SlideShare una empresa de Scribd logo
1 de 37
Digital Surveillance in China: From the
Great Firewall to the social credit system
Winnie Soon | 24.Jan.2017
Aarhus University
www.siusoon.net
Research perspective as a Hong Kongese…
https://www.facebook.com/localstudiohongkong/posts/911512712220379?utm_source=DesignTAXI&utm_medium=DesignTAXI&utm_term=DesignTAXI&utm_content=Desi
gnTAXI&utm_campaign=DesignTAXI
https://www.facebook.com/localstudiohongkong/posts/911512712220379?utm_source=DesignTAXI&utm_me
dium=DesignTAXI&utm_term=DesignTAXI&utm_content=DesignTAXI&utm_campaign=DesignTAXI
Share a similar language system (the same base Chinese alphabet)…
Digital Surveillance in China
https://www.apc.org/en/node/14821
0
200
400
600
800
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
MILLION
Initiative on
social-credit
system
Internet Penetration in China and key milestones on technological development/related policies
real name
Registration
+ enhanced
VPN blocking
join meeting
about social credits
system at
provincial levelThe term “Great Firewall”
was coined
Initiative on
Golden Shield Project
Golden Shield Project
in operation
Launched
Google.cn
Guidelines on
social-credit
system
Target completion of
social-credit system
Google.cn
redirected
to HK
Online
Publishing
Services Permit
+ ICP licence
Clean up
campaign on
unauthorized
VPN providers
Michel de Certeau (1984)
The Practice of Everyday Life
[A] tactic is determined by the absence of power just
as a strategy is organized by the postulation of
power.
(De Certeau, 1984, p. 38. Italics in original)
Strategies are operations:
- Defining how things work/operate (such as law, policy, firewall
creation)
- Regarding Internet as an institutional space of authority
- Allowing work to build upon previous work (De Certeau, 1984, p.
xix)
Tactics are resistance acts:
- Resistance stems from daily life practice
- Tactics are improvisational and opportunistic (De Certeau, 1984,
p. xix)
- Tactical practices operate within “the space of the other” (De
Certeau, 1984, p. xix)
- Creative consumption
- “A tactic is an art of the weak” (De Certeau, 1984, p. 37).
China’s state law - 1996
Measures on the Regulation of Public
Computer Networks and the Internet
Article 10:
…No unit or individual may use the Internet
to retrieve, replicate, create, or transmit
information that harms national security,
threatens social stability ….
Strategies…
China’s state law - 1996
Temporary Regulations Governing Computer
Information Networks and the Internet
No. 195:
The State is in charge of overall planning,
national standardization, graded control, and
the development of all areas related to the
Internet.
... No group or individual may establish or
utilize any other means to gain Internet
access.
The Golden Shield Project (2003 – present)
Operated by the Ministry of Public Security
Controlling the flow of information through a censorship system, including:
• IP blocking
• DNS Filtering and Redirection
• URL and Packet Filtering
• VPN/SSH Traffic Recognition
• Speech and Face recognition
Strategies…
China Channel, 2008 | by Aram Bartholl, Evan Roth and Tobias Leingruber
[Browser add-on]
Tactics…
CANNOT (2010) by Winnie Soon
[5x Digital prints with screen shots]
Tactics…
Hundred degree can not search
your thirty degree smile, 2016 by
Miao Ying
LAN Love Poem-Holding a kitchen
knife cut internet cable, a road with
lightning sparks, 2014 by Miao Ying
Flowers all fallen, Birds far gone,
2015 by Miao Ying
LAN Love Poem-To be Missed is
Another kind of Beauty, 2014 by
Miao Ying
>> Interview with Ying Miao: https://vimeo.com/162455923
Tactics…
The Golden Shield Project (2003- present)
Operated by the Ministry of Public Security
It is more than a mere technological project:
- Not only to control the access of ‘foreign’ information
- But also discover the need to censor local contents (user generated
content) e.g P2P and internal/local servers
Strategies…
The Golden Shield Project (2003- present)
Operated by the Ministry of Public Security
It is more than a mere technological project:
- Not only to control the access of ‘foreign’ information
- But also discover the need to censor local contents (user generated
content) e.g P2P and internal/local servers
> 50-cent party members to influence Internet discussion
> A culture of self-censorship (from individuals to companies)
> Internet policing (estimated to contain over 200,000 workers)
Strategies…
Strategies…
http://firstmonday.org/article/view/2378/2089
Censored Censorship, 2010 | by Kim Asendorf
[Net Art]
Tactics…
Weiboscope (2011-present) and WeChatscope (under pilot study) by Fu King Wa and his team @ HKU
Tactics…
Tactics are procedures that gain validity in relation to the pertinence
they lend to time-to the circumstances which the precise instant of an
intervention transforms into a favorable situation, to the rapidity of
the movements that change the organization of a space, to the
relations among successive moments in actions, to the possible
intersections of durations and heterogeneous rhythms, etc.
(De Certeau, 1984, p. 38)
Specific event: Tiananmen Square Protest | 1989
Video: https://www.youtube.com/watch?v=CxDd82Myqis
