Restrictions on Online Freedom of Expression in China the Domestic, Regional and International Implications of China’S Policies and Practices
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Internet Surveillance in China
The Architecture of Control: Internet Su rveillance in China James A. Lewis , Center for Strategic and International Studies July 200 6 Security concerns shape China’s official internet and information technology strateg ies . Th ese include concerns shared by many cou nt ries: promoting a strong and growing economy , providing information assurance , and defending against foreign intrusions into China’s information space . Most importantly for the Chinese, information security include s a political element not foun d in many other nations – c ontrol by the party and the state over communications and the flow of informa tion . The rapid spread of internet access and mobile communications pose a serious challenge to this goal. In response, China’s security apparatus is reorienting its informational defenses. In the past, the emphasi s was on blocking access - the “great firewall.” In the future, the emphasis will be on the monitoring and surveillance of online activities. China’s primary objective in internet securi ty is political – preventing IT from eroding the regime’s authority. Information security is defined in China as “a comprehensive concept understood in a broad sense, and it involves political, economic, cultural, ideological, media, social and military l evel or field. ” It includes “data, system, network, infrastructure .”1 Chin ese officials worry about the potential of the Internet to contribute to the loss of state secrets , offer new avenues for organizing dissent and opposition , and spread “harmful inf ormation. ” This makes controlling access to "harmful network information” and the ability to monitor and intercept communications top priorities .2 For China’s leadership, one particular set of event s demonstrated the risks of not securing networks. -
THE BUSINESS of CENSORSHIP: CONTENT MANAGEMENT and the CHINESE ECONOMY By
THE BUSINESS OF CENSORSHIP: CONTENT MANAGEMENT AND THE CHINESE ECONOMY by JOSHUA CLARK B.A. (Hons.), Queen's University at Kingston, 2009 MASTER OF ARTS in THE FACULTY OF GRADUATE STUDIES (Political Science) THE UNIVERSITY OF BRITISH COLUMBIA (Vancouver) August 2010 ©Joshua Clark, 2010 Abstract Content control and censorship on the Internet are increasingly important topics for scholars of democratization, media and communications. Most studies have examined the relationship between the Internet, content management and various elements important to democratization such as the formation of civil society organizations. This thesis attempts to expand this discussion by examining the effects of online content management on economic systems, using the People's Republic of China as an example. China features a globally integrated economy that is increasing dependent on manufacturing and services while simultaneously maintaining one of the most extensive online content management systems in the world. This paper attempts to show how the Communist Party of China is able to reconcile the need for connectivity in order to drive their economy while maintaining political control. It also discusses the long-term implications of this strategy. The first section consists of a series of quantitative and qualitative tests to determine how various classes of websites are managed. These tests reveal that in order to maintain the flow of information necessary for a globally integrated economy, the Chinese Communist Party utilizes strategies that manage but not block the information flows related to business. This survey is followed by a case study examining the relationship between Google and China, and the implications of Chinese regulation and control for the broader economy. -
Egypt Digital Rights Landscape Report
ids.ac.uk Digital Rights in Closing Civic Space: Lessons from Ten African Countries 209 Egypt Digital Rights Landscape Report Egypt Digital Rights Landscape Report Mohamed Farahat This is an Open Access report distributed under the terms of the Creative Commons Attribution 4.0 International licence (CC BY), which permits unrestricted use, distribution, and reproduction in any medium, provided the original authors and source are credited and any modifications or adaptations are indicated. This report is part of ‘Digital Rights in Closing Civic Space: Lessons from Ten African Countries’; the Introduction is also recommended reading. © 2021 Mohamed Farahat © Institute of Development Studies. DOI: 10.19088/IDS.2021.014 ids.ac.uk Digital Rights in Closing Civic Space: Lessons from Ten African Countries 210 Egypt Digital Rights Landscape Report 1. Introduction Egypt has experienced many political and social changes prior to and since the 2011 uprising. These changes have had a significant impact on civic space offline, as well as online. Digital rights are simply human rights in online spaces and are recognised as being of central importance. This is especially true when closing civic space in the physical world means that opening civic space online is a necessary last resort. The coronavirus (Covid-19) pandemic has highlighted the importance of digital rights, especially for vulnerable groups such as refugees and people in rural and remote areas. The main objective of this report is to give an overview of digital rights in Egypt, especially in the context of freedom of expression and freedom of assembly, the right to access the internet, and for access to information, and the right to knowledge; and to explore the impacts of the political context on civic space in general and digital rights in particular. -
