Freedom, GEABSOLUTE POWERS CORRUPT ABSOLUTELY, General Election (GE15), Malaysia, Politics, polling Nov 19: Destroy Umno for the betterment of Malaysia, race, religion, Solidality, support Aliran for Justice

Share This

Showing posts with label Human Rights Watch. Show all posts
Showing posts with label Human Rights Watch. Show all posts

Saturday 1 March 2014

Human Rights Record of the United States in 2013

Video:
China published a report on the United States' human rights record on Friday, in response to U.S. criticism and "irresponsible remarks" about China.

"The Human Rights Record of the United States in 2013" was released by the Information Office of the State Council, China's cabinet, in response to "Country Reports on Human Rights Practices for 2013" made public by the U.S. State Department on Thursday.

Press TV
China's report states that there were serious human rights problems in the U.S in 2013, with the situation deteriorating in many fields. Once again posing as "the world judge of human rights", the U.S. government "made arbitrary attacks and irresponsible remarks" on almost 200 countries and regions, the report says.

The United States carefully concealed and avoided mentioning its own human rights problems, according to the report.

THE WORLD THROUGH PRISM

The U.S. government spies on its own citizens to a "massive and unrestrained" degree, the report says.

The report calls the U.S. PRISM surveillance program, a vast, long-term mechanism for spying on private citizens both at home and abroad, "a blatant violation of international law" and says it "seriously infringes human rights."

The U.S. intelligence services, by virtue of data provided by Internet and telecom companies -- including Microsoft, Google, Apple, Facebook, and Yahoo -- "recklessly" track citizens' private contacts and social activities.

KILLER ROBOTS AND DEAD CONVENTIONS

The report quantifies drone strikes by the U.S. in countries, including Pakistan and Yemen, which have caused heavy civilian casualties. In Pakistan alone, since 2004, the U.S. has carried out 376 drone strikes killing 926 civilians.

The U.S. has not ratified, or participated in, a series of core UN conventions on human rights, such as the International Covenant on Economic, Social and Cultural Rights, the Convention on the Elimination of All Forms of Discrimination against Women, the Convention on the Rights of the Child, and the Convention on the Rights of Persons with Disabilities.

CRUEL AND UNUSUAL PUNISHMENT

Solitary confinement is prevalent in the U.S., the report says.

In U.S. prisons, inmates in solitary confinement are enclosed in cramped cells with poor ventilation and little or no natural light, isolated from other prisoners; a situation that takes it toll on inmates' physical and mental health.

About 80,000 U.S. prisoners are in solitary confinement. Some have been held in solitary confinement for over 40 years.

RAMPANT GUN VIOLENCE

The rampant U.S. gun culture breeds violence that results in the death of 11,000 Americans every year.

The report cites figures from the FBI that state firearms were used in 69.3 percent of the nation's murders, 41 percent of robberies, and 21.8 percent of aggravated assaults.

In 2013, 137 people were killed in 30 mass murder events (four or more deaths each).

A rampage in the headquarters of the Naval Sea Systems Command in Washington D.C. left 12 people dead, according to the report.

UNEMPLOYMENT AND HOMELESSNESS

"The U.S. still faces a grave employment situation with its unemployment rate still high," the report says.

Unemployment for low-income families has topped 21 percent. The homeless population in the U.S. has climbed 16 percent from 2011 to 2013.

There are also many child laborers in the agricultural sector in the U.S. and their physical and mental health is seriously compromised, the report says.

Friday's report was the 15th such annual report published by China in response to U.S. attacks.

Related:

Commentary: U.S. should "sweep its own doorstep" on human rights

BEIJING, Feb. 28 (Xinhua) -- A Chinese idiom says that all will follow one who is personally upright, even though he does not give orders; but if he is not personally upright, they will not follow, even though he gives orders.

Attributed to Confucius (551 BC-479 BC), one of the greatest Chinese philosophers in history, the idiom is an important tenet for the Chinese. Full story

Full text of Human Rights Record of the United States in 2013

U.S. biggest violator of non-Americans' human rights: China report

China issues report on U.S. human rights

Commentary: U.S. not a human rights judge with flawed record


China, Australia hold 15th human rights dialogue

China: Dialogue is the way to resolve human rights differences

China says courts do not help human rights

China elected to UN human rights body

Sunday 14 July 2013

Play safe on the mobile, secure your devices!


All a sinister person needs to do to spy on you is to simply penetrate your smartphone or tablet.

OF late, spying has been a household word after revelations of Prism, a clandestine mass electronic surveillance programme operated by the United States National Security Agency (NSA), by former NSA contractor Edward Snowden. 

But one does not need an entire state programme to spy on someone.

