{"id":204173,"date":"2017-07-08T03:44:00","date_gmt":"2017-07-08T07:44:00","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/chinas-newest-censorship-methods-on-display-the-diplomat\/"},"modified":"2017-07-08T03:44:00","modified_gmt":"2017-07-08T07:44:00","slug":"chinas-newest-censorship-methods-on-display-the-diplomat","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/censorship\/chinas-newest-censorship-methods-on-display-the-diplomat\/","title":{"rendered":"China&#8217;s Newest Censorship Methods on Display &#8211; The Diplomat"},"content":{"rendered":"<p><p>    July, more than most other months, is loaded with politically    sensitive anniversaries that keep Communist Party of China    (CPC) censors and security forces on their toes.  <\/p>\n<p>    First comes the July 1 anniversary of Hong Kongs transfer from    British to Chinese rule. Then there is July 5, marking the 2009    ethnic violence in the Xinjiang region that sparked an    unprecedented crackdown on its mostly Muslim Uyghur population.    The very next day, July 6, is the Dalai Lamas birthday,    andJuly 9is    the second anniversary of a sweeping repressive action against    Chinas human rights lawyers.Finally there    isJuly 20, the    date in 1999 when the CPC banned the popular spiritual practice    Falun Gong and began a massive  and often violent  campaign    to eradicate it.  <\/p>\n<p>    This year, the anniversaries overlap with other news stories    that Beijing likely wants to quash, including an international    uproar surrounding democracy activistLiu    Xiaobos belated release on medical parole with terminal    cancer, and a campaign by exiled tycoonGuo    Wenguito publicize corruption allegations involving    top Chinese leaders.  <\/p>\n<p>    It is not surprising in these circumstances that the CPC    hastightened    information controls. But the party has not simply    intensified its efforts in the short term. It has also    gradually adapted its methods to a changing technological    environment, one in which mobile phones, social media    applications, and digital surveillance are critical features.  <\/p>\n<p>    The result is a new level of intrusiveness and sophistication,    as well as danger for populations that are already at risk of    severe human rights violations.  <\/p>\n<p>    Cutting off Access to Circumvention Tools  <\/p>\n<p>    One of the escalating restrictions that may have the widest    reach is a crackdown on virtual private networks (VPNs), which    allow users to bypass official censorship. Several VPN    applications have beendisabledor    removed fromonline    storessince July 1. In a June 22 message to    customers,prominent    VPN provider Greensaid that after receiving a notice    from the higher authorities, it planned to cease operations on    July 1, causing a ripple of conversations on social media about    what circumvention tools could still be used. The latest    initiative builds onincreasing    official effortsto stop the dissemination of such    tools, including some that the authorities had long tolerated.  <\/p>\n<p>    The applications removal will have the secondary effect of    cutting off software updates for users, leaving their devices    more vulnerable to hacking. And while many use VPNs to access    uncensored news or blocked social media sites like Facebook and    Twitter, the tools are also used for security purposes, to    protect businesses and activists from pervasive state    surveillance.  <\/p>\n<p>    Inspecting the Personal Communications of    Minorities  <\/p>\n<p>    Other recent controls have focused on ethnic and religious    minorities. In Xinjiang, authorities in a district of the    regional capitalUrumqiissued    a notice on June 27 instructing all residents and business    owners to submit their personal ID cards, cell phones,    external drives, portable hard drives, notebook computers, and    media storage cards to the local police post for registration    and scanning byAugust    1. One district employee toldRadio    Free Asiathat the campaign was taking place    throughout the city. The goal is ostensibly to identify and    purge any terrorist videos, but the action violates the    privacy rights of Urumqis three million residents and exposes    them to punishment for a host of other possible offenses,    including those related to peaceful religious or political    expression.  <\/p>\n<p>    In Tibet, the instant-messaging application WeChat has become    increasingly popular in recent years, as it has across China.    But using it to communicate about the Dalai Lama or his    birthday is difficult and dangerous. A test conducted in    January by the Canada-based Citizen Lab found that the Tibetan    spelling for Dalai    Lama was automatically deleted in WeChat messages.    Meanwhile, at leasttwo    Tibetansare known to have been jailed for    participating in a WeChat group commemorating the spiritual    leaders 80th birthday in 2015. After a new spate of    self-immolation protests took place in early 2017, Tibetans in    Sichuan Province report that police aremonitoring    communicationon the platform more closely and    detaining those suspected of sharing information about    self-immolations with overseas contacts.  <\/p>\n<p>    New Tactics and New Targets  <\/p>\n<p>    These developments reflect a broader trend identified in a    recentFreedom    House reporton religion in China. The study found    that Chinese government tactics of religious control and    persecution have been changing to incorporate new technologies    and match the evolving communication habits of the public. Even    in the absence of sensitive anniversaries, various modes of    electronic surveillance have expanded dramatically at sites of    worship and public spaces frequented by religious believers.  <\/p>\n<p>    The CPCs information controls also appear to be spreading to    traditionally less persecuted groups, like state-sanctioned    churches and non-Uyghur residents of Xinjiang. Since March,    authorities inZhejianghave    reportedly been implementing a campaign to    installsurveillance    cameras in churches and possibly Buddhist temples, in some    cases sparking altercations with police and violence against    congregants. In Urumqi, the order to turn in digital devices    forinspectionapplies    to ethnic Han and Kazakh residents as well as Uyghurs, while    localKazakhshave    reported increased monitoring and some prosecutions related to    expressions of their Muslim faith in recent months.  <\/p>\n<p>    The Information Arms Race  <\/p>\n<p>    The Chinese governments actions are partly a response to    creative initiatives by minority activists to share their    stories and perspectives in a heavily restrictive information    environment.  <\/p>\n<p>    It is a nonstop game of cat-and-mouse, journalist Nithin Coca    wrote in a June 27articleabout    Chinas high-tech war on Tibetan communication. As the Tibet    movements digital-security abilities and training improve, the    Chinese government implements more sophisticated hacking    techniques.  <\/p>\n<p>    Similarly, asFalun    Gongpractitioners devise new means of disseminating    information to debunk vilifying state propaganda and expose    abuses they have suffered, security forces have adapted by    increasing electronic surveillance and deploying geolocation    technology to find and arrest them. Local authorities in places    likeJiangsu    provincehave also upgraded anti-Falun Gong propaganda    efforts, deploying LED rolling screens, cartoons, microblogs,    and QQ messaging  including in schools  last month to    demonize Falun Gong and other banned religious groups.  <\/p>\n<p>    A Vicious Circle  <\/p>\n<p>    The result of the escalating controls is that there are even    fewer avenues for persecuted groups and individuals to defend    themselves, offer alternatives to the party line, or expose    violence committed by officials. Meanwhile, other Chinese    interested in knowing more about these and other censored    topics find it increasingly difficult  and risky  to obtain    information.  <\/p>\n<p>    There is also a cost to the CPC. Such aggressive stability    maintenance methods ultimately increase tensions with key    populations, intensify resentment of the partys heavy-handed    rule, and inspire anti-government activism and even violence,    including among otherwise apolitical citizens.  <\/p>\n<p>    From that perspective, while the CPCs efforts may successfully    silence some critics this year, party leaders may face an even    more daunting challenge next July.  <\/p>\n<p>    Sarah Cook is a senior research analyst for East Asia at    Freedom House, director of itsChina    Media Bulletin,and author    ofThe    Battle for Chinas Spirit: Religious Revival, Repression, and    Resistance under Xi Jinping.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/thediplomat.com\/2017\/07\/chinas-newest-censorship-methods-on-display\/\" title=\"China's Newest Censorship Methods on Display - The Diplomat\">China's Newest Censorship Methods on Display - The Diplomat<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> July, more than most other months, is loaded with politically sensitive anniversaries that keep Communist Party of China (CPC) censors and security forces on their toes. First comes the July 1 anniversary of Hong Kongs transfer from British to Chinese rule.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/censorship\/chinas-newest-censorship-methods-on-display-the-diplomat\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[],"class_list":["post-204173","post","type-post","status-publish","format-standard","hentry","category-censorship"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/204173"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=204173"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/204173\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=204173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=204173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=204173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}