• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

North Korea-linked actors spread XORIndex malware via 67 malicious npm packages

 | 

FBI seized multiple piracy sites distributing pirated video games

 | 

An attacker using a $500 radio setup could potentially trigger train brake failures or derailments from a distance

 | 

Interlock ransomware group deploys new PHP-based RAT via FileFix

 | 

Global Louis Vuitton data breach impacts UK, South Korea, and Turkey

 | 

Experts uncover critical flaws in Kigen eSIM technology affecting billions

 | 

Spain awarded €12.3 million in contracts to Huawei

 | 

Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb

 | 

Wing FTP Server flaw actively exploited shortly after technical details were made public

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 53

 | 

Security Affairs newsletter Round 532 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

McDonald’s job app exposes data of 64 Million applicants

 | 

Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

 | 

U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

 | 

UK NCA arrested four people over M&S, Co-op cyberattacks

 | 

PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

 | 

Qantas data breach impacted 5.7 million individuals

 | 

DoNot APT is expanding scope targeting European foreign ministries

 | 

Nippon Steel Solutions suffered a data breach following a zero-day attack

 | 

Iranian group Pay2Key.I2P ramps Up ransomware attacks against Israel and US with incentives for affiliates

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Cyber Crime
  • Intelligence
  • Social Networks
  • The business of Censorship. Golden Shield Project, but not only …

The business of Censorship. Golden Shield Project, but not only …

Pierluigi Paganini November 19, 2011

““If you open the window for fresh air,  you have to expect some flies to blow in” this is the Deng Xiaoping’s phrase, which summarizes the essence of the “Golden Shield Project” also Known as the “Great Firewall of China”. The project is related to the development of the most efficient system of censorship and surveillance in the world of the People’sRepublic of China.

The project was started in 1998 and officially began in 2003 driven by the government to operate the control of what had become the platform for communication and dissemination most important in the country, internet (officially introduced in 1994).

Since 1997 the Ministry of Public Security started the activities to govern Internet usage with official regulations.  The key conept of the regulation are the Articles 4-6:

“Individuals are prohibited from using the Internet to: harm national security; disclose state secrets; or injure the interests of the state or society. Users are prohibited from using the Internet to create, replicate, retrieve, or transmit information that incites resistance to the PRC Constitution, laws, or administrative regulations; promotes the overthrow of the government or socialist system; undermines national unification; distorts the truth, spreads rumors, or destroys social order; or provides sexually suggestive material or encourages gambling, violence, or murder. Users are prohibited from engaging in activities that harm the security of computer information networks and from using networks or changing network resources without prior approval.”

Purpose of the project is to block content by preventing IP addresses from being routed through and consists of standard firewalls and proxy servers at the Internet gateways. Through DNS cache poisoning it’s possible to make unreachable when specific web sites are requested.

In October 2001, Greg Walton of the International Centre for Human Rights and Democratic Development published a report; he wrote:

Old style censorship is being replaced with a massive, ubiquitous architecture of surveillance: the Golden Shield. Ultimately, the aim is to integrate a gigantic online database with an all-encompassing surveillance network – incorporating speech and face recognition, closed-circuit television, smart cards, credit records, and Internet surveillance technologies

China has implemented most sophisticated Internet content-filtering that is able to effectively filters content using multiple methods of regulation and technical controls:

  • IP blocking and content filtering
  • DNS and URL filtering
  • DNS poisoning
  • Connection reset

This is a real battle in the cyber space that involve the world’s largest online population and weapon created by Chinese government is an advanced Internet censorship and surveillance system to monitor their activity.  What are the targets of censorship? We can categorize the censored contents as

  • web sites belonging to outlawed or suppressed groups
  • sites related to the hostile governments, media, or other organizations deemed as subversive
  • sites related to religious content any pornography web site or sites that encourage criminal activity
  • blogging sites

The Chinese model is a reference for all the others authoritarian regimes but not only for them. We are assisting to a challenge engaged by governments worldwide like USA that desire to legislate cyber space and impose their control to prevent any form of terrorism and dissents. We are observing a growing trend toward Internet censorship in a range of countries that are investing in the necessary technology to implement the control. The technologies are exactly the same used to secure network infrastructure from attack.

