{"id":317,"date":"2008-12-02T16:06:25","date_gmt":"2008-12-02T20:06:25","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/idblog\/?p=317"},"modified":"2008-12-02T17:55:14","modified_gmt":"2008-12-02T21:55:14","slug":"317","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/idblog\/2008\/12\/02\/317\/","title":{"rendered":"Chinese Bloggers Find Cracks in &#8220;Great Firewall&#8221;"},"content":{"rendered":"<p>Rebecca MacKinnon just posted <a href=\"http:\/\/rconversation.blogs.com\/rconversation\/2008\/11\/studying-chines.html\">an interesting excerpt<\/a> of academic research on Chinese censorship. She focused her work on domestic blogging services in China and how politically sensitive material is censored within or without the &#8220;Great Firewall.&#8221; Since some blogging services are foreign companies operating domestically in China (MySpace, Yahoo! China), she broaches the now familiar quandary of corporate complicity in Chinese state censorship.<\/p>\n<p>Google (and YouTube&#8217;s <a href=\"http:\/\/opennet.net\/blog\/2008\/03\/youtube-and-rise-geolocational-filtering\">geolocational filtering<\/a>) have been much discussed. Perhaps less visible was the story that came out a month ago about even <a href=\"http:\/\/www.france24.com\/en\/20081003-skype-spy-users-china-internet-tom\">Skype conversations<\/a> are now being monitored (thanks to Toronto-based <a href=\"http:\/\/www.citizenlab.org\/\">Citizen Lab<\/a>) by an automatic filtering system hunting for keywords and targeted users. One wonders if there will ever be a moment when the sprawling expanse of internet expression will become too large and unwieldy for Chinese authorities to keep a costly censorship regime.<\/p>\n<p>Unfortunately, the Chinese government has already found ways of increasing the efficiency of the operation. In addition to automatic filters and regional censors, China has practically <a href=\"http:\/\/rconversation.blogs.com\/rconversation\/2006\/02\/china_registrat.html\">outsourced the work<\/a> to private companies by requiring licenses (and their implicit conditions) to operate.<\/p>\n<p>What is interesting about MacKinnon&#8217;s work (which we earlier covered <a href=\"http:\/\/blogs.law.harvard.edu\/idblog\/2008\/11\/14\/digitial-media-in-repressive-regimes-how-china-filters-blogs\/\">here<\/a>) is how uneven and inconsistent blog censorship in China turns out to be:<\/p>\n<blockquote><p>All Chinese blog-hosting companies are required by government regulators to censor their users&#8217; content in order to keep their business licenses. But as Liu [<a href=\"http:\/\/chinadigitaltimes.net\/tag\/liu-xiaoyuan\/\">Liu Xiaoyuan<\/a>, a prominent Chinese blogger] discovered, they all make different choices not only about how to implement censorship requirements, but also how to treat the users who get censored.<\/p><\/blockquote>\n<p>If you don&#8217;t get shut down on one site, you&#8217;re likely to slip through on another&#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Rebecca MacKinnon just posted an interesting excerpt of academic research on Chinese censorship. She focused her work on domestic blogging services in China and how politically sensitive material is censored within or without the &#8220;Great Firewall.&#8221; Since some blogging services are foreign companies operating domestically in China (MySpace, Yahoo! China), she broaches the now familiar [&hellip;]<\/p>\n","protected":false},"author":1979,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32,359,2128,2142],"tags":[923,3687,56353,3809,56358],"class_list":["post-317","post","type-post","status-publish","format-standard","hentry","category-blogging","category-china","category-free-speech","category-id-project","tag-blog","tag-censorship","tag-china","tag-filter","tag-free-speech"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/idblog\/wp-json\/wp\/v2\/posts\/317","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/idblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/idblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/idblog\/wp-json\/wp\/v2\/users\/1979"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/idblog\/wp-json\/wp\/v2\/comments?post=317"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/idblog\/wp-json\/wp\/v2\/posts\/317\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/idblog\/wp-json\/wp\/v2\/media?parent=317"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/idblog\/wp-json\/wp\/v2\/categories?post=317"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/idblog\/wp-json\/wp\/v2\/tags?post=317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}