The Hijacked Potential of China's Internet
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Internet Surveillance in China
The Architecture of Control: Internet Su rveillance in China James A. Lewis , Center for Strategic and International Studies July 200 6 Security concerns shape China’s official internet and information technology strateg ies . Th ese include concerns shared by many cou nt ries: promoting a strong and growing economy , providing information assurance , and defending against foreign intrusions into China’s information space . Most importantly for the Chinese, information security include s a political element not foun d in many other nations – c ontrol by the party and the state over communications and the flow of informa tion . The rapid spread of internet access and mobile communications pose a serious challenge to this goal. In response, China’s security apparatus is reorienting its informational defenses. In the past, the emphasi s was on blocking access - the “great firewall.” In the future, the emphasis will be on the monitoring and surveillance of online activities. China’s primary objective in internet securi ty is political – preventing IT from eroding the regime’s authority. Information security is defined in China as “a comprehensive concept understood in a broad sense, and it involves political, economic, cultural, ideological, media, social and military l evel or field. ” It includes “data, system, network, infrastructure .”1 Chin ese officials worry about the potential of the Internet to contribute to the loss of state secrets , offer new avenues for organizing dissent and opposition , and spread “harmful inf ormation. ” This makes controlling access to "harmful network information” and the ability to monitor and intercept communications top priorities .2 For China’s leadership, one particular set of event s demonstrated the risks of not securing networks. -
Tribunal Statement My Investigation Into Chinese Organ
Tribunal Statement My investigation into Chinese organ harvesting of prisoners of conscience was essentially an accident. I had been writing about Chinese Communist Party (CCP) surveillance of Falun Gong practitioners and other dissidents since 2002, around the time I left Beijing to finish Losing the New China (Encounter Books, 2004). By 2005, I was thinking about my next book and my experience on the ground told me that Falun Gong was the biggest issue in China. Yet there was a gap in the existing literature. Research by Falun Gong practitioners was emotionally charged, while published writing by self-proclaimed “objective” outsiders overcompensated with undue formality, bias against spirituality, or avoiding actual witness accounts in favor of formulaic original research. That partially explains why I maintained a degree of skepticism about the first public organ harvesting allegations from both the Epoch Times and the Kilgour- Matas report, Bloody Harvest in 2006. Yet I was firmly convinced that a comprehensive account of the conflict between the Chinese State and Falun Gong was long overdue, and I began a lengthy interview process to fill that gap. One of my very first interviews was in Toronto with three women who were fresh out of labor camp. Even in that early stage, I recognized that their stories were relatively routine – demonstrations at Tiananmen followed by capture, incarceration, and attempts to force practitioners to reject Falun Gong using torture, brainwashing, threats to the family, and humiliation. One of the women – call her Wang - was the least articulate but had a very appealing salt-of-the-earth quality. -
Human Rights in China and U.S. Policy: Issues for the 117Th Congress
Human Rights in China and U.S. Policy: Issues for the 117th Congress March 31, 2021 Congressional Research Service https://crsreports.congress.gov R46750 SUMMARY R46750 Human Rights in China and U.S. Policy: Issues March 31, 2021 for the 117th Congress Thomas Lum U.S. concern over human rights in China has been a central issue in U.S.-China relations, Specialist in Asian Affairs particularly since the Tiananmen crackdown in 1989. In recent years, human rights conditions in the People’s Republic of China (PRC) have deteriorated, while bilateral tensions related to trade Michael A. Weber and security have increased, possibly creating both constraints and opportunities for U.S. policy Analyst in Foreign Affairs on human rights. After consolidating power in 2013, Chinese Communist Party General Secretary and State President Xi Jinping intensified and expanded the reassertion of party control over society that began toward the end of the term of his predecessor, Hu Jintao. Since 2017, the government has enacted new laws that place further restrictions on civil society in the name of national security, authorize greater controls over minority and religious groups, and further constrain the freedoms of PRC citizens. Government methods of social and political control are evolving to include the widespread use of sophisticated surveillance and big data technologies. Arrests of human rights advocates and lawyers intensified in 2015, followed by party efforts to instill ideological conformity across various spheres of society. In 2016, President Xi launched a policy known as “Sinicization,” under which the government has taken additional measures to compel China’s religious practitioners and ethnic minorities to conform to Han Chinese culture, support China’s socialist system as defined by the Communist Party, abide by Communist Party policies, and reduce ethnic differences and foreign influences. -