Censored from sina weibo during 2013 - 2014
Tactics…
4.6.2016
Tactics…
//点//
//点//
/点//
/人//
//点//
//点//
/点//
/人//
4.6.2016
Tactics…
占占点
占占人
占点占
6+4 6+4
8的平方 square of eight
viiv viiv (Roman numerals 6 and 4)
65-1 65-1
五四+一个月 May Fourth + one month
https://qz.com/698990/261-ways-to-refer-to-the-tiananmen-square-massacre-in-china/
Strategies…
Sensitive keywords
What will happen soon?
Social Credit System
(2020)
“construct a social credit environment of sincerity, self-
discipline, trust-keeping and mutual trust.”
(State Council, 2014)
Social Credit System
(2020)
Basic info:
Official announcement: 2014
Target implementation: 2020
Citizen: 1.3 billion+
Identification: credit/citizen score (based on id number)
Coverage: Individual, companies and institutions
(*sectoral credit information systems)
Scope of the system:
Politics, Business, Society, Justice
Consequences:
Rewards: incentivise trust-keeping (*rewards for reporting
individuals)
Punishment: punish trust-breaking (*establish blacklist
systems, market withdrawal mechanisms, policy support,
administrative approval, public service market access etc)
Black Mirror: Nose Dive
https://www.youtube.com/watch?v=fgLYHM6evt8&t=34m20s
Key insights:
- Tactics are resistance acts, emerging from every day practice and
accompanying by the asymmetrical balance of power.
- Tactics are targeted, capturing the opportunistic time/space.
- An urgency to develop an archive of tactical practices (in relation to
digital surveillance in China).
Ref:
• Planning Outline for the Construction of a Social Credit System (2014-
2020):https://chinacopyrightandmedia.wordpress.com/2014/06/14/planning-outline-for-the-
construction-of-a-social-credit-system-2014-2020/
• Government Requests Report (Facebook): https://govtrequests.facebook.com/
• State Council releases guidelines on establishing individual credit system:
http://english.gov.cn/policies/latest_releases/2016/12/30/content_281475528903041.htm
• A brief history of China’s campaign to enforce real-name registration online:
https://www.techinasia.com/history-chinas-campaign-enforce-realname-registration-online
• Annual Report on the Development of China’s Special Economic Zone (2016)
• Measurers on the regulation of public computer networks and the Internet (1996):
http://www.asianlii.org/cn/legis/cen/laws/motropcnati718/
• A history of Google in China: http://www.ft.com/cms/s/0/faf86fbc-0009-11df-8626-
00144feabdc0.html?ft_site=falcon#axzz4VwNKKQR5
• Miao Ying: http://rhizome.org/editorial/2015/jul/08/artist-profile-miao-ying/
• Background of Jun fourth: https://botanwang.com/node/10883
• China’s Golden Shield: Is Cisco Systems Complicit?
http://cyberlaw.stanford.edu/blog/2015/03/china%E2%80%99s-golden-shield-cisco-
systems-complicit
• China Imposes Broad New Restrictions on Publication of Internet Content:
http://www.lexology.com/library/detail.aspx?g=fa85e3a8-21d4-445c-85bb-2d7b66b57262
• China’s Censorship 2.0: How companies censor bloggers by Rebecca Mackinnon
http://firstmonday.org/article/view/2378/2089
• 工业和信息化部关于清理规范互联网网络接入服务市场的通知:
http://www.miit.gov.cn/n1146295/n1652858/n1652930/n3757020/c5471946/content.html
Appendix
http://video.eblcu.cn/cls/201103/course/3-1/img/4.jpg
Pictorial Chinese Characters…
People
Tactics…
Weibo Credit
(2011-present)
[Weibo, social media]
Strategies…
Sesame Credit Scores
(2015-present)
[Payment App]
Ant Financial Services Group, an affiliate of the
Chinese Alibaba Group
Strategies…
Social Credit System
(2014-2020)
“All levels’ People’s Governments must first and foremost
strengthen their own sincerity construction, and drive the
establishment of an sincerity consciousness in all of society
and an increase in the levels of sincerity through honest
governing by governments. Take the lead in using credit
information and credit products in administrative
permission, government procurement, tendering and
budding, labour and employment, social security, scientific
research management, cadre promotion and appointment,
management and supervision, application for government
financial support and other such areas, and foster the
development of a credit services market.” (State Council
Notice, 2014)
Strategies…
Social Credit System
(2014-2020)
“When people's behavior isn't bound by their morality, a
system must be used to restrict their actions”
- Chinese Academy of Social Science, 2015
“Especially given the speed of the digital economy it is
crucial that people can quickly verify each other’s
creditworthiness. The behavior of the majority is
determined by their world of thoughts. A person who
believes in socialist core values, is behaving more decent.”
- Professor Wang Shuqin, 2015
“It is clearly an attempt to create a new citizen”
-Researcher Rogier Creemers, 2015
Strategies…
Recording the individual credit records
Improving individual information security
Promoting sharing of individual credit information
Perfecting the incentive and punishment mechanisms
of individual credit (e.g joint punishment)
Guidelines of the social credit system (2016)
http://english.gov.cn/policies/latest_releases/2016/12/30/content_281475528903041.htm
http://www.chinalawtranslate.com/creditmechanisms/?lang=en

Más contenido relacionado

La actualidad más candente

Warlord China, 1912-27
Warlord China, 1912-27Warlord China, 1912-27
Warlord China, 1912-27RCB78
 
Russia Ukraine war analysis.pptx
Russia Ukraine war analysis.pptxRussia Ukraine war analysis.pptx
Russia Ukraine war analysis.pptxKhulna University
 
Korea ppt-korean war
Korea ppt-korean warKorea ppt-korean war
Korea ppt-korean warJini Shim
 
4) Placing a digital platform at the heart of organisational change with Oxfa...
4) Placing a digital platform at the heart of organisational change with Oxfa...4) Placing a digital platform at the heart of organisational change with Oxfa...
4) Placing a digital platform at the heart of organisational change with Oxfa...Code Computerlove
 
Cold War - Why did detente take place?
Cold War - Why did detente take place?Cold War - Why did detente take place?
Cold War - Why did detente take place?mrmarr
 
Cold War: The war that changed the table of international relations
Cold War: The war that changed the table of international relationsCold War: The war that changed the table of international relations
Cold War: The war that changed the table of international relationsarokiya17
 
Open door policy in china
Open door policy in chinaOpen door policy in china
Open door policy in chinaKLV96
 
An overview of Chinese history
An overview of Chinese historyAn overview of Chinese history
An overview of Chinese historyGavin Sanchez
 
