SlideShare a Scribd company logo
Charles Mok | Cyber Policy Center, Stanford University | Feb 15 2023 | For Northeastern University
Chinese Digital Repression
Repressive Practices
Through technology and operations
• What is the Great Firewall (GFW)?
• What is censorship?
• Fear
• Friction
• Flooding
• Total control on infrastructure and backbone networks
Smart City
• Informatization of city management — transportation, public safety,
healthcare, environmental protection…
• Utlizing technologies: IoT, 5G, AI, Big Data, Cloud computing.
• Alibaba’s City Brain project (Hangzhou) — >20 cities in China plus Kuala
Lumpur, Macau, etc. by 2019.
• Huawei — leveraging 5G and communications technologies for land and air
transport coordination.
Massive Surveillance
• SkyNet project: surveillance camera network with facial recognition and AI.
• Leading vendors: Hikvision, SenseTime, Dahua, Huawei, ZTE, etc.
• BBC reporter John Sudworth (Guiyang, Guizhou; 2017) “caught in 7 minutes”:
“If you have nothing to hide, you have nothing to fear?”
• Massive deployment in Xinjiang.
Social Credit
• State Council document: “Guidelines of Social Credit System Construction (2014-2020)” (2014):
• The system aims to standardize assessment for businesses, organizations and individuals,
measuring financial, social and political worthiness.
• Rather than a single score to limit social activities of movements of individuals, it still focuses
more on business or marketplace behaviors.
• The system is still fragmented, not fully digitized and decisions largely made by humans rather
than AI.
• However, the system is still a flexible tool for rapid and strict enforcement when needed.
• Do not underestimate the acceptance by Chinese public — for social harmony, crime
prevention, in a “low trust” society.
Covid-19 Tracing
• A perfect opportunity to test the technology and social credit in order to trace and restrict
movements of people, record their vaccination and infection records, and testing their level of
acceptance.
• Real-name registration for apps rolled out by different levels of governments and municipalities,
often with different quarantine policies.
• Use of health code apps to control movements for political purpose by inserting a “red” code:
• A human rights lawyer restricted from traveling to Beijing (Nov, 2021).
• In the Henan banking crisis (2021), affected customers were placed under restriction to
prevent them from joining protests.
• These apps are dismantled in 2023, but….
Repressive Regulations
• Regulations since mid-1990s affirms the state’s sole and absolute right to
build, manage and control the Internet.
• Internet security falls under the control of the Ministry of Public Security.
• 2014: China’s Internet policies were centralized and controlled by the State
Internet Information Office (SIIO) and later upgraded to become the Central
Cyberspace Affairs Commission, chaired by Xi Jinping himself.
• By 2018, the Cyberspace Administration of China (CAC) was formed as the
top cyber regulator in China.
Rule by Law
Under CAC
• Cybersecurity Law (CSL) of 2017, amended/clarified in 2021.
• Amalgamatiion of previous Internet censorship laws, unifying control.
• Data sovereignty requirements, and state security agencies can seize data.
• “Critical information infrastructure” subject to national security review over data security,
procurement and cross-border data flows, etc.
• Should not “incite subversion of national sovereignty, overturn the socialist system, incite
separatism, break national unity, advocate terrorism or extremism, advocate ethnic hatred
and discrimination, disseminate violent, obscene, or sexual information, create or
disseminate false information to disrupt economic or social order.”
• Other recent major laws: Data Security Law (DSL), Personal Information Protection Law
(PIPL).
Exporting Repression
Digital Silk Road
• “Masterplan by Beijing to deploy its techno-authoritarian model” to Belt-and-Road countries
(since 2015).
• Dual-use technologies: military and industrial/civilian usages
• Next-generation national firewall — active surveillance and data analytics
• Thailand’s failed attempt in 2015; Cambodia, 2020.
• State financing for many Afircan and Asian countries to procure equipments and projects
from Huawei, ZTE etc.
• WSJ (2019): Uganda and Zambia governments intercepted encrypted communications
and social media messages and used cell location data to track political opponents.
China’s Global Data Harvest
• 5G and infrastructure: Huawei, ZTE, etc.
• US's Clean Network Initiative (2020) and sanctions by various western countries.
• Surveillance cameras: Hikvision, etc.
• Strong pushback in the UK, Australia, etc.
• Consumer products and services
• Mobile phones by Huawei, Xiaomi, etc.
• AliPay, WeChatPay
• Didi Chuxing
• Most of all — TikTok
• Also the balloons?
Finally, Technology Standards and Norms
• Growing global influence
• Unlimited cooperation between China and Russia
• Huawei as the proxy agent to advance China’s proposed standards: “New IP”
and “IPv6+”: advancing the idea of a strong regulatory binding between an IP
address and a user.
• Attempts to change the global tech standard decision processes:
• From IETF, IEEE, IAB, IRTF, W3C etc to ITU
• 2022 Election of ITU’s Secretary General: USA vs Russia
The Way Forward
• China is actively exporting its Internet governance model.
• China, working with Russia and other authoritarian regimes, will further fragment the
Internet
• Digital sovereignty being advanced by many governments, including democracies
• Multistakeholder model of Internet governance under continuous and escalating
threats
• Challenges and opportunities in global data trade
• Other challenges from new technologies, including AI, blockchain, digital currencies,
quantum computing, etc.
Charles Mok
Visiting Scholar
Global Digital Policy Incubator
Cyber Policy Center
Stanford University
@charlesmok
@charlesmok@mastodon.online
linkedin.com/in/charlesmok

More Related Content

Similar to Chinese Digital Repression

How the internet of things is shaping up
How the internet of things is shaping upHow the internet of things is shaping up
How the internet of things is shaping up
Prayukth K V
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
Ahmed Banafa
 
IT and COMMUNICATION INFRASTRUCTURE PROJECT STATUS
IT and COMMUNICATION INFRASTRUCTURE PROJECT STATUSIT and COMMUNICATION INFRASTRUCTURE PROJECT STATUS
IT and COMMUNICATION INFRASTRUCTURE PROJECT STATUS
Adityaraj Rathore
 
Digital Economy and Investment Policy
Digital Economy and Investment Policy Digital Economy and Investment Policy
Digital Economy and Investment Policy
Randeep Sudan
 
36201_AT_Kearney_Seoul_Forum_IoT
36201_AT_Kearney_Seoul_Forum_IoT36201_AT_Kearney_Seoul_Forum_IoT
36201_AT_Kearney_Seoul_Forum_IoTAlex Blanter
 
2.3. SMART CITY - glenn andrew hughes pw c_smart city summit keynote speech
2.3. SMART CITY - glenn andrew hughes pw c_smart city summit keynote speech2.3. SMART CITY - glenn andrew hughes pw c_smart city summit keynote speech
2.3. SMART CITY - glenn andrew hughes pw c_smart city summit keynote speech
Chuong Nguyen
 
4. Financing Solutions and Public Private Partnership (PPP) for building smar...
4. Financing Solutions and Public Private Partnership (PPP) for building smar...4. Financing Solutions and Public Private Partnership (PPP) for building smar...
4. Financing Solutions and Public Private Partnership (PPP) for building smar...
Chuong Nguyen
 
Smart cities and internet of things and integration
Smart cities and internet of things and integrationSmart cities and internet of things and integration
Smart cities and internet of things and integration
ChandankumarJ
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
Charles Mok
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
blogzilla
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017
Ahmed Banafa
 
GTP Presentation: Development Drivers in the Network Society
GTP Presentation: Development Drivers in the Network SocietyGTP Presentation: Development Drivers in the Network Society
GTP Presentation: Development Drivers in the Network Society
Greater_Tygerberg_Partnership
 
Next generation e-government: G-Cloud and beyond
Next generation e-government: G-Cloud and beyondNext generation e-government: G-Cloud and beyond
Next generation e-government: G-Cloud and beyond
oleg2030
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
Ahmed Banafa
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited
Ahmed Banafa
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
itnewsafrica
 
COMMS ALLIANCE CommsDay Melb Congress
COMMS ALLIANCE CommsDay Melb Congress COMMS ALLIANCE CommsDay Melb Congress
COMMS ALLIANCE CommsDay Melb Congress
GrahameLynch1
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
PhngLinhTrn33
 
Digital India: Use of Technology For Transforming Society
Digital India: Use of Technology For Transforming SocietyDigital India: Use of Technology For Transforming Society
Digital India: Use of Technology For Transforming Society
Dr. Sunil Kr. Pandey
 
Thailand’s Development towards Sustainable Foundation of IOT
Thailand’s Development towards Sustainable Foundation of IOTThailand’s Development towards Sustainable Foundation of IOT
Thailand’s Development towards Sustainable Foundation of IOT
Check Digital
 

Similar to Chinese Digital Repression (20)

How the internet of things is shaping up
How the internet of things is shaping upHow the internet of things is shaping up
How the internet of things is shaping up
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
IT and COMMUNICATION INFRASTRUCTURE PROJECT STATUS
IT and COMMUNICATION INFRASTRUCTURE PROJECT STATUSIT and COMMUNICATION INFRASTRUCTURE PROJECT STATUS
IT and COMMUNICATION INFRASTRUCTURE PROJECT STATUS
 
Digital Economy and Investment Policy
Digital Economy and Investment Policy Digital Economy and Investment Policy
Digital Economy and Investment Policy
 
36201_AT_Kearney_Seoul_Forum_IoT
36201_AT_Kearney_Seoul_Forum_IoT36201_AT_Kearney_Seoul_Forum_IoT
36201_AT_Kearney_Seoul_Forum_IoT
 
2.3. SMART CITY - glenn andrew hughes pw c_smart city summit keynote speech
2.3. SMART CITY - glenn andrew hughes pw c_smart city summit keynote speech2.3. SMART CITY - glenn andrew hughes pw c_smart city summit keynote speech
2.3. SMART CITY - glenn andrew hughes pw c_smart city summit keynote speech
 
4. Financing Solutions and Public Private Partnership (PPP) for building smar...
4. Financing Solutions and Public Private Partnership (PPP) for building smar...4. Financing Solutions and Public Private Partnership (PPP) for building smar...
4. Financing Solutions and Public Private Partnership (PPP) for building smar...
 
Smart cities and internet of things and integration
Smart cities and internet of things and integrationSmart cities and internet of things and integration
Smart cities and internet of things and integration
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017
 
GTP Presentation: Development Drivers in the Network Society
GTP Presentation: Development Drivers in the Network SocietyGTP Presentation: Development Drivers in the Network Society
GTP Presentation: Development Drivers in the Network Society
 
Next generation e-government: G-Cloud and beyond
Next generation e-government: G-Cloud and beyondNext generation e-government: G-Cloud and beyond
Next generation e-government: G-Cloud and beyond
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
COMMS ALLIANCE CommsDay Melb Congress
COMMS ALLIANCE CommsDay Melb Congress COMMS ALLIANCE CommsDay Melb Congress
COMMS ALLIANCE CommsDay Melb Congress
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
 
Digital India: Use of Technology For Transforming Society
Digital India: Use of Technology For Transforming SocietyDigital India: Use of Technology For Transforming Society
Digital India: Use of Technology For Transforming Society
 
Thailand’s Development towards Sustainable Foundation of IOT
Thailand’s Development towards Sustainable Foundation of IOTThailand’s Development towards Sustainable Foundation of IOT
Thailand’s Development towards Sustainable Foundation of IOT
 

More from Charles Mok

Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
Charles Mok
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
Charles Mok
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
Charles Mok
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
Charles Mok
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Charles Mok
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
Charles Mok
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
Charles Mok
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
Charles Mok
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
Charles Mok
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Charles Mok
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
Charles Mok
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
Charles Mok
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
Charles Mok
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
Charles Mok
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
Charles Mok
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T
Charles Mok
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點
Charles Mok
 
在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由
Charles Mok
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Charles Mok
 

More from Charles Mok (20)

Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點
 
在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
 

Recently uploaded

ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 

Recently uploaded (16)

ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 

Chinese Digital Repression

  • 1. Charles Mok | Cyber Policy Center, Stanford University | Feb 15 2023 | For Northeastern University Chinese Digital Repression
  • 2. Repressive Practices Through technology and operations • What is the Great Firewall (GFW)? • What is censorship? • Fear • Friction • Flooding • Total control on infrastructure and backbone networks
  • 3. Smart City • Informatization of city management — transportation, public safety, healthcare, environmental protection… • Utlizing technologies: IoT, 5G, AI, Big Data, Cloud computing. • Alibaba’s City Brain project (Hangzhou) — >20 cities in China plus Kuala Lumpur, Macau, etc. by 2019. • Huawei — leveraging 5G and communications technologies for land and air transport coordination.
  • 4. Massive Surveillance • SkyNet project: surveillance camera network with facial recognition and AI. • Leading vendors: Hikvision, SenseTime, Dahua, Huawei, ZTE, etc. • BBC reporter John Sudworth (Guiyang, Guizhou; 2017) “caught in 7 minutes”: “If you have nothing to hide, you have nothing to fear?” • Massive deployment in Xinjiang.
  • 5. Social Credit • State Council document: “Guidelines of Social Credit System Construction (2014-2020)” (2014): • The system aims to standardize assessment for businesses, organizations and individuals, measuring financial, social and political worthiness. • Rather than a single score to limit social activities of movements of individuals, it still focuses more on business or marketplace behaviors. • The system is still fragmented, not fully digitized and decisions largely made by humans rather than AI. • However, the system is still a flexible tool for rapid and strict enforcement when needed. • Do not underestimate the acceptance by Chinese public — for social harmony, crime prevention, in a “low trust” society.
  • 6. Covid-19 Tracing • A perfect opportunity to test the technology and social credit in order to trace and restrict movements of people, record their vaccination and infection records, and testing their level of acceptance. • Real-name registration for apps rolled out by different levels of governments and municipalities, often with different quarantine policies. • Use of health code apps to control movements for political purpose by inserting a “red” code: • A human rights lawyer restricted from traveling to Beijing (Nov, 2021). • In the Henan banking crisis (2021), affected customers were placed under restriction to prevent them from joining protests. • These apps are dismantled in 2023, but….
  • 7. Repressive Regulations • Regulations since mid-1990s affirms the state’s sole and absolute right to build, manage and control the Internet. • Internet security falls under the control of the Ministry of Public Security. • 2014: China’s Internet policies were centralized and controlled by the State Internet Information Office (SIIO) and later upgraded to become the Central Cyberspace Affairs Commission, chaired by Xi Jinping himself. • By 2018, the Cyberspace Administration of China (CAC) was formed as the top cyber regulator in China.
  • 8. Rule by Law Under CAC • Cybersecurity Law (CSL) of 2017, amended/clarified in 2021. • Amalgamatiion of previous Internet censorship laws, unifying control. • Data sovereignty requirements, and state security agencies can seize data. • “Critical information infrastructure” subject to national security review over data security, procurement and cross-border data flows, etc. • Should not “incite subversion of national sovereignty, overturn the socialist system, incite separatism, break national unity, advocate terrorism or extremism, advocate ethnic hatred and discrimination, disseminate violent, obscene, or sexual information, create or disseminate false information to disrupt economic or social order.” • Other recent major laws: Data Security Law (DSL), Personal Information Protection Law (PIPL).
  • 9. Exporting Repression Digital Silk Road • “Masterplan by Beijing to deploy its techno-authoritarian model” to Belt-and-Road countries (since 2015). • Dual-use technologies: military and industrial/civilian usages • Next-generation national firewall — active surveillance and data analytics • Thailand’s failed attempt in 2015; Cambodia, 2020. • State financing for many Afircan and Asian countries to procure equipments and projects from Huawei, ZTE etc. • WSJ (2019): Uganda and Zambia governments intercepted encrypted communications and social media messages and used cell location data to track political opponents.
  • 10. China’s Global Data Harvest • 5G and infrastructure: Huawei, ZTE, etc. • US's Clean Network Initiative (2020) and sanctions by various western countries. • Surveillance cameras: Hikvision, etc. • Strong pushback in the UK, Australia, etc. • Consumer products and services • Mobile phones by Huawei, Xiaomi, etc. • AliPay, WeChatPay • Didi Chuxing • Most of all — TikTok • Also the balloons?
  • 11. Finally, Technology Standards and Norms • Growing global influence • Unlimited cooperation between China and Russia • Huawei as the proxy agent to advance China’s proposed standards: “New IP” and “IPv6+”: advancing the idea of a strong regulatory binding between an IP address and a user. • Attempts to change the global tech standard decision processes: • From IETF, IEEE, IAB, IRTF, W3C etc to ITU • 2022 Election of ITU’s Secretary General: USA vs Russia
  • 12. The Way Forward • China is actively exporting its Internet governance model. • China, working with Russia and other authoritarian regimes, will further fragment the Internet • Digital sovereignty being advanced by many governments, including democracies • Multistakeholder model of Internet governance under continuous and escalating threats • Challenges and opportunities in global data trade • Other challenges from new technologies, including AI, blockchain, digital currencies, quantum computing, etc.
  • 13. Charles Mok Visiting Scholar Global Digital Policy Incubator Cyber Policy Center Stanford University @charlesmok @charlesmok@mastodon.online linkedin.com/in/charlesmok