Effective Censorship: Maintaining Control in China
University of Pennsylvania ScholarlyCommons CUREJ - College Undergraduate Research Electronic Journal College of Arts and Sciences 2010 Effective Censorship: Maintaining Control In China Michelle (Qian) Yang University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/curej Part of the Political Science Commons Recommended Citation Yang, Michelle (Qian), "Effective Censorship: Maintaining Control In China" 01 January 2010. CUREJ: College Undergraduate Research Electronic Journal, University of Pennsylvania, https://repository.upenn.edu/curej/118. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/curej/118 For more information, please contact [email protected]. Effective Censorship: Maintaining Control In China Keywords censorship, china, incentives, Social Sciences, Political Science, Devesh Kapur, Kapur, Devesh Disciplines Political Science This article is available at ScholarlyCommons: https://repository.upenn.edu/curej/118 Effective Censorship: Maintaining Control in China Michelle Yang April 09, 2010 Acknowledgments My initial interest in this thesis topic was generated during the summer of 2009 when I was interning in Beijing. There, I had found myself unable to access a large portion of the websites I’ve grown so accustomed to in my everyday life. I knew from then that I wanted to write about censorship in China. Since that summer, the scope of the topic has changed greatly under the careful guidance of Professor Devesh Kapur. I am incredibly grateful for all the support he has given me during this entire process. This final thesis wouldn’t be what it is today without his guidance. Professor Kapur, thank you for believing in me and for pushing me to complete this thesis! I would also like to extend my gratitude to both Professor Doherty-Sil and Professor Goldstein for taking time out of their busy schedules to meet with me and for providing me with indispensible advice. -
The Internet Beyond Borderless Versus Balkanized
POROUS TERRITORIES: THE INTERNET BEYOND BORDERLESS VERSUS BALKANIZED LUKE MUNN Western Sydney University (Australia) [email protected] Abstract: If the internet was once viewed as a borderless realm, critics now warn it is in danger of being “balkanized”, splintering into nationalized fragments. Certainly nation-states increasingly see the Internet as “their” internet, a national space to be regulated and actively shaped. The first half of this article charts the technologies that appear to place this vision within reach: data localization, internet shutdowns, and internet filtering. These moves promise to exert sovereign control, to make the inter- net an extension of national territory. Yet by drawing on two recent events in China, this article argues that these territories are messy and their borders are permeable. Pro-government activists jump across the firewall in order to attack individuals and organizations who threaten the stability and security of their motherland. Simultane- ously, individuals scale the firewall in order to question the party line and express solidarity with democratic movements, undermining the political and technical boundaries established by their nation. Internet architectures create a condition where territorialization is constantly being both amplified and undermined by “extra- territorial” activities. These practices demonstrate the everyday porosity of internet territories, providing a messier portrait that goes beyond the dichotomy of borderless vs balkanized. Keywords: territory, fragmentation, balkanization, internet, China. When nations speak of the internet today, they no longer use the language of the virtual, but of soil. At the dawn of the internet, cyberspace was framed as a new realm decoupled from the state. This digital sphere stretched across the globe, making it essentially ungovernable. -
Redalyc.Characterizing E-Government in China
Desafíos ISSN: 0124-4035 [email protected] Universidad del Rosario Colombia Baquero-Hernández, Ricardo Alberto Characterizing E-Government in China Desafíos, vol. 24, núm. 2, julio-diciembre, 2012, pp. 233-257 Universidad del Rosario Bogotá, Colombia Disponible en: http://www.redalyc.org/articulo.oa?id=359633172009 Cómo citar el artículo Número completo Sistema de Información Científica Más información del artículo Red de Revistas Científicas de América Latina, el Caribe, España y Portugal Página de la revista en redalyc.org Proyecto académico sin fines de lucro, desarrollado bajo la iniciativa de acceso abierto Characterizing E-Government in China RICARDO ALBERTO BAQUERO-HERNÁNDEZ* Artículo recibido: 10 de noviembre de 2010 Artículo aprobado: 12 de febrero de 2011 Para citar este artículo: Baquero Hernández, R. A. (2012). Characterizing E-Government in China. Desafíos, 24 (2), pp. 233-257. Abstract Although E-Government (E-G) is one public policy in China, it still has a long way to go in terms of diffusion across the country and interactive participation from citizens. It constitutes a double sided sword since it enhances the features that China needs to show to the world in international competitiveness and status, but also poses challenges to the Communist rule inasmuch as it has to be controlled. Therefore, E-G is both a political and a managerial issue: it is sensitive to the Chinese Communist Party but also leads to economical and administrative pros- perity and efficiency. Some of the keys would be the development of the middle class, further penetration of the Internet, and more education about virtual tools in government issues and services. -
