Organized by AU Data Lab: http://datalab.au.dk/currently/events/show/artikel/come-join-us-for-the-first-lunch-talk-in-2017/
Abstract: As part of the Great Firewall of China, the Golden Shield Project, a massive surveillance and censoring system was initiated in the 1990s in China. The recent initiative of China’s social-credit system will assign a ‘social credit’ rating to every citizen based on their professions, social behaviors, online shopping habits and many others. This credit scoring system will collect data points through running algorithms and analyzing big data, which is connected to the entire rewards and punishment system. This presentation will discuss the Golden Shield Project and its relation to the latest social credit system. Few artistic and journalistic digital projects will be presented to examine how creativity could emerge from and through this highly controlled digital environment and how citizens may work against the internet censorship.
Digital Surveillance in China: From the Great Firewall to the Social Credit System
1. Digital Surveillance in China: From the
Great Firewall to the social credit system
Winnie Soon | 24.Jan.2017
Aarhus University
www.siusoon.net
2. Research perspective as a Hong Kongese…
https://www.facebook.com/localstudiohongkong/posts/911512712220379?utm_source=DesignTAXI&utm_medium=DesignTAXI&utm_term=DesignTAXI&utm_content=Desi
gnTAXI&utm_campaign=DesignTAXI
6. Michel de Certeau (1984)
The Practice of Everyday Life
[A] tactic is determined by the absence of power just
as a strategy is organized by the postulation of
power.
(De Certeau, 1984, p. 38. Italics in original)
7. Strategies are operations:
- Defining how things work/operate (such as law, policy, firewall
creation)
- Regarding Internet as an institutional space of authority
- Allowing work to build upon previous work (De Certeau, 1984, p.
xix)
Tactics are resistance acts:
- Resistance stems from daily life practice
- Tactics are improvisational and opportunistic (De Certeau, 1984,
p. xix)
- Tactical practices operate within “the space of the other” (De
Certeau, 1984, p. xix)
- Creative consumption
- “A tactic is an art of the weak” (De Certeau, 1984, p. 37).
8. China’s state law - 1996
Measures on the Regulation of Public
Computer Networks and the Internet
Article 10:
…No unit or individual may use the Internet
to retrieve, replicate, create, or transmit
information that harms national security,
threatens social stability ….
Strategies…
China’s state law - 1996
Temporary Regulations Governing Computer
Information Networks and the Internet
No. 195:
The State is in charge of overall planning,
national standardization, graded control, and
the development of all areas related to the
Internet.
... No group or individual may establish or
utilize any other means to gain Internet
access.
9. The Golden Shield Project (2003 – present)
Operated by the Ministry of Public Security
Controlling the flow of information through a censorship system, including:
• IP blocking
• DNS Filtering and Redirection
• URL and Packet Filtering
• VPN/SSH Traffic Recognition
• Speech and Face recognition
Strategies…
10. China Channel, 2008 | by Aram Bartholl, Evan Roth and Tobias Leingruber
[Browser add-on]
Tactics…
11. CANNOT (2010) by Winnie Soon
[5x Digital prints with screen shots]
Tactics…
12. Hundred degree can not search
your thirty degree smile, 2016 by
Miao Ying
LAN Love Poem-Holding a kitchen
knife cut internet cable, a road with
lightning sparks, 2014 by Miao Ying
Flowers all fallen, Birds far gone,
2015 by Miao Ying
LAN Love Poem-To be Missed is
Another kind of Beauty, 2014 by
Miao Ying
>> Interview with Ying Miao: https://vimeo.com/162455923
Tactics…
13. The Golden Shield Project (2003- present)
Operated by the Ministry of Public Security
It is more than a mere technological project:
- Not only to control the access of ‘foreign’ information
- But also discover the need to censor local contents (user generated
content) e.g P2P and internal/local servers
Strategies…
14. The Golden Shield Project (2003- present)
Operated by the Ministry of Public Security
It is more than a mere technological project:
- Not only to control the access of ‘foreign’ information
- But also discover the need to censor local contents (user generated
content) e.g P2P and internal/local servers
> 50-cent party members to influence Internet discussion
> A culture of self-censorship (from individuals to companies)
> Internet policing (estimated to contain over 200,000 workers)
Strategies…
18. Tactics are procedures that gain validity in relation to the pertinence
they lend to time-to the circumstances which the precise instant of an
intervention transforms into a favorable situation, to the rapidity of
the movements that change the organization of a space, to the
relations among successive moments in actions, to the possible
intersections of durations and heterogeneous rhythms, etc.
