02/25/2002, Volume 007, Issue 23
Continued from http://www.clearwisdom.net/emh/articles/2002/4/25/21308.html
Why has there been so little oversight of such corporate activity? As Michael
Robinson puts it, for the first four years of the Net era, those with paranoid
visions of China's government were never quite able to square their suspicions
with the rapid expansion of the Chinese Internet. Although it was widely rumored
in Beijing that up to 30,000 state security employees were monitoring the
Internet in that city alone, the monitoring was also laughed at. Apparently the
bureaucrats liked monitoring pornography so much that they had a massive
backlog. State security was said to be lax, corrupt, full of holes. Chinese whiz
kids could still surf through the firewall and beyond. Associations could
flourish among the patrons of the cybercafes, using anonymous monikers. Many saw
the Internet as a populist river leading to the ocean of the global community.
Then, the Chinese government abruptly built a cyber-version of the Three Gorges
Dam.
In October 2000, the State Council ordered Internet Service Providers to hold
all Chinese user data--phone numbers, time, and surfing history--for at least 60
days. In November, commercial news sites were banned. In December, the National
People's Congress decreed all unauthorized online political activity illegal.
January 2001 saw the criminalization of Internet transfer of "state secret
information," such as reports of human rights violations. February brought
"Internet Police 110," software blocking "cults, sex, and violence" while
monitoring users' attempts to access such sites. By March, the surveillance
started to work; hundreds of e-mails on the controversy surrounding a
schoolhouse bombing in Jiangxi disappeared. Around the same time, Chinese
authorities announced near completion of a "black box" to collect all
information flowing across the Internet. In April, arrests of democracy
activists using the web and a nationwide crackdown on cybercafes reached
critical mass. Surviving cafes had to install internal monitoring software.
E-mail to Tibet now took three days to get through, if at all, and Falun Gong
e-mail was completely eradicated. By October 2001, when President George W. Bush
flew to Shanghai for the Asia-Pacific Economic Cooperation Summit, he was
entering an Internet police state. To deflect criticism, but perhaps also as a
demonstration of power, blocks on U.S. news websites were magically lifted by
Chinese authorities. The minute Bush went airborne, the blocks were back in
place. During Bush's current visit to China, any attempt to discuss loosening
Chinese Internet controls is likely to be brushed aside using the rhetoric of
our own struggle against terrorism (what, you're against surveillance?). But if
the Chinese take this tack, they are of course being dishonest about their own
motives.
There were urgent reasons for the Chinese Internet crackdown; fighting terrorism
wasn't one of them. Instead, look to the slow-motion crisis of a leadership
transition, the release of the Tiananmen papers, the emergence of a cyber-Falun
Gong, and a stirring--you could feel it on the street--for greater freedom of
expression, if not genuine democracy. Then again, there may be a more elaborate
game afoot. Chairman Mao knew the utility of briefly loosening controls to
create a dragnet. In effect, the current Chinese leadership promoted a "hundred
flowers" period of relative Internet freedom--again, not to capture terrorists,
but to expose anyone who disagreed with the legitimacy of their rule and to
attract massive Western investment. American technologies of surveillance,
encryption, firewalls, and viruses have now been transferred to Chinese
partners--and might even one day be turned against our own ludicrously open
Internet. We funded, built, and pushed into China what we thought was a Trojan
Horse, but we forgot to build the hatch.
Consider a Chinese user in search of an unblocked news site (weeklystandard.com,
for example). He won't expect to get through, and if he does, it will be cause
for alarm, for the site may be a tripwire--not for spam, but for state security.
Everything he does on the web might conceivably be used against him.
Pornography? Potentially, a two-year sentence. Political? Possible permanent
loss of career, family, and freedom. E-mail may be the most risky: Two years
ago, working from my office in a Chinese TV studio, I received an e-mail from a
U.S. friend (in a browser-based Hotmail account, no less, which in theory should
be difficult to monitor) with the words "China," "unrest," "labor," and "Xinjiang"
in queer half-tone brackets, as if the words had been picked out by a filter. I
now realize that it was a warning; any savvy Chinese user would have sensed it
instantly.
Before the crackdown one could escape and surf anonymously in a cybercafe¡¡or use
a proxy server--another computer that acts as an intermediary between surfers
and websites, helping to hide their web footprints and evade the filters. Not
surprisingly, the most common search words in China were not "Britney" and
"hooters," but "free" and "proxy." Fully 10 percent of Chinese users--about two
million people--used proxies regularly in an attempt to circumvent government
controls. In what Michael calls "the first sign of cleverness" by the
government, a proxy pollution campaign began last spring when the Chinese
authorities either developed or imported a system that sniffs the networks for
signs of proxies. A user, frantically typing in proxy addresses until he finds
one that isn't blocked, effectively provides the government with a tidy
blacklist. After a few of these tedious sessions, many of my Chinese friends
simply gave up climbing over the firewall. For a small fee, expat users could
turn to a web-based proxy browser, such as Anonymizer. But credit cards are
effectively blocked for Chinese citizens. Just for good measure, Anonymizer was
finally blocked as well.
