Interesting response from the People’s Daily suggesting the floodgates of intertextuality are wide open…
To further understand the likes of Snowden, let us end with a narrative by the character Red from the Shawshank Redemption as he rationalizes the escape of his friend Andy: “Some birds are not meant to be caged. Their feathers are just too bright. And when they fly away, the part of you that knows it was a sin to lock them up does rejoice.”
For more, see US suggests whistleblower ‘in league with the Chinese’ (The Age, June 15, 2013)
- – -
Whistleblower welcome in China
By Xu Peixi (China.org.cn)
Source – People’s Daily, published June 14, 2013
By Gou Ben – China.org.cn
Last week, a bright idealistic young man named Edward Snowden almost single-handedly opened the lid on the U.S. National Security Agency’s PRISM program, a program which marks the bleakest moment yet in the history of the Internet due to its scope, exact country of origin and implications.
In terms of scope, major transnational service providers ranging from Google to Apple are involved in allowing the NSA to access their customers’ data for the purposes of “surveillance.” Nearly all types of services ranging from email to VoIP have come within the program’s scope and it originates in a country which dominates the world’s Internet resources – a fact which is acknowledged in the information leaked by Snowden clearly states: “Much of the world’s communications flow through the U.S.” and the information is accessible. The case indicates that through outsourcing and contracting, Big Brother is breaching the fundamental rights of citizens by getting unfettered access to their most personal communications.
As the case unfolds, there are many things to worry about. How do we make sense of the fact that the market and the state colluded in the abuse of private information via what represents the backbone of many modern day infrastructures? How do we rationalize the character of Snowden and his fellow whistleblowers? How do we understand the one-sided cyber attack accusations the U.S. has poured upon China in the past few months? To what degree have foreign users of these Internet services fallen victim to this project? Among all these suspicions, let us clarify two types of American personality.
Please click here to read the full article at People’s Daily.
Read the rest of this entry »
Filed under: Beijing Consensus, Charm Offensive, Chinese Model, Communications, Culture, Cyberattack, Domestic Growth, Economics, Government & Policy, History, Ideology, Influence, Internet, Mapping Feelings, Media, military, Modernisation, Peaceful Development, People's Daily, Politics, Public Diplomacy, Reform, Soft Power, Strategy, Tao Guang Yang Hui (韬光养晦), Technology, The Chinese Identity, The construction of Chinese and Non-Chinese identities, U.S.