(De Certeau, 1984, p. 38)
25. Social Credit System
(2020)
“construct a social credit environment of sincerity, self-
discipline, trust-keeping and mutual trust.”
(State Council, 2014)
26. Social Credit System
(2020)
Basic info:
Official announcement: 2014
Target implementation: 2020
Citizen: 1.3 billion+
Identification: credit/citizen score (based on id number)
Coverage: Individual, companies and institutions
(*sectoral credit information systems)
Scope of the system:
Politics, Business, Society, Justice
Consequences:
Rewards: incentivise trust-keeping (*rewards for reporting
individuals)
Punishment: punish trust-breaking (*establish blacklist
systems, market withdrawal mechanisms, policy support,
administrative approval, public service market access etc)
27. Black Mirror: Nose Dive
https://www.youtube.com/watch?v=fgLYHM6evt8&t=34m20s
28. Key insights:
- Tactics are resistance acts, emerging from every day practice and
accompanying by the asymmetrical balance of power.
- Tactics are targeted, capturing the opportunistic time/space.
- An urgency to develop an archive of tactical practices (in relation to
digital surveillance in China).
29. Ref:
• Planning Outline for the Construction of a Social Credit System (2014-
2020):https://chinacopyrightandmedia.wordpress.com/2014/06/14/planning-outline-for-the-
construction-of-a-social-credit-system-2014-2020/
• Government Requests Report (Facebook): https://govtrequests.facebook.com/
• State Council releases guidelines on establishing individual credit system:
http://english.gov.cn/policies/latest_releases/2016/12/30/content_281475528903041.htm
• A brief history of China’s campaign to enforce real-name registration online:
https://www.techinasia.com/history-chinas-campaign-enforce-realname-registration-online
• Annual Report on the Development of China’s Special Economic Zone (2016)
• Measurers on the regulation of public computer networks and the Internet (1996):
http://www.asianlii.org/cn/legis/cen/laws/motropcnati718/
• A history of Google in China: http://www.ft.com/cms/s/0/faf86fbc-0009-11df-8626-
00144feabdc0.html?ft_site=falcon#axzz4VwNKKQR5
• Miao Ying: http://rhizome.org/editorial/2015/jul/08/artist-profile-miao-ying/
• Background of Jun fourth: https://botanwang.com/node/10883
• China’s Golden Shield: Is Cisco Systems Complicit?
http://cyberlaw.stanford.edu/blog/2015/03/china%E2%80%99s-golden-shield-cisco-
systems-complicit
• China Imposes Broad New Restrictions on Publication of Internet Content:
http://www.lexology.com/library/detail.aspx?g=fa85e3a8-21d4-445c-85bb-2d7b66b57262
• China’s Censorship 2.0: How companies censor bloggers by Rebecca Mackinnon
http://firstmonday.org/article/view/2378/2089
• 工业和信息化部关于清理规范互联网网络接入服务市场的通知:
http://www.miit.gov.cn/n1146295/n1652858/n1652930/n3757020/c5471946/content.html
35. Social Credit System
(2014-2020)
“All levels’ People’s Governments must first and foremost
strengthen their own sincerity construction, and drive the
establishment of an sincerity consciousness in all of society
and an increase in the levels of sincerity through honest
governing by governments. Take the lead in using credit
information and credit products in administrative
permission, government procurement, tendering and
budding, labour and employment, social security, scientific
research management, cadre promotion and appointment,
management and supervision, application for government
financial support and other such areas, and foster the
development of a credit services market.” (State Council
Notice, 2014)
Strategies…
36. Social Credit System
(2014-2020)
“When people's behavior isn't bound by their morality, a
system must be used to restrict their actions”
- Chinese Academy of Social Science, 2015
“Especially given the speed of the digital economy it is
crucial that people can quickly verify each other’s
creditworthiness. The behavior of the majority is
determined by their world of thoughts. A person who
believes in socialist core values, is behaving more decent.”
