China's Golden Shield Project or The Great Firewall of China

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

Freedom of Speech (Part 3)
Copyrights and Internet Piracy: SOPA and PIPA Essential Questions… What are SOPA and PIPA? Should people make money off of their creativity? How damaging.
DOT POINT 6 The role of government, the media and communication technologies in promoting or eroding active citizenship ◦ Refer to the handout distributed.
Self-Censorship in China Eric Schabel & Fahad Pervaiz.
Odessa national academy of telecommunications n. a. A.S. Popov Department of Automation and control of technological processes CONTENT IMAGES FILTERING.
THE INTERNET IN CHINA 384 million users by the end of 2009 (Xinhua News Agency, Jan. 15, 2010) Top three uses are online music, online news and search.
Censorship Traditionally: Deletion of materials that the gorvernment or media considers to be objectionable Internet censorship often just blocks access.
Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?
Forced Internet Filtering Thomas Mahoney. Internet Filtering ► Techniques  Technical blocking  Search result removal  Take-Down  Self-Censorship ►
Internet Censorship Sri Reddy Internet and Web Systems 2 Presentation.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Internet Censorship By: Austin Tyler And, Lisa. Introduction  Ever since there has been an Internet, there have been attempts to control it. However,
Internet Censorship In order of appearance: Dmitriy Bespalov Ilya Braude Brian McBurney Yaroslav Volkov.
Internet Censorship in China By Shipeng Xu. What content is censored? Social networks: Facebook, Twitter, Youtube and Flikr etc. Any news sources contains.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
China. Government Communist Party ◦Restricts other groups from running ◦Leaders are not elected from people  Gain power through loyalty of communist.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Internet censorship in the People's Republic of China Group Presentation by Alauddin, Michel, Malik and Toshe.
Chapter 9: The Internet and World Wide Web Two contrasting views: Media Critic Marshall McCLuhan: the Internet would help create a “global village” of.
Chapter 2: Anatomy of the Problem Recent terrorist attacks and the raise in cyber attacks have raised concern about the need to protect the nation’s cyber.
Google & Industry Best practices BY: ANAHITA ZAMANI ITMGMT 550 – INSTRUCTOR: TONY WOLF SEP
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12.
Copyright (c) 2003 by Prentice Hall. All rights reserved. Understanding the Internet CHAPTER ONE How the Internet is Changing the World.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Presentation by: Jennifer Collins Roldan Padilla.
Internet Censorship Flora Wan Computer Science 99 Winter 2000.
China 101 Facts and Trends. China 101 Key facts Full Name – People’s Republic of China (PRC) Population billion (July 2007 UN estimate) Size
China Club forum Question: Why did China ban Facebook?
Contemporary Issues in China 1.Religious Persecutions: Patriotic Churches 2.Censorship 3.Infanticide 4.Taiwan’s Sovereignty 5.Pollution.
China Seminar Boulder, Colorado 2010 David Lampton John Hopkins University Version 2.
Towards A Greater Vision Monitoring the pattern and growth of South Korea’s media June 2013 Presented by: Oloruntobi “IBK” Jaiyeola SIS-645-E01L-E91L-2013XE.
Digital Marketing 3 rd assignment E Group 이병은 박영인 이동휘 이은정.
Economic Systems Chapter 2 Section 4 Modern Economies.
CHINA. Largest population in the world!!! 1.4 billion 55% live in rural areas, 45% live in urban areas – 25% change in last 20 years (urbanization) –
Tyler Rapp.  I strongly believe anonymous posting should be legal  Why? You have the right, guaranteed to you by the 1 st Amendment in the United States.
Central Management of 300 Firewalls and Access-Lists Fabian Mauchle TNC 2012 Reykjavík, 21-May-2012.
Political Globalization. The Nation-State “Sovereign authority in a specified territory, with the right to use force both to maintain internal order and.
Think / Pair / Share What are Human Rights?
Creating your online identity
Net Neutrality An ethical examination of the internet’s ownership
Chapter 2 Section 4 Modern Economies
Table of contents Foundation for support of reforms in Ukraine. Initiation……………………….3 Structure of the Foundation …………………………………………………………4 Areas of Activities …………………………………………………….5.
CS590B690B Detecting network interference
Freedom of Expression.
China & Censorship.
Aurora A. Rubio INDICATORS ON COMMUNITY ACCESS TO ICT:
Think / Pair / Share What are Human Rights?
Chapter 26-3 China Today.
Information and Social Media
China & Censorship.
Afef Abrougui and Koliwe Majama Internet Freedom Festival, March 2017
The Great Firewall of China
China is Losing a War Over Internet
China's Golden Shield Project or The Great Firewall of China
Firewalls Routers, Switches, Hubs VPNs
CHINA TRANSFORMING ITSELF.
This Is China!.
Warm up # 39 What rights do you think that a government is obligated to provide for their citizens, why are these important?
Global Communities Capstone Project Advisor: Caitlin Haugen
A Gift of Fire Third edition Sara Baase
An Introduction to the Content Evaluation and Monitoring Association (EMA) Copyright (C) Content Evaluation Monitoring Association All rights reserved.
Multilingual Domain Name(m-DNS)
Cyber Security Ecosystem of Georgia. Experience and Challenges
Freedom of Speech in Cyberspace
Libya has been removed from this list since the Arab Spring
A Gift of Fire Third edition Sara Baase
Big Data in Official Statistics: Generalities
Presentation transcript:

