Investing in censorship

Investing in censorship

Robert Clark  |   July 08, 2010
Should foreign investors invest in Chinese censorship?
If you’re an investor in any Chinese internet company – like search firm Baidu, telecom giant China Mobile or portal Sina, to name a few – your dollars are supporting China’s system of censorship.
It is an issue since Google declared earlier this year that it would no longer censor search results in China. Its China operating license expired on June 30 and its status is unclear. State media said Wednesday that a decision on Google’s future “may take some time.” 
In the wake of the Google affair, Rebecca McKinnon, a Visiting Fellow at Princeton's Center for Information Technology Policy, says investors “should be clear about what kind of innovation they are financing.”
Officially, of course, the Chinese people “fully enjoy freedom of speech on the internet” – as long as they obey the law.
According to a recent white paper on the internet in China, those laws forbid “being against the cardinal principles set forth in the Constitution; endangering state security, divulging state secrets, subverting state power and jeopardizing national unification; damaging state honor and interests; instigating ethnic hatred…; jeopardizing state religious policy, propagating heretical or superstitious ideas; spreading rumors, disrupting social order and stability; disseminating obscenity, pornography, gambling, violence” etcetera, etcetera.
“Other than that, people are totally free,” writes McKinnon. She describes the system as “networked authoritarianism” –  meaning that communist officials know they can’t possibly monitor all content online, and in any case see the net as a force for economic and social good. However, the party operates a multi-layered system of filtering, censorship and licensing to ensure that no threats emerge.
“[I]n the networked authoritarian state there is no guarantee of individual rights and freedoms. People go to jail when the powers-that-be decide they are too much of a threat – and there’s nothing anybody can do about it.”

Tell Us What You Think

Add comment

The content of this field is kept private and will not be shown publicly.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <code> <ul> <ol> <li> <dl> <dt> <dd> <a> <p> <span> <div> <h1> <h2> <h3> <h4> <h5> <h6> <img> <img /> <map> <area> <hr> <br> <br /> <ul> <ol> <li> <dl> <dt> <dd> <table> <tr> <td> <em> <b> <u> <i> <strong> <font> <del> <ins> <sub> <sup> <quote> <blockquote> <pre> <address> <code> <cite> <embed> <object> <strike> <caption>
  • Lines and paragraphs break automatically.
  • Use <!--pagebreak--> to create page breaks.

More information about formatting options


Robert Clark
Game on for social networking
Robert Clark
Yet another telecom service from Google
Tom Nolle, CIMI Corp
Myriad factors must be taken into account
Claudio Castelli/Ovum
To integrate Genesys and Enterprise divisions
Kate Gerwig
The era of cloud computing has arrived: Forrester
Martin Creaner
Inaction could lead to obsolescence


Greg Bensinger
Up to $1k devices could replace all laptop functions
Ivan Pepelnjak
Address shortage and IPv6 deployment sparking an explosion in routing table growth

Frontpage Content by Category's most popular news stories, blogs, analysis and features in the first six months of 2010