Ch.5 ancient india 2003
Ch.5  ancient india 2003Ch.5  ancient india 2003
Ch.5 ancient india 2003dhtaylor3
 
26.4 nineteenth century progress (1)
26.4 nineteenth century progress (1)26.4 nineteenth century progress (1)
26.4 nineteenth century progress (1)Brighton Alternative
 
European Invasion Of Asia
European Invasion Of AsiaEuropean Invasion Of Asia
European Invasion Of Asiagrieffel
 
Origins of the cold war
Origins of the cold warOrigins of the cold war
Origins of the cold warmgattis
 
Korean war! Explained. Phases and causes. Outcome?
Korean war! Explained. Phases and causes. Outcome?Korean war! Explained. Phases and causes. Outcome?
Korean war! Explained. Phases and causes. Outcome?Ernesto Correa Gómez
 
Social media in the conduct of foreign affairs and diplomacy
Social media in the conduct of foreign affairs and diplomacySocial media in the conduct of foreign affairs and diplomacy
Social media in the conduct of foreign affairs and diplomacySaeed Al Dhaheri
 

La actualidad más candente (20)

Warlord China, 1912-27
Warlord China, 1912-27Warlord China, 1912-27
Warlord China, 1912-27
 
Ussr.ppt
Ussr.pptUssr.ppt
Ussr.ppt
 
Russia Ukraine war analysis.pptx
Russia Ukraine war analysis.pptxRussia Ukraine war analysis.pptx
Russia Ukraine war analysis.pptx
 
Classical views of geopolitics
Classical views of geopoliticsClassical views of geopolitics
Classical views of geopolitics
 
Second Sino Japanese War
Second Sino Japanese WarSecond Sino Japanese War
Second Sino Japanese War
 
Korea ppt-korean war
Korea ppt-korean warKorea ppt-korean war
Korea ppt-korean war
 
4) Placing a digital platform at the heart of organisational change with Oxfa...
4) Placing a digital platform at the heart of organisational change with Oxfa...4) Placing a digital platform at the heart of organisational change with Oxfa...
4) Placing a digital platform at the heart of organisational change with Oxfa...
 
Cold War - Why did detente take place?
Cold War - Why did detente take place?Cold War - Why did detente take place?
Cold War - Why did detente take place?
 
Cold War: The war that changed the table of international relations
Cold War: The war that changed the table of international relationsCold War: The war that changed the table of international relations
Cold War: The war that changed the table of international relations
 
Open door policy in china
Open door policy in chinaOpen door policy in china
Open door policy in china
 
North korea ppt
North korea   pptNorth korea   ppt
North korea ppt
 
An overview of Chinese history
An overview of Chinese historyAn overview of Chinese history
An overview of Chinese history
 
Ch.5 ancient india 2003
Ch.5  ancient india 2003Ch.5  ancient india 2003
Ch.5 ancient india 2003
 
Social Media For Peace
Social Media For PeaceSocial Media For Peace
Social Media For Peace
 
26.4 nineteenth century progress (1)
26.4 nineteenth century progress (1)26.4 nineteenth century progress (1)
26.4 nineteenth century progress (1)
 
European Invasion Of Asia
European Invasion Of AsiaEuropean Invasion Of Asia
European Invasion Of Asia
 
Origins of the cold war
Origins of the cold warOrigins of the cold war
Origins of the cold war
 
Korean war! Explained. Phases and causes. Outcome?
Korean war! Explained. Phases and causes. Outcome?Korean war! Explained. Phases and causes. Outcome?
Korean war! Explained. Phases and causes. Outcome?
 
Social media in the conduct of foreign affairs and diplomacy
Social media in the conduct of foreign affairs and diplomacySocial media in the conduct of foreign affairs and diplomacy
Social media in the conduct of foreign affairs and diplomacy
 
China after 1949.
China after 1949.China after 1949.
China after 1949.
 

Similar a Digital Surveillance in China: From the Great Firewall to the Social Credit System

When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...
When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...
When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...David Rozas
 
2014 Managing Cloud: A New Multidisciplinary Paradigm for Policymakers
2014 Managing Cloud: A New Multidisciplinary Paradigm for Policymakers2014 Managing Cloud: A New Multidisciplinary Paradigm for Policymakers
2014 Managing Cloud: A New Multidisciplinary Paradigm for Policymakersaccacloud
 
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)Christian Heller
 
Open Education and Blockchain
Open Education and BlockchainOpen Education and Blockchain
Open Education and BlockchainCarmen Holotescu
 
Foresight Analytics
Foresight AnalyticsForesight Analytics
Foresight Analyticssuresh sood
 
Meetup web rtc 동향과 이슈_2017.08.25
Meetup web rtc 동향과 이슈_2017.08.25Meetup web rtc 동향과 이슈_2017.08.25
Meetup web rtc 동향과 이슈_2017.08.25sung young son
 
China's internet policies and regulations
China's internet policies and regulationsChina's internet policies and regulations
China's internet policies and regulationsTrần Quốc Khánh
 
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806smecchk
 
GAIA and Alternative Networks
GAIA and Alternative NetworksGAIA and Alternative Networks
GAIA and Alternative NetworksJose Saldana
 
24 7 internet of Everything Everywhere
24 7 internet of  Everything  Everywhere24 7 internet of  Everything  Everywhere
24 7 internet of Everything EverywhereGlenn McKnight
 
AprIGF: WS 38 - 'How can we enhance the collaboration between tech and IGF co...
AprIGF: WS 38 - 'How can we enhance the collaboration between tech and IGF co...AprIGF: WS 38 - 'How can we enhance the collaboration between tech and IGF co...
AprIGF: WS 38 - 'How can we enhance the collaboration between tech and IGF co...APNIC
 
