Feeds

Note to despots: You can't kill the internet

Burma's wave of dissent floods through firewall

Mobile application security vulnerability report

The latest reports from the turmoil in Burma say at least one person died and many were wounded today when police again shot at protesters on the streets of Rangoon.

Until now, one of the most striking things about the monk-led uprising has been the volume of information that has been escaping about the usually secretive regime's activities.

Citizens have been using mobile phones, cyber cafes, and according to some reports, internet connections controlled by foreign embassies to get news to the outside world.

A picture of blood-stained sandals on the streets of burma today

Blood on the streets [via ko-htike.blogspot.com]

The junta now seems to have recognised that worldwide communications networks make the kind of hammer blow it delivered when it murdered 3,000 democracy campaigners in 1989 a difficult PR proposition. According to free speech advocate Reporters Without Borders, they've swooped to cut off channels over the last few days.

Happily, it doesn't seem to be working too well, thanks to the ingenuity of the Burmese people. According to The Asia Times: Thanks to the growing global proliferation of proxy servers, proxy sites, encrypted e-mail accounts, http tunnels and other creative workarounds, the cyber-reality in Myanmar [Burma] is actually much less restricted than ONI's research indicated." A 2005 Study by Havard's OPenNet Initiative (ONI) had said that Burma's internet censorship "was among the tightest in the World."

The pressure group Democratic Voice of Burma has up-to-date accounts of the uprising here, and the BBC is posting first-hand reports here.

London-based blogger Ko Htike's site features more eyewitness accounts and pictures of the military crackdown. He reported at 3pm today (Burma time):

right now they're using fire engines

and hitting people

and dragging them onto E2000 trucks

and most of them are girls

and people are shouting

The few professional journalists operating in the country are delivering reports via satellite phones that the regime cannot interfere with.

Despite the growing international outcry over current events, an emergency meeting of the UN security council on Wednesday mustered only a "statement of concern". Burma's near neighbour and trade partner China has by all accounts led moves to block sanctions. The European Parliament called on China and Russia to drop their opposition to sanctions today.

China is, of course, expert in supressing online dissent itself. It'll play host to the world at the Olympics in Beijing next summer, and cannot afford a bloodbath on its doorstep as it tries to sell "new China".

According to The Reg's technical team, we've had 216 readers visit us from Burma since 1 September. Good luck to you if you're still reading. ®

Mobile application security vulnerability report

More from The Register

next story
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
US Social Security 'wasted $300 million on an IT BOONDOGGLE'
Scrutiny committee bods probe derailed database project
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Australia floats website blocks and ISP liability to stop copyright thieves
Big Content could get the right to order ISPs to stop traffic
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.