Jump to content

Great Firewall of China: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Pwnage8 (talk | contribs)
Line 58: Line 58:
* Web sites relating to [[Crime|criminal]] activity
* Web sites relating to [[Crime|criminal]] activity
* Sites linked with the [[Dalai Lama]] and his [[International Tibet Independence Movement]], including his teachings
* Sites linked with the [[Dalai Lama]] and his [[International Tibet Independence Movement]], including his teachings
* Most blogging sites, such as [[blogger.com]], [[wordpress.com]], experience frequent or permanent outages
* Most blogging sites, such as [[blogger.com]], [[wordpress.com]], [[Apple Inc.|Apple]]'s [[.Mac]] experience frequent or permanent outages
* Web sites deemed as subversive
* Web sites deemed as subversive



Revision as of 12:12, 16 April 2008

The Golden Shield Project (Chinese: 金盾工程; pinyin: jīndùn gōngchéng), sometimes referred to as the Great Firewall of China (as a play on the iconic Great Wall of China), is a censorship and surveillance project operated by the Ministry of Public Security (MPS) of the People's Republic of China. The project started in 1998 and began operations in November of 2003.

History

In 1998 the China Democracy Party was formed as one of the first true political opposition parties with global technical capabilities that could reach the masses via Internet, email and paging systems. The Communist party feared the CDP would breed a powerful new network that the party elites may not be able to control.[1] The CDP was immediately banned followed by arrests and imprisonment.[2] That same year the Golden Shield project was started. The first part of the project lasted eight years, completing in 2006. The second part began in 2006. It will be finished in 2008. According to China Central Television (CCTV), up to 2002, the preliminary work of the Golden Shield Project cost US$800 million (equivalent to RMB 6.4 billion or €640 million).[3]

On 6 December 2002, 300 people in charge of the Golden Shield project from 31 provinces and cities throughout China participated in a four-day inaugural “Comprehensive Exhibition on Chinese Information System”. At the exhibition, many western high-tech products including Internet security, video monitoring and human face recognition, were purchased. It is estimated that around 30,000 police are employed in this gigantic project.[4]

It has been nicknamed the Great Firewall of China in reference to its role as a network firewall and to the ancient Great Wall of China. A major part of the project includes the ability to block content by preventing IP addresses from being routed through and consists of standard firewall and proxy servers at the Internet gateways. The system also selectively engages in DNS poisoning when particular sites are requested. The government does not appear to be systematically examining Internet content, as this appears to be technically impractical.[5]

The first part of the project passed the national inspection on November 16, 2006 in Beijing.[citation needed]

Chinese officials have told Internet providers to get ready to unblock access from certain Internet cafés, access jacks in hotel rooms and conference centers where foreigners are expected to work or stay during the Olympic Games.[6]

Purpose

In September 2002, Li Runsen, the technology director at MPS and member of the Golden Shield leadership, further explained this broad definition to thousands of police nationwide at a meeting in Beijing called “Information Technology for China’s Public Security”.

In October 2001, Greg Walton of the International Centre for Human Rights and Democratic Development published a report; he wrote:

Old style censorship is being replaced with a massive, ubiquitous architecture of surveillance: the Golden Shield. Ultimately, the aim is to integrate a gigantic online database with an all-encompassing surveillance network – incorporating speech and face recognition, closed-circuit television, smart cards, credit records, and Internet surveillance technologies.[7]

In July of 2007, authorities intensified the "monitoring and control" of The Great Firewall, causing email disruption, in anticipation of the Shanghai Cooperation Organization meeting scheduled for August 2007.[8]

Technical information

Some commonly-used methods for censoring content are:[9]

  • IP blocking. The access to a certain IP address is denied. If the target Web site is hosted in a shared hosting server, all Web sites on the same server will be blocked. This affects all IP protocols (mostly TCP) such as HTTP, FTP or POP. A typical circumvention method is to find proxies that have access to the target Web sites, but proxies may be jammed or blocked, and some Web sites such as Wikipedia also block proxies from editing articles. Some large Web sites such as Google allocated additional IP addresses to circumvent the block, but later the block was extended to cover the new IPs.
  • DNS filtering and redirection. Don't resolve domain names, or return incorrect IP addresses. This affects all IP protocols such as HTTP, FTP or POP. A typical circumvention method is to find a domain name server that resolves domain names correctly, but domain name servers are subject to blockage as well, especially IP blocking. Another workaround is to bypass DNS if the IP address is obtainable from other sources and is not blocked. Examples are modifying the Hosts file or typing the IP address instead of the domain name in a Web browser.
  • URL filtering. Scan the requested Uniform Resource Locator (URL) string for target keywords regardless of the domain name specified in the URL. This affects the HTTP protocol. Typical circumvention methods are to use escaped characters in the URL, or to use encrypted protocols such as VPN and SSL.[10]
  • Packet filtering. Terminate TCP packet transmissions when a certain number of controversial keywords are detected. This affects all TCP protocols such as HTTP, FTP or POP, but Search engine pages are more likely to be censored. Typical circumvention methods are to use encrypted protocols such as VPN and SSL, to escape the HTML content, or reducing the TCP/IP stack's MTU, thus reducing the amount of text contained in a given packet.
  • Connection reset. If a previous TCP connection is blocked by the filter, future connection attempts from both sides will also be blocked for up to 30 minutes. Depending on the location of the block, other users or Web sites may be also blocked if the communications are routed to the location of the block. A circumvention method is to ignore the reset packet sent by the firewall.[11]

Censored content

Mainland Chinese Internet censorship programs have censored Web sites that include (among other things):

Blocked Web sites are indexed to a lesser degree, if at all, by some Chinese search engines, such as Baidu and Google China. This sometimes has considerable impact on search results.[14]

According to the New York Times, Google has set up computer systems inside China that try to access Web sites outside the country. If a site is inaccessible, then it is added to Google China's blacklist.[15] However, once unblocked, the Web sites will be reindexed.

Bypassing

  • Bouncing through an arbitrary host outside the firewall.
  • Companies can establish regional Web sites within China. This prevents their content from going through the Great Firewall; however, it requires companies to apply for local ICP licenses.
  • The Great Firewall cannot filter secure traffic, such as VPN data sent over connections.
  • Onion routing, such as Tor, can be used.
  • Freegate is a program that takes advantage of a number of open proxies for bypassing firewalls; it can be used as well.
  • UltraSurf by UltraReach is another product that people use to circumvent the GFW.

Unblocking

Certain sites have begun to be unblocked, including:

  • The BBC Website [16]
  • Youtube [17]
  • en.wikipedia.org, including this article about the Golden Shield (the search for some key words relating to current events, such as "Tibet", result in a browser error message, though)

References

  1. ^ Goldman, Merle Goldman. Gu, Edward X. [2004] (2004). Chinese Intellectuals between State and Market. Routledge publishing. ISBN 0415325978
  2. ^ Goldsmith, Jack L. (2006). Who Controls the Internet?: Illusions of Borderless World. Oxford university press. p. 91. ISBN 01895152662. {{cite book}}: Check |isbn= value: length (help); Unknown parameter |coauthors= ignored (|author= suggested) (help)
  3. ^ 金盾工程前期耗8亿美元 建全国性监视系统 Template:Zh icon
  4. ^ 首屆「2002年中國大型機構信息化展覽會」全國31省市金盾工程領導雲集 Template:Zh icon
  5. ^ "War of the words". The Guardian.
  6. ^ "The Connection Has Been Reset". theatlantic.com.
  7. ^ China's Golden Shield: Corporations and the Development of Surveillance Technology in the People's Republic of China
  8. ^ "China censors blamed for email chaos". Reuters. July 18, 2007. Retrieved 2007-08-19.
  9. ^ Empirical Analysis of Internet Filtering in China.
  10. ^ For an example, see Wikipedia:Advice to users using Tor to bypass the Great Firewall
  11. ^ zdnetasia.com
  12. ^ Marquand, Robert (2006-02-04). "China's media censorship rattling world image". Christian Science Monitor. {{cite web}}: Cite has empty unknown parameters: |accessyear=, |month=, |accessmonthday=, and |coauthors= (help)
  13. ^ Websitepulse.com returns for zh.uncyclopedia.info via Beijing, China or Shanghai, China; "Status: Empty reply from server."
  14. ^ "controlling information: you can't get there from here -- filtering searches". The tank man. Frontline (pbs.org).
  15. ^ Google's China Problem (and China's Google Problem), p8
  16. ^ BBC News Article on the Unblocking of iteself
  17. ^ China Citizens Comment on the Unblocking, one mentions YouTube is also Free to access

See also