Participation Presentation Mitchell VSO 091009
Participation Presentation Mitchell VSO 091009Participation Presentation Mitchell VSO 091009
Participation Presentation Mitchell VSO 091009Ed Mitchell
 
Blockchain Talent 101 | Women in Blockchain (Oct 2, 2018)
Blockchain Talent 101 | Women in Blockchain (Oct 2, 2018)Blockchain Talent 101 | Women in Blockchain (Oct 2, 2018)
Blockchain Talent 101 | Women in Blockchain (Oct 2, 2018)AnchorTaiwan
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Wendy Qi
 
Multistakeholder_Model-Histories-Trends-Recent Developments
Multistakeholder_Model-Histories-Trends-Recent DevelopmentsMultistakeholder_Model-Histories-Trends-Recent Developments
Multistakeholder_Model-Histories-Trends-Recent DevelopmentsEdwin A. Opare
 
Blockchain and Open Education
Blockchain and Open EducationBlockchain and Open Education
Blockchain and Open EducationCarmen Holotescu
 
Future of education late 2016
Future of education late 2016Future of education late 2016
Future of education late 2016Bryan Alexander
 
Digital Economy and Investment Policy
Digital Economy and Investment Policy Digital Economy and Investment Policy
Digital Economy and Investment Policy Randeep Sudan
 

Similar a Digital Surveillance in China: From the Great Firewall to the Social Credit System (20)

When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...
When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...
When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...
 
Recent Internet and Communications Technologies and Business Mind (3/4)
Recent Internet and Communications Technologies and Business Mind (3/4)Recent Internet and Communications Technologies and Business Mind (3/4)
Recent Internet and Communications Technologies and Business Mind (3/4)
 
2014 Managing Cloud: A New Multidisciplinary Paradigm for Policymakers
2014 Managing Cloud: A New Multidisciplinary Paradigm for Policymakers2014 Managing Cloud: A New Multidisciplinary Paradigm for Policymakers
2014 Managing Cloud: A New Multidisciplinary Paradigm for Policymakers
 
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)
 
Open Education and Blockchain
Open Education and BlockchainOpen Education and Blockchain
Open Education and Blockchain
 
Foresight Analytics
Foresight AnalyticsForesight Analytics
Foresight Analytics
 
Meetup web rtc 동향과 이슈_2017.08.25
Meetup web rtc 동향과 이슈_2017.08.25Meetup web rtc 동향과 이슈_2017.08.25
Meetup web rtc 동향과 이슈_2017.08.25
 
China's internet policies and regulations
China's internet policies and regulationsChina's internet policies and regulations
China's internet policies and regulations
 
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
 
GAIA and Alternative Networks
GAIA and Alternative NetworksGAIA and Alternative Networks
GAIA and Alternative Networks
 
24 7 internet of Everything Everywhere
24 7 internet of  Everything  Everywhere24 7 internet of  Everything  Everywhere
24 7 internet of Everything Everywhere
 
Promise perils io_t
Promise perils io_tPromise perils io_t
Promise perils io_t
 
AprIGF: WS 38 - 'How can we enhance the collaboration between tech and IGF co...
AprIGF: WS 38 - 'How can we enhance the collaboration between tech and IGF co...AprIGF: WS 38 - 'How can we enhance the collaboration between tech and IGF co...
AprIGF: WS 38 - 'How can we enhance the collaboration between tech and IGF co...
 
Participation Presentation Mitchell VSO 091009
Participation Presentation Mitchell VSO 091009Participation Presentation Mitchell VSO 091009
Participation Presentation Mitchell VSO 091009
 
Blockchain Talent 101 | Women in Blockchain (Oct 2, 2018)
Blockchain Talent 101 | Women in Blockchain (Oct 2, 2018)Blockchain Talent 101 | Women in Blockchain (Oct 2, 2018)
Blockchain Talent 101 | Women in Blockchain (Oct 2, 2018)
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
Multistakeholder_Model-Histories-Trends-Recent Developments
Multistakeholder_Model-Histories-Trends-Recent DevelopmentsMultistakeholder_Model-Histories-Trends-Recent Developments
Multistakeholder_Model-Histories-Trends-Recent Developments
 
Blockchain and Open Education
Blockchain and Open EducationBlockchain and Open Education
Blockchain and Open Education
 
Future of education late 2016
Future of education late 2016Future of education late 2016
Future of education late 2016
 
Digital Economy and Investment Policy
Digital Economy and Investment Policy Digital Economy and Investment Policy
Digital Economy and Investment Policy
 

Más de Aarhus University

Unerasable Characters in Machine Learning
Unerasable Characters in Machine LearningUnerasable Characters in Machine Learning
Unerasable Characters in Machine LearningAarhus University
 
Humanistic and Computational Thinking Through Practice
Humanistic and Computational Thinking Through PracticeHumanistic and Computational Thinking Through Practice
Humanistic and Computational Thinking Through PracticeAarhus University
 
n.a.g/the inexecutable query
n.a.g/the inexecutable queryn.a.g/the inexecutable query
n.a.g/the inexecutable queryAarhus University
 
What is Coding in University in Practice?
What is Coding in University in Practice?What is Coding in University in Practice?
What is Coding in University in Practice?Aarhus University
 
Screen shots : Critical Codes of Capture
Screen shots : Critical Codes of CaptureScreen shots : Critical Codes of Capture
Screen shots : Critical Codes of CaptureAarhus University
 
Why Code? Why Program? Why Create?
Why Code? Why Program? Why Create? Why Code? Why Program? Why Create?
Why Code? Why Program? Why Create? Aarhus University
 
Executing tasks: Spam as Automated Agents
Executing tasks: Spam as Automated AgentsExecuting tasks: Spam as Automated Agents
Executing tasks: Spam as Automated AgentsAarhus University
 
Executing Queries as a form of artistic practice
Executing Queries as a form of artistic practiceExecuting Queries as a form of artistic practice
Executing Queries as a form of artistic practiceAarhus University
 