- Professor Wang Shuqin, 2015
“It is clearly an attempt to create a new citizen”
-Researcher Rogier Creemers, 2015
Strategies…
37. Recording the individual credit records
Improving individual information security
Promoting sharing of individual credit information
Perfecting the incentive and punishment mechanisms
of individual credit (e.g joint punishment)
Guidelines of the social credit system (2016)
http://english.gov.cn/policies/latest_releases/2016/12/30/content_281475528903041.htm
http://www.chinalawtranslate.com/creditmechanisms/?lang=en
Notas del editor
Regard as a autonomous region and operate largely independently of China, having its own passport, flag, currency, law system and official language. Hong Kong as part of China but having “One Country two systems”.
Rule of man over rule of law, highly centralized system and the political system is dominated by CCP
A lot of the rules and systems follow Great Britian. For example, traffic/driving system, education system, government organization and law. I grew up under this highly westernized environment, but also I witness the return of Hong Kong to China in 1997, as well as still being sensitive to the post-handover environment in Hong Kong such as the how the two-system work/not work, shrinking freedom, facing increasing pressure from China.
Before 1956 / 1964 (using the same traditonal chinese characters) – the cultural revolution
Pictorial Chinese characters chinese symbols were based on pictographs ..later then incorporate elements like phenetics, abstract concepts
Several thousands commonly used chinese characters
Introduced by People republic of china, iIN 1954 PROMOTES mass literacy introduce simplified chinese character
Simplified means: simplier brushstrokes, a smaller collection of symbols
Having this concept is important when we talk about some of the works that sneak around internet censorship.
As the most general and basic level: You cannot access some of the websites in China such as Facebook and Google. Sensitive keywords will be censored in Social Media. Surveillance is highly centralized but executed in a very distributed manner – which means all the media companies and institutions need to comply with the standard in China.
Rencently (just last year), according to current and former Facebook s employees, there is a development on going which is to create censorship tool to enter China. comply with government requests
I know the social credit system is a topic that get many people excited on how it is being implemented, the details, and the potential consequences. It is still unfolding..the focus of this talk is not the social credit and it is more to give you a background of the surveillance culture in china.
Hainan should be taken as the demonstration zone for the construction of a national social credit system
Using the concept of strategy and tactics -> examine power and control. Strategy persumes control, tactics as the puriview of non-powerful. As an adaptation of environment which has been created by the strategies of the powerful.
Control is never perfect , the strategy construction is always changing
VPN: new government tool can learn, discover and block traffic going through VPNs. Cut off business as well
A strategy… postulates a place that can be delimited as its own and serve as the base from which relations with an exteriority composed of targets or threats can be managed.
(De Certeau, 1984, pp. 35-36)
- “home setting” as a representational space
Error space (page error) becomes an aesthetic language of representation.
End- 1: 25
Since our daily lives play out within spaces of economic, social, political, and institutional control, de Certeau sees tactical practices as an integral part of our everyday existence, and important operations of agency (de Certeau 1984, xiv-xv).
- What maes its so successful is not only its complex technology but also the culture that the system engenders – a culture of self censorship
- What maes its so successful is not only its complex technology but also the culture that the system engenders – a culture of self censorship
Specific to content
Lines of text, drawn from a variety of China media sources scans across the screen and scrolls upwards
A word is blacked out , hidden from us
Human mind creates narrative where there is none.
>> Playfully reconfigure space by laying the blocks on certain texts.
Focus on time…the speed of spreading and sensorship
What I am going to show you next is how De Certeau describes as tactics that are related to time, the successive moments in actions
It is an important incident not only because of many students were being killed.
This event has become a censorship bar from the ways how Hong Kongese looked at.
Whenever there is elections, we will ask the politicians on how they think about Tiananmen Square
Umbrella movement (2014), a fear whether government would send PLA (People Liberation Army) tanks again
fear: we can still hold Tiananmen Memorial Events in Hong Kong
Also an indicator It becomes a measurement for us, a measurement for the freedom of expression
Plays with the chinese character which has a pictorial root, in which the author only pick up the characters that look like the tank and the man. It is not necessarily related to the meaning (semantics) of the text
Some of the tactical approach, citizen chooses to augment the characters. Instead of getting the semantics of the text, they play with the image of the text.
