SlideShare a Scribd company logo
Policy Primer
Internet Censorship: The
Great Firewall of China
Presented by Michael Natoli
Another Great Wall of China?
• ‘The Great Firewall’ was coined by Wired
magazine in 1997 (Runkel, 2010)
• Unlike the Great Wall of China, the Great
Firewall of China is not a physical structure!
Figure 1. Great Wall of China Facts (Lehnardt, 2016)
What is the ‘Great Firewall’?
• An attempt to help ‘purify’ the internet in
China through censorship of foreign websites
• Part of China’s “Golden Shield Project” which
aims to block or monitor internet content and
usage as defined by the State (James, 2009)
Figure 2. Gold Shield (pngimg, n.d.)
Threat of Unrestricted Internet in China
• “The Internet allows unprecedented
opportunities for access to previously prohibited
news and… it will enable China’s growing
Internet class to shake off the blinders placed
upon them by the government, eventually
leading to a more democratic political
framework” (Kluver & Qiu, 2003, pp. 31-32)
• Poses a potential political and social threat to
China’s current established order
Restricting & Monitoring Internet Access
• The internet is used for
more than just streaming
music and watching cat
videos; it provides access
to foreign knowledge and
concepts, and a forum for
personal expression
• Controlling content
potentially threatens
basic human rights like
freedom of expression
and the right to privacy
Figure 3. Galaxy Cat (Medina, n.d.)
So Internet Restriction is bad… right?
• Not necessarily!
• Controlling internet content can be beneficial
to society in the correct setting and with
suitable implementation, such as blocking
images of child pornography or restricting
witness protection records
• This does not mean all internet restrictions
are made with the public’s interest in mind!
Why else would you restrict the Internet?
• There are a variety of other reasons a
governing body like the People’s Republic of
China would claim necessitates restricted
internet access like that provided by the
Great Firewall of China, primarily related to:
– The country’s economy
– Governance & politics
Economic Factors
• Blocking major international sites and
browsers such as Facebook and Google with
the intention of “guarding against foreign
economic domination” (Walton, 2001)
• Promoting the domestic economy by
alleviating saturation of international online
sites and brands, leaving the market open for
local institutions and companies
Political Factors
• “The goal of the Chinese government’s Internet
filtering and censorship is to minimize the
discussions on sensitive political issues and to
avoid the potential organization of online anti-
government voices” (Lee & Liu, 2012, p. 139)
• Restriction of any structured or potentially
choreographed political opposition by shutting
down sites promoting destructive ideals or
supporting idealistically rivaling political parties
Detriments of Internet Censorship
• The ruling political powers may have their own agendas,
attempting to use the notion of ‘enhanced domestic economy’ or
‘destructive foreign ideologies’ to their own political benefit and
to ensure their enduring power
• A severe blow to the ‘global economy’ in the form of lost
international trade (both in goods and information exchange)
• Appropriate censorship is not clearly defined and can be
subjective based on the individual or organisation performing the
censoring
• In the case of the Great Firewall, the Chinese government has
never disclosed its filter’s targets or its filtering system’s explicit
criteria (Lee & Liu, 2012, p. 139)
Risks of the Great Firewall
• “Authoritarian states may use co-regulation to freeze out
free speech, censor the internet and overpower the
media. This is exactly what is happening now in China”
(Frydman, Hennebel, & Lewkowicz, 2012, p. 146)
• Any sites conflicting with the political leaders’ agendas
can be ‘silently’ blocked unbeknownst to the public
• Promotion of multiculturalism is actively purged and a
form of modern imperialism is enforced within China
Is it time the Great Firewall came down?
• Apparent studies within China suggest the citizens support the use
of the Great Firewall: is it then fair for ‘foreigners’ to deem their
institution a threat to human rights if the people being governed
desire this implementation?
• Can surveys suggesting the populace support the Great Firewall be
trusted, or are they yet more forms of governmental control and
manipulation of information?
• Is this issue an extension of “the propensity of the Western media
to sensationalize Internet censorship”? (Thornton, 2009, p. 265)
• The Great Firewall and its filters can be circumvented by
opponents of its use with a moderate degree of knowledge of
how the internet functions, although this yields both legal and
moral quandaries
References
• Billout, G. (2013). China Wall. Retrieved from http://www.artchipel.com/post/65331283838/guy-billout-
china-wall-watercolor-and-airbrush
• Frydman, B., Hennebel, L., & Lewkowicz, G. (2012). Co-regulation and the rule of law. In E. Brousseau,
M. Marzouki & C. Meadel (Eds.), Governance, Regulation and Powers on the Internet
(pp. 133-150). Cambridge, UK: Cambridge University Press
• James, R. (2009, March 18). A Brief History of: Chinese Internet Censorship. Time.
• Kluver, R., & Qiu, J. L. (2003). China, the Internet and Democracy. In I. Banerjee (Ed.), Rhetoric and Reality:
The Internet Challenge for Democracy in Asia (pp. 26-60). Singapore: Eastern Universities Press
• Lee, J. , & Liu, C. (2012). Forbidden City Enclosed by the Great Firewall: The Law and Power of Internet
Filtering in China. Minnesota Journal of Law, Science, and Technology, 13(1), 125-151.
Retrieved from https://ssrn.com/abstract=2035788
• Lehnardt, K. (2016). Great Wall of China Facts. Retrieved from https://d3jkudlc7u70kh.cloudfront.net/
great-wall-of-china-facts.jpg
• Medina, M. (n.d.). Galaxy Cat. Retrieved from https://i.pinimg.com/736x/ea/5d/ca/ea5dca4056948
e013ca654c16910ecf4--galaxy-cat-the-galaxy.jpg
• Pngimg (n.d.). Gold Shield. Retrieved from http://pngimg.com/download/1274/?i=1
• Runkel, M. (2010). The Great Firewall of China: Political and economical implications of the Great Shield.
GRIN Verlag, Munich, Germany
• Thornton, P. M. (2009). Censorship and Surveillance in Chinese Cyberspace: Beyond the Great Firewall.
In P. H. Gries & S. Rosen (Eds.), Chinese Politics: State, Society, and the Market (pp.179-198).
London, UK: Routledge
• Walton, G. (2001). China’s Golden Shield: Corporations and the Development of Surveillance
Technology in the People’s Republic of China. Canada: Rights & Democracy

