Golden Shield Project
   HOME

TheInfoList



OR:

The Golden Shield Project (), also named National Public Security Work Informational Project, is the Chinese nationwide network-security fundamental constructional project by the
e-government E-government (short for electronic government) is the use of technological communications devices, such as computers and the Internet, to provide public services to citizens and other persons in a country or region. E-government offers new ...
of the
People's Republic of China China, officially the People's Republic of China (PRC), is a country in East Asia. It is the world's List of countries and dependencies by population, most populous country, with a Population of China, population exceeding 1.4 billion, slig ...
. This project includes a security management information system, a criminal information system, an exit and entry administration information system, a supervisor information system, a traffic management information system, among others. The Golden Shield Project is one of the 12 important "golden" projects. The other "golden" projects are Golden Customs (also known as Golden Gate) (for customs), Golden Tax (for taxation), Golden Macro, Golden Finance (for financial management), Golden Auditing, Golden Security, Golden Agriculture (for agricultural information), Golden Quality (for quality supervision), Golden Water (for water conservancy information), Golden Credit, and Golden Discipline projects. The Golden Shield Project also manages the Bureau of Public Information and Network Security Supervision, which is a bureau that is widely believed, though not officially claimed, to operate a subproject called the Great Firewall of China (GFW) which is a
censorship Censorship is the suppression of speech, public communication, or other information. This may be done on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient". Censorship can be conducted by governments ...
and
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as ...
project that blocks data from foreign countries that may be unlawful in the PRC. It is operated by the Ministry of Public Security (MPS) of the
government of China The Government of the People's Republic of China () is an authoritarian political system in the People's Republic of China under the exclusive political leadership of the Chinese Communist Party (CCP). It consists of legislative, executive, mil ...
. This subproject was initiated in 1998 and began operations in November 2003. It has also seemingly been used to attack international web sites using Man-on-the-side
DDoS In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host conn ...
, for example GitHub on 2015/03/28.


History

The political and ideological background of the Golden Shield Project is considered to be one of
Deng Xiaoping Deng Xiaoping (22 August 1904 – 19 February 1997) was a Chinese revolutionary leader, military commander and statesman who served as the paramount leader of the China, People's Republic of China (PRC) from December 1978 to November 1989. Aft ...
's favorite sayings in the early 1980s: "If you open the window for fresh air, you have to expect some flies to blow in." The saying is related to a period of economic reform in China that became known as the " socialist market economy". Superseding the political ideologies of the
Cultural Revolution The Cultural Revolution, formally known as the Great Proletarian Cultural Revolution, was a sociopolitical movement in the People's Republic of China (PRC) launched by Mao Zedong in 1966, and lasting until his death in 1976. Its stated goa ...
, the reform led China towards a
market economy A market economy is an economic system in which the decisions regarding investment, production and distribution to the consumers are guided by the price signals created by the forces of supply and demand, where all suppliers and consumers ...
and opened up the market for foreign investors. Nonetheless, despite the economic freedom, values and political ideas of the
Chinese Communist Party The Chinese Communist Party (CCP), officially the Communist Party of China (CPC), is the founding and sole ruling party of the People's Republic of China (PRC). Under the leadership of Mao Zedong, the CCP emerged victorious in the Chinese Ci ...
have had to be protected by "swatting flies" of other unwanted ideologies. The Internet in China arrived in 1994, as the inevitable consequence of and supporting tool for the " socialist market economy". As availability of the Internet has gradually increased, it has become a common communication platform and tool for trading information. The Ministry of Public Security took initial steps to control Internet use in 1997, when it issued comprehensive regulations governing its use. The key sections, Articles 46, are the following: In 1998, the Chinese Communist Party feared that the
China Democracy Party The Democracy Party of China (DPC; ) is a political party that started in the People's Republic of China, and was banned by the Chinese Communist Party (CCP).Gittings, John. ''The Changing Face of China: From Mao to Market''. (2005). Oxford Univ ...
(CDP) would breed a powerful new network that the party elites might not be able to control. The CDP was immediately banned, followed by arrests and imprisonment. That same year, the Golden Shield project was started. The first part of the project lasted eight years and was completed in 2006. The second part began in 2006 and ended in 2008. On 6 December 2002, 300 people in charge of the Golden Shield project from 31
provinces A province is almost always an administrative division within a country or state. The term derives from the ancient Roman '' provincia'', which was the major territorial and administrative unit of the Roman Empire's territorial possessions ou ...
and cities throughout China participated in a four-day inaugural "Comprehensive Exhibition on Chinese Information System". At the exhibition, many western high-tech products, including Internet security, video monitoring and human
face recognition A facial recognition system is a technology capable of matching a human face from a digital image or a video frame against a database of faces. Such a system is typically employed to authenticate users through ID verification services, an ...
were purchased. It is estimated that around 30,000-50,000 police are employed in this gigantic project. A subsystem of the Golden Shield has been nicknamed " the Great Firewall" (防火长城) (a term that first appeared in a Wired magazine article in 1997) in reference to its role as a network firewall and to the ancient
Great Wall of China The Great Wall of China (, literally "ten thousand ''li'' wall") is a series of fortifications that were built across the historical northern borders of ancient Chinese states and Imperial China as protection against various nomadic grou ...
. This part of the project includes the ability to block content by preventing
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
es from being routed through and consists of standard firewalls and
proxy server In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. Instead of connecting directly to a server that can fulfill a reques ...
s at the six
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, p ...
gateways. The system also selectively engages in DNS cache poisoning when particular sites are requested. The government does not appear to be systematically examining Internet content, as this appears to be technically impractical. Because of its disconnection from the larger world of IP routing protocols, the network contained within the Great Firewall has been described as "the Chinese autonomous
routing domain {{short description, Computer networking concept In computer networking, a routing domain is a collection of networked systems that operate common routing protocol A routing protocol specifies how routers communicate with each other to distribu ...
". During the
2008 Summer Olympics The 2008 Summer Olympics (), officially the Games of the XXIX Olympiad () and also known as Beijing 2008 (), were an international multisport event held from 8 to 24 August 2008, in Beijing, China. A total of 10,942 athletes from 204 Nat ...
, Chinese officials told Internet providers to prepare to unblock access from certain Internet cafés, access jacks in hotel rooms and conference centers where foreigners were expected to work or stay.