All that a sinister person needs to do is to penetrate their intended victim’s smartphone or tablet. Which is quite an easy thing to do, actually. One of the common methods used is spyware.

Such spyware can easily be found by searching on Google although they are usually not free.

There is a possibility that consumers might download spyware from an identified party or an unknown source accidentally. - Goh Chee Hoh

This is what happened when a husband in Singapore suspected his wife of having an affair. On the pretence that his phone was not working, he borrowed his wife’s phone to make a call but instead installed a spyware app.

The husband was then able to see the calls made (but not hear the actual conversation), messages sent and her location at that point, from a computer using a Web-based application that communicated with the app.

When the information confirmed that she was having an affair, he continued to monitor her phone for some time before posting the information online, including the messages she sent to her “lover”. He did not reveal any personal details about themselves but this is how the news became public.

However, many have questioned the authenticity of the story, with some brushing it off as a publicity stunt to sell the spyware app.

Nevertheless, it pays to be safe, as there are apps that can do such things and they are easily obtainable from the Web.


“Mobile phones are an integral part of consumers’ lives, with two thirds of adults worldwide reporting that they use a mobile device to access the Internet,” says David Hall, senior manager of regional product marketing for Norton at Symantec Corporation.

“As we use our mobile phones in new and innovative ways, we’re also putting sensitive information at risk.”

“Spyware is a type of malware (malicious software) that logs information and then forwards that information from your device,” explains Rob Forsyth, director for Asia Pacific at Sophos Ltd.

Usually, such spyware is capable of operating quietly in the background so it can easily go unnoticed by an unsuspecting device owner.

“For a regular user, it is very difficult to figure out that they’ve been infected,” says Goh Su Gim, security advisor for Asia Pacific at F-Secure (M) Sdn Bhd. “There’s no obvious signs.”

In fact, it may surprise you to know that such threats could actually come from a source that’s known to you.

“There is a possibility that consumers might download spyware from an identified party such as their spouse, friends, colleagues, business associates or from an unknown source accidentally,” says Goh Chee Hoh, managing director for South-East Asia at Trend Micro Inc.

As an example, he describes a mobile phone monitoring service which uses Nickispy, a family of viruses that attacks Android devi­ces). It is said to be capable of monitoring a mobile user’s activities and whereabouts. The Chinese website which offers this service charges subscribers fees costing US$300 to US$540 (RM900 to RM1,620).

“This spyware sends MMS to the victim’s mobile device. Once the MMS is downloaded, the cybercriminal is granted access to your line of communications,” Chee Hoh says.

This security issue is further compounded in cases where a consumer uses the same device for both work and personal purposes.

“From a personal user’s standpoint, one can experience loss of privacy whereas from a business perspective, an organisation may lose sensitive data which can lead to loss of revenue,” he explains.

Had such an act been committed in Malaysia, it would go against Section 231 of the Communications and Multimedia Act 1998. Using an app to obtain information from another person’s phone can land the offender a RM50,000 fine or a prison term not exceeding two years if convicted.

The Malaysian Communications and Multimedia commission (MCMC), our multimedia industry nurturer and regulator, also said that it does not act alone when pursuing offenders.

“We look at each case individually and help other agencies like the police, for example, when upholding the law,” said Sheikh Raffie Abd Rahman, MCMC head of strategic communications.



Simple safeguards to keep your devices secure

While the mobile security and privacy threats remain very real and imminent, the steps to prevent such problems are really quite straightforward and easy to do.

Following are some practical tips, courtesy of security specialists Symantec Corporation, Sophos Ltd, Trend Micro Inc and F-Secure (M) Sdn Bhd, that you should take note of:

1. Use your device’s built-in security features 

Configure your security settings so that functions such as location sharing are disabled and passwords are not saved but need to be manually keyed in each time.

You can also make your device more secure by activating its lock function and requiring an identification action such as a fingerprint scan, keystroke pattern, numeric PIN or alphanumeric password in order to access the device.

2. Use strong passwords and secure Internet connections

Unique and strong passwords will help prevent valuable information from being stolen from your device. Using a different password for each and every app would be best but you would need to ensure that you have a good way of remembering those passwords if you choose to go this route.

Avoiding open and unsecured Internet connections such as free public WiFi will also reduce risk of online threats on your mobile device.

3. Never jailbreak or root your device 

Use your device as recommended by the manufacturer instead of modifying the version of the iOS or Android operating system that has been installed. This is usually done to install pirated games and apps for free but this makes it easier for spyware to operate on your device.