Poster: Introducing Massbrowser: a Censorship Circumvention System Run by the Masses
Poster: Introducing MassBrowser: A Censorship Circumvention System Run by the Masses Milad Nasr∗, Anonymous∗, and Amir Houmansadr University of Massachusetts Amherst fmilad,[email protected] ∗Equal contribution Abstract—We will present a new censorship circumvention sys- side the censorship regions, which relay the Internet traffic tem, currently being developed in our group. The new system of the censored users. This includes systems like Tor, VPNs, is called MassBrowser, and combines several techniques from Psiphon, etc. Unfortunately, such circumvention systems are state-of-the-art censorship studies to design a hard-to-block, easily blocked by the censors by enumerating their limited practical censorship circumvention system. MassBrowser is a set of proxy server IP addresses [14]. (2) Costly to operate: one-hop proxy system where the proxies are volunteer Internet To resist proxy blocking by the censors, recent circumven- users in the free world. The power of MassBrowser comes from tion systems have started to deploy the proxies on shared-IP the large number of volunteer proxies who frequently change platforms such as CDNs, App Engines, and Cloud Storage, their IP addresses as the volunteer users move to different a technique broadly referred to as domain fronting [3]. networks. To get a large number of volunteer proxies, we This mechanism, however, is prohibitively expensive [11] provide the volunteers the control over how their computers to operate for large scales of users. (3) Poor QoS: Proxy- are used by the censored users. Particularly, the volunteer based circumvention systems like Tor and it’s variants suffer users can decide what websites they will proxy for censored from low quality of service (e.g., high latencies and low users, and how much bandwidth they will allocate. -
Egypt: Freedom on the Net 2017
FREEDOM ON THE NET 2017 Egypt 2016 2017 Population: 95.7 million Not Not Internet Freedom Status Internet Penetration 2016 (ITU): 39.2 percent Free Free Social Media/ICT Apps Blocked: Yes Obstacles to Access (0-25) 15 16 Political/Social Content Blocked: Yes Limits on Content (0-35) 15 18 Bloggers/ICT Users Arrested: Yes Violations of User Rights (0-40) 33 34 TOTAL* (0-100) 63 68 Press Freedom 2017 Status: Not Free * 0=most free, 100=least free Key Developments: June 2016 – May 2017 • More than 100 websites—including those of prominent news outlets and human rights organizations—were blocked by June 2017, with the figure rising to 434 by October (se Blocking and Filtering). • Voice over Internet Protocol (VoIP) services are restricted on most mobile connections, while repeated shutdowns of cell phone service affected residents of northern Sinai (Se Restrictions on Connectivity). • Parliament is reviewing a problematic cybercrime bill that could undermine internet freedom, and lawmakers separately proposed forcing social media users to register with the government and pay a monthly fee (see Legal Environment and Surveillance, Privacy, and Anonymity). • Mohamed Ramadan, a human rights lawyer, was sentenced to 10 years in prison and a 5-year ban on using the internet, in retaliation for his political speech online (see Prosecutions and Detentions for Online Activities). • Activists at seven human rights organizations on trial for receiving foreign funds were targeted in a massive spearphishing campaign by hackers seeking incriminating information about them (see Technical Attacks). 1 www.freedomonthenet.org Introduction FREEDOM EGYPT ON THE NET Obstacles to Access 2017 Introduction Availability and Ease of Access Internet freedom declined dramatically in 2017 after the government blocked dozens of critical news Restrictions on Connectivity sites and cracked down on encryption and circumvention tools. -
The Velocity of Censorship
The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Tao Zhu, Independent Researcher; David Phipps, Bowdoin College; Adam Pridgen, Rice University; Jedidiah R. Crandall, University of New Mexico; Dan S. Wallach, Rice University This paper is included in the Proceedings of the 22nd USENIX Security Symposium. August 14–16, 2013 • Washington, D.C., USA ISBN 978-1-931971-03-4 Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Tao Zhu David Phipps Adam Pridgen [email protected] Computer Science Computer Science Independent Researcher Bowdoin College Rice University Jedidiah R. Crandall Dan S. Wallach Computer Science Computer Science University of New Mexico Rice University Abstract terconnected through their social graph and tend to post about sensitive topics. This biases us towards the content Weibo and other popular Chinese microblogging sites are posted by these particular users, but enables us to mea- well known for exercising internal censorship, to comply sure with high fidelity the speed of the censorship and with Chinese government requirements. This research discern interesting patterns in censor behaviors. seeks to quantify the mechanisms of this censorship: Sina Weibo (weibo.com, referred to in this paper sim- how fast and how comprehensively posts are deleted. ply as “Weibo”) has the most active user community of Our analysis considered 2.38 million posts gathered over any microblog site in China [39]. Weibo provides ser- roughly two months in 2012, with our attention focused vices which are similar to Twitter, with @usernames, on repeatedly visiting “sensitive” users. -