Actions and purpose

The Golden Shield Project contains an integrated, multi-layered system, involving technical, administrative, public security, national security, publicity and many other departments. This project was planning to finish within five years, separated into two phases.


Phase I

The first phase of the project focused on the construction of the first-level, second-level, and the third-level information communication network, application database, shared platform, etc. The period was three years. According to the
Xinhua News Agency Xinhua News Agency (English pronunciation: )J. C. Wells: Longman Pronunciation Dictionary, 3rd ed., for both British and American English, or New China News Agency, is the official state news agency of the People's Republic of China. Xinhua ...
, since September 2003, the Public Security department of China has recorded 96% of the population information of mainland China into the database. In other words, the information of 1.25 billion out of 1.3 billion people has recorded in the information database of the Public Security department of China. Within three years, phase I project has finished the first-level, second-level, and the third-level backbone network and access network. This network has covered public security organs at all levels. The grass-roots teams of public security organs have accessed to the backbone network with the coverage rate 90%, that is to say, every 100 police officers have 40 computers connected to the network of the phase I project. The Ministry of Public Security of the People's Republic of China said that the phase I project had significantly enhanced the combat effectiveness of public security. Members participated in the phase I project include
Tsinghua University Tsinghua University (; abbr. THU) is a national public research university in Beijing, China. The university is funded by the Ministry of Education. The university is a member of the C9 League, Double First Class University Plan, Projec ...
from China, and some high-tech companies from the United States of America, the United Kingdom, Israel, etc.
Cisco Systems Cisco Systems, Inc., commonly known as Cisco, is an American-based multinational digital communications technology conglomerate corporation headquartered in San Jose, California. Cisco develops, manufactures, and sells networking hardware, ...
from the United States of America has provided massive hardware devices for this project, and therefore was criticized by some members of the
United States Congress The United States Congress is the legislature of the federal government of the United States. It is Bicameralism, bicameral, composed of a lower body, the United States House of Representatives, House of Representatives, and an upper body, ...
. According to
China Central Television China Central Television (CCTV) is a Chinese state- and political party-owned broadcaster controlled by the Chinese Communist Party (CCP). Its 50 different channels broadcast a variety of programing to more than one billion viewers in six lan ...
, phase I cost 6.4 billion yuan. On 6 December 2002, there came the "2002 China Large Institutions Informationization Exhibition", 300 leaders from the Ministry of Public Security of the People's Republic of China and from other
public security bureau A Public Security Bureau (PSB) () of a city or county, or Public Security Department (PSD) () of a province or autonomous region, in the People's Republic of China refers to a government office essentially acting as a police station or a local ...
s of 31 provinces or municipalities attended the exhibition. There were many western high-tech products, including network security, video surveillance and face recognition. It was estimated that about 30000 police officers have been employed to maintain the system. There was a multi-level system to track netizens violating the provisions. Netizens who want to use the internet in a cybercafé are required to show their Resident Identity Cards. If some violating event happened, the owner of the cybercafé can send the personal information to the police through the internet. It is called a public security automation system, but it is actually an integrated, multi-layered, internet blocking and monitoring system, involving the technical, administrative, public security, national security, publicity, etc. The features are known as: readable, listenable, and thinkable.