4. Be cautious when choosing and installing apps

It’s a vast universe out there in the World Wide Web and, at times, it’s hard to tell the good guys from the bad ones. It therefore pays to be extra careful when downloading apps from the Internet. If something is too good to be true, it probably is. Do background checks on developers if you need to be sure, and scrutinise an app’s ratings and reviews as well.

It’s also a better idea to download apps directly from the Google Play Store for Android devices rather than from third party websites since downloads from some of these sources may contain malware.

Do have a close look at the Terms and Conditions as well as permissions requested by an app prior to installing it, as you don’t want to unknowingly allow developers to track and collect personal data which is unnecessary for running the app.

5. Scrutinise notifications and services running on your device 

Stay alert whenever you receive any notification on your device. Some may contain malicious links or cleverly trick you into submitting personal information to cybercriminals.

Also, pay special attention to services running in the background on your device that seem unfamiliar or strange. You will have to refer to online guides on how to check, as it differs among devices.

The principle of “when in doubt, throw it out” could help save you a great deal of trouble later on.

6. Log out immediately

This is especially crucial for social media apps where the chances of your data being misused are higher. Make it a habit to log out of such apps and re-enter login information each time you use them.

7. Stay up-to-date

Take time to pick out a preferred mobile security software and install it on your device. Make sure to constantly update it, and don’t forget to check for updates for all your apps and to install any available patches for your device’s operating system as well. Set up routine scans for your device, and review the logs each time a scan is concluded.

Wednesday 30 November 2011

Malaysia passes ban on street protests



Activist lawyers decry new law they say imposes tougher restrictions and penalties for demonstrators. 

Malaysia's lower house of parliament has approved a ban a on street protests after opposition legislators boycotted the vote and activists criticised the ban as repressive and a threat to freedom of public assembly.

The law is expected to be enforced after parliament's upper house, also dominated by the ruling National Front coalition, approves it as early as next month.



Najib Razak, the country's prime minister, has framed the bill as part of a campaign he launched in September to replace tough laws on security, speech and assembly in a bid to shore up support ahead of elections he is expected to call for next year.

He defended the act on Monday, saying it guarantees the right to peaceful assembly and said the law prohibits public marches to avoid disruptions to general society.

But it has been assailed by opposition politicians who call Najib's reforms an election ploy, and say the bill validates their fears that tough old laws will merely be replaced by strict new rules.

Malaysian and international rights groups describe it as repressive because it bans street rallies and imposes tough restrictions and penalties for demonstrators.

The law was announced only last week, and some critics say the vote was rushed without proper public consultation.

About 500 lawyers and their supporters marched to parliament hours before the vote, urging lawmakers to reject the bill and chanting "freedom to the people'' before police stopped most of them from entering the complex.

The new law would confine demonstrators mainly to stadiums and public halls. Depending on the venue, organisers may be required to give 10-day advance notification to police, who would determine whether the date and location are suitable.

Children under 15 and non-citizens would be barred from attending rallies, which also cannot be held near schools, hospitals, places of worship, airports or gasoline stations.

Demonstrators who break the law can be fined $6,200.

VK Liew, a deputy Cabinet minister in Najib's office who received a protest note from the lawyers on Tuesday, suggested that critics should not be too quick to criticize the law.

"We should look at it holistically, not piecemeal,'' Liew told reporters.

Opposition reaction

Anwar Ibrahim, the opposition leader, said he believed the Peaceful Assembly Act would be "more draconian'' than laws in Zimbabwe or Myanmar.

Other opposition activists indicated they might challenge the law in court, insisting it breaches the people's constitutional rights.

Amnesty International, the UK-based rights group, called the Peaceful Assembly Act "a legislative attack on Malaysians' right to peaceful protest,'' while Human Rights Watch said the law is being pushed through parliament with "undue haste".

"The government must reject the bill as it infringes on the rights of the people and violates the constitution," said Wong Chin Huat of Bersih 2.0, which spearheaded a rally for electoral reform in July that was broken up by police.

Lim Chee Wee, president of the Malaysian Bar Council, said the ban was "outrageous".

"Assemblies in motion provide the demonstrators with a wider audience and greater visibility, in order for others to see and hear the cause or grievance giving rise to the gathering," he said.

Critics including the Malaysian Bar Council and Human Rights Watch maintain the act would grant police too much power over the timing, duration, and location of gatherings.

"This bill is a legislative attack on Malaysians' right to peaceful protest," Sam Zarifi, Amnesty's Asia-Pacific director, said in a statement.

The ruling Barisan Nasional coalition has been accused of routinely using tough laws to block challenges to its five decades in power.

Source:
Al Jazeera and agencies
Newscribe : get free news in real time

Related post:

Malaysia's 'Peaceful' Bill off to a rocky start, at odds with ...