SlideShare uma empresa Scribd logo
1 de 11
The Great Firewall of China Internet CensorshipPractices
Communicationas a Human Right 1948: United NationsUniversalDeclaration of Human Rights Freedom of Opinion and Expression Throughanymedia Regardless of frontiers
Techniques of Filtering Technical blocking: IP blocking,  DNS tampering,  URL blocking using a proxy. Search result removals Take-down Induced self-censorship
Who is thecensor? Privatecensorship Usuallynotpolitical Carried out bytheprivatesector (usuallyinternet-providers) „Voluntarylaw” of Finland State-managedcensorship
Internet CensorshipinChina legislation in 1997:  No unit or individual may use the Internet to create, replicate, retrieve, or transmit the following kinds of information: Inciting violation the Constitution or laws or the implementation of administrative regulations; Inciting to overthrow the government or the socialist system; Inciting division of the country, harming national unification; Inciting hatred or discrimination among nationalities or harming the unity of the nationalities; Making falsehoods or distorting the truth, spreading rumors, destroying the order of society; Promoting feudal superstitions, sexually suggestive material, gambling, violence, murder; Terrorism or inciting others to criminal activity; openly insulting other people or distorting the truth to slander people; Injuring the reputation of state organs; Other activities against the Constitution, laws or administrative regulations
The Golden Shield Project belongs under the Ministry of Public Security  Startedin 1998 (China Democracy Party)
Methods of the Project Censoring, filtering Wide-range surveillance network Encouraging self-censorship: the logics ofBentham’sPanopticon
Toolsforthecensorship Made in the US Market freedominthe US vs. human rightsinChina Question of dual-useitems Cisco’sPolicenet
Yahoo inChina Provideddatatoidentify and imprisonChinese human right activists 2001: WangXiaoning 2002: JiangLijun 2003: LiZhi 2005: Shi Tao 2007: sueagainst Yahoo  publicapologize
GoogleinChina
Future

Mais conteúdo relacionado

Mais procurados

Internet Freedom 2.1
Internet Freedom 2.1Internet Freedom 2.1
Internet Freedom 2.1
Dhruva Jaishankar
 
Presentation 01
Presentation 01Presentation 01
Presentation 01
vindya
 
China's Internet policy_ Final paper
China's Internet policy_ Final paperChina's Internet policy_ Final paper
China's Internet policy_ Final paper
Monica Chan
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
blogzilla
 

Mais procurados (20)

Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...Privacy and data protection in the realm of Internet Governance by Santosh Si...
Privacy and data protection in the realm of Internet Governance by Santosh Si...
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
 
Privatising Privacy
Privatising PrivacyPrivatising Privacy
Privatising Privacy
 
After 9 11
After 9 11After 9 11
After 9 11
 
Nc Latest Ppt
Nc Latest PptNc Latest Ppt
Nc Latest Ppt
 
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
Cybercrime or...? by Johnny Lundberg, Deputy Police Chief, The National polic...
Cybercrime or...? by Johnny Lundberg, Deputy Police Chief, The National polic...Cybercrime or...? by Johnny Lundberg, Deputy Police Chief, The National polic...
Cybercrime or...? by Johnny Lundberg, Deputy Police Chief, The National polic...
 
Data Sovereignty
Data SovereigntyData Sovereignty
Data Sovereignty
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Internet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms dayInternet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms day
 
Internet Freedom 2.1
Internet Freedom 2.1Internet Freedom 2.1
Internet Freedom 2.1
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
#DCI11 Access to Information
#DCI11 Access to Information#DCI11 Access to Information
#DCI11 Access to Information
 
Presentation 01
Presentation 01Presentation 01
Presentation 01
 
Un may 28, 2019
Un may 28, 2019Un may 28, 2019
Un may 28, 2019
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
China's Internet policy_ Final paper
China's Internet policy_ Final paperChina's Internet policy_ Final paper
China's Internet policy_ Final paper
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
 

Semelhante a The Great Firewall of China

Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice Context
Info_Studies_Aberystwyth
 
Policy, Media, and Power.ppt
Policy, Media, and Power.pptPolicy, Media, and Power.ppt
Policy, Media, and Power.ppt
Johnny Schaefer
 
