Techno-authoritarianism
   HOME





Techno-authoritarianism
Techno-authoritarianism, also known as IT-backed authoritarianism, digital authoritarianism or digital dictatorship, refers to the state use of information technology in order to control or manipulate both foreign and domestic populations. Tactics of digital authoritarianism may include mass surveillance including through biometrics such as facial recognition, internet firewalls and censorship, internet blackouts, disinformation campaigns, and digital social credit systems. Although some institutions assert that this term should only be used to refer to authoritarian governments, others argue that the tools of digital authoritarianism are being adopted and implemented by governments with "authoritarian tendencies", including democracies. Most notably, China and Russia have been accused by the Brookings Institution of leveraging the Internet and information technology to repress opposition domestically while undermining democracies abroad. Definition IT-backed authoritari ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

The Washington Post
''The Washington Post'', locally known as ''The'' ''Post'' and, informally, ''WaPo'' or ''WP'', is an American daily newspaper published in Washington, D.C., the national capital. It is the most widely circulated newspaper in the Washington metropolitan area and has a national audience. As of 2023, the ''Post'' had 130,000 print subscribers and 2.5 million digital subscribers, both of which were the List of newspapers in the United States, third-largest among U.S. newspapers after ''The New York Times'' and ''The Wall Street Journal''. The ''Post'' was founded in 1877. In its early years, it went through several owners and struggled both financially and editorially. In 1933, financier Eugene Meyer (financier), Eugene Meyer purchased it out of bankruptcy and revived its health and reputation; this work was continued by his successors Katharine Graham, Katharine and Phil Graham, Meyer's daughter and son-in-law, respectively, who bought out several rival publications. The ''Post ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Cyberattack
A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content. The rising dependence on increasingly complex and interconnected computer systems in most domains of life is the main factor that causes vulnerability to cyberattacks, since virtually all computer systems have bugs that can be exploited by attackers. Although it is impossible or impractical to create a perfectly secure system, there are many defense mechanisms that can make a system more difficult to attack, making information security a field of rapidly increasing importance in the world today. Perpetrators of a cyberattack can be criminals, hacktivists, or states. They attempt to find weaknesses in a system, exploit them and create malware to carry out their goals, and deliver it to the targeted system. Once installed, the malware can have a variety of effects depending on its purpose. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Internet Service Provider
An Internet service provider (ISP) is an organization that provides a myriad of services related to accessing, using, managing, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privately owned. Internet services typically provided by ISPs can include internet access, internet transit, domain name registration, web hosting, and colocation. History The Internet (originally ARPAnet) was developed as a network between government research laboratories and participating departments of universities. Other companies and organizations joined by direct connection to the backbone, or by arrangements through other connected companies, sometimes using dialup tools such as UUCP. By the late 1980s, a process was set in place towards public, commercial use of the Internet. Some restrictions were removed by 1991, shortly after the introduction of the World Wide Web. During the 1980s, online s ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Associated Press
The Associated Press (AP) is an American not-for-profit organization, not-for-profit news agency headquartered in New York City. Founded in 1846, it operates as a cooperative, unincorporated association, and produces news reports that are distributed to its members, major U.S. daily newspapers and radio and television broadcasters. Since the award was established in 1917, the AP has earned 59 Pulitzer Prizes, including 36 for photography. The AP is also known for its widely used ''AP Stylebook'', its AP polls tracking National Collegiate Athletic Association, NCAA sports, sponsoring the National Football League's annual awards, and its election polls and results during Elections in the United States, US elections. By 2016, news collected by the AP was published and republished by more than 1,300 newspapers and broadcasters. The AP operates 235 news bureaus in 94 countries, and publishes in English, Spanish, and Arabic. It also operates the AP Radio Network, which provides twice ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Blasphemy Law In Russia
A blasphemy law is a law prohibiting blasphemy, which is the act of insulting or showing contempt or lack of reverence to a deity, or sacred objects, or toward something considered sacred or inviolable. According to Pew Research Center, about a quarter of the world's countries and territories (26%) had anti-blasphemy laws or policies as of 2014. In some states, blasphemy laws are used to protect the religious beliefs of a majority, while in other countries, they serve to offer protection of the religious beliefs of minorities. In addition to prohibitions against blasphemy or blasphemous libel, blasphemy laws include all laws which give redress to those insulted on account of their religion. These blasphemy laws may forbid: the vilification of religion and religious groups, defamation of religion and its practitioners, denigration of religion and its followers, offending religious feelings, or the contempt of religion. Some blasphemy laws, such as those formerly existing in Den ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Internet Censorship In Russia
In Russia, internet censorship is enforced on the basis of several laws and through several mechanisms. Since 2008, Russia maintains a centralized internet blacklist (known as the "single register") maintained by the Federal Service for Supervision of Communications, Information Technology and Mass Media (''Roskomnadzor''). The list is used for the censorship of individual URLs, domain names, and IP addresses. It was originally introduced to block sites that contain materials advocating drug abuse and drug production, descriptions of suicide methods, and containing child pornography. It was subsequently amended to allow the blocking of materials that are classified as extremist by including them to the Federal List of Extremist Materials. According to Freedom House, these regulations have been frequently abused to block criticism of the federal government or local administrations. A law prohibiting "abuse of mass media freedom" implements a process for the shutting down of onl ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


SORM
The System for Operative Investigative Activities (SORM; ) is the technical specification for lawful interception interfaces of telecommunications and telephone networks operating in Russia. The current form of the specification enables the targeted surveillance of both telephone and Internet communications. Initially implemented in 1995 to allow access to surveillance data for the FSB, in subsequent years the access has been widened to other law enforcement agencies. History SORM-1 SORM was first implemented in 1995, requiring telecommunications operators to install FSB-provided hardware allowing the agency to monitor users’ communications metadata and content, including phone calls, email traffic and web browsing activity, despite the low internet penetration rate at the time. SORM-2 In July 1998 the system was replaced by SORM‑2. Under SORM‑2, Russian Internet service providers (ISPs) must install a special device on their servers to allow the FSB to track all credit ca ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Federal Assembly (Russia)
The Federal Assembly is the bicameral national legislature of Russia. The upper house is the Federation Council, and the lower house is the State Duma. The assembly was established by the Constitution of the Russian Federation in 1993, replacing the former Supreme Soviet of Russia. It is located in Moscow. The Chairman of the Federation Council is the third most important position after the President and the Prime Minister. In the case that both the President and the Prime Minister are incapacitated, the Speaker of the upper house of the Russian parliament becomes Acting President of Russia. The jurisdiction of the Federation Council includes: approval of changes in borders between federal subjects of Russia, approval of the presidential decree on the introduction of a martial law or on the introduction of a state of emergency, deciding on the possibility of using the Armed Forces of Russia outside the territory of Russia, appointment of elections of the President, impeac ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Biometrics
Biometrics are body measurements and calculations related to human characteristics and features. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are often categorized as physiological characteristics which are related to the shape of the body. Examples include, but are not limited to fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina, odor/scent, voice, shape of ears and gait. Behavioral characteristics are related to the pattern of behavior of a person, including but not limited to mouse movement, typing rhythm, gait, signature, voice, and behavioral profiling. Some researchers have coined the term behaviometrics (behavioral biom ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

The New York Times
''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of the longest-running newspapers in the United States, the ''Times'' serves as one of the country's Newspaper of record, newspapers of record. , ''The New York Times'' had 9.13 million total and 8.83 million online subscribers, both by significant margins the List of newspapers in the United States, highest numbers for any newspaper in the United States; the total also included 296,330 print subscribers, making the ''Times'' the second-largest newspaper by print circulation in the United States, following ''The Wall Street Journal'', also based in New York City. ''The New York Times'' is published by the New York Times Company; since 1896, the company has been chaired by the Ochs-Sulzberger family, whose current chairman and the paper's publ ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Malware
Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to cause disruption to a computer, server (computing), server, Client (computing), client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, Computer worm, worms, Trojan horse (computing), Trojan horses, logic bombs, ransomware, spyware, adware, rogue software, Wiper (malware), wipers and keyloggers). Malware poses serious problems to individuals and businesses on the Internet. According to NortonLifeLock, Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 66 ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


The Diplomat (magazine)
''The Diplomat'' is an international online news magazine covering politics, society, and culture in the Indo-Pacific region. It is based in Washington, D.C. It was originally an Australian bi-monthly print magazine, founded by Minh Bui Jones, David Llewellyn-Smith and Sung Lee in 2001, but due to financial reasons it was converted into an online magazine in 2009 and moved to Japan and later Washington, D.C. In 2020, ''The Diplomat'' has a monthly unique visitor count of 2 million. The magazine is currently owned by MHT Corporation. History ''The Diplomat'' was originally an Australian bi-monthly print magazine, founded by Minh Bui Jones, David Llewellyn-Smith and Sung Lee in 2001. The first edition was published in April 2002, with Bui Jones as the founding editor and Llewellyn-Smith the founding publisher. The magazine was acquired by James Pach through his company Trans-Asia Inc. in December 2007. Pach assumed the role of executive publisher and hired former '' Pent ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]