IS CHINA'S Internet beyond redemption? Is it destined to be a tool of
surveillance and repression, managed by the Chinese government and serviced by
cynical Western partners? Maybe not. The Great Firewall might be vulnerable to a
few physicists at the University of Oregon. I spent a day watching Stephen Hsu
diagram the Chinese web and its weaknesses. Hsu and his company, SafeWeb, have
developed a proxy server system called Triangle Boy. The triangle refers to the
Chinese user, to a fleet of servers outside of the firewall, and to a mothership
which the servers report to, but the Chinese government cannot find. Already
tens of thousands of Chinese users have connected with it; five of the top
twenty Triangle Boy search sites are in the Chinese language. Every day, the
Chinese user receives an e-mail listing new addresses of Triangle Boy servers,
which allow the user to visit websites that they would otherwise be unable to
reach. Because the addresses of the servers change constantly, the system is
practically unbeatable. Any attack, especially on the mothership, requires
enormous resources.
But as surely as Triangle Boy works to liberate the surfing Chinese masses, you
can bet State Security is looking for a way to pounce on this latest proxy
rebellion. The simplest one will be to enlist American companies, still eager to
curry favor in Beijing, and get them to develop software allowing the Public
Security Bureau to sniff out and block proxies as quickly as they are created.
The only practical solution to this puzzle is for the Bush administration to
make Internet freedom in China a high priority. At the moment it is a laughably
small priority. The Voice of America, whose website has been a high-profile
target of Chinese blocking, last summer began funding Triangle Boy to the tune
of $10,000 per month. VOA officials undertook that small effort in frustration;
they attempt to send daily news via e-mail to some 800,000 addresses in China,
with no guarantee that they are getting through. Hsu estimates that supplying
one million Chinese users with Triangle Boy (approximately 600 million page
views a month) would require just $1 million annually. Budgeted at $300 million
a year, VOA has the means and is wisely looking at several other solutions as
well. But for VOA to justify an anti-blocking effort on a scale that will make a
difference, it will need to be seen as carrying out an important plank of
American foreign policy, not just acting on the margins as it is now.
And why not make this a higher profile U.S. policy? Cracking the Chinese
firewall is at least as technically interesting as strategic defense. Triangle
Boy is still theoretically vulnerable to spoof sites, authorization problems, or
a Code Red-style worm attacking the servers. That implies a need for a highly
technical layering operation, involving an endless and ever-changing supply of
low-key web-based proxies, mirror sites, and encrypted e-mail and instant
messenger services in Mandarin, Cantonese, and English, in sufficient volume to
overwhelm the Chinese firewall.
Creative engineers, unleashed to solve the problem of bringing Internet freedom
to China, might take any number of approaches. They might go through Hong Kong,
where illicit cables are said to run to Guangzhou. They might cut some deals
with a "loose" Chinese ISP, such as Jitong. They might use messages formatted as
images to defeat software that sniffs out characters. They might exploit the
fact that Chinese Internet addresses were originally configured in peculiar
blocks. Or the fact that the government's proxy-hunters come from only a few
locations. A shrewd native engineer could probably root out and defeat 99
percent of these government agents.
None of these measures will be cheap. Nor can we expect the U.S. government to
fully manage such a multi-pronged private-and-public defense of Internet
freedom. Even if they back the overall concept, administration officials will
inevitably want deniability about certain parts of such an operation. This means
the project will need to attract the support of foundations, human rights
groups, religious organizations--any group that cares about a free China.
But it will be worth it. Given the willingness of capitalists to work hand in
hand with the Chinese regime, the Internet may be the only force left that is
potentially anti-hierarchical. Think of it as a way to levy a web-based
democracy tax on the Chinese government. Think of it also as a way around the
university students and the intelligentsia, who are overrated as agents for
democratic change in China.
As the father of the Chinese Internet Michael Robinson notes, "In the Chinese
Internet's infancy, the first three sites that the government blocked were two
anti-government sites--and one Maoist site. What threatens them? . . . The
heartland." Ultimately, it won't be the intellectuals who are key to bringing
democracy to China. Irate overtaxed peasants with Internet-enabled cell phones
ten years from now are the real target market. And those whose dream is
democracy in China are operating with diminishing points of entry. The American
business presence in China is deeply, perhaps fatally, compromised as an agent
for liberalizing change. The Internet remains the strongest force for democracy
available to the Chinese people. But it remains a mere potentiality, yet another
American dream, unless we first grapple with the question: Who lost China's
Internet? Well, we did. But we can still repair the damage. We can, in Michael's
words, "lay down the communication network for revolution." If we don't, his
progeny may not forgive us.
Ethan Gutmann, a visiting fellow at the Project for the New American Century, is
completing a book, "Beijing Boot Camp."
http://www.weeklystandard.com/content/public/articles/000/000/000/923vznzw.asp