digital surveillance in china: from the great firewall to the social credit system

Post on 14-Apr-2017

56 Views

Category:

Education

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Digital Surveillance in China: From the Great Firewall to the social credit system

Winnie Soon | 24.Jan.2017Aarhus Universitywww.siusoon.net

Research perspective as a Hong Kongese…

https://www.facebook.com/localstudiohongkong/posts/911512712220379?utm_source=DesignTAXI&utm_medium=DesignTAXI&utm_term=DesignTAXI&utm_content=DesignTAXI&utm_campaign=DesignTAXI

https://www.facebook.com/localstudiohongkong/posts/911512712220379?utm_source=DesignTAXI&utm_medium=DesignTAXI&utm_term=DesignTAXI&utm_content=DesignTAXI&utm_campaign=DesignTAXI

Share a similar language system (the same base Chinese alphabet)…

Digital Surveillance in China

https://www.apc.org/en/node/14821

19971998

19992000

20012002

20032004

20052006

20072008

20092010

20112012

20132014

20152016

20172018

20192020

0

200

400

600

800

MIL

LIO

N

Initiative on social-credit system

Internet Penetration in China and key milestones on technological development/related policies

real nameRegistration+ enhanced VPN blocking

join meetingabout social creditssystem at provincial levelThe term “Great Firewall”

was coined

Initiative on Golden Shield Project

Golden Shield Project in operation

Launched Google.cn

Guidelines on social-credit system

Target completion of social-credit system

Google.cn redirected to HK

Online Publishing Services Permit + ICP licence

Clean up campaign on unauthorized VPN providers

Michel de Certeau (1984)The Practice of Everyday Life

[A] tactic is determined by the absence of power just as a strategy is organized by the postulation of power.

(De Certeau, 1984, p. 38. Italics in original)

Strategies are operations:

- Defining how things work/operate (such as law, policy, firewall creation)

- Regarding Internet as an institutional space of authority- Allowing work to build upon previous work (De Certeau, 1984, p.

xix)

Tactics are resistance acts:

- Resistance stems from daily life practice- Tactics are improvisational and opportunistic (De Certeau, 1984,

p. xix)- Tactical practices operate within “the space of the other” (De

Certeau, 1984, p. xix)- Creative consumption- “A tactic is an art of the weak” (De Certeau, 1984, p. 37).

China’s state law - 1996Measures on the Regulation of Public Computer Networks and the Internet

Article 10: …No unit or individual may use the Internet to retrieve, replicate, create, or transmit information that harms national security, threatens social stability ….

Strategies…

China’s state law - 1996Temporary Regulations Governing Computer Information Networks and the Internet

No. 195: The State is in charge of overall planning, national standardization, graded control, and the development of all areas related to the Internet.

... No group or individual may establish or utilize any other means to gain Internet access.

The Golden Shield Project (2003 – present)Operated by the Ministry of Public Security

Controlling the flow of information through a censorship system, including:

• IP blocking• DNS Filtering and Redirection• URL and Packet Filtering• VPN/SSH Traffic Recognition• Speech and Face recognition

Strategies…

China Channel, 2008 | by Aram Bartholl, Evan Roth and Tobias Leingruber[Browser add-on]

Tactics…

CANNOT (2010) by Winnie Soon[5x Digital prints with screen shots]

Tactics…

Hundred degree can not search your thirty degree smile, 2016 by Miao Ying

LAN Love Poem-Holding a kitchen knife cut internet cable, a road with lightning sparks, 2014 by Miao Ying

Flowers all fallen, Birds far gone, 2015 by Miao Ying

LAN Love Poem-To be Missed is Another kind of Beauty, 2014 by Miao Ying

>> Interview with Ying Miao: https://vimeo.com/162455923

Tactics…

The Golden Shield Project (2003- present)Operated by the Ministry of Public Security

It is more than a mere technological project:

- Not only to control the access of ‘foreign’ information - But also discover the need to censor local contents (user generated

content) e.g P2P and internal/local servers

Strategies…

The Golden Shield Project (2003- present)Operated by the Ministry of Public Security

It is more than a mere technological project:

- Not only to control the access of ‘foreign’ information - But also discover the need to censor local contents (user generated

content) e.g P2P and internal/local servers

> 50-cent party members to influence Internet discussion> A culture of self-censorship (from individuals to companies)> Internet policing (estimated to contain over 200,000 workers)

Strategies…

Strategies…

http://firstmonday.org/article/view/2378/2089

Censored Censorship, 2010 | by Kim Asendorf[Net Art]

Tactics…

Weiboscope (2011-present) and WeChatscope (under pilot study) by Fu King Wa and his team @ HKU

Tactics…

Tactics are procedures that gain validity in relation to the pertinence they lend to time-to the circumstances which the precise instant of an intervention transforms into a favorable situation, to the rapidity of the movements that change the organization of a space, to the relations among successive moments in actions, to the possible intersections of durations and heterogeneous rhythms, etc.