Retweeting Through the Great Firewall a Persistent and Undeterred Threat Actor
Retweeting through the great firewall A persistent and undeterred threat actor Dr Jake Wallis, Tom Uren, Elise Thomas, Albert Zhang, Dr Samantha Hoffman, Lin Li, Alex Pascoe and Danielle Cave Policy Brief Report No. 33/2020 About the authors Dr Jacob Wallis is a Senior Analyst working with the International Cyber Policy Centre. Tom Uren is a Senior Analyst working with the International Cyber Policy Centre. Elise Thomas is a Researcher working with the International Cyber Policy Centre. Albert Zhang is a Research Intern working with the International Cyber Policy Centre. Dr Samanthan Hoffman is an Analyst working with the International Cyber Policy Centre. Lin Li is a Researcher working with the International Cyber Policy Centre. Alex Pascoe is a Research Intern working with the International Cyber Policy Centre. Danielle Cave is Deputy Director of the International Cyber Policy Centre. Acknowledgements ASPI would like to thank Twitter for advanced access to the takedown dataset that formed a significant component of this investigation. The authors would also like to thank ASPI colleagues who worked on this report. What is ASPI? The Australian Strategic Policy Institute was formed in 2001 as an independent, non‑partisan think tank. Its core aim is to provide the Australian Government with fresh ideas on Australia’s defence, security and strategic policy choices. ASPI is responsible for informing the public on a range of strategic issues, generating new thinking for government and harnessing strategic thinking internationally. ASPI International Cyber Policy Centre ASPI’s International Cyber Policy Centre (ICPC) is a leading voice in global debates on cyber and emerging technologies and their impact on broader strategic policy. -
Effective Censorship: Maintaining Control in China
University of Pennsylvania ScholarlyCommons CUREJ - College Undergraduate Research Electronic Journal College of Arts and Sciences 2010 Effective Censorship: Maintaining Control In China Michelle (Qian) Yang University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/curej Part of the Political Science Commons Recommended Citation Yang, Michelle (Qian), "Effective Censorship: Maintaining Control In China" 01 January 2010. CUREJ: College Undergraduate Research Electronic Journal, University of Pennsylvania, https://repository.upenn.edu/curej/118. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/curej/118 For more information, please contact [email protected]. Effective Censorship: Maintaining Control In China Keywords censorship, china, incentives, Social Sciences, Political Science, Devesh Kapur, Kapur, Devesh Disciplines Political Science This article is available at ScholarlyCommons: https://repository.upenn.edu/curej/118 Effective Censorship: Maintaining Control in China Michelle Yang April 09, 2010 Acknowledgments My initial interest in this thesis topic was generated during the summer of 2009 when I was interning in Beijing. There, I had found myself unable to access a large portion of the websites I’ve grown so accustomed to in my everyday life. I knew from then that I wanted to write about censorship in China. Since that summer, the scope of the topic has changed greatly under the careful guidance of Professor Devesh Kapur. I am incredibly grateful for all the support he has given me during this entire process. This final thesis wouldn’t be what it is today without his guidance. Professor Kapur, thank you for believing in me and for pushing me to complete this thesis! I would also like to extend my gratitude to both Professor Doherty-Sil and Professor Goldstein for taking time out of their busy schedules to meet with me and for providing me with indispensible advice. -
West Censoring East
West Censoring East The Use of Western Technologies by Middle East Censors 2010-2011 Executive Summary The OpenNet Initiative has documented network filtering of the Internet by national governments in over forty countries worldwide. Countries use this network filtering as one of many methods to control the flow of online content that is objectionable to the filtering governments for social, political, and security reasons. Filtering is particularly appealing to governments as it allows them to control content not published within their national borders. National governments use a variety of technical means to filter the Internet; in this paper, we analyze the use of American- and Canadian- made software for the purpose of government-level filtering in the Middle East and North Africa. In this report, the authors find that nine countries in the region utilize Western-made tools for the purpose of blocking social and political content, effectively blocking a total of over 20 million Internet users from accessing such websites. 1 The authors analyze as well the increasing opacity of the usage of Western-made tools for filtering at the national level. Helmi Noman and Jillian C. York authored this report. ONI principal investigators Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain authored the foreword. Noman is a Senior Research Fellow at the Munk School of Global Affairs, University of Toronto, and is a Berkman Center Research Affiliate. York is the coordinator for the OpenNet Initiative at the Berkman Center for Internet & Society. The authors would like to thank James Tay of Citizen Lab for technical support and test data analysis. -
Congressional-Executive Commission on China Annual
CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA ANNUAL REPORT 2016 ONE HUNDRED FOURTEENTH CONGRESS SECOND SESSION OCTOBER 6, 2016 Printed for the use of the Congressional-Executive Commission on China ( Available via the World Wide Web: http://www.cecc.gov U.S. GOVERNMENT PUBLISHING OFFICE 21–471 PDF WASHINGTON : 2016 For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Mar 15 2010 19:58 Oct 05, 2016 Jkt 000000 PO 00000 Frm 00003 Fmt 5011 Sfmt 5011 U:\DOCS\AR16 NEW\21471.TXT DEIDRE CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA LEGISLATIVE BRANCH COMMISSIONERS House Senate CHRISTOPHER H. SMITH, New Jersey, MARCO RUBIO, Florida, Cochairman Chairman JAMES LANKFORD, Oklahoma ROBERT PITTENGER, North Carolina TOM COTTON, Arkansas TRENT FRANKS, Arizona STEVE DAINES, Montana RANDY HULTGREN, Illinois BEN SASSE, Nebraska DIANE BLACK, Tennessee DIANNE FEINSTEIN, California TIMOTHY J. WALZ, Minnesota JEFF MERKLEY, Oregon MARCY KAPTUR, Ohio GARY PETERS, Michigan MICHAEL M. HONDA, California TED LIEU, California EXECUTIVE BRANCH COMMISSIONERS CHRISTOPHER P. LU, Department of Labor SARAH SEWALL, Department of State DANIEL R. RUSSEL, Department of State TOM MALINOWSKI, Department of State PAUL B. PROTIC, Staff Director ELYSE B. ANDERSON, Deputy Staff Director (II) VerDate Mar 15 2010 19:58 Oct 05, 2016 Jkt 000000 PO 00000 Frm 00004 Fmt 0486 Sfmt 0486 U:\DOCS\AR16 NEW\21471.TXT DEIDRE C O N T E N T S Page I. Executive Summary ............................................................................................. 1 Introduction ...................................................................................................... 1 Overview ............................................................................................................ 5 Recommendations to Congress and the Administration .............................. -
Digital Gerrymandering 24
00 01 02 03 04 05 06 07 08 09 10 11 12 Policy & Government Digital Gerrymandering Near-future pessimistic scenario Electoral districts have long been shaped and manipulated to the benefit or disadvantage of certain political parties, and as network connectivity becomes a major factor affecting citizens’ quality of life, access to resources, and even the ability to vote, the practice of gerrymandering is translated to the digital realm. Building on the tactics of traditional gerrymandering, some districts are “packed”— incumbent politicians strategically place high-speed internet in a select few districts to consolidate constitu- ents of the opposing party in fewer locales, minimizing their presence in contested districts and thus weakening their ability to sway elections. Other districts, where constituents of the opposing are already concentrated, are “cracked”—incumbent politicians throttle connectivity or undermine the installation and maintenance of network infrastructure in order to disperse their opponents’ vot- ers, diluting their electoral impact. No politician will give up the opportunity to gain an advantage over their rivals, and weaponizing connectivity is a clever (if sinister) way to do just that. Scenarios24 © 2021 Future Today Institute 00 01 02 03 04 05 06 07 08 09 10 11 12 Policy & Government Watch Closely Informs Strategy Act Now 2ND YEAR ON THE LIST Techno-Nationalism KEY INSIGHT EXAMPLES DISRUPTIVE IMPACT EMERGING PLAYERS A great decoupling is underway, as the • U.S. Department of State In the digital age, a China’s new Foreign Investment Law U.S. and Chinese tech sectors are cleaved imposes strict rules for vetting foreign • Committee on Foreign Investment in nation’s technology apart by national governments. -
The Internet Beyond Borderless Versus Balkanized
POROUS TERRITORIES: THE INTERNET BEYOND BORDERLESS VERSUS BALKANIZED LUKE MUNN Western Sydney University (Australia) [email protected] Abstract: If the internet was once viewed as a borderless realm, critics now warn it is in danger of being “balkanized”, splintering into nationalized fragments. Certainly nation-states increasingly see the Internet as “their” internet, a national space to be regulated and actively shaped. The first half of this article charts the technologies that appear to place this vision within reach: data localization, internet shutdowns, and internet filtering. These moves promise to exert sovereign control, to make the inter- net an extension of national territory. Yet by drawing on two recent events in China, this article argues that these territories are messy and their borders are permeable. Pro-government activists jump across the firewall in order to attack individuals and organizations who threaten the stability and security of their motherland. Simultane- ously, individuals scale the firewall in order to question the party line and express solidarity with democratic movements, undermining the political and technical boundaries established by their nation. Internet architectures create a condition where territorialization is constantly being both amplified and undermined by “extra- territorial” activities. These practices demonstrate the everyday porosity of internet territories, providing a messier portrait that goes beyond the dichotomy of borderless vs balkanized. Keywords: territory, fragmentation, balkanization, internet, China. When nations speak of the internet today, they no longer use the language of the virtual, but of soil. At the dawn of the internet, cyberspace was framed as a new realm decoupled from the state. This digital sphere stretched across the globe, making it essentially ungovernable.