Redefining Digital Citizenship in the Cyber Era
Cybersoverignty: Redefining Digital Citizenship in the Cyber Era By: Sophie Laurence AP Gov May 20, 2019 Cyber: a combining form meaning “computer,” “computer network,” or “virtual reality,” used in the formation of compound words (cybertalk; cyberart; cyberspace) and, by extension, meaning “expressing visions of the future.” Sovereignty: supreme power especially over a body politic; freedom from external control; autonomy. A search in dictionary.com yields the following result: “No results found for cybersovereignty.” Neither this word nor its variations (cyber-sovereignty, cyber sovereignty) appears in any English language dictionary. Yet, the rise of China as the world’s dominant cyber-superpower amplifies the urgent need for international discourse on its meaning and implications. Even as the West is wondering if a change in the global paradigm is underway, China has already dramatically redefined what it means to be a digital citizen in the 21st century. The working meaning of “cybersovereignty” is the full right and power of a governing body over the internet within its own borders, without any interference from outside entities. In the material world, national borders are physical boundaries protected by border guards, demarcated by country lines on maps, and governed by national laws. There is no equivalent universal system to regulate internet borders. Though utopianists routinely frame the internet as an open and free instrument of democracy, this is an ideological fiction; the reality is that the internet is a commodified entity owned by a privileged few and, in the case of China, state-controlled. Correspondingly, it has become a battleground in the struggle for international economic dominance and domestic political control. -
Artificial Intelligence, China, Russia, and the Global Order Technological, Political, Global, and Creative Perspectives
AIR UNIVERSITY LIBRARY AIR UNIVERSITY PRESS Artificial Intelligence, China, Russia, and the Global Order Technological, Political, Global, and Creative Perspectives Shazeda Ahmed (UC Berkeley), Natasha E. Bajema (NDU), Samuel Bendett (CNA), Benjamin Angel Chang (MIT), Rogier Creemers (Leiden University), Chris C. Demchak (Naval War College), Sarah W. Denton (George Mason University), Jeffrey Ding (Oxford), Samantha Hoffman (MERICS), Regina Joseph (Pytho LLC), Elsa Kania (Harvard), Jaclyn Kerr (LLNL), Lydia Kostopoulos (LKCYBER), James A. Lewis (CSIS), Martin Libicki (USNA), Herbert Lin (Stanford), Kacie Miura (MIT), Roger Morgus (New America), Rachel Esplin Odell (MIT), Eleonore Pauwels (United Nations University), Lora Saalman (EastWest Institute), Jennifer Snow (USSOCOM), Laura Steckman (MITRE), Valentin Weber (Oxford) Air University Press Muir S. Fairchild Research Information Center Maxwell Air Force Base, Alabama Opening remarks provided by: Library of Congress Cataloging-in- Publication Data Brig Gen Alexus Grynkewich (JS J39) Names: TBD. and Lawrence Freedman (King’s College, Title: Artificial Intelligence, China, Russia, and the Global Order : Techno- London) logical, Political, Global, and Creative Perspectives / Nicholas D. Wright. Editor: Other titles: TBD Nicholas D. Wright (Intelligent Biology) Description: TBD Identifiers: TBD Integration Editor: Subjects: TBD Mariah C. Yager (JS/J39/SMA/NSI) Classification: TBD LC record available at TBD AIR UNIVERSITY PRESS COLLABORATION TEAM Published by Air University Press in October -
The Impact of Media Censorship: Evidence from a Field Experiment in China
The Impact of Media Censorship: Evidence from a Field Experiment in China Yuyu Chen David Y. Yang* January 4, 2018 — JOB MARKET PAPER — — CLICK HERE FOR LATEST VERSION — Abstract Media censorship is a hallmark of authoritarian regimes. We conduct a field experiment in China to measure the effects of providing citizens with access to an uncensored Internet. We track subjects’ me- dia consumption, beliefs regarding the media, economic beliefs, political attitudes, and behaviors over 18 months. We find four main results: (i) free access alone does not induce subjects to acquire politically sen- sitive information; (ii) temporary encouragement leads to a persistent increase in acquisition, indicating that demand is not permanently low; (iii) acquisition brings broad, substantial, and persistent changes to knowledge, beliefs, attitudes, and intended behaviors; and (iv) social transmission of information is statis- tically significant but small in magnitude. We calibrate a simple model to show that the combination of low demand for uncensored information and the moderate social transmission means China’s censorship apparatus may remain robust to a large number of citizens receiving access to an uncensored Internet. Keywords: censorship, information, media, belief JEL classification: D80, D83, L86, P26 *Chen: Guanghua School of Management, Peking University. Email: [email protected]. Yang: Department of Economics, Stanford University. Email: [email protected]. Yang is deeply grateful to Ran Abramitzky, Matthew Gentzkow, and Muriel Niederle -