Phase II

The phase II project started in 2006. The main task was to enhance the terminal construction, and the public security business application system, trying to informatize of the public security work. The period was two years. Based on the phase I project, phase II project expanded the information application types of public security business, and informationized further public security information. The key points of this project included application system construction, system integration, the expansion of information centre, and information construction in central and western provinces. The system of was planning to strengthen the integration, to share and analysis of information. It would greatly enhance the information for the public security work support.


Censored content

Mainland Chinese Internet censorship programs have censored Web sites that include (among other things): * Web sites belonging to "outlawed" or suppressed groups, such as pro-democracy activists and Falun Gong. * News sources that often cover topics that are considered defamatory against China, such as
police brutality Police brutality is the excessive and unwarranted use of force by law enforcement against an individual or a group. It is an extreme form of police misconduct and is a civil rights violation. Police brutality includes, but is not limited to ...
,
Tiananmen Square protests of 1989 The Tiananmen Square protests, known in Chinese as the June Fourth Incident (), were student-led demonstrations held in Tiananmen Square, Beijing during 1989. In what is known as the Tiananmen Square Massacre, or in Chinese the June Fourth ...
,
freedom of speech Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The right to freedom of expression has been recogni ...
,
democracy Democracy (From grc, δημοκρατία, dēmokratía, ''dēmos'' 'people' and ''kratos'' 'rule') is a form of government in which the people have the authority to deliberate and decide legislation (" direct democracy"), or to choose g ...
sites. These sites include
Voice of America Voice of America (VOA or VoA) is the State media, state-owned news network and International broadcasting, international radio broadcaster of the United States, United States of America. It is the largest and oldest U.S.-funded international br ...
and the Chinese edition of
BBC News BBC News is an operational business division of the British Broadcasting Corporation (BBC) responsible for the gathering and broadcasting of news and current affairs in the UK and around the world. The department is the world's largest broadc ...
. * Sites related to the
Taiwan Taiwan, officially the Republic of China (ROC), is a country in East Asia, at the junction of the East and South China Seas in the northwestern Pacific Ocean, with the People's Republic of China (PRC) to the northwest, Japan to the no ...
ese government, media, or other organizations, including sites dedicated to religious content, and most large Taiwanese community websites or
blog A blog (a Clipping (morphology), truncation of "weblog") is a discussion or informational website published on the World Wide Web consisting of discrete, often informal diary-style text entries (posts). Posts are typically displayed in Reverse ...
s. * Web sites that contain anything the Chinese authorities regard as
obscenity An obscenity is any utterance or act that strongly offends the prevalent morality of the time. It is derived from the Latin ''obscēnus'', ''obscaenus'', "boding ill; disgusting; indecent", of uncertain etymology. Such loaded language can be us ...
or
pornography Pornography (often shortened to porn or porno) is the portrayal of sexual subject matter for the exclusive purpose of sexual arousal. Primarily intended for adults,
. * Web sites relating to
criminal In ordinary language, a crime is an unlawful act punishable by a state or other authority. The term ''crime'' does not, in modern criminal law, have any simple and universally accepted definition,Farmer, Lindsay: "Crime, definitions of", in C ...
activity. * Sites linked with the
Dalai Lama Dalai Lama (, ; ) is a title given by the Tibetan people to the foremost spiritual leader of the Gelug or "Yellow Hat" school of Tibetan Buddhism, the newest and most dominant of the four major schools of Tibetan Buddhism. The 14th and current D ...
, his teachings or the
International Tibet Independence Movement The International Tibet Independence Movement (ITIM) is a non-profit organization, founded on 18 March 1995, that supports Tibetan independence from the People's Republic of China: :"only independence for Tibet can ensure the survival of the T ...
. * Most blogging sites experience frequent or permanent outages. * Web sites deemed as subversive. Blocked web sites are indexed to a lesser degree, if at all, by some Chinese
search engines A search engine is a software system designed to carry out web searches. They search the World Wide Web in a systematic way for particular information specified in a textual web search query. The search results are generally presented in ...
. This sometimes has considerable impact on search results. According to ''
The New York Times ''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid ...
'',
Google Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
has set up computer systems inside China that try to access Web sites outside the country. If a site is inaccessible, then it is added to Google China's blacklist. However, once unblocked, the Web sites will be reindexed. Referring to Google's first-hand experience of the great firewall, there is some hope in the international community that it will reveal some of its secrets. Simon Davies, founder of London-based pressure group
Privacy International Privacy International (PI) is a UK-based registered charity that defends and promotes the right to privacy across the world. First formed in 1990, registered as a non-profit company in 2002 and as a charity in 2012, PI is based in London. Its ...
, is now challenging Google to reveal the technology it once used at China's behest. "That way, we can understand the nature of the beast and, perhaps, develop circumvention measures so there can be an opening up of communications." "That would be a dossier of extraordinary importance to human rights," Davies says. Google has yet to respond to his call.


