H. P. ZHENG
have a direct imp ac t on internet s p eec h.
On February 1, 1996, China’s State Council promulgated the
Interim Provisions Governing Management of Computer In-
formation Networks. It prohibits four categories of information
from being produced or transmitted online: information that
would harm national security, disclose state secrets, threaten
social stability or promote sexually suggestive material (art.
13).
On September 20, 2000, the State Council issued the Meas-
ures for Managing Internet Information Services (Measures,
2000), which significantly extended the scope of prohibited
contents. Article 15 of the 2000 Measures provides:
ISPs (internet service providers) shall not produce, reproduce,
release, or disseminate information that contains any of the
following: 1) Information that goes against the basic principles
set in the Constitution; 2) Information that endangers national
security, divulges state secrets, subverts the government, or
undermines national unity; 3) Information that is detrimental to
the honor and interests of the state ··· 6) Information that dis-
seminates rumors, disturbs social order, or undermines social
stability ··· or 9) Other information prohibited by the law or
administrative regulations.
It is easy to see that provisions like this are “vague, confus-
ing and inconsistent” (Li, 2004). Yet similar provisions are
present in many other internet regulations. Indeed, these provi-
sions are so common that many Chinese seem to have “ac-
cepted” them. Few people attempted to challenge the legiti-
macy (or constitutionality) of such provisions. Obviously, such
vague provisions can deter individual citizens from spreading
“sensitive” information that may fall into one of the prohibited
categories.
Internet Censorship and Its Resistance
This Part introduces some specific measures (or techniques)
that China uses to control the internet. Although these measures
in fact overlap with one another, for purpose of clarity, they are
to be discussed separately here.
Blocking and Filtering Systems
The Chinese government consistently blocks the entire do-
main of certain websites that are hard to control, including
some international news sources (i.e., BBC-Chinese), internal
blogger servicer providers (i.e., facebook, blogger), and some
other websites that often post criticism on China’s human rights
and social justice records (i.e., Amnesty International, Human
Rights Watch, etc.) These websites are blocked regardless of
their specific contents, partly because the ISPs of these websites
are unlikely to “cooperate” with the Chinese government in
censoring the internet content (ONI, 2005).
The general trend, though, seems to be that the Chinese gov-
ernment tries to filter specific “sensitive” contents rather than
blocking the entire websites at the backbone level. For example,
before the 2008 Olympic Games, the New York Times website
was entirely blocked. During the Olympic Games, the site was
partially “unblocked”, rendering some URLs (Uniform Re-
source Locates) accessible while others inaccessible. Thus, the
accessibility of a website does not guarantee that all the con-
tents on that site will be available. Typically, the blocked con-
tents are those that are deemed to be “sensitive” by the gov-
ernment. The specific “sensitive” contents change over time.
However, certain contents are regularly filtered: for example,
the Tiananmen Square protests of 1989, the independence of
Ti b et, X inj i ang and T a iwa n , an d t h e Fa l u n Gong movement, etc.
(Zittrain & Edelman, 2003; ONI, 2005).
With respect to filtering technology, China’s technology is
“the most sophisticated effort of its kind in the world”. (ONI,
2005) As early as 1998, the Chinese government began to in-
vest in the notorious Gold Shield software project. The main
function of the Gold Shield software is to censor “illegal” con-
tents. It can pick the sensitive words and block the relevant
content. However, the effectiveness of filtering technology is
unclear. The filtering systems can not foresee all the sensitive
words. In addition, sophisticated internet users can often access
blocked contents through various circumvention technologies.
Moreover, in recent years, as more and more individuals be-
gan to use internet, the resistance against such blocking and
filtering practices also increases. The controversy over the
“Green Dam Youth Escort” (“Green Dam” hereafter) provides
a revealing example. The “Green Dam” software was a filtering
device that was supposed to be very powerful in filtering inter-
net contents. In May 2008, the Minister of Industry and Infor-
mation (MII) spent more than 41 million yuan (about 6 million
US dollars) to purchase the “Green Dam” software from two
companies that had “cooperated” with Chinese government in
the past. The MII then offered the software to internet users for
free downloads. However, few individuals bothered to install
the “free” software (Chao, 2009).
On May 19, 2009, the MII went further by sending a notifi-
cation to computer manufacturers of its intention to require all
new personal computers sold in China after July 1 to pre-install
the “Green Dam” software. However, soon after the notification
was released, there was a surge of online criticism. At the night
of June 30, just several hours before the requirement was to
become effective, MII issued a notice, declaring that the re-
quirement to install the “Green Dam” software was to be post-
poned. Till day, the MII has not re-set the requirement for
compulsory pre-installation of the software.
Controlling the ISPs and the Resulting
Self-Censorship
As mentioned in Part 2, several regulations impose liabilities
on ISPs, blog service providers (BSPs), and BBS (Bulletin
Board System) providers, etc. For example, the 2000 Measures
requires IAPs and ISPs to record the dates and times when
subscribers accessed the Internet, the subscriber’s account
number, the addresses of all websites visited, and the telephone
number used to access the Internet. The ISPs and IAPs must
keep a record of this information for sixty days and provide it to
the authorities upon request. Similar liabilities were imposed on
BBS providers in another regulation promulgated in 2000.
Indeed, the Chinese authorities took specific actions to im-
plement these regulations. For example, on January 9, 2009,
Niubo, a blog service provider, was shut down because it
transmitted “harmful information on political and current af-
fairs” (Wu, 2009). Specifically, the closure was linked to its
status as being the leading domestic circulator Charter 08, a
proposal by Chinese intellectuals to reform China’s politics
(Garnaut, 2009).
Because of the threat of punishment, private entities (includ-
ing IAPs, ISPs and BSPs) often resort to self-censorship. The
following are some of the typical methods that are used by
Copyright © 2013 SciRes.
38