

Bill Lueders & Jason Shephard:

A statewide public records audit found that one in 10 requests for basic documents were denied or ignored by local governments.


Another two in 10 requests were fulfilled only after records custodians required the requesters to identify themselves or explain why they wanted the documents, in violation of state law.


The audit, conducted by the Wisconsin Freedom of Information Council and the University of Wisconsin-Madison School of Journalism and Mass Communication, involved 318 public records requests filed in 65 counties.


“We were not trying to trick anyone,” says Bill Lueders, the Council’s elected president and news editor of Isthmus newspaper. “We asked for basic information that no one should have any problems getting. And yet there were problems.”

Obama’s Secret Weapons: Internet, Databases and Psychology

Sarah Lai Stirland:

During a sweltering Friday evening rush hour in early October, Jeanette Scanlon spent two-and-a-half hours with 20 other people waving a homemade Barack Obama sign at the cars flowing through a busy intersection in Plant City, Florida.


“I got shot the bird one time,” laughs the easy-natured Scanlon, a 43-year-old single mother of three and a Tampa psychiatrist’s billing manager. “That wasn’t the thumbs up I was looking for.”


Scanlon is one of an estimated 230,000 volunteers who are powering Obama’s get-out-the-vote campaign in the swing state of Florida. And while sign-waving is a decidedly low-tech appeal to voters’ hearts and minds, make no mistake: The Obama campaign’s technology is represented here. Scanlon organized the gathering — and 24 others since September — through Obama’s social networking site, my.BarackObama.com. Similarly, she used the site’s Neighbor-to-Neighbor tool in September to find registered voters in her own neighborhood, so she could canvass them for Obama. And this weekend, Scanlon and another 75 or so Plant City volunteers will be phoning thousands of Floridians to urge them to vote, using a sophisticated database provided by the Obama campaign to ensure they don’t call McCain supporters by mistake.


The Obama campaign has been building, tweaking and tinkering with its technology and organizational infrastructure since it kicked off in February 2007, and today has most sophisticated organizing apparatus of any presidential campaign in history. Previous political campaigns have tapped the internet in innovative ways — Howard Dean’s 2004 presidential run, and Ron Paul’s bid for this year’s Republican nomination, to name two. But Obama is the first to successfully integrate technology with a revamped model of political organization that stresses volunteer participation and feedback on a massive scale, erecting a vast, intricate machine set to fuel an unprecedented get-out-the-vote drive in the final days before Tuesday’s election.

A friend recently mentioned that one of the canvasers asked if they could leave an orange dot on their mailbox, notifying other workers that they have already voted! I wonder how long it will be until citizens push back on the extensive personal data mining.

Open Records Guerrilla

Nathan Halverson:

But if you want to download and save those laws to your computer, forget it.
The state claims copyright to those laws. It dictates how you can access and distribute them — and therefore how much you’ll have to pay for print or digital copies.
It forbids people from storing or distributing its laws without consent.
That doesn’t sit well with Carl Malamud, a Sebastopol resident with an impressive track record of pushing for digital access to public information. He wants California — and every other federal, state and local agency — to drop their copyright claims on law, contending it will pave the way for innovators to create new ways of searching and presenting laws.
“When it comes to the law, the courts have always said there can be no copyright because people are obligated to know what it says,” Malamud said. “Ignorance of the law is no excuse in court.”
Malamud is spoiling for a major legal fight.

Lessig on John McCain’s Technology “Platform”

Larry Lessig

I have my doubts – unfortunately – that Obama will be much better on the crucial broadband issue for two reasons:

  • AT&T, very good at spreading the love money, or the king of telco lobbying is sponsoring the Democratic convention
  • Our own Democratic Governor – Jim Doyle, recently signed a AT&T supported “Video competition bill” into law – maybe useful for AT&T, but hardly good for citizens.

AT&T Mulls Watching You Surf

Saul Hansell:

AT&T is “carefully considering” monitoring the Web-surfing activities of customers who use its Internet service, the company said in a letter in response to an inquiry from the House Committee on Energy and Commerce.
While the company said it hadn’t tested such a system for monitoring display advertising viewing habits or committed to a particular technology, it expressed much more interest in the approach than the other big Internet providers who also responded to the committee’s letter.
AT&T did however promise that if it does decide to start tracking its customers online, it will “do so the right way.” In particular, the advertising system will require customers to affirmatively agree to have their surfing monitored. This sort of “opt-in” approach is preferred by privacy experts to the “opt-out” method, practiced by most ad targeting companies today, which records the behavior of anyone who doesn’t explicitly ask to not to be tracked.

I’ve Seen the Future, and It Has a Kill Switch

Bruce Schneier:

It used to be that just the entertainment industries wanted to control your computers — and televisions and iPods and everything else — to ensure that you didn’t violate any copyright rules. But now everyone else wants to get their hooks into your gear.
OnStar will soon include the ability for the police to shut off your engine remotely. Buses are getting the same capability, in case terrorists want to re-enact the movie Speed. The Pentagon wants a kill switch installed on airplanes, and is worried about potential enemies installing kill switches on their own equipment.
Microsoft is doing some of the most creative thinking along these lines, with something it’s calling “Digital Manners Policies.” According to its patent application, DMP-enabled devices would accept broadcast “orders” limiting capabilities. Cellphones could be remotely set to vibrate mode in restaurants and concert halls, and be turned off on airplanes and in hospitals. Cameras could be prohibited from taking pictures in locker rooms and museums, and recording equipment could be disabled in theaters. Professors finally could prevent students from texting one another during class.
The possibilities are endless, and very dangerous. Making this work involves building a nearly flawless hierarchical system of authority. That’s a difficult security problem even in its simplest form. Distributing that system among a variety of different devices — computers, phones, PDAs, cameras, recorders — with different firmware and manufacturers, is even more difficult. Not to mention delegating different levels of authority to various agencies, enterprises, industries and individuals, and then enforcing the necessary safeguards.

Laptop Security While on Travel

Bruce Schneier:

Last month a US court ruled that border agents can search your laptop, or any other electronic device, when you’re entering the country. They can take your computer and download its entire contents, or keep it for several days. Customs and Border Patrol has not published any rules regarding this practice, and I and others have written a letter to Congress urging it to investigate and regulate this practice.
But the US is not alone. British customs agents search laptops for pornography. And there are reports on the internet of this sort of thing happening at other borders, too. You might not like it, but it’s a fact. So how do you protect yourself?
Encrypting your entire hard drive, something you should certainly do for security in case your computer is lost or stolen, won’t work here. The border agent is likely to start this whole process with a “please type in your password”. Of course you can refuse, but the agent can search you further, detain you longer, refuse you entry into the country and otherwise ruin your day.