Control is never perfect , the strategy construction is always changing. The entire surveillance system has learn and adapt.
We are trying to understand how strategies and tactics are played out / negotiated in the digital surveillance of China.
Strategy and Tactics
“Focus on the areas of industry and commerce, tax payment, pricing, import and export, production safety, product quality, environmental protection, food and drugs, medicine and healthcare, intellectual property rights, logistical services, project construction, e-commerce, traffic and transportation, contract fulfilment, human resources, social security, education and research, and perfect sectoral credit record and employee credit files.”
- Extension of space
---------
Announcement: notice to all provincial, autonomous region and
Called “The Planning outline for the construction of a Social Credit System (2014-2020)” -> for public circulation
“Focus on the areas of industry and commerce, tax payment, pricing, import and export, production safety, product quality, environmental protection, food and drugs, medicine and healthcare, intellectual property rights, logistical services, project construction, e-commerce, traffic and transportation, contract fulfilment, human resources, social security, education and research, and perfect sectoral credit record and employee credit files.”
The earliest written Chinese symbols were based on pictographs, where the characters highly resembled their denoted meanings. Such was the case for oracle bone script (甲骨文 jiǎgǔwén). As time wore on, the Chinese writing system developed and began incorporating elements like phonetics, abstract concepts, and radicals. Eventually it evolved into a logographic system, words represented by symbols.
IN chinese, we have over 50,000 characters ..to able to read a newspaper, it is about 3000
In 2013, Jason Ng wrote the book about sensitive and censored text text
Research Fellow at the University of Toronto's Citizen Lab
Interested in internet censorship and digital activism
Background:
Popular chinese Twitter-like microblogging site Sina Weibo (2009) facebook + Twitter | 2015 requires real name registration
Over 212 million active users (2015)
Weibo credit is a user credit system -> safeguard a good atmosphere within in the Weibo community
Reports of untrue information, invasions of privacy, personal attacks, plagiarized content, harassment of others
Punishment: no featured post, cannot being follow, other cannot forward your post, cannot post…> deleted account
Credit caculation: credit score = starting credit points + reward points – credit deductions
Logic: credit recovery system from low credit points after a certain period of time
tie an ID card or mobile phone number to their accounts before they were allowed to post (2012)
(ref: http://blog.sina.com.cn/s/blog_e5309e110102v3py.html)
Background:
popular third-party payment app with over 350 million users
First system in china to incorporate online and offline data to generate credit scores
Operate independently from the government’s social credit system
5 categories:
1/ purchases (volume, price – not content ) from Alibab’s Tmall and Taobao ecommerce platforms
2/ household status (job/income)
3 + 4 / timely payment on bills and credit cards
5/ friends around (quantity)
Jobbies and friends ..> if friends have a poor lending reputation, this reflects badly on the person
Starting from 2015, people shares their credit scores on social media
Announcement: notice to all provincial, autonomous region and
Called “The Planning outline for the construction of a Social Credit System (2014-2020)” -> for public circulation
Government driven, highly centralized, and not for profit
It also urged concentrating the registration efforts in key sectors such as food and drugs, work safety, environmental protection, work security and engineering construction. To help ensure that the information is accurate, the main subjects will be lawyers, teachers, civil servants and real estate brokers.
1/ CASS: Affliated with the PRC’s state council, they are helping the develop the model
2/ Wang Shuqin >> working on this new system at Capital Normal University
3/ Creemers, university of oxford
Nationwide level
Promoting socialist core values such as patriotism, respecting the elderly, working hard and avoiding extravagant consumption
1/ information registration in internet, delivery, telecom, financial sectors)
2/ Concentrate on key sectors to ensure the accuracy of information (lawyers, teachers, civil servants, real estate brokers)
Fourth is perfecting the incentive and punishment mechanisms of individual credit. People who have good credit scores would be offered more social conveniences, especially more opportunities in education, employment, and entrepreneurship. Joint punishment such as Limits on engaging in particular industries or projects, Limits on government support or subsidies, Limits on occupational qualifications , Limits on special market transactions, Limits on high spending and related consumption, travelling,