More Related Content

What's hot

The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
University of Sydney
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
moldovaictsummit2016
 
The Internet State Filter
The Internet State FilterThe Internet State Filter
The Internet State Filter
Andrew Davies
 
Dutton power corrupts-2021
Dutton power corrupts-2021Dutton power corrupts-2021
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom House
 
Wikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetWikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetVincy
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacy
Yasmin AbdelAziz
 
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
Shreedeep Rayamajhi
 
UNESCO’s Division for Freedom of Expression, Democracy and Peace Report
UNESCO’s Division for Freedom of  Expression, Democracy and Peace ReportUNESCO’s Division for Freedom of  Expression, Democracy and Peace Report
UNESCO’s Division for Freedom of Expression, Democracy and Peace Report
Anax Fotopoulos
 
Authoritarian Governments in Cyberspace
Authoritarian Governments in CyberspaceAuthoritarian Governments in Cyberspace
Authoritarian Governments in Cyberspace
evgeny.morozov
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceblogzilla
 
Political Communication In Cmc
Political Communication In CmcPolitical Communication In Cmc
Political Communication In Cmcjacob_denver
 
Media and government
Media and governmentMedia and government
Media and government
Aida Yergaliyeva
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the World
Nitine
 
Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpointmmentis117
 
Censorship
CensorshipCensorship
Censorship
Arpan Bose
 
georgetown talk evgeny morozov
georgetown talk evgeny morozovgeorgetown talk evgeny morozov
georgetown talk evgeny morozov
evgeny.morozov
 

What's hot (20)

The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
The Internet State Filter
The Internet State FilterThe Internet State Filter
The Internet State Filter
 
Dutton power corrupts-2021
Dutton power corrupts-2021Dutton power corrupts-2021
Dutton power corrupts-2021
 
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
 
Wikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetWikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internet
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacy
 
6026 Cybersecurity China
6026 Cybersecurity China6026 Cybersecurity China
6026 Cybersecurity China
 
North Korea
North KoreaNorth Korea
North Korea
 
Hate speech
Hate speechHate speech
Hate speech
 
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...
 