China's Golden Shield Project or The Great Firewall of China

In the 20th century, control of information was easier Not many sources Few gatekeepers Nations isolated

Today, control of information is more difficult Especially if you want to stay competitive in the global community.

One Approach to Control: Shut it Off January, 2011 President Mubarak of Egypt Reacting to use of social media by protestors Shuts down Internet in Egypt How did he do it?

How the Internet Works

How Mubarak Shut Down the Internet

China: a smoother article China is an interesting example of a nation with a strategic vision for controlling the newly emerging virtual world.

In a speech in 2012, China's outgoing President Hu noted: "At present, our country has an important strategic window for development, but is also in a period of magnified social conflicts...“ He urged the importance of "...further strengthening and improving management of the Internet, improving the standard of management of virtual society, and establishing mechanisms to guide online public opinion."

More recently, President Xi Jinping has called for “cyber sovereignty” “We should respect the right of individual countries to independently choose their own path of cyber development and model of cyber regulation and participate in international cyberspace governance on an equal footing,”

The largest Internet user base in the world 772 million users in 2017 56% of the population Internet critical to continued economic, technological development How to shape and control an essentially free environment?

Who controls the Internet in China? At least 14 government agencies Political turf war State Internet Information Office created May, 2011 Coordination, oversight, or control? Power, money at stake

Most prominent method of control The Golden Shield Project Run by the Ministry of Public Security Most sophisticated filtering and monitoring system on the Internet

Officers JingJing and Chacha Unlike the crude Internet take down in Egypt, China has explored a variety of ways to shape and control information on the Web.

How China controls the Internet Creating alternatives to open applications like Google, Facebook and Twitter Pressure on foreign companies Licensing of news Embedded software Banning anonymous postings Filtering Monitoring Controlling the discussion Informing "Self discipline" (Self- censorship)

Filtering $700 million in Golden Shield infrastructure Sites blocked by keyword, DNS server International traffic through a few fiber-optic cables in 3 areas Easier to control, monitor Supposedly done to block pornography Filtering common in the U.S.

Monitoring An estimated 30,000 police monitors 500 cities with an Internet police bureau

Controlling the discussion The 50 cent army (or party) Begun at Nanjing University People paid to post, comment, and spin Mainly government, also private sector Estimates: 300,000 posters Potential impact on social media unknown

Informing In 2004, Center of Illegal and Harmful Information shut down 1,287 sites. Informers paid between $60 and $240.

Self-discipline = Harmony = Self-censorship "Harmonious" a code word for the suppression of unpleasant speech River crab and harmony similar Chinese characters River crab is a code word for "censor" River crab shutting down Twitter on the 20th anniversary of Tiananmen Square

Self-discipline = Harmony = Self-censorship Companies are responsible for what users do (US, Europe considered) Companies regulate according to state dictates or suffer fines and shutdowns Baidu, China's Google, aggressive censor Google abandoned .cn presence over this (or inability to compete) "Networked Authoritarianism" (Rebecca MacKinnon) Fear pressures individuals to conform Risqué cosplayer Li Ling “forced to drink tea”

Creating alternatives More easily controlled Pressure foreign companies to get in line

Pressuring foreign companies Apple products subject to Chinese audits NYT denied press credentials Media “ Content control” broadly interpreted US Department of Defense, NSA also want control over tech

Embedded Software Green Dam Child Escort Software most famous Project of the Ministry of Industry and Information Technology Supposedly anti- pornography filter for kids 85% political, 15% sexual words filtered

Green Dam Girl Originally required on all new computers Chinese Internet users hostile Ridiculed by "Green Dam Girl" cartoons Reaction in Chinese press mixed (government turf war) Software ineffective and buggy Ministry backed down Software optional, funding cut, project died

Buggy software Pig farmers found their pictures banned Color was a little too close to human flesh

So, where is all this going? Can China allow just enough freedom online to innovate and satisfy an upwardly mobile population and...

...still maintain control over the anarchy of virtual space?

Nobody knows. There's never been anything remotely like this. Parody of Green Dam Child Escort software in chichi Hong Kong fashion magazine Look. River crabs for harmony!