(De Certeau, 1984, p. 38)

Specific event: Tiananmen Square Protest | 1989

Video: https://www.youtube.com/watch?v=CxDd82Myqis

Censored from sina weibo during 2013 - 2014

Tactics…

4.6.2016

Tactics…

//点 // // 点 // / 点 ///人 //

//点 // // 点 // / 点 ///人 //

4.6.2016

Tactics…

占占点占占人占点占6+4 6+4

8的平方 square of eight

viiv viiv (Roman numerals 6 and 4)

65-1 65-1

五四 +一个月 May Fourth + one month

https://qz.com/698990/261-ways-to-refer-to-the-tiananmen-square-massacre-in-china/

Strategies…

Sensitive keywords

What will happen soon?

Social Credit System(2020)

“construct a social credit environment of sincerity, self-discipline, trust-keeping and mutual trust.”

(State Council, 2014)

Social Credit System(2020)

Basic info:Official announcement: 2014 Target implementation: 2020 Citizen: 1.3 billion+ Identification: credit/citizen score (based on id number)Coverage: Individual, companies and institutions (*sectoral credit information systems)

Scope of the system:Politics, Business, Society, Justice

Consequences:Rewards: incentivise trust-keeping (*rewards for reporting individuals)Punishment: punish trust-breaking (*establish blacklist systems, market withdrawal mechanisms, policy support, administrative approval, public service market access etc)

Black Mirror: Nose Dive

https://www.youtube.com/watch?v=fgLYHM6evt8&t=34m20s

Key insights:

- Tactics are resistance acts, emerging from every day practice and accompanying by the asymmetrical balance of power.

- Tactics are targeted, capturing the opportunistic time/space.- An urgency to develop an archive of tactical practices (in relation to

digital surveillance in China).

Ref:• Planning Outline for the Construction of a Social Credit System (2014-2020):

https://chinacopyrightandmedia.wordpress.com/2014/06/14/planning-outline-for-the-construction-of-a-social-credit-system-2014-2020/

• Government Requests Report (Facebook): https://govtrequests.facebook.com/• State Council releases guidelines on establishing individual credit system:

http://english.gov.cn/policies/latest_releases/2016/12/30/content_281475528903041.htm • A brief history of China’s campaign to enforce real-name registration online:

https://www.techinasia.com/history-chinas-campaign-enforce-realname-registration-online • Annual Report on the Development of China’s Special Economic Zone (2016)• Measurers on the regulation of public computer networks and the Internet (1996):

http://www.asianlii.org/cn/legis/cen/laws/motropcnati718/ • A history of Google in China:

http://www.ft.com/cms/s/0/faf86fbc-0009-11df-8626-00144feabdc0.html?ft_site=falcon#axzz4VwNKKQR5

• Miao Ying: http://rhizome.org/editorial/2015/jul/08/artist-profile-miao-ying/• Background of Jun fourth: https://botanwang.com/node/10883• China’s Golden Shield: Is Cisco Systems Complicit? http

://cyberlaw.stanford.edu/blog/2015/03/china%E2%80%99s-golden-shield-cisco-systems-complicit

• China Imposes Broad New Restrictions on Publication of Internet Content: http://www.lexology.com/library/detail.aspx?g=fa85e3a8-21d4-445c-85bb-2d7b66b57262

• China’s Censorship 2.0: How companies censor bloggers by Rebecca Mackinnon http://firstmonday.org/article/view/2378/2089

• 工业和信息化部关于清理规范互联网网络接入服务市场的通知 : http://www.miit.gov.cn/n1146295/n1652858/n1652930/n3757020/c5471946/content.html

Appendix

http://video.eblcu.cn/cls/201103/course/3-1/img/4.jpg

Pictorial Chinese Characters…

People

Tactics…

Weibo Credit(2011-present)

[Weibo, social media]

Strategies…

Sesame Credit Scores(2015-present)

[Payment App]

Ant Financial Services Group, an affiliate of the Chinese Alibaba Group

Strategies…

Social Credit System(2014-2020)

“All levels’ People’s Governments must first and foremost strengthen their own sincerity construction, and drive the establishment of an sincerity consciousness in all of society and an increase in the levels of sincerity through honest governing by governments. Take the lead in using credit information and credit products in administrative permission, government procurement, tendering and budding, labour and employment, social security, scientific research management, cadre promotion and appointment, management and supervision, application for government financial support and other such areas, and foster the development of a credit services market.” (State Council Notice, 2014)

Strategies…

Social Credit System(2014-2020)

“When people's behavior isn't bound by their morality, a system must be used to restrict their actions”

- Chinese Academy of Social Science, 2015

“Especially given the speed of the digital economy it is crucial that people can quickly verify each other’s creditworthiness. The behavior of the majority is determined by their world of thoughts. A person who believes in socialist core values, is behaving more decent.”

- Professor Wang Shuqin, 2015

“It is clearly an attempt to create a new citizen”

-Researcher Rogier Creemers, 2015

Strategies…

Recording the individual credit records

Improving individual information security

Promoting sharing of individual credit information

Perfecting the incentive and punishment mechanisms of individual credit (e.g joint punishment)

Guidelines of the social credit system (2016)

http://english.gov.cn/policies/latest_releases/2016/12/30/content_281475528903041.htmhttp://www.chinalawtranslate.com/creditmechanisms/?lang=en

top related