UNESCO’s Division for Freedom of Expression, Democracy and Peace Report
UNESCO’s Division for Freedom of  Expression, Democracy and Peace ReportUNESCO’s Division for Freedom of  Expression, Democracy and Peace Report
UNESCO’s Division for Freedom of Expression, Democracy and Peace Report
 
Authoritarian Governments in Cyberspace
Authoritarian Governments in CyberspaceAuthoritarian Governments in Cyberspace
Authoritarian Governments in Cyberspace
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspace
 
Political Communication In Cmc
Political Communication In CmcPolitical Communication In Cmc
Political Communication In Cmc
 
Media and government
Media and governmentMedia and government
Media and government
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the World
 
Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpoint
 
Censorship
CensorshipCensorship
Censorship
 
georgetown talk evgeny morozov
georgetown talk evgeny morozovgeorgetown talk evgeny morozov
georgetown talk evgeny morozov
 

Similar to Policy primer

Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620Tissue Chowtszyan
 
POLS 3620 Internet freedom
POLS 3620 Internet freedomPOLS 3620 Internet freedom
POLS 3620 Internet freedomroypong
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
Jeffrey Hart
 
China's Internet policy_ Final paper
China's Internet policy_ Final paperChina's Internet policy_ Final paper
China's Internet policy_ Final paperMonica Chan
 
Team Aurora - 2021 Technology, Innovation & Great Power Competition
Team Aurora - 2021 Technology, Innovation & Great Power CompetitionTeam Aurora - 2021 Technology, Innovation & Great Power Competition
Team Aurora - 2021 Technology, Innovation & Great Power Competition
Stanford University
 
Access and Digital Divide
Access and Digital DivideAccess and Digital Divide
Access and Digital Divide
hmjchung
 
Internet Access & Digital Divides
Internet Access & Digital DividesInternet Access & Digital Divides
Internet Access & Digital Divides
hmjchung
 
Urban Topic- Cycpercities and china's censorship
Urban Topic- Cycpercities and china's censorshipUrban Topic- Cycpercities and china's censorship
Urban Topic- Cycpercities and china's censorshipNicole Muth
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the Networked
Msifry
 
Chinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdfChinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdf
aghsports
 
The Political Power of Social Media Technology, the Publ.docx
The Political Power of Social Media Technology, the Publ.docxThe Political Power of Social Media Technology, the Publ.docx
The Political Power of Social Media Technology, the Publ.docx
AASTHA76
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its Discontents
Msifry
 
C1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docxC1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docx
AndrewClark295760
 
Dutton china-sjtu-2015
Dutton china-sjtu-2015Dutton china-sjtu-2015
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docxArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
wraythallchan
 
internet censorship.docx
internet censorship.docxinternet censorship.docx
internet censorship.docx
AndrewClark295760
 
Internet censorship
Internet censorshipInternet censorship
Internet censorship
mateo davis
 
Texas policy 2016
Texas policy 2016Texas policy 2016
The Internet And International Relations
The Internet And International RelationsThe Internet And International Relations
The Internet And International Relations
David Quinn
 

Similar to Policy primer (20)

Internet freedom
Internet freedomInternet freedom
Internet freedom
 
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
 
POLS 3620 Internet freedom
POLS 3620 Internet freedomPOLS 3620 Internet freedom
POLS 3620 Internet freedom
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
China's Internet policy_ Final paper
China's Internet policy_ Final paperChina's Internet policy_ Final paper
China's Internet policy_ Final paper
 