Interfacing with questions: The unpredictability of live queries in the work...
Interfacing with questions:  The unpredictability of live queries in the work...Interfacing with questions:  The unpredictability of live queries in the work...
Interfacing with questions: The unpredictability of live queries in the work...Aarhus University
 
Microtemporality: At The Time When Loading-in-progress
Microtemporality: At The Time When Loading-in-progressMicrotemporality: At The Time When Loading-in-progress
Microtemporality: At The Time When Loading-in-progressAarhus University
 
Software art and design: computational thinking through programming practice ...
Software art and design: computational thinking through programming practice ...Software art and design: computational thinking through programming practice ...
Software art and design: computational thinking through programming practice ...Aarhus University
 
Network materiality and temporality: Things flow 'non-continuously' in networ...
Network materiality and temporality: Things flow 'non-continuously' in networ...Network materiality and temporality: Things flow 'non-continuously' in networ...
Network materiality and temporality: Things flow 'non-continuously' in networ...Aarhus University
 
Discussing Software through the art of the Hong Kong Umbrella Movement
Discussing Software through the art of the Hong Kong Umbrella MovementDiscussing Software through the art of the Hong Kong Umbrella Movement
Discussing Software through the art of the Hong Kong Umbrella MovementAarhus University
 
Nonhuman Participation: a materialist perspective on execution from agency o...
Nonhuman Participation: a materialist perspective on execution from agency o...Nonhuman Participation: a materialist perspective on execution from agency o...
Nonhuman Participation: a materialist perspective on execution from agency o...Aarhus University
 
Artist Talk: From net art to software art
Artist Talk: From net art to software artArtist Talk: From net art to software art
Artist Talk: From net art to software artAarhus University
 
Collaborative and Collective [Artistic] Research
Collaborative and Collective [Artistic] ResearchCollaborative and Collective [Artistic] Research
Collaborative and Collective [Artistic] ResearchAarhus University
 
Net Art: Data Hacking, Coding and Critical Thinking
Net Art: Data Hacking, Coding and Critical ThinkingNet Art: Data Hacking, Coding and Critical Thinking
Net Art: Data Hacking, Coding and Critical ThinkingAarhus University
 

Más de Aarhus University (20)

Unerasable Characters in Machine Learning
Unerasable Characters in Machine LearningUnerasable Characters in Machine Learning
Unerasable Characters in Machine Learning
 
Humanistic and Computational Thinking Through Practice
Humanistic and Computational Thinking Through PracticeHumanistic and Computational Thinking Through Practice
Humanistic and Computational Thinking Through Practice
 
n.a.g/the inexecutable query
n.a.g/the inexecutable queryn.a.g/the inexecutable query
n.a.g/the inexecutable query
 
What is Coding in University in Practice?
What is Coding in University in Practice?What is Coding in University in Practice?
What is Coding in University in Practice?
 
Screen shots : Critical Codes of Capture
Screen shots : Critical Codes of CaptureScreen shots : Critical Codes of Capture
Screen shots : Critical Codes of Capture
 
Why Code? Why Program? Why Create?
Why Code? Why Program? Why Create? Why Code? Why Program? Why Create?
Why Code? Why Program? Why Create?
 
Executing tasks: Spam as Automated Agents
Executing tasks: Spam as Automated AgentsExecuting tasks: Spam as Automated Agents
Executing tasks: Spam as Automated Agents
 
Executing Liveness
Executing LivenessExecuting Liveness
Executing Liveness
 
Executing Queries as a form of artistic practice
Executing Queries as a form of artistic practiceExecuting Queries as a form of artistic practice
Executing Queries as a form of artistic practice
 
Interfacing with questions: The unpredictability of live queries in the work...
Interfacing with questions:  The unpredictability of live queries in the work...Interfacing with questions:  The unpredictability of live queries in the work...
Interfacing with questions: The unpredictability of live queries in the work...
 
Microtemporality: At The Time When Loading-in-progress
Microtemporality: At The Time When Loading-in-progressMicrotemporality: At The Time When Loading-in-progress
Microtemporality: At The Time When Loading-in-progress
 
Software art and design: computational thinking through programming practice ...
Software art and design: computational thinking through programming practice ...Software art and design: computational thinking through programming practice ...
Software art and design: computational thinking through programming practice ...
 
Executing Queries
Executing QueriesExecuting Queries
Executing Queries
 
Life and Death in Software
Life and Death in SoftwareLife and Death in Software
Life and Death in Software
 
Network materiality and temporality: Things flow 'non-continuously' in networ...
Network materiality and temporality: Things flow 'non-continuously' in networ...Network materiality and temporality: Things flow 'non-continuously' in networ...
Network materiality and temporality: Things flow 'non-continuously' in networ...
 
Discussing Software through the art of the Hong Kong Umbrella Movement
Discussing Software through the art of the Hong Kong Umbrella MovementDiscussing Software through the art of the Hong Kong Umbrella Movement
Discussing Software through the art of the Hong Kong Umbrella Movement
 
Nonhuman Participation: a materialist perspective on execution from agency o...
Nonhuman Participation: a materialist perspective on execution from agency o...Nonhuman Participation: a materialist perspective on execution from agency o...
Nonhuman Participation: a materialist perspective on execution from agency o...
 
