Casting the Ubiquitous Net of Information Control: Internet Surveillance in China from Golden Shield to Green Dam

Casting the Ubiquitous Net of Information Control: Internet Surveillance in China from Golden Shield to Green Dam

Zixue Tai
DOI: 10.4018/japuc.2010010104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Alongside the rise of the Internet as a pivotal economic and cultural force in Chinese society, the Chinese government has implemented a two-tiered strategy in dealing with the great potential and underlying risks associated with the network era. This paper offers a critical, in-depth overview of China’s state-orchestrated Internet surveillance apparatus from the Great Firewall to the latest Green Dam project. The author examines the conceptual and historical evolution of the Golden Shield program and analyzes the legal framework through which official regulation is justified or rationalized. Next, the author examines the prevalent practice of industry self-regulation among both Chinese and foreign companies engaged in online business in China. The paper ends with a discussion of the aborted official effort of extending content control to individual computers with the Green Dam Youth Escort project.
Article Preview
Top

Introduction

Three decades of explosive economic growth in China has led the country on a path of unprecedented transformation. A centerpiece behind China’s quick rise as a global economic power has been the ongoing telecommunications revolution across different sectors and regions in the country (Harwit, 2008). Triggered by decades of spectacular boom in the IT sector as a direct result of state-guided development and meticulous government intervention, China unseated the United States, the long-time No. 1 in the world, to become the global leader in technology, media and telecommunications (TMT) products and services in 2007 (Morgan Stanley, 2009). In five core areas as measured by landline phones, mobile phones, cable subscriptions, Internet use, and installed PCs, China takes the lead in four while lagging only behind the United States in the remaining (i.e., installed PCs) area. In particular, the Internet, which boasts 384 million users in China as of June 2009 (China Internet Network Information Center, 2010) and whose staggering growth shows no signs of slowing down in the years ahead, has been a key cornerstone of China’s state-orchestrated informatization strategy (Harwit, 2008; Tai, 2006).

As a vital part of the overall scheme of openness to the outside world, China has successfully incorporated the enthusiastic participation and valuable contribution from global telecommunications giants such as Yahoo, Google, Cisco, Microsoft, and SunMicrosystems in its informatization strives (Cherry, 2005; Israel, 2009; MacKinnon, 2008; Santoro, 2009), and has attracted considerable global capital in financing pillar IT enterprises (Harwit, 2008; Segal, 2002; Tai, 2006). Meanwhile, it has implemented a wide array of national policies to foster a rising core of highly innovative and globally competitive Chinese high-tech enterprises encompassing major areas of IT research and development (Ning, 2009; Segal, 2002). Side by side with the increasing penetration of the Internet into every aspect of Chinese society are two simultaneous initiatives by the Chinese party-state to solidify its authoritarian control of a fast-changing society by harnessing the disruptive and freewheeling nature of information technology: one is characterized by a series of legislative acts and administrative directives to (il)legalize behaviors and prescribe content online, and the other is marked by the construction of “one of the largest and most sophisticated filtering systems in the world” (OpenNet Initiative, 2009a, p. 1). The latter, officially called the “Golden Shield” project, fully implemented in 2003, is more commonly known as the “Great Firewall of China.” But China’s online surveillance apparatus is multifaceted and multilayered in nature, encompassing many more formal and informal arrangements and approaches than the Great Firewall and co-opting a multitude of state as well as non-state actors and entities in effecting an evolving multi-dimensional regulatory and control mechanism that has few parallels in the world.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing