China's Skype Watch Revealed

Dreyfuss, Joel
October 2008
Red Herring;10/2/2008, p4
Trade Publication
The article focuses on a report issued by Canadian human rights group Citizen Lab which claims that text messages sent over Tom-Skype, a joint venture between a wireless Chinese operator and eBay, which owns Skype, were monitored for political content and tagged for politically-charged topics and names. Because the servers were poorly configured, the group was able to access the contents and figure out the key words that triggered storage of messages.


Related Articles

  • Dynamic Data Updates for Mobile Devices by Using 802.11 Wireless Communications. Ramanamurthy, B. V.; Babu, K. Srinivas; Sharfuddin, Mohammed // BVICAM's International Journal of Information Technology;2011, Vol. 3 Issue 1, p25 

    Mobile devices are used for conveying important information. Opportunity exist to introduce users to different application of resource constraint mobile device Currently, the client is forced to continuously poll for updates from potentially different data sources, such as, e-commerce, on-line...

  • LEARN 2 TXT MSG.  // ASEE Prism;Nov2008, Vol. 18 Issue 3, p45 

    The article underscores how text messaging helped in the communication systems of the University of New Orleans (UNO) in Louisiana after the onslaught of Hurricane Katrina. It states that this hurricane damaged the university's web sites, computer servers and e-mail systems, preventing...

  • GFI Beefs Up Server Checks and Alerting in Network Monitor Server 7.0. Munshi, Renee // Windows IT Pro;Feb2006, Vol. 12 Issue 2, p34 

    The article focuses on the GFI Network Server Monitor 7.0 software from GFI. It alerts administrators to problems with Short Message Service (SMS) and email messages. It also has the ability to send SMS messages to a Global System for Mobile Communication (GSM) phone or SMS gateway and email...

  • MIPv6 Based Framework for RF-GSM Enabled Mobile Wireless Sensor Nodes. Caytiles, Ronnie D.; Seungyong Shin; HyunJu Munn; Byungjoo Park // International Journal of Multimedia & Ubiquitous Engineering;2014, Vol. 9 Issue 6, p377 

    The terms "ubiquity" can be achieved by the mobility of wireless sensor networks that denotes networks of intelligent sensor nodes that monitors physical and environmental conditions and can be deployed anywhere and anytime. The emergence of mobility that allows sensor nodes in WSNs to move...

  • Realization and Design of SMS Alarm System in Satellite TT&C Ground Station. Zhang Tao; Li Weiguo; Li Yichao // Applied Mechanics & Materials;2014, Vol. 716-717, p1413 

    The existed MCS in ground station is local monitoring and control system, so there must be a man on duty all day long to monitor the whole system. In order to make all the staff of the station get the real time alarm messages of the system, we use a SMS modem and a serial server to realize the...

  • Consortium offers low SMS rates. Petrie, Anne // Precision Marketing;2/11/2005, Vol. 17 Issue 15, p2 

    The article focuses on mobile marketing consortium that has been formed to drive down the price of picture and text messaging. Business is all set to be benefited from this consortium. The UK Mobile Messaging Consortium (UKMMC), a not-for-profit arrangement, will enable SMEs to find the lowest...

  • SMS-Parking Service Introduced in Oman. Naqvi, Syed Jafar; Al-Shihi, Hafedh; Ali, Saqib // Computer Technology & Application;2011, Vol. 2 Issue 8, p712 

    Mobile computing has increased quite rapidly over the past few years. The major drivers of mobile computing are large number of mobile phone users. As their number is increasing worldwide, different organizations are offering their services using the mobile devices. Oman is a developing country...

  • Text Offenders: Privacy, Text Messages, and the Failure of the Title III Minimization Requirement. Hyatt, Seth M. // Vanderbilt Law Review;May2011, Vol. 64 Issue 4, p1347 

    The article discusses the issues on text messages, privacy, and the failure of the minimization requirement under Title III in the U.S. It traces the history of electronic surveillance law focusing on the development and subsequent application of the requirement. It examines the privacy...

  • Feedback.  // New Scientist;1/8/2005, Vol. 185 Issue 2481, p80 

    The article focuses on readers' responses to the periodical. John Gilbey of Aberystwyth has come up with a good use for the surveillance cameras that have sprung up across Great Britain he intends to develop software to enable them to send text messages for the public. Timothy Tylor of St....


Read the Article


Sign out of this library

Other Topics