Artist Talk: From net art to software art
Artist Talk: From net art to software artArtist Talk: From net art to software art
Artist Talk: From net art to software art
 
Collaborative and Collective [Artistic] Research
Collaborative and Collective [Artistic] ResearchCollaborative and Collective [Artistic] Research
Collaborative and Collective [Artistic] Research
 
Net Art: Data Hacking, Coding and Critical Thinking
Net Art: Data Hacking, Coding and Critical ThinkingNet Art: Data Hacking, Coding and Critical Thinking
Net Art: Data Hacking, Coding and Critical Thinking
 

Último

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Último (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 

Digital Surveillance in China: From the Great Firewall to the Social Credit System

  • 1. Digital Surveillance in China: From the Great Firewall to the social credit system Winnie Soon | 24.Jan.2017 Aarhus University www.siusoon.net
  • 2. Research perspective as a Hong Kongese… https://www.facebook.com/localstudiohongkong/posts/911512712220379?utm_source=DesignTAXI&utm_medium=DesignTAXI&utm_term=DesignTAXI&utm_content=Desi gnTAXI&utm_campaign=DesignTAXI
  • 4. Digital Surveillance in China https://www.apc.org/en/node/14821
  • 5. 0 200 400 600 800 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 MILLION Initiative on social-credit system Internet Penetration in China and key milestones on technological development/related policies real name Registration + enhanced VPN blocking join meeting about social credits system at provincial levelThe term “Great Firewall” was coined Initiative on Golden Shield Project Golden Shield Project in operation Launched Google.cn Guidelines on social-credit system Target completion of social-credit system Google.cn redirected to HK Online Publishing Services Permit + ICP licence Clean up campaign on unauthorized VPN providers
  • 6. Michel de Certeau (1984) The Practice of Everyday Life [A] tactic is determined by the absence of power just as a strategy is organized by the postulation of power. (De Certeau, 1984, p. 38. Italics in original)
  • 7. Strategies are operations: - Defining how things work/operate (such as law, policy, firewall creation) - Regarding Internet as an institutional space of authority - Allowing work to build upon previous work (De Certeau, 1984, p. xix) Tactics are resistance acts: - Resistance stems from daily life practice - Tactics are improvisational and opportunistic (De Certeau, 1984, p. xix) - Tactical practices operate within “the space of the other” (De Certeau, 1984, p. xix) - Creative consumption - “A tactic is an art of the weak” (De Certeau, 1984, p. 37).
  • 8. China’s state law - 1996 Measures on the Regulation of Public Computer Networks and the Internet Article 10: …No unit or individual may use the Internet to retrieve, replicate, create, or transmit information that harms national security, threatens social stability …. Strategies… China’s state law - 1996 Temporary Regulations Governing Computer Information Networks and the Internet No. 195: The State is in charge of overall planning, national standardization, graded control, and the development of all areas related to the Internet. ... No group or individual may establish or utilize any other means to gain Internet access.
  • 9. The Golden Shield Project (2003 – present) Operated by the Ministry of Public Security Controlling the flow of information through a censorship system, including: • IP blocking • DNS Filtering and Redirection • URL and Packet Filtering • VPN/SSH Traffic Recognition • Speech and Face recognition Strategies…
  • 10. China Channel, 2008 | by Aram Bartholl, Evan Roth and Tobias Leingruber [Browser add-on] Tactics…
  • 11. CANNOT (2010) by Winnie Soon [5x Digital prints with screen shots] Tactics…
  • 12. Hundred degree can not search your thirty degree smile, 2016 by Miao Ying LAN Love Poem-Holding a kitchen knife cut internet cable, a road with lightning sparks, 2014 by Miao Ying Flowers all fallen, Birds far gone, 2015 by Miao Ying LAN Love Poem-To be Missed is Another kind of Beauty, 2014 by Miao Ying >> Interview with Ying Miao: https://vimeo.com/162455923 Tactics…
  • 13. The Golden Shield Project (2003- present) Operated by the Ministry of Public Security It is more than a mere technological project: - Not only to control the access of ‘foreign’ information - But also discover the need to censor local contents (user generated content) e.g P2P and internal/local servers Strategies…
  • 14. The Golden Shield Project (2003- present) Operated by the Ministry of Public Security It is more than a mere technological project: - Not only to control the access of ‘foreign’ information - But also discover the need to censor local contents (user generated content) e.g P2P and internal/local servers > 50-cent party members to influence Internet discussion > A culture of self-censorship (from individuals to companies) > Internet policing (estimated to contain over 200,000 workers) Strategies…
  • 16. Censored Censorship, 2010 | by Kim Asendorf [Net Art] Tactics…
  • 17. Weiboscope (2011-present) and WeChatscope (under pilot study) by Fu King Wa and his team @ HKU Tactics…
  • 18. Tactics are procedures that gain validity in relation to the pertinence they lend to time-to the circumstances which the precise instant of an intervention transforms into a favorable situation, to the rapidity of the movements that change the organization of a space, to the relations among successive moments in actions, to the possible intersections of durations and heterogeneous rhythms, etc. (De Certeau, 1984, p. 38)
  • 19. Specific event: Tiananmen Square Protest | 1989 Video: https://www.youtube.com/watch?v=CxDd82Myqis
  • 20. Censored from sina weibo during 2013 - 2014 Tactics…
  • 23. 占占点 占占人 占点占 6+4 6+4 8的平方 square of eight viiv viiv (Roman numerals 6 and 4) 65-1 65-1 五四+一个月 May Fourth + one month https://qz.com/698990/261-ways-to-refer-to-the-tiananmen-square-massacre-in-china/ Strategies… Sensitive keywords
  • 25. Social Credit System (2020) “construct a social credit environment of sincerity, self- discipline, trust-keeping and mutual trust.” (State Council, 2014)
  • 26. Social Credit System (2020) Basic info: Official announcement: 2014 Target implementation: 2020 Citizen: 1.3 billion+ Identification: credit/citizen score (based on id number) Coverage: Individual, companies and institutions (*sectoral credit information systems) Scope of the system: Politics, Business, Society, Justice Consequences: Rewards: incentivise trust-keeping (*rewards for reporting individuals) Punishment: punish trust-breaking (*establish blacklist systems, market withdrawal mechanisms, policy support, administrative approval, public service market access etc)
  • 27. Black Mirror: Nose Dive https://www.youtube.com/watch?v=fgLYHM6evt8&t=34m20s
  • 28. Key insights: - Tactics are resistance acts, emerging from every day practice and accompanying by the asymmetrical balance of power. - Tactics are targeted, capturing the opportunistic time/space. - An urgency to develop an archive of tactical practices (in relation to digital surveillance in China).
  • 29. Ref: • Planning Outline for the Construction of a Social Credit System (2014- 2020):https://chinacopyrightandmedia.wordpress.com/2014/06/14/planning-outline-for-the- construction-of-a-social-credit-system-2014-2020/ • Government Requests Report (Facebook): https://govtrequests.facebook.com/ • State Council releases guidelines on establishing individual credit system: http://english.gov.cn/policies/latest_releases/2016/12/30/content_281475528903041.htm • A brief history of China’s campaign to enforce real-name registration online: https://www.techinasia.com/history-chinas-campaign-enforce-realname-registration-online • Annual Report on the Development of China’s Special Economic Zone (2016) • Measurers on the regulation of public computer networks and the Internet (1996): http://www.asianlii.org/cn/legis/cen/laws/motropcnati718/ • A history of Google in China: http://www.ft.com/cms/s/0/faf86fbc-0009-11df-8626- 00144feabdc0.html?ft_site=falcon#axzz4VwNKKQR5 • Miao Ying: http://rhizome.org/editorial/2015/jul/08/artist-profile-miao-ying/ • Background of Jun fourth: https://botanwang.com/node/10883 • China’s Golden Shield: Is Cisco Systems Complicit? http://cyberlaw.stanford.edu/blog/2015/03/china%E2%80%99s-golden-shield-cisco- systems-complicit • China Imposes Broad New Restrictions on Publication of Internet Content: http://www.lexology.com/library/detail.aspx?g=fa85e3a8-21d4-445c-85bb-2d7b66b57262 • China’s Censorship 2.0: How companies censor bloggers by Rebecca Mackinnon http://firstmonday.org/article/view/2378/2089 • 工业和信息化部关于清理规范互联网网络接入服务市场的通知: http://www.miit.gov.cn/n1146295/n1652858/n1652930/n3757020/c5471946/content.html
  • 34. Sesame Credit Scores (2015-present) [Payment App] Ant Financial Services Group, an affiliate of the Chinese Alibaba Group Strategies…
  • 35. Social Credit System (2014-2020) “All levels’ People’s Governments must first and foremost strengthen their own sincerity construction, and drive the establishment of an sincerity consciousness in all of society and an increase in the levels of sincerity through honest governing by governments. Take the lead in using credit information and credit products in administrative permission, government procurement, tendering and budding, labour and employment, social security, scientific research management, cadre promotion and appointment, management and supervision, application for government financial support and other such areas, and foster the development of a credit services market.” (State Council Notice, 2014) Strategies…
  • 36. Social Credit System (2014-2020) “When people's behavior isn't bound by their morality, a system must be used to restrict their actions” - Chinese Academy of Social Science, 2015 “Especially given the speed of the digital economy it is crucial that people can quickly verify each other’s creditworthiness. The behavior of the majority is determined by their world of thoughts. A person who believes in socialist core values, is behaving more decent.” - Professor Wang Shuqin, 2015 “It is clearly an attempt to create a new citizen” -Researcher Rogier Creemers, 2015 Strategies…
  • 37. Recording the individual credit records Improving individual information security Promoting sharing of individual credit information Perfecting the incentive and punishment mechanisms of individual credit (e.g joint punishment) Guidelines of the social credit system (2016) http://english.gov.cn/policies/latest_releases/2016/12/30/content_281475528903041.htm http://www.chinalawtranslate.com/creditmechanisms/?lang=en