Bypass techniques

Because the Great Firewall blocks destination IP addresses and domain names and inspects the data being sent or received, a basic censorship circumvention strategy is to use proxy nodes and encrypt the data. Most circumvention tools combine these two mechanisms."Splinternet Behind the Great Firewall of China: The Fight Against GFW"
Daniel Anderson, ''Queue'', Association for Computing Machinery (ACM), Vol. 10, No. 11 (29 November 2012), doi:10.1145/2390756.2405036. Retrieved 11 October 2013.
*
Proxy server In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. Instead of connecting directly to a server that can fulfill a reques ...
s outside China can be used, although using just a simple open proxy (HTTP or SOCKS) without also using an encrypted tunnel (such as HTTPS) does little to circumvent the sophisticated censors. * Companies can establish regional Web sites within China. This prevents their content from going through the Great Firewall of China; however, it requires companies to apply for local ICP licenses. *
Onion routing Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion. The encrypted data is transmitted through a series of net ...
and Garlic routing, such as
I2P The Invisible Internet Project (I2P) is an anonymous network layer (implemented as a mix network) that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's traffic (by using ...
or Tor, can be used. *
Freegate Freegate is a software application developed by Dynamic Internet Technology (DIT) that enables internet users from mainland China, South Korea , North Korea, Syria, Vietnam, Iran, United Arab Emirates, Germany, New Zealand, Australia, and the Uni ...
, Ultrasurf, and Psiphon are free programs that circumvent the China firewall using multiple
open proxies An open proxy is a type of proxy server that is accessible by any Internet user. Generally, a proxy server only allows users ''within a network group'' (i.e. a closed proxy) to store and forward Internet services such as DNS or web pages to ...
, but still behave as though the user is in China. * VPNs (virtual private network) and SSH (secure shell) are the powerful and stable tools for bypassing surveillance technologies. They use the same basic approaches, proxies and encrypted channels, used by other circumvention tools, but depend on a private host, a virtual host, or an account outside of China, rather than open, free proxies. * Open application programming interface (API) used by Twitter which enables to post and retrieve tweets on sites other than Twitter. "The idea is that coders elsewhere get to Twitter, and offer up feeds at their own URLs—which the government has to chase down one by one." says Jonathan Zittrain, co-director of Harvard's Berkman Klein Center for Internet & Society. * Reconfiguration at the end points of communication, encryption, discarding reset packets according to the TTL value (time to live) by distinguishing those resets generated by the Firewall and those made by end user, not routing any further packets to sites that have triggered blocking behavior.


Exporting technology

Reporters Without Borders Reporters Without Borders (RWB; french: Reporters sans frontières; RSF) is an international non-profit and non-governmental organization with the stated aim of safeguarding the right to freedom of information. It describes its advocacy as found ...
suspects that countries such as
Cuba Cuba ( , ), officially the Republic of Cuba ( es, República de Cuba, links=no ), is an island country comprising the island of Cuba, as well as Isla de la Juventud and several minor archipelagos. Cuba is located where the northern Caribb ...
,
Vietnam Vietnam or Viet Nam ( vi, Việt Nam, ), officially the Socialist Republic of Vietnam,., group="n" is a country in Southeast Asia, at the eastern edge of mainland Southeast Asia, with an area of and population of 96 million, making ...
,
Zimbabwe Zimbabwe (), officially the Republic of Zimbabwe, is a landlocked country located in Southeast Africa, between the Zambezi and Limpopo Rivers, bordered by South Africa to the south, Botswana to the south-west, Zambia to the north, and ...
and
Belarus Belarus,, , ; alternatively and formerly known as Byelorussia (from Russian ). officially the Republic of Belarus,; rus, Республика Беларусь, Respublika Belarus. is a landlocked country in Eastern Europe. It is bordered by ...
have obtained surveillance technology from China although the censorships in these countries are not much in comparison to China.


Differences from the Great Firewall

The Golden Shield Project is distinct from the Great Firewall (GFW), which has a different mission. The differences are listed below: Politically, # The GFW is a tool for the propaganda system, whereas the Golden Shield Project is a tool for the public security system. # The original requirements of the GFW are from the 610 office, whereas the original requirements of the Golden Shield Project are from the public security department. # The GFW is a national gateway for filtering foreign websites, whereas the Golden Shield Project is for monitoring the domestic internet. Technically, # The GFW is attached to the three national internet exchange centres, and then spread to some of the
ISP An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise private ...
s to implement the blocking effect, whereas the Golden Shield Project stations in the most exchange centres and data centres. # The GFW is very powerful in scientific research, including many information security scientists, such as people from
Harbin Institute of Technology Harbin Institute of Technology (; abbreviation: HIT or ) is a public research university and a member of China's elite C9 League and a member of the University Alliance of the Silk Road. HIT is a Chinese Ministry of Education Class A Dou ...
,
Chinese Academy of Sciences The Chinese Academy of Sciences (CAS); ), known by Academia Sinica in English until the 1980s, is the national academy of the People's Republic of China for natural sciences. It has historical origins in the Academia Sinica during the Republi ...
, and
Beijing University of Posts and Telecommunications The Beijing University of Posts and Telecommunications (BUPT) () is a key national university distinguished by the teaching and research in the field of cable communications, wireless communications, computer, and electronic engineering. BUP ...
, whereas the Golden Shield Project is less powerful in scientific research. # The GFW is built by
Fang Binxing Fang Binxing is a former Principal of Beijing University of Posts and Telecommunications. He is also known for his substantial contribution to China's Internet censorship infrastructure, and has been dubbed "Father of China's Great Fire Wa ...
, whereas the Golden Shield Project is built by Shen Changxiang.


See also

* Blocking of Wikipedia by China * Censorship in China *
Cypher Cypher is an alternative spelling for cipher. Cypher may also refer to: Arts and entertainment * Cypher (French Group), a Goa trance music group * Cypher (band), an Australian instrumental band * ''Cypher'' (film), a 2002 film * ''Cypher'' ...
*
Green Dam Youth Escort Green Dam Youth Escort () is content-control software for Windows developed in the People's Republic of China (PRC) which, under a directive from the Ministry of Industry and Information Technology (MIIT), was to take effect on 1 July 2009, as ...
*
Human rights in China Human rights in mainland China are periodically reviewed by the United Nations Human Rights Committee (UNHRC), on which the Chinese Communist Party (CCP), government of the People's Republic of China (PRC) and various foreign governments and ...
*
International Freedom of Expression Exchange IFEX, formerly International Freedom of Expression Exchange, is a global network of 124 independent non-governmental organisations that work at a local, national, regional, or international level to defend and promote freedom of expression as a ...
– monitor
Internet censorship in China
*
Internet censorship in the People's Republic of China Internet censorship in the People's Republic of China (PRC) affects both publishing and viewing online material. Many controversial events are censored from news coverage, preventing many Chinese citizens from knowing about the actions of th ...
* Internet in China * List of government surveillance projects * Media of China *
Politics of China The People's Republic of China is run by a single party, the Chinese Communist Party (CCP), headed by the CCP General Secretary who tends to be the paramount leader of China. China is among few contemporary party-led dictatorships to not hold ...
*
Splinternet The splinternet (also referred to as cyber-balkanization or internet balkanization) is a characterization of the Internet as splintering and dividing due to various factors, such as technology, commerce, politics, nationalism, religion, and diver ...
* '' Who Controls the Internet?''


Notes


References


External links


China Digital Times: Internet ControlBreaking Through the "Golden Shield"ViewDNS.info - Chinese Firewall Test
- Tests if Golden Shield is performing DNS filtering/redirection on your domain within mainland China.

{{DEFAULTSORT:Great Firewall of China Internet censorship in China 1998 establishments in China 2003 establishments in China