Team Aurora - 2021 Technology, Innovation & Great Power Competition
Team Aurora - 2021 Technology, Innovation & Great Power CompetitionTeam Aurora - 2021 Technology, Innovation & Great Power Competition
Team Aurora - 2021 Technology, Innovation & Great Power Competition
 
Access and Digital Divide
Access and Digital DivideAccess and Digital Divide
Access and Digital Divide
 
Internet Access & Digital Divides
Internet Access & Digital DividesInternet Access & Digital Divides
Internet Access & Digital Divides
 
Urban Topic- Cycpercities and china's censorship
Urban Topic- Cycpercities and china's censorshipUrban Topic- Cycpercities and china's censorship
Urban Topic- Cycpercities and china's censorship
 
Digital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the NetworkedDigital Sovereigns or Consent of the Networked
Digital Sovereigns or Consent of the Networked
 
Chinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdfChinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdf
 
The Political Power of Social Media Technology, the Publ.docx
The Political Power of Social Media Technology, the Publ.docxThe Political Power of Social Media Technology, the Publ.docx
The Political Power of Social Media Technology, the Publ.docx
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its Discontents
 
C1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docxC1729690_PersuasiveAnalysis Research Paper (Argument).docx
C1729690_PersuasiveAnalysis Research Paper (Argument).docx
 
Dutton china-sjtu-2015
Dutton china-sjtu-2015Dutton china-sjtu-2015
Dutton china-sjtu-2015
 
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docxArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
 
internet censorship.docx
internet censorship.docxinternet censorship.docx
internet censorship.docx
 
Internet censorship
Internet censorshipInternet censorship
Internet censorship
 
Texas policy 2016
Texas policy 2016Texas policy 2016
Texas policy 2016
 
The Internet And International Relations
The Internet And International RelationsThe Internet And International Relations
The Internet And International Relations
 

Recently uploaded

somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 

Recently uploaded (16)

somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 

Policy primer

  • 1. Policy Primer Internet Censorship: The Great Firewall of China Presented by Michael Natoli
  • 2. Another Great Wall of China? • ‘The Great Firewall’ was coined by Wired magazine in 1997 (Runkel, 2010) • Unlike the Great Wall of China, the Great Firewall of China is not a physical structure! Figure 1. Great Wall of China Facts (Lehnardt, 2016)
  • 3. What is the ‘Great Firewall’? • An attempt to help ‘purify’ the internet in China through censorship of foreign websites • Part of China’s “Golden Shield Project” which aims to block or monitor internet content and usage as defined by the State (James, 2009) Figure 2. Gold Shield (pngimg, n.d.)
  • 4. Threat of Unrestricted Internet in China • “The Internet allows unprecedented opportunities for access to previously prohibited news and… it will enable China’s growing Internet class to shake off the blinders placed upon them by the government, eventually leading to a more democratic political framework” (Kluver & Qiu, 2003, pp. 31-32) • Poses a potential political and social threat to China’s current established order
  • 5. Restricting & Monitoring Internet Access • The internet is used for more than just streaming music and watching cat videos; it provides access to foreign knowledge and concepts, and a forum for personal expression • Controlling content potentially threatens basic human rights like freedom of expression and the right to privacy Figure 3. Galaxy Cat (Medina, n.d.)
  • 6. So Internet Restriction is bad… right? • Not necessarily! • Controlling internet content can be beneficial to society in the correct setting and with suitable implementation, such as blocking images of child pornography or restricting witness protection records • This does not mean all internet restrictions are made with the public’s interest in mind!
  • 7. Why else would you restrict the Internet? • There are a variety of other reasons a governing body like the People’s Republic of China would claim necessitates restricted internet access like that provided by the Great Firewall of China, primarily related to: – The country’s economy – Governance & politics
  • 8. Economic Factors • Blocking major international sites and browsers such as Facebook and Google with the intention of “guarding against foreign economic domination” (Walton, 2001) • Promoting the domestic economy by alleviating saturation of international online sites and brands, leaving the market open for local institutions and companies
  • 9. Political Factors • “The goal of the Chinese government’s Internet filtering and censorship is to minimize the discussions on sensitive political issues and to avoid the potential organization of online anti- government voices” (Lee & Liu, 2012, p. 139) • Restriction of any structured or potentially choreographed political opposition by shutting down sites promoting destructive ideals or supporting idealistically rivaling political parties
  • 10. Detriments of Internet Censorship • The ruling political powers may have their own agendas, attempting to use the notion of ‘enhanced domestic economy’ or ‘destructive foreign ideologies’ to their own political benefit and to ensure their enduring power • A severe blow to the ‘global economy’ in the form of lost international trade (both in goods and information exchange) • Appropriate censorship is not clearly defined and can be subjective based on the individual or organisation performing the censoring • In the case of the Great Firewall, the Chinese government has never disclosed its filter’s targets or its filtering system’s explicit criteria (Lee & Liu, 2012, p. 139)
  • 11. Risks of the Great Firewall • “Authoritarian states may use co-regulation to freeze out free speech, censor the internet and overpower the media. This is exactly what is happening now in China” (Frydman, Hennebel, & Lewkowicz, 2012, p. 146) • Any sites conflicting with the political leaders’ agendas can be ‘silently’ blocked unbeknownst to the public • Promotion of multiculturalism is actively purged and a form of modern imperialism is enforced within China
  • 12. Is it time the Great Firewall came down? • Apparent studies within China suggest the citizens support the use of the Great Firewall: is it then fair for ‘foreigners’ to deem their institution a threat to human rights if the people being governed desire this implementation? • Can surveys suggesting the populace support the Great Firewall be trusted, or are they yet more forms of governmental control and manipulation of information? • Is this issue an extension of “the propensity of the Western media to sensationalize Internet censorship”? (Thornton, 2009, p. 265) • The Great Firewall and its filters can be circumvented by opponents of its use with a moderate degree of knowledge of how the internet functions, although this yields both legal and moral quandaries
  • 13. References • Billout, G. (2013). China Wall. Retrieved from http://www.artchipel.com/post/65331283838/guy-billout- china-wall-watercolor-and-airbrush • Frydman, B., Hennebel, L., & Lewkowicz, G. (2012). Co-regulation and the rule of law. In E. Brousseau, M. Marzouki & C. Meadel (Eds.), Governance, Regulation and Powers on the Internet (pp. 133-150). Cambridge, UK: Cambridge University Press • James, R. (2009, March 18). A Brief History of: Chinese Internet Censorship. Time. • Kluver, R., & Qiu, J. L. (2003). China, the Internet and Democracy. In I. Banerjee (Ed.), Rhetoric and Reality: The Internet Challenge for Democracy in Asia (pp. 26-60). Singapore: Eastern Universities Press • Lee, J. , & Liu, C. (2012). Forbidden City Enclosed by the Great Firewall: The Law and Power of Internet Filtering in China. Minnesota Journal of Law, Science, and Technology, 13(1), 125-151. Retrieved from https://ssrn.com/abstract=2035788 • Lehnardt, K. (2016). Great Wall of China Facts. Retrieved from https://d3jkudlc7u70kh.cloudfront.net/ great-wall-of-china-facts.jpg • Medina, M. (n.d.). Galaxy Cat. Retrieved from https://i.pinimg.com/736x/ea/5d/ca/ea5dca4056948 e013ca654c16910ecf4--galaxy-cat-the-galaxy.jpg • Pngimg (n.d.). Gold Shield. Retrieved from http://pngimg.com/download/1274/?i=1 • Runkel, M. (2010). The Great Firewall of China: Political and economical implications of the Great Shield. GRIN Verlag, Munich, Germany • Thornton, P. M. (2009). Censorship and Surveillance in Chinese Cyberspace: Beyond the Great Firewall. In P. H. Gries & S. Rosen (Eds.), Chinese Politics: State, Society, and the Market (pp.179-198). London, UK: Routledge • Walton, G. (2001). China’s Golden Shield: Corporations and the Development of Surveillance Technology in the People’s Republic of China. Canada: Rights & Democracy