Notas del editor

  1. Regard as a autonomous region and operate largely independently of China, having its own passport, flag, currency, law system and official language. Hong Kong as part of China but having “One Country two systems”. Rule of man over rule of law, highly centralized system and the political system is dominated by CCP A lot of the rules and systems follow Great Britian. For example, traffic/driving system, education system, government organization and law. I grew up under this highly westernized environment, but also I witness the return of Hong Kong to China in 1997, as well as still being sensitive to the post-handover environment in Hong Kong such as the how the two-system work/not work, shrinking freedom, facing increasing pressure from China.
  2. Before 1956 / 1964 (using the same traditonal chinese characters) – the cultural revolution Pictorial Chinese characters  chinese symbols were based on pictographs ..later then incorporate elements like phenetics, abstract concepts Several thousands commonly used chinese characters Introduced by People republic of china, iIN 1954 PROMOTES mass literacy  introduce simplified chinese character Simplified means: simplier brushstrokes, a smaller collection of symbols Having this concept is important when we talk about some of the works that sneak around internet censorship.
  3. As the most general and basic level: You cannot access some of the websites in China such as Facebook and Google. Sensitive keywords will be censored in Social Media. Surveillance is highly centralized but executed in a very distributed manner – which means all the media companies and institutions need to comply with the standard in China. Rencently (just last year), according to current and former Facebook s employees, there is a development on going which is to create censorship tool to enter China.  comply with government requests I know the social credit system is a topic that get many people excited on how it is being implemented, the details, and the potential consequences. It is still unfolding..the focus of this talk is not the social credit and it is more to give you a background of the surveillance culture in china.
  4. Hainan should be taken as the demonstration zone for the construction of a national social credit system
  5. Using the concept of strategy and tactics -> examine power and control. Strategy persumes control, tactics as the puriview of non-powerful. As an adaptation of environment which has been created by the strategies of the powerful. Control is never perfect , the strategy construction is always changing
  6. http://www.volkskrant.nl/buitenland/china-rates-its-own-citizens-including-online-behaviour~a3979668/
  7. VPN: new government tool can learn, discover and block traffic going through VPNs. Cut off business as well A strategy… postulates a place that can be delimited as its own and serve as the base from which relations with an exteriority composed of targets or threats can be managed. (De Certeau, 1984, pp. 35-36)
  8. - “home setting” as a representational space Error space (page error) becomes an aesthetic language of representation.
  9. End- 1: 25 Since our daily lives play out within spaces of economic, social, political, and institutional control, de Certeau sees tactical practices as an integral part of our everyday existence, and important operations of agency (de Certeau 1984, xiv-xv).
  10. - What maes its so successful is not only its complex technology but also the culture that the system engenders – a culture of self censorship
  11. - What maes its so successful is not only its complex technology but also the culture that the system engenders – a culture of self censorship
  12. Specific to content
  13. Lines of text, drawn from a variety of China media sources scans across the screen and scrolls upwards A word is blacked out , hidden from us Human mind creates narrative where there is none. >> Playfully reconfigure space by laying the blocks on certain texts.
  14. Focus on time…the speed of spreading and sensorship
  15. What I am going to show you next is how De Certeau describes as tactics that are related to time, the successive moments in actions It is an important incident not only because of many students were being killed. This event has become a censorship bar from the ways how Hong Kongese looked at. Whenever there is elections, we will ask the politicians on how they think about Tiananmen Square Umbrella movement (2014), a fear whether government would send PLA (People Liberation Army) tanks again fear: we can still hold Tiananmen Memorial Events in Hong Kong Also an indicator It becomes a measurement for us, a measurement for the freedom of expression
  16. Plays with the chinese character which has a pictorial root, in which the author only pick up the characters that look like the tank and the man. It is not necessarily related to the meaning (semantics) of the text
  17. Some of the tactical approach, citizen chooses to augment the characters. Instead of getting the semantics of the text, they play with the image of the text.
  18. Control is never perfect , the strategy construction is always changing. The entire surveillance system has learn and adapt. We are trying to understand how strategies and tactics are played out / negotiated in the digital surveillance of China.
  19. Strategy and Tactics
  20. “Focus on the areas of industry and commerce, tax payment, pricing, import and export, production safety, product quality, environmental protection, food and drugs, medicine and healthcare, intellectual property rights, logistical services, project construction, e-commerce, traffic and transportation, contract fulfilment, human resources, social security, education and research, and perfect sectoral credit record and employee credit files.”
  21. - Extension of space --------- Announcement: notice to all provincial, autonomous region and Called “The Planning outline for the construction of a Social Credit System (2014-2020)” -> for public circulation “Focus on the areas of industry and commerce, tax payment, pricing, import and export, production safety, product quality, environmental protection, food and drugs, medicine and healthcare, intellectual property rights, logistical services, project construction, e-commerce, traffic and transportation, contract fulfilment, human resources, social security, education and research, and perfect sectoral credit record and employee credit files.”
  22. The earliest written Chinese symbols were based on pictographs, where the characters highly resembled their denoted meanings. Such was the case for oracle bone script (甲骨文 jiǎgǔwén). As time wore on, the Chinese writing system developed and began incorporating elements like phonetics, abstract concepts, and radicals. Eventually it evolved into a logographic system, words represented by symbols. IN chinese, we have over 50,000 characters ..to able to read a newspaper, it is about 3000
  23. In 2013, Jason Ng wrote the book about sensitive and censored text text Research Fellow at the University of Toronto's Citizen Lab Interested in internet censorship and digital activism
  24. Background: Popular chinese Twitter-like microblogging site Sina Weibo (2009)  facebook + Twitter | 2015 requires real name registration Over 212 million active users (2015) Weibo credit is a user credit system -> safeguard a good atmosphere within in the Weibo community Reports of untrue information, invasions of privacy, personal attacks, plagiarized content, harassment of others Punishment: no featured post, cannot being follow, other cannot forward your post, cannot post…> deleted account Credit caculation: credit score = starting credit points + reward points – credit deductions Logic: credit recovery system from low credit points after a certain period of time tie an ID card or mobile phone number to their accounts before they were allowed to post (2012) (ref: http://blog.sina.com.cn/s/blog_e5309e110102v3py.html)
  25. Background: popular third-party payment app with over 350 million users First system in china to incorporate online and offline data to generate credit scores Operate independently from the government’s social credit system 5 categories: 1/ purchases (volume, price – not content ) from Alibab’s Tmall and Taobao ecommerce platforms 2/ household status (job/income) 3 + 4 / timely payment on bills and credit cards 5/ friends around (quantity)  Jobbies and friends ..> if friends have a poor lending reputation, this reflects badly on the person Starting from 2015, people shares their credit scores on social media
  26. Announcement: notice to all provincial, autonomous region and Called “The Planning outline for the construction of a Social Credit System (2014-2020)” -> for public circulation Government driven, highly centralized, and not for profit It also urged concentrating the registration efforts in key sectors such as food and drugs, work safety, environmental protection, work security and engineering construction. To help ensure that the information is accurate, the main subjects will be lawyers, teachers, civil servants and real estate brokers.
  27. 1/ CASS: Affliated with the PRC’s state council, they are helping the develop the model 2/ Wang Shuqin >> working on this new system at Capital Normal University 3/ Creemers, university of oxford Nationwide level Promoting socialist core values such as patriotism, respecting the elderly, working hard and avoiding extravagant consumption
  28. 1/ information registration in internet, delivery, telecom, financial sectors) 2/ Concentrate on key sectors to ensure the accuracy of information (lawyers, teachers, civil servants, real estate brokers) Fourth is perfecting the incentive and punishment mechanisms of individual credit. People who have good credit scores would be offered more social conveniences, especially more opportunities in education, employment, and entrepreneurship. Joint punishment such as Limits on engaging in particular industries or projects, Limits on government support or subsidies, Limits on occupational qualifications , Limits on special market transactions, Limits on high spending and related consumption, travelling,