Issues-and-Concerns-regarding-local-politics (1).pptx
Issues-and-Concerns-regarding-local-politics (1).pptxIssues-and-Concerns-regarding-local-politics (1).pptx
Issues-and-Concerns-regarding-local-politics (1).pptx
ADELYNEHERMOSO1
 

Semelhante a The Great Firewall of China (20)

comparative_police_system.pptx
comparative_police_system.pptxcomparative_police_system.pptx
comparative_police_system.pptx
 
Transnational Crime.pptx
Transnational Crime.pptxTransnational Crime.pptx
Transnational Crime.pptx
 
Report on new it bill cirminalization of foe in social media by shreedeep r...
Report on new it bill cirminalization of foe in social media   by shreedeep r...Report on new it bill cirminalization of foe in social media   by shreedeep r...
Report on new it bill cirminalization of foe in social media by shreedeep r...
 
cyber crime
cyber crimecyber crime
cyber crime
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime Bill
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptx
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice Context
 
Unit 1 vocab
Unit 1 vocabUnit 1 vocab
Unit 1 vocab
 
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in NigeriaFree Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
Free Speech and Hate Speech: Regulatory Challenge of Internet Freedom in Nigeria
 
National security and Freedom of expresion after Wikileaks
National security and Freedom of expresion after Wikileaks National security and Freedom of expresion after Wikileaks
National security and Freedom of expresion after Wikileaks
 
Chapter14
Chapter14Chapter14
Chapter14
 
A principle-based approach to regulating #fakenews
A principle-based approach to regulating #fakenewsA principle-based approach to regulating #fakenews
A principle-based approach to regulating #fakenews
 
Policy, Media, and Power.ppt
Policy, Media, and Power.pptPolicy, Media, and Power.ppt
Policy, Media, and Power.ppt
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
 
Issues-and-Concerns-regarding-local-politics (1).pptx
Issues-and-Concerns-regarding-local-politics (1).pptxIssues-and-Concerns-regarding-local-politics (1).pptx
Issues-and-Concerns-regarding-local-politics (1).pptx
 
Trend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxTrend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptx
 
Mdia5000 presentation
Mdia5000 presentationMdia5000 presentation
Mdia5000 presentation
 
Mdia5000 presentation
Mdia5000 presentationMdia5000 presentation
Mdia5000 presentation
 
Mdia5000 presentation
Mdia5000 presentationMdia5000 presentation
Mdia5000 presentation
 
Internet governance
Internet governanceInternet governance
Internet governance
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

The Great Firewall of China

  • 1. The Great Firewall of China Internet CensorshipPractices
  • 2. Communicationas a Human Right 1948: United NationsUniversalDeclaration of Human Rights Freedom of Opinion and Expression Throughanymedia Regardless of frontiers
  • 3. Techniques of Filtering Technical blocking: IP blocking, DNS tampering, URL blocking using a proxy. Search result removals Take-down Induced self-censorship
  • 4. Who is thecensor? Privatecensorship Usuallynotpolitical Carried out bytheprivatesector (usuallyinternet-providers) „Voluntarylaw” of Finland State-managedcensorship
  • 5. Internet CensorshipinChina legislation in 1997: No unit or individual may use the Internet to create, replicate, retrieve, or transmit the following kinds of information: Inciting violation the Constitution or laws or the implementation of administrative regulations; Inciting to overthrow the government or the socialist system; Inciting division of the country, harming national unification; Inciting hatred or discrimination among nationalities or harming the unity of the nationalities; Making falsehoods or distorting the truth, spreading rumors, destroying the order of society; Promoting feudal superstitions, sexually suggestive material, gambling, violence, murder; Terrorism or inciting others to criminal activity; openly insulting other people or distorting the truth to slander people; Injuring the reputation of state organs; Other activities against the Constitution, laws or administrative regulations
  • 6. The Golden Shield Project belongs under the Ministry of Public Security Startedin 1998 (China Democracy Party)
  • 7. Methods of the Project Censoring, filtering Wide-range surveillance network Encouraging self-censorship: the logics ofBentham’sPanopticon
  • 8. Toolsforthecensorship Made in the US Market freedominthe US vs. human rightsinChina Question of dual-useitems Cisco’sPolicenet
  • 9. Yahoo inChina Provideddatatoidentify and imprisonChinese human right activists 2001: WangXiaoning 2002: JiangLijun 2003: LiZhi 2005: Shi Tao 2007: sueagainst Yahoo  publicapologize