Resisting the Censorship Infrastructure in China

Resisting the Censorship Infrastructure in China

Proceedings of the 50th Hawaii International Conference on System Sciences | 2017 Resisting the Censorship Infrastructure in China Yubo Kou Yong Ming Kow Xinning Gui Purdue University City University of Hong Kong University of California, Irvine [email protected] [email protected] [email protected] Abstract highly politicized events, we had opportunities to sample more instances of resistance in our data. China’s censorship infrastructure is widely We found that participants’ many practices to recognized as sophisticated, strict, and deal with censorship involved their understanding of comprehensive. We conducted a qualitative study to how the Internet censorship functioned as an understand Chinese citizens’ practices to navigate infrastructure. We found a variety of strategies which the censored Chinese Internet. We found that usually included users attempting to understand participants’ practices were closely related to their boundaries, mechanics, and intents of censorship. In understanding of and resistance to the censorship turn, they took measures to avoid, or embrace infrastructure. Participants switched between public censorship, hopefully, to make the best of a and private channels based on the information they restrictive informational environment. We discuss the desired to seek. They communicated in ways that relationship between repression, censorship, and were considered less vulnerable to censorship resistance through the infrastructure lens. examination. They broadened their information search to mitigate the impact of censored content 2. Background consumption. Through these practices, participants reportedly coped with the censorship infrastructure China has one of the most sophisticated, strict, in an effective manner. We discuss how this case of and comprehensive censorship systems in the world resistance to censorship in China may further our that regulates its Internet infrastructure [21,23]. understanding of such infrastructure. Among the most well-known of China’s censorship apparatuses include the Great Firewall, which is the 1. Introduction primary technical means of restricting information access at the infrastructure level, which includes China is widely known for its comprehensive, blocking undesirable foreign websites such as strict Internet censorship infrastructure [23,34]. In a Facebook and Twitter, regulating access and top-down manner, the Chinese central government contents, and monitoring Internet use. But China’s required that internet companies block keywords, censorship infrastructure also extends to include delete unfavorable contents, and ban infringing users online espionage, regulatory tactics, and social [3,21]. By imposing hefty penalties for non- pressure, as MacKinnon, a renowned Internet complying organizations, and without providing clear freedom advocate and former journalist, described: censorship parameters, these entities (e.g., Cyber-attacks against activists, dissidents, and Chinese microblogs, news sites, and social-networking sites) exiles could compromise their computer networks and are encouraged to develop strict algorithms which email accounts. Device and network controls involve filter results with broad strokes, thus resulting in a pre-installing information filtering and tracking highly restricted informational spaces [13,21]. mechanisms in computers and routers sold in China. We carried out a qualitative study to understand Domain-name controls prevented ordinary individuals how Chinese citizens resisted the censorship from registering Internet domain names ending in infrastructure. We conducted 32 semi-structured “.cn.” Localized disconnection and restriction referred interviews with mainland Chinese citizens, and also to shutting down connections in specific locations observed their discussions on social media. All these entirely to ensure that locals cannot use the Internet interviewees had discussed three recent political or mobile phones to organize protests. Surveillance events in the Chinese social media: The Umbrella works through identity registration for Internet usage, Movement, the National People’s Congress, and the monitoring software, and the compliance of Internet companies. The government proactively steers online crackdown on corruption. By focusing on these URI: http://hdl.handle.net/10125/41437 ISBN: 978-0-9981331-0-2 CC-BY-NC-ND 2332 conversations through party members, government minds, as the censorship infrastructure was not officials, and “fifty-cent party,” people paid to write designed to completely remove dissents on its posts in favor of their employers. [23] Internet. In fact, the Chinese government had Therefore, not only does the government controls investigated citizens’ dissents which at times exposed the Internet hardware and software networks, it also corruption and malfeasance at lower level imposes a special Internet police force to enforce the governments, which contribute to China’s effort at government’s censorship regulations [21,33]. cracking down on corrupted officials [8]. Rather, a But the most effective effort at restricting more important focus for its censorship apparatuses, information which emerges at the grassroots level, than to completely eliminate anti-government including chatrooms, microblogs, and online forums, discourses, are to prevent citizens’ collective perhaps come not from government’s surveillance, mobilization and actions. King, et al. examined but self-censorship of information which deleted social media content on the Chinese Internet, organizations and individuals present to their users. arguing that China’s censorship is designed to silence Both domestic and foreign Internet corporations such comments which encouraged or organized social as Google [6] and Yahoo [10] altered their search mobilization; and all forms of mobilization aimed at results to accommodate the state’s censorship spurring offline collective actions were targeted requirements. regardless of their political inclinations [17]. Thus, And the Chinese government encourages self- Chinese citizens still have limited latitude to conduct censoring entities to be thorough by intentionally political discourses, so long as they could keeping censorship regulations and guidelines successfully guess at the extent of permissible generic and ambiguous. Roberts, a scholar studying boundaries. censorship and propaganda in China, noted: So far, Chinese citizens’ reactions to the Chinese censorship apparatuses have been dialectically It is illegal in China to write or distribute any complicated. As censorship is continuously information online that “harms the interest of the strengthened, Chinese are also making use of proxy nation,” “spreads rumors or disturbs social order,” servers and email to access restricted information “insults or defames third parties,” or “jeopardizes the [2,22,25]. And citizens have also discussed sensitive nation’s unity.” Punishments are similarly ambiguous topics using substitute terms for blocked keywords and unevenly administered—violating online [16,24]. For example, “ harmony和谐” refers to the information laws could result in punishment as severe as jail-time to as trivial as having your account shut ideology of social harmony proposed during Hu down or simply removing one offending social media Jintao and Wen Jiabao’s administration (2003-2013). post. The wide range of information that could qualify People use “ river crab 河蟹,” a homophone of under these laws keeps online users in China guessing “ harmony 和谐,” to circumvent the block list of as to what types of information are indeed off-limits sensitive words [38]. Thus, Roberts suggested that and what types of punishment could be meted out for the Chinese censorship not only had not deterred the spreading the information. [28] spread of information, it emboldens Internet users to By providing only highly abstract terms such as engage more actively in political writings [28]. national interest, social order, and national unity, the government affords itself more flexibility of 3. Related Work interpreting and manipulating legal boundaries [3,21]. Thus, companies which stand to lose much in In their seminal work on infrastructure, Star and case of a regulatory misstep tend to deploy sweeping Ruhleder state that infrastructure is neither a tool or a censoring mechanisms to block keywords, ban users, substrate, but a fundamentally relational concept, and delete infringing contents [13,21]. The extent of which becomes real infrastructure in relation to self-censorship may intensify during political events, organized practices [31]. Infrastructure has the for example, a case study of keyword blocking on following properties: embeddedness, transparency, Weibo reported that, during the 2012 National reach or scope, learned as part of membership, links Congress election, Weibo actively manipulated and with conventions of practice, embodiment of filtered the search results of certain government standards, built on an installed base, becomes visible officials’ names [26]. Even citizens in Hong Kong upon breakdown, and fixed in modular increments, were worried about the impact of censorship when not all at once or globally [30]. In many ways, they engaged in civic activities [19]. China’s censorship shares such properties. It is sunk But despite popular beliefs, Chinese citizens still into and inside of the Internet infrastructure, the maintain a small degree of agency in speaking their organizational arrangements of Internet companies, 2333 technologies, and

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    9 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us