Chinese Police Dub Censorship Circumvention Tools As 'Terrorist Software'

from the nice-social-score-you-have-there;-be-a-shame-if-anything-happened-to-it dept

The Great Firewall of China is pretty well-known these days, as is the fact that it is by no means impenetrable. The Chinese authorities aren't exactly happy about that, and we have seen a variety of attempts to stop its citizens from using tools to circumvent the national firewall. These have included Chinese ISPs trying to spot and block the use of VPNs; deploying China's Great Cannon to take out anti-censorship sites using massive DDoS attacks; forcing developers of circumvention tools to shut down their repositories; and pressuring Content Delivery Networks to remove all illegal circumvention, proxy and VPN services hosted on their servers.

Despite years of clampdown, anti-censorship tools are still being used widely in China -- one estimate is that 1-3% of China's Internet users do so, which would equate to millions of people. However, Global Voices has a report of police action in the Chinese region of Xinjiang, whose indigenous population is Turkic-speaking and Muslim, that may be the harbinger of even tougher measures against circumvention tools. It concerns a leaked police report, which contains the following passage:

A netizen in Changji (online account number: XXXXX IP: XXXXX) is suspected of downloading a violent and terrorist circumvention software at 12:42:21 on October 13. The software can run on mobile for sending different types of documents. Once installed, the software can be operated on the mobile management tool set for searching documents, games, backing up photos and sending text messages. This software has been classified by Public Security Bureau as second class violent and terrorist software.
What's worrying here is that the unnamed circumvention tool is classed as "violent and terrorist software," albeit only of the second class. As Global Voices points out:
Judging by the "function" described in the case report, the circumvention tool is merely giving its user access to overseas search engines and cloud storage. While the document specifically says that the circumvention tool has been classified by the public security bureau as a type of "second class violent and terrorist software", there is no public information describing how it was classified as such, or what other products share this classification. This leaves Internet users with no way to know if their software or other tools are legal or not.
Labelling something as "terrorist" is an easy way to justify making it illegal, and to try to head off any criticism of doing so. The Global Voices article notes that this move may be a purely local one, reflecting the continuing state of unrest in Xinjiang. But if it proves a useful way of framing things, it could easily be rolled out across the country.

The Global Voices article points out that there's another way the Chinese authorities might start to make the use of VPNs and other circumvention tools more risky: by making it a part of the "citizen score" system that is currently being developed to spot "pre-crime".

A person with no overseas business using circumvention tool to communicate with people outside the country can be viewed as suspicious. And in the case of Xinjiang, where the authorities see 90% of the violent and terrorist crimes are related to getting access to censored information, detecting the downloading and usage of circumvention tool is part of the pre-crime crackdown.
That approach would have the advantage that those doing business abroad using VPNs would be largely unaffected -- important for the Chinese economy. But those who are using them purely as circumvention tools to access "forbidden" material beyond the Great Firewall might find that their citizen score drops as a result. Even if circumvention tools aren't classed as terrorist software and banned outright, increasing the social cost of being seen to employ them might be just as effective.

Follow me @glynmoody on Twitter or identi.ca, and +glynmoody on Google+

Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: china, circumvention, freedom, internet freedom, law enforcement, police, terrorist software, vpn


Reader Comments

Subscribe: RSS

View by: Time | Thread


  • identicon
    Skullduggery, 3 Nov 2016 @ 11:51am

    China is a terrorist organization...

    Just ask its citizens...

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 3 Nov 2016 @ 2:17pm

      Re: China is a terrorist organization...

      "Just ask its citizens..."

      How? Any that speak out get arrested.

      link to this | view in chronology ]

  • identicon
    Pixelation, 3 Nov 2016 @ 12:32pm

    The NSA and FBI have to be so jealous.

    I wish I was kidding.

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 3 Nov 2016 @ 1:17pm

    The software is "Violent" I crashing is bad and all but I don't recall it being a "Violent" event. Annoying, troublesome, but never "Violent."

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 3 Nov 2016 @ 1:46pm

      Re:

      Software can directly lead to violence when it crashes, like the impact of the users head with the desk. Also a mouse can violently destroy a flat screen when thrown at it in anger, as can a fist punching it, or a head butting it

      link to this | view in chronology ]

  • identicon
    Lawrence D’Oliveiro, 3 Nov 2016 @ 3:59pm

    “Terrorism” Has Become A Meaningless Term

    “Terrorism” nowadays seems little more than a stick you can use to beat people you don’t like with. Nelson Mandela was officially a “terrorist”. Mahatma Gandhi was officially a “terrorist”. Truly it is said: “one side’s “terrorist” is the other side’s “freedom fighter””.

    The only clear definition of “terrorism” I have come across is “violence targeted against civilians for political ends”. Phrased that way, what government has not been guilty of “terrorism”?

    link to this | view in chronology ]

    • icon
      Richard (profile), 4 Nov 2016 @ 7:35am

      Re: “Terrorism” Has Become A Meaningless Term

      violence targeted against civilians for political ends

      No, I think one has to be more specific than that.

      Terrorism is violence done to achieve an aim by instilling fear that is disproportionate to the actual effect of the violence and used in circumstances where direct violent means are not possible.

      What is the Chinese government so scared of?

      link to this | view in chronology ]

      • identicon
        Lawrence D’Oliveiro, 4 Nov 2016 @ 2:50pm

        Re: by instilling fear that is disproportionate to the actual effect of the violence

        The terrorists don’t have to worry about that; the authorities are quite capable of doing that themselves.

        link to this | view in chronology ]

        • icon
          Richard (profile), 4 Nov 2016 @ 3:53pm

          Re: Re: by instilling fear that is disproportionate to the actual effect of the violence

          The terrorists are using the authorities (or is it the other way around?)
          Either way the rest of us pay for it!

          link to this | view in chronology ]

  • identicon
    Anonymous Coward, 3 Nov 2016 @ 6:33pm

    The software used was very violent, very erotic.

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 3 Nov 2016 @ 7:40pm

    Meanwhile, in America...

    Many of those same pieces of software are considered Technological Protection Measure circumvention.

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 4 Nov 2016 @ 9:58am

      Re: Meanwhile, in America...

      "can be operated on the mobile management tool set for searching documents, games, backing up photos and sending text messages."

      Sounds like a NIT to me.

      link to this | view in chronology ]

  • identicon
    Anonymous Coward, 4 Nov 2016 @ 9:09am

    Just like the US and their war on encryption.

    link to this | view in chronology ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.