Falun Gong in China
Genocide Studies and Prevention: An International Journal Volume 12 Issue 1 Article 6 6-2018 Cold Genocide: Falun Gong in China Maria Cheung University of Manitoba Torsten Trey Doctors Against Forced Organ Harvesting David Matas University of Manitoba Richard An EME Professional Corp Legal Services Follow this and additional works at: https://scholarcommons.usf.edu/gsp Recommended Citation Cheung, Maria; Trey, Torsten; Matas, David; and An, Richard (2018) "Cold Genocide: Falun Gong in China," Genocide Studies and Prevention: An International Journal: Vol. 12: Iss. 1: 38-62. DOI: https://doi.org/10.5038/1911-9933.12.1.1513 Available at: https://scholarcommons.usf.edu/gsp/vol12/iss1/6 This Article is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Genocide Studies and Prevention: An International Journal by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Cold Genocide: Falun Gong in China Acknowledgements This article is dedicated to the Chinese citizens who were innocently killed for their spiritual beliefs. This article is available in Genocide Studies and Prevention: An International Journal: https://scholarcommons.usf.edu/gsp/vol12/iss1/6 Cold Genocide: Falun Gong in China Maria Cheung University of Manitoba Winnipeg, Manitoba, Canada Torsten Trey Doctors Against Forced Organ Harvesting Washington, D.C., USA David Matas University of Manitoba Winnipeg, Manitoba, Canada Richard An York University Toronto, Ontario, Canada Introduction The classical school of genocide studies which traces back to Raphael Lemkin focuses on eradication of a group through the mass murder of its members in a short period. -
THE PLIGHT of UYGHURS in CHINA Hon. David Kilgour, J.D., For
THE PLIGHT OF UYGHURS IN CHINA Hon. David Kilgour, J.D., for International Coalition to End Transplant Abuse in China (ETAC) Universal Peace Federation Ottawa 28 Jan 2020 MIHRIGUL TURSUN, refugee Photo credit: Radio Free Asia Allow me to introduce Mihrigul Tursun, a Uyghur woman who grew up in Xinjiang, who moved overseas for employment opportunities. In 2015, she gave birth in Egypt to triplets Two months later, she flew with them to Xinjiang to visit her parents. Upon arrival at the airport in Urumqi, she was interrogated by Chinese authorities. They then separated her from her triplets and detained her in a “vocational training centre.” When released three months later, she was told that one of her sons had inexplicably died after an operation in hospital. Her passport was confiscated and she was forced to remain in China. Two years later, while staying in her parents’ home 1 1,184 km from Urumqi, she was taken from her two toddlers and again placed in detention - this time in an overcrowded cell with more than 50 other women. The cell was so crowded that they had to take turns sleeping in shifts and standing. Over time, nine of the detainees died from the conditions. In 2018, diplomats from the Egyptian Embassy in Beijing intervened to help her leave prison and reunite with her two children and they finally left for Cairo. One year ago, they moved to the state of Virginia and began working through the U.S. asylum process. It hasn’t been easy - her son is asthmatic, but she’s unable to take him to a pediatrician because she lacks health insurance. -
A Survey of Defensive Measures for Digital Persecution in the Global South
future internet Article A Survey of Defensive Measures for Digital Persecution in the Global South Louis Edward Papa 1,2 and Thaier Hayajneh 2,* 1 Graduate School of Arts and Science, Fordham University, New York, NY 10023, USA; [email protected] 2 Fordham Center for Cybersecurity, Fordham University, New York, NY 10023, USA * Correspondence: [email protected] Received: 27 July 2020; Accepted: 25 September 2020; Published: 29 September 2020 Abstract: This paper examines the phenomenon of digital persecution in the Global South and evaluates tools that defend against it. First, the paper explains the nature of persecution and its digital incarnation. It then provides a contextual overview of real-world instances of digital persecution in seven Global South countries. The possible defensive technologies against censorship and surveillance are discussed. The article goes on to discuss barriers to technology adoption in the Global South, explains the security implication of these difficulties, and examines the role that human computer interaction (HCI) metrics could play in overcoming these challenges. Finally, the paper surveys the viability of sixteen security tools in a Global South context. The survey results were mixed, with 37.5% of the reviewed tools being deemed to be inviable for use in the Global South to defend against persecution. Prescriptive recommendations are provided for creating security tools that are universal, simple, and effective. Keywords: persecution; oppression; free software; global south; cybersecurity; HCI; human rights 1. Introduction In a few short years, most internet users will be the poor of the Global South. Internet technology is often presented as a panacea for the common troubles in developing economies.