Chinese Police Dub Censorship Circumvention Tools As 'Terrorist Software'

from the nice-social-score-you-have-there;-be-a-shame-if-anything-happened-to-it dept

The Great Firewall of China is pretty well-known these days, as is the fact that it is by no means impenetrable. The Chinese authorities aren't exactly happy about that, and we have seen a variety of attempts to stop its citizens from using tools to circumvent the national firewall. These have included Chinese ISPs trying to spot and block the use of VPNs; deploying China's Great Cannon to take out anti-censorship sites using massive DDoS attacks; forcing developers of circumvention tools to shut down their repositories; and pressuring Content Delivery Networks to remove all illegal circumvention, proxy and VPN services hosted on their servers.

Despite years of clampdown, anti-censorship tools are still being used widely in China -- one estimate is that 1-3% of China's Internet users do so, which would equate to millions of people. However, Global Voices has a report of police action in the Chinese region of Xinjiang, whose indigenous population is Turkic-speaking and Muslim, that may be the harbinger of even tougher measures against circumvention tools. It concerns a leaked police report, which contains the following passage:

A netizen in Changji (online account number: XXXXX IP: XXXXX) is suspected of downloading a violent and terrorist circumvention software at 12:42:21 on October 13. The software can run on mobile for sending different types of documents. Once installed, the software can be operated on the mobile management tool set for searching documents, games, backing up photos and sending text messages. This software has been classified by Public Security Bureau as second class violent and terrorist software.
What's worrying here is that the unnamed circumvention tool is classed as "violent and terrorist software," albeit only of the second class. As Global Voices points out:
Judging by the "function" described in the case report, the circumvention tool is merely giving its user access to overseas search engines and cloud storage. While the document specifically says that the circumvention tool has been classified by the public security bureau as a type of "second class violent and terrorist software", there is no public information describing how it was classified as such, or what other products share this classification. This leaves Internet users with no way to know if their software or other tools are legal or not.
Labelling something as "terrorist" is an easy way to justify making it illegal, and to try to head off any criticism of doing so. The Global Voices article notes that this move may be a purely local one, reflecting the continuing state of unrest in Xinjiang. But if it proves a useful way of framing things, it could easily be rolled out across the country.

The Global Voices article points out that there's another way the Chinese authorities might start to make the use of VPNs and other circumvention tools more risky: by making it a part of the "citizen score" system that is currently being developed to spot "pre-crime".

A person with no overseas business using circumvention tool to communicate with people outside the country can be viewed as suspicious. And in the case of Xinjiang, where the authorities see 90% of the violent and terrorist crimes are related to getting access to censored information, detecting the downloading and usage of circumvention tool is part of the pre-crime crackdown.
That approach would have the advantage that those doing business abroad using VPNs would be largely unaffected -- important for the Chinese economy. But those who are using them purely as circumvention tools to access "forbidden" material beyond the Great Firewall might find that their citizen score drops as a result. Even if circumvention tools aren't classed as terrorist software and banned outright, increasing the social cost of being seen to employ them might be just as effective.

Follow me @glynmoody on Twitter or identi.ca, and +glynmoody on Google+


Reader Comments

Subscribe: RSS

View by: Time | Thread


  • identicon
    Skullduggery, 3 Nov 2016 @ 11:51am

    China is a terrorist organization...

    Just ask its citizens...

    reply to this | link to this | view in chronology ]

  • identicon
    Pixelation, 3 Nov 2016 @ 12:32pm

    The NSA and FBI have to be so jealous.

    I wish I was kidding.

    reply to this | link to this | view in chronology ]

  • identicon
    Anonymous Coward, 3 Nov 2016 @ 1:17pm

    The software is "Violent" I crashing is bad and all but I don't recall it being a "Violent" event. Annoying, troublesome, but never "Violent."

    reply to this | link to this | view in chronology ]

    • identicon
      Anonymous Coward, 3 Nov 2016 @ 1:46pm

      Re:

      Software can directly lead to violence when it crashes, like the impact of the users head with the desk. Also a mouse can violently destroy a flat screen when thrown at it in anger, as can a fist punching it, or a head butting it

      reply to this | link to this | view in chronology ]

  • identicon
    Lawrence D’Oliveiro, 3 Nov 2016 @ 3:59pm

    “Terrorism” Has Become A Meaningless Term

    “Terrorism” nowadays seems little more than a stick you can use to beat people you don’t like with. Nelson Mandela was officially a “terrorist”. Mahatma Gandhi was officially a “terrorist”. Truly it is said: “one side’s “terrorist” is the other side’s “freedom fighter””.

    The only clear definition of “terrorism” I have come across is “violence targeted against civilians for political ends”. Phrased that way, what government has not been guilty of “terrorism”?

    reply to this | link to this | view in chronology ]

    • icon
      Richard (profile), 4 Nov 2016 @ 7:35am

      Re: “Terrorism” Has Become A Meaningless Term

      violence targeted against civilians for political ends

      No, I think one has to be more specific than that.

      Terrorism is violence done to achieve an aim by instilling fear that is disproportionate to the actual effect of the violence and used in circumstances where direct violent means are not possible.

      What is the Chinese government so scared of?

      reply to this | link to this | view in chronology ]

      • identicon
        Lawrence D’Oliveiro, 4 Nov 2016 @ 2:50pm

        Re: by instilling fear that is disproportionate to the actual effect of the violence

        The terrorists don’t have to worry about that; the authorities are quite capable of doing that themselves.

        reply to this | link to this | view in chronology ]

        • icon
          Richard (profile), 4 Nov 2016 @ 3:53pm

          Re: Re: by instilling fear that is disproportionate to the actual effect of the violence

          The terrorists are using the authorities (or is it the other way around?)
          Either way the rest of us pay for it!

          reply to this | link to this | view in chronology ]

  • identicon
    Anonymous Coward, 3 Nov 2016 @ 6:33pm

    The software used was very violent, very erotic.

    reply to this | link to this | view in chronology ]

  • identicon
    Anonymous Coward, 3 Nov 2016 @ 7:40pm

    Meanwhile, in America...

    Many of those same pieces of software are considered Technological Protection Measure circumvention.

    reply to this | link to this | view in chronology ]

    • identicon
      Anonymous Coward, 4 Nov 2016 @ 9:58am

      Re: Meanwhile, in America...

      "can be operated on the mobile management tool set for searching documents, games, backing up photos and sending text messages."

      Sounds like a NIT to me.

      reply to this | link to this | view in chronology ]

  • identicon
    Anonymous Coward, 4 Nov 2016 @ 9:09am

    Just like the US and their war on encryption.

    reply to this | link to this | view in chronology ]


Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here
Get Techdirt’s Daily Email
Use markdown for basic formatting. HTML is no longer supported.
  Save me a cookie
Follow Techdirt
Techdirt Gear
Shop Now: I Invented Email
Advertisement
Report this ad  |  Hide Techdirt ads
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Chat
Advertisement
Report this ad  |  Hide Techdirt ads
Recent Stories
Advertisement
Report this ad  |  Hide Techdirt ads

Close

Email This

This feature is only available to registered users. Register or sign in to use it.