We are facing a new business opportunity, control and censorship through complex content filtering platforms. Just a few days ago I published the news on a tender held by the Soviet government on the implementation of a similar system (http://securityaffairs.co/wordpress/?p=156)

On August Bloomberg reported on Bahrain’s use of surveillance software developed by Nokia  and Siemens to intercept messages and collect information on human rights activists, resulting in their arrest and torture. Countries like Syria, Egypt, Bahrain, Thailand, Lybia are acquiring, or have already bought, surveillance systems and this means the that we will observe block to web activities for their citizens, in the best case, and in worst case brutal suppress of dissent. Electronic Frontier Foundation has documented the sale of surveillance equipment by several companies, including Cisco and Nortel, to China causing torture, cruel, inhuman or other degrading treatment or punishment, arbitrary arrest and prolonged detention.

It is wrong to believe that only this government control and monitor web usage , we are living in the era of fake freedom. Do you believe to be able to surf on internet without external control? You are foolish! Western government use in differ way this powerful platform to prevent terrorism, frauds, pornography but also to monitor the sentiment of entire population and maybe to influence it.

Please analyze the transparency report produced by Google that regularly receives requests from government agencies and courts around the world to remove content from their services and hand over user data. Government Requests tool discloses the number of requests we receive from each government in six-month reporting periods with certain limitations … you will notice that behind China there are Countries like Germany and France. Surprised? Do you believe that all the request are related to piracy or similar issue?

The Google itself has been accused to implement censorship with its search engine. Some samples? In the United States, Google commonly censors search results to comply with Digital Millennium Copyright Act-related legal complaints.

On April 2008, Google refused to run ads for a UK Christian group opposed to abortion, explaining that they were non compliant to Google policy, but this meas that Google could decide what is indexable and what no based on its policies … dangerous.

Who control the controller?

I conclude with a question: << what sense does it talk about human rights when Western companies cultivate a bloody business selling this systems?>>

(Pierluigi Paganini)

http://en.wikipedia.org/wiki/Great_Firewall_of_China

http://www.google.com/transparencyreport/governmentrequests/

http://sethf.com/anticensorware/general/google-censorship.php

http://en.wikipedia.org/wiki/Censorship_by_Google#Censorship

https://www.eff.org/deeplinks/2011/09/government-internet-surveillance-starts-eyes-built

https://www.eff.org/deeplinks/2011/08/cisco-and-abuses-human-rights-china-part-1

http://csis.org/files/media/csis/pubs/0706_cn_surveillance_and_information_technology.pdf

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – China, Golden Shield)

[adrotate banner=”13″]


facebook linkedin twitter

Censorship China Cyber Crime Espionage Facebook Google Hackers Hacking Incident Intelligence Internet Large scale infiltration Social Network

you might also like

Pierluigi Paganini July 15, 2025
FBI seized multiple piracy sites distributing pirated video games
Read more
Pierluigi Paganini July 14, 2025
Interlock ransomware group deploys new PHP-based RAT via FileFix
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    North Korea-linked actors spread XORIndex malware via 67 malicious npm packages

    Hacking / July 15, 2025

    FBI seized multiple piracy sites distributing pirated video games

    Cyber Crime / July 15, 2025

    An attacker using a $500 radio setup could potentially trigger train brake failures or derailments from a distance

    Hacking / July 15, 2025

    Interlock ransomware group deploys new PHP-based RAT via FileFix

    Cyber Crime / July 14, 2025

    Global Louis Vuitton data breach impacts UK, South Korea, and Turkey

    Data Breach / July 14, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT