The business of Censorship. Golden Shield Project, but not only …

“If you open the window for fresh air,  you have to expect some flies to blow in” this is the Deng Xiaoping’s phrase, which summarizes the essence of the “Golden Shield Project” also Known as the “Great Firewall of China”. The project is related to the development of the most efficient system of censorship and surveillance in the world of the People’sRepublic of China.

The project was started in 1998 and officially began in 2003 driven by the government to operate the control of what had become the platform for communication and dissemination most important in the country, internet (officially introduced in 1994).

Since 1997 the Ministry of Public Security started the activities to govern Internet usage with official regulations.  The key conept of the regulation are the Articles 4-6:

“Individuals are prohibited from using the Internet to: harm national security; disclose state secrets; or injure the interests of the state or society. Users are prohibited from using the Internet to create, replicate, retrieve, or transmit information that incites resistance to the PRC Constitution, laws, or administrative regulations; promotes the overthrow of the government or socialist system; undermines national unification; distorts the truth, spreads rumors, or destroys social order; or provides sexually suggestive material or encourages gambling, violence, or murder. Users are prohibited from engaging in activities that harm the security of computer information networks and from using networks or changing network resources without prior approval.”

Purpose of the project is to block content by preventing IP addresses from being routed through and consists of standard firewalls and proxy servers at the Internet gateways. Through DNS cache poisoning it’s possible to make unreachable when specific web sites are requested.

In October 2001, Greg Walton of the International Centre for Human Rights and Democratic Development published a report; he wrote:

Old style censorship is being replaced with a massive, ubiquitous architecture of surveillance: the Golden Shield. Ultimately, the aim is to integrate a gigantic online database with an all-encompassing surveillance network – incorporating speech and face recognition, closed-circuit television, smart cards, credit records, and Internet surveillance technologies

China has implemented most sophisticated Internet content-filtering that is able to effectively filters content using multiple methods of regulation and technical controls:

  • IP blocking and content filtering
  • DNS and URL filtering
  • DNS poisoning
  • Connection reset

This is a real battle in the cyber space that involve the world’s largest online population and weapon created by Chinese government is an advanced Internet censorship and surveillance system to monitor their activity.  What are the targets of censorship? We can categorize the censored contents as

  • web sites belonging to outlawed or suppressed groups
  • sites related to the hostile governments, media, or other organizations deemed as subversive
  • sites related to religious content any pornography web site or sites that encourage criminal activity
  • blogging sites

The Chinese model is a reference for all the others authoritarian regimes but not only for them. We are assisting to a challenge engaged by governments worldwide like USA that desire to legislate cyber space and impose their control to prevent any form of terrorism and dissents. We are observing a growing trend toward Internet censorship in a range of countries that are investing in the necessary technology to implement the control. The technologies are exactly the same used to secure network infrastructure from attack.

We are facing a new business opportunity, control and censorship through complex content filtering platforms. Just a few days ago I published the news on a tender held by the Soviet government on the implementation of a similar system (http://securityaffairs.co/wordpress/?p=156)

On August Bloomberg reported on Bahrain’s use of surveillance software developed by Nokia  and Siemens to intercept messages and collect information on human rights activists, resulting in their arrest and torture. Countries like Syria, Egypt, Bahrain, Thailand, Lybia are acquiring, or have already bought, surveillance systems and this means the that we will observe block to web activities for their citizens, in the best case, and in worst case brutal suppress of dissent. Electronic Frontier Foundation has documented the sale of surveillance equipment by several companies, including Cisco and Nortel, to China causing torture, cruel, inhuman or other degrading treatment or punishment, arbitrary arrest and prolonged detention.

It is wrong to believe that only this government control and monitor web usage , we are living in the era of fake freedom. Do you believe to be able to surf on internet without external control? You are foolish! Western government use in differ way this powerful platform to prevent terrorism, frauds, pornography but also to monitor the sentiment of entire population and maybe to influence it.

Please analyze the transparency report produced by Google that regularly receives requests from government agencies and courts around the world to remove content from their services and hand over user data. Government Requests tool discloses the number of requests we receive from each government in six-month reporting periods with certain limitations … you will notice that behind China there are Countries like Germany and France. Surprised? Do you believe that all the request are related to piracy or similar issue?

The Google itself has been accused to implement censorship with its search engine. Some samples? In the United States, Google commonly censors search results to comply with Digital Millennium Copyright Act-related legal complaints.

On April 2008, Google refused to run ads for a UK Christian group opposed to abortion, explaining that they were non compliant to Google policy, but this meas that Google could decide what is indexable and what no based on its policies … dangerous.

Who control the controller?

I conclude with a question: << what sense does it talk about human rights when Western companies cultivate a bloody business selling this systems?>>

(Pierluigi Paganini)

http://en.wikipedia.org/wiki/Great_Firewall_of_China

http://www.google.com/transparencyreport/governmentrequests/

http://sethf.com/anticensorware/general/google-censorship.php

http://en.wikipedia.org/wiki/Censorship_by_Google#Censorship

https://www.eff.org/deeplinks/2011/09/government-internet-surveillance-starts-eyes-built

https://www.eff.org/deeplinks/2011/08/cisco-and-abuses-human-rights-china-part-1

http://csis.org/files/media/csis/pubs/0706_cn_surveillance_and_information_technology.pdf

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – China, Golden Shield)

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Sweden’s liquor supply severely impacted by ransomware attack on logistics company

A ransomware attack on a Swedish logistics company Skanlog severely impacted the country's liquor supply. …

32 mins ago

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

11 hours ago

CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.…

18 hours ago

DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transactions

The U.S. Department of Justice (DoJ) announced the arrest of two co-founders of a cryptocurrency mixer…

18 hours ago

Google fixed critical Chrome vulnerability CVE-2024-4058

Google addressed a critical Chrome vulnerability, tracked as CVE-2024-4058, that resides in the ANGLE graphics…

23 hours ago

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

1 day ago

This website uses cookies.