dave lyons - china's golden shield project

21
China's Golden Shield Project: Myths, Realities and Context Dave Lyons School of Communications, Library and Information Science Rutgers University 7 th Annual Chinese Internet Research Conference 2009 University of Pennsylvania

Upload: circ09

Post on 10-Apr-2015

1.930 views

Category:

Documents


2 download

DESCRIPTION

A great deal has been written in English language media about the People's Republic of China's Golden Shield Project (金盾工程) since it was launched in 1998. This paper will explore three vital issues that have too often been neglected. First, a great number of articles have mistakenly equated the Golden Shield Project with what is colloquially known as “The Great Firewall” and China's efforts at controlling Chinese citizens access to the Internet . In fact, the Golden Shield Project is more appropriately described as an attempt to 'informatize' law enforcement in China, primarily through the creation of national databases, in which Internet policing is only one small component. This project, in turn, is only one of many Golden projects of massive digital overhaul of the entire PRC bureaucracy. The second unexplored issue to be addressed will the historical context of bureaucracy, identity and forgery in Chinese history. While previous work has focused on Western corporate complicity in providing China with technology that is used for censorship and surveillance, none has examined the longstanding importance of census taking, household registration and other information collecting in the organization and policing of traditional Chinese society. Finally, there is the comparative experience of China and Western nations, in particular the United States, in the 20th Century in developing and implementing modern systems and databases for collecting and sharing information on citizens deemed necessary for the functioning of the state.

TRANSCRIPT

Page 1: Dave Lyons - China's Golden Shield Project

China's Golden Shield Project:

Myths, Realities and Context

Dave Lyons

School of Communications, Library and Information Science

Rutgers University

7th Annual Chinese Internet Research Conference 2009

University of Pennsylvania

Page 2: Dave Lyons - China's Golden Shield Project

Introduction

In the past decade, there has been a tendency to use the technical term “Golden Shield Project”

as a synonym for the colloquial expressions “Great Firewall” or “Net Nanny”, which refer to China's

active censorship and monitoring of Internet content. This mistake has not only been made by Western

observers, but Chinese ones as well. There has been a lack of material, however, describing what the

Golden Shield Project has involved since its inception in 1998 (Walton: 2001). While the GSP is fact

related to Internet monitoring, it plays a minor role in what has been an extraordinary nationwide

initiative in China to “informatize” every aspect of the Ministry of Public Security's workflow at local,

provincial and national levels. Golden Shield is better described as an effort to network the police,

rather than police the network. The first section of this paper seeks to examine the goals and

implementation of the Golden Shield Project as reported in online Chinese media and government

reports, as well as touch upon the cultural context of policing in China and its relevance to China's

digital police reforms. The conclusion will attempt to place some of these developments into a proper

global context, arguing that China is not a “testbed” for global surveillance and policing technology,

but rather is catching up to the industrialized West within its own cultural context.

Golden Shield: A History

The Golden Shield Project has often been mentioned in Western media reports in the same

breath as Internet censorship (Fallows: 2008, August: 2006, Klein: 2008, Walton: 2001, Zhang: 2005),

but this misrepresents the goals of the GSP. The GSP is better understood as a national initiative to

'informatize' (xinxihua) the public security apparatus. The Chinese leadership has seen 'informatization'

as a fundamental part of its drive towards modernization since the late 1980s, influenced by Alvin

Page 3: Dave Lyons - China's Golden Shield Project

Toffler's The Third Wave and then spurred after witnessing the Clinton administration's focus on

developing the Internet industry in the U.S.. The government began with an “Office Automation

Project” in the late 1980s to introduce computers to all levels of Chinese government (Zhang: 2005).

The Golden Shield is part and parcel of a larger array of Golden Projects, of which there are at

least twelve, covering the financial industry, social security, agriculture, tax collection, customs, water

management, manufacturing standards, government auditing, IC card technology and more (Guo: 2006.

A 2003 overview (China.com.cn: 2003) described the Project as encompassing the construction and

securing of PSB communications and networking, computer application development, the

establishment of ministry-wide IT standards and practices, as well as “public network security

monitoring”, or the Cyberpolice. The Project has overseen the development of eight nationwide

networked databases for police purposes:

Population management

Criminal records

PSB personnel

Fugitives

Stolen vehicles

Motor vehicles/drivers licenses

National security

Border control

Accompanying these databases are operational software platforms developed at the provincial level for

various tasks, which generally include:

population management

Page 4: Dave Lyons - China's Golden Shield Project

public security work

case management

crime analysis

foreign affairs management

central dispatch

traffic management

personnel management

national security

The Project was originally scheduled in three phases: a research and development phase from

1998 to 1999, followed by Phase I (1999-2002) which focused on laying the foundations for a three tier

network (local, provincial and national) and developing accompanying applications and standards, as

well as developing communications facilities including secure intranet, mobile/wireless, satellite,

telephone and video conferencing. The central government invested 816.5 million RMB, 200 million of

which was allocated to the Western regions and the rest given to the MPS to distribute at the provincial

and national levels. (China Market Intelligence Center: 2006). The second phase, devoted to

completing this work, was scheduled to run from 2002-2004. It appears, however, that the Project took

longer than anticipated, as completion of the project was not approved by various national agencies

until late 2006 (sdpc.gov.cn: 2006). Moreover, overlapping initiatives such as the 2nd generation ID

card have been underway through 2008, and while the Golden Shield Project may have been

completed, the systems it built continue to evolve. A 2008 review of the 12 Golden Projects estimated a

total of 6 billion RMB had been invested at the provincial and local levels in implementing the entire

project along with the initial central government investment (E-Gov.org.cn: 2008)

The National Population Information Management System: Golden Shield's “Dragon's Head”

Page 5: Dave Lyons - China's Golden Shield Project

The National Population Information Management System is China's first ever, and most likely

the world's most ambitious, national register of citizens. The development of this database did not

begin with Golden Shield. The MPS has been pursuing a national registration database since 1986, and

in the late 1990s began the “Hundred Cities Network Project” to create a population registration

network in China's largest cities in response to an increasingly mobile population (Central People's

Government website: January 23, 2006). By 2002, when Golden Shield had completed its first phase,

the “Hundred Cities Network Project” had in fact already connected 250 cities and 650 million

searchable individual hukou records (People's Daily: 2002; Keane: 2006), and presumably had thus laid

significant groundwork for the population management component of Golden Shield's second phase.

According to Gov.cn, the official website of the government of the People's Republic of China, this

process shifted the focus of registration away from the isolated local police station, to a vertically

integrated network ranging from the local station to the ministerial level, with records for 1.26 billion

individuals across over 150 centralized prefecture level databases, which are designed to be the hubs

for the network. The report also said the population information management system is the “dragon's

head” (longtou) of Golden Shield, highlighting its central importance to the initiative, and provided

“one stop shopping” for various services and vital information for various government departments,

including family planning, education, health, taxation and telecommunications.

The Second Generation ID Card: Replacing the Hukou?

The second generation ID card is the necessary corollary to the population management

database. For over 50 years, the primary form of identification for Chinese citizens has been the

household registration certificate (hukou), which gives citizens access to employment, education,

health care, and other vital services. Permanent and temporary residents in any administrative area must

Page 6: Dave Lyons - China's Golden Shield Project

register with the local police station. This system, however, was clearly ill suited for the reform and

opening up process that began in the 1980s under Deng Xiaoping, as restrictions on mobility relaxed

and millions of rural residents migrated to the cities in search of work. The Chinese government

created the first generation national ID card in 1985 to supplement the hukou, but did not begin

implementing a network solution until the 100 City Network Project in the 1990s. It is also worth

noting that the household registration system has been the focal point of China's national census efforts

(Wang: 2001). Prior to census canvassing, the hukou registers are “rectified”, and used as the basis for

census work (Lavely: 2001). While the hukou system is meant to track everyone, limited resources

generally leads police to only focus on “targeted persons”, either previously convicted or suspected of

criminal activity. The national population management system and ID card give police a nationwide,

integrated system for tracking and monitoring these individuals (Keane: 2006; Wang: 2004).

Despite this, however, by the mid-1990s rural migrants accounted for a disproportionate amount

of criminal cases in the courts of major cities, indicating that existing policing methods were unable to

cope with the massive social and demographic changes brought about by economic reform (Chen:

2002). Community policing in China's recent past typically was centered around a stable, local

community, which in turn has deep roots in the traditional baojia system of collective justice in earlier

dynasties (Dutton: 1988). Local residents helped the police with hukou registration through security

defense committees (SDCs), and engaged in mutual surveillance. Economic reform and its attending

increase in mobility has not only made this system ineffective, but driven the police to become more

professional, bureaucratic, and distant (Wong: 2001). At the same time, the national ID card system

means a move away from a collective-based “resident” identity within the local hukou district, to an

individual, mobile “citizen” identity.

Another consequence of these changes has been a flourishing black market for forged

documents. It is not uncommon in Chinese cities today to see forgers (banzheng) phone number graffiti

on the sides of buildings, stairwells or even on occasion mischievously scrawled on police cars. In an

Page 7: Dave Lyons - China's Golden Shield Project

interview in 2007, then Minister of Civil Affairs Li Xueju discussed plans for a national marriage

registration network, saying that local marriage registers had become “information islands” and that the

use of fake documents was “rampant”(IT168.com: 2007). All provinces are now expected to complete a

national marriage registration network by 2010, one reason ostensibly being to eliminate bigamy

(Sichuan News: 2009). While the marriage network has yet to be constructed, the second generation ID

card is undoubtedly meant to tackle many of the same problems of forgery and identity fraud. The ID

Card Law written in 2003 lays out penalties not only for forgery or identity theft, but also makes the

police liable for any corrupt practices involving ID cards (Keane: 2006). This has not prevented forgers

from producing fake 2nd generation ID cards, however, which began to be reported not long after its

introduction (Sina.com: 2006, Shantou Daily: 2007). These forgeries, however, do not appear to have

not surmounted the technical challenges of counterfeiting RFID chips or personal data. The Chinese

government has also established services for anyone to verify an individuals identity through the

National Citizen Identity Information Center via the Internet (http://www.nciic.com.cn/) or mobile

phone to guard against fraud (Keane: 2006).

The second generation ID card appears to contain the same basic data as the household

registration under a unique identifier. The ID number consists of 18 digits, the first 6 containing the

holders permanent hukou district code, followed by their birthdate (digits 7-14, year-month-day) and

the 'sequence number' (differentiating people with the same birthdate, even for males and odd for

females). Brown reports this number was four digits on the first generation ID card, while Keane

claims it is three digits on the 2nd generation card followed by a single digit verification number. In

2001, it was reported that the 2nd Generation ID Card would contain biometric data such as fingerprints

(Sohu.com: 2001), but this was determined to be infeasible and scrapped (Brown: 2008). The “PRC

Resident ID Card Act” went into effect on January 1, 2004 and the second generation ID card project

went into effect, scheduled to be completed by the end of 2008. An embedded RFID chip allows

contactless scanning. According to one posting on the Ministry of Commerce website, the card would

Page 8: Dave Lyons - China's Golden Shield Project

accomplish two important goals: first, it would be vital for the verification of identity regarding

residency, marriage, military service, adoption, travel abroad, vehicle registration and licensing, hotel

occupancy, bank accounts and legal matters. The second generation ID card would, in effect, be a

universal identifier. Second, the card would create a domestic IT industry chain, from RFID chip design

to database and card reader production. Interestingly, the posting also says that card readers must have

an effective range of 10 cm in order to protect users privacy as well as allay health concerns about

radiation (Ministry of Commerce website: 2006). While the first generation ID card had to be replaced

whenever a resident moved their hukou, this information is simply altered on the internal chip of the

new 2nd generation card, simplifying the bureaucratic process. The registration form for the new ID

card also requests less information than the previous model, as questions about blood type, religious

beliefs, level of education, military service, occupation and marital status are omitted (Keane: 2006).

This information, however, may still be recorded within the local hukou record.

By December 2008, more than 900 million 2nd generation ID cards had been issued nationwide

(Central People's Government: 2009).

What's in a Name?

One of the issues surrounding the 2nd generation ID card and the national population

information management system involves personal names. The recent case of “Zhao C” brought to

national and even global attention restrictions on using the latin alphabet in names (Martinsen: 2009),

and a prior case involved parents who wanted to name their child using the symbol “@” (Brown:

2008). While rare characters were sometimes handwritten on first generation ID cards, there is no such

flexibility with the second generation card due to the limitations of the networked database. A draft law

put forward in 2007 by the Ministry of Public Security barred the use of the following in names:

Page 9: Dave Lyons - China's Golden Shield Project

already simplified traditional characters

eliminated variant characters

self-designed characters

foreign letters or characters

pinyin

Arabic numerals

symbols

other non-standard Chinese characters and minority scripts beyond the scope of the system.

The New York Times reported that PSB systems accommodate 32,252 of the roughly 55,000

Chinese characters in existence (LaFraniere: 2009). In some cases temporary ID cards are continually

reissued for citizens whose names are outside the scope of the system, but this is an incomplete solution

since their names still cannot be inputted on computer systems at, say, hotels or banks (Brown: 2008).

A related issue is the failed attempt at creating a real name registration system for Internet use in

2005, which met not only with dissatisfaction from Chinese netizens but the emergence of

circumvention tools that generated fake ID numbers not only for China but Korea as well, which had

implemented a similar, voluntary program earlier. Online gaming companies were targeted for

mandatory use, but in one article a customer service representative at one game company admitted that

“if you don't enter your real number, it's not a big deal.” The company had never verified players ID

numbers with the PSB, and “it doesn't matter if you enter a random string of numbers”

(Chinabyte.com: 2006). While the population management information system and the 2nd generation

ID card create a system for authenticating identity, China has so far failed to implement an effective

method for users to submit genuine identification.

Reports from Testbed Cities: Guangzhou, Weihai & Qingdao

Page 10: Dave Lyons - China's Golden Shield Project

The official website of the Ministry of Public Security (MPS) (mps.gov.cn: March 29; April 10;

April 13, 2006) published several reports from testbed cities on their progress implementing Golden

Shield, under the rubric of “strengthening urban policing through science and technology”. Each report

gives some idea of how each city places emphasis on different Golden Shield objectives. Guangzhou,

for example, claims its CCTV surveillance network covering 2,519 streets aided in 67% of 21, 000

arrests during its 2005 “Sword Lily” anti-street crime campaign, and its partnering with China

Construction Bank to expedite the payment of traffic tickets and curb the use of false receipts. There is

also a focus on convenience and service: informatization dropped the wait time for residents to receive

exit permits (for going abroad) from 25 days to a mere two, and is compared to “supermarket

shopping”, thanks to image comparison software allowing application photos to be compared to those

in the city's population management database.

Weihai and Qingdao, on the other hand, mention harbor security, a topic absent from

Guangzhou's report though it is one of China's busiest ports. Weihai also mentions the presence of

8,000 foreign residents as well as a migrant population of 8 million, a detail not considered important

in Guangzhou's report. One example from Weihai involves the investigation three connected fraud

cases in Weihai's Economic and Technology Zone. A suspect from another province was located at his

hotel, not by directly checking the population management database but instead by using the network to

issue a bulletin citywide. Other improvements considered part of Golden Shield include the 110

emergency hotline system, mobile command and communications, firefighting capabilities, radio

dispatch, crime scene investigation scientific equipment such as microscopes and DNA sequencers,

and, in the case of Guangzhou, joint research and development with Beijing and Tsinghua universities

as well as the Hong Kong police force.

In 2004 trial Qingdao launched its PSB Network Security Monitoring and Alert Center, or

Cyberpolice. Over nearly 2 years it received over 12,000 reports from netizens, uncovered 367 cases

Page 11: Dave Lyons - China's Golden Shield Project

“of every sort”, and arrested 316 suspects. The Qingdao cyberpolice were involved in the first national

crackdown on international pornography rings, participating in two cases involving overseas

pornographic distributors. Qingdao also implemented an internet cafe IC card system to monitor over

2,000 cafes citywide to combat “pornography and other harmful information”, leading to arrest of more

than 30 suspects. Weihai reported its network monitoring team investigated 137 cases and arrested 198

suspects, 27 of which were online-identified fugitives for every kind of crime in 2005. The team

arrested 19 “criminal elements” with the aid of the city's Internet cafe IC card management system, and

investigated 53 cases of “broken regulations”. The Guangdong report doesn't mention Internet

monitoring, though Guangdong has one of the oldest cyberpolice programs in China, as discussed

below.

Data Quality and Integrity

In 2007, an estimated 90% of “grassroots” or the lowest level of PSB stations had been

incorporated into the network, with 800,000 computers nationwide or 47 for every 100 staff (China

Economic Net: 2007). Having the technology, however, does not immediately translate into fluent and

accurate usage. Hebei province reported that many rural areas “lacked technical skills”, leading to

inaccurate data entry (Handan Municipal Government website: 2005). Guangzhou, in its MPS report,

emphasized four principles for hiring personnel: the ability to use office automation systems, basic

applications, search systems, and at least one Chinese character input method – in other words, basic

computer office skills. In an interview in 2007, Xie Yiping, director of the MPS Information Center and

vice-director of the Golden Shield Office said that there were problems with data quality that still

needed to be addressed (Sina.com: 2007).

The Cyberpolice

Page 12: Dave Lyons - China's Golden Shield Project

One public security function related to Internet censorship and monitoring that is associated

with Golden Shield is the mention of “public network security monitoring”, or the Cyberpolice. As

mentioned above, the cyberpolice have been mentioned in reports about Golden Shield, albeit as a

small component among many other technology-based changes in public security administration, and

often the “network monitoring teams” are not mentioned at all. A 2008 article on the Guangdong

cyberpolice describes the development of Internet crime investigation in the province (Yangcheng

Evening News: 2008). It was the Guangdong cyberpolice in Shenzhen who developed the Jingjing and

Chacha cyberpolice cartoon characters as a deterrent. In 1994, Guangdong's Provincial Information and

Communication (PIC) department had two staff members. In 1998, the MPS changed the name of its

ministry level Computer Management and Supervision division to the Public Information Network

Security Supervision Bureau. In 2000, Guangdong's PIC changed its name to the Public Information

Network Security Supervision department and had 22 personnel. By 2008 the province had a network

of more than 1,000 cybercops. The cybercops responsibilities not only involve monitoring the public

Internet, but working on computer crime cases such as viruses, malware, hackers, and online fraud, as

well as using the Internet to receive reports of possible crimes, much like the 110 emergency phone

number. The reporting aspect in some ways reflects the interaction between police and citizens in

traditional Chinese community policing. The emphasis on netizen reporting on online crime through

cyberpolice web portals is not dissimilar to the “mass line” approach to policing of earlier decades, in

which citizens are seen as the front line against crime with police assistance, rather than vice versa

(Wong: 2001). Mutual surveillance as form of social control and crime prevention is not simply a

Communist innovation, either; as mentioned above, earlier systems such as the baojia also empowered

families within the community to monitor one another for inappropriate behavior (Dutton: 1988).

Similarly, “50 Cent Parties”, state-organized groups of netizens directed to seek out controversial

online discussions and make pro-government arguments (Bandurski: 2008), are forms of citizen

Page 13: Dave Lyons - China's Golden Shield Project

surveillance working in cooperation with public security officials not unlike the security defense

committees or neighborhood committees found in a hukou district. The policing of the virtual

community, then, bears a striking resemblance to long-standing structures in real life.

While some authors have suggested that Golden Shield is involved in censoring certain IP

addresses and keywords, these aspects of Chinese censorship are conducted by the Ministry of Industry

and Information Technology (MIIT), provincial ISPs, and Internet content providers themselves

(Human Rights Watch: 2006; MacKinnon: 2009). Public security bureaus, however, are part of the

process. Anti-pornography campaigns aimed at “purifying the Internet”, for example, have been

coordinated efforts between the MPS and MIIT (Nanfang Weekend: 2005). Golden Shield, however,

appears to be more accurately described as the national government's effort to bring computer networks

to policing, of which only a small part is monitoring activity on the public Internet.

Conclusion: Golden Shield in an International Context

The various forms of “informatization” that Golden Shield encompasses are not novel, despite

claims that China is pioneering new forms of centralized surveillance that have no precedent in the

West (Klein: 2008). National ID cards, or similar universal identifiers such as social security numbers,

have existed in some form in most Western nations longer than they have in China, which did not have

any such comprehensive system until the 1980s. Likewise, the use of computers in census data has a

long history in countries such as the United States, where Hollerith punch cards were used for data

processing in the 1890 national census (Agar: 2003), and the first UNIVAC computer was delivered to

the U.S. Census Bureau in 1951 and the use of optical readers in 1960(U.S. Census Bureau). During the

same period, the U.S. social security number took on many of the same functions as the new PRC ID

card number as the computer revolution across government and industry made use of it as a de facto

universal identifier, and the Social Security Administration itself computerized (Social Security

Page 14: Dave Lyons - China's Golden Shield Project

Administration: 1997). In 1965, American visitors to China observed that the country probably did not

have any functioning computers in 1958, and was just beginning to develop its own computer expertise

after the Sino-Soviet split. The computers available were few and far between, and mostly limited to

scientific research projects, most notably nuclear weapons development (Audette: 1966). By 1985,

China had developed its first mainframe similar to the previous decade's Cray I but with less computing

power (Gao: 1986). Punch card technology was later used for administrative purposes in the United

States and Europe throughout the twentieth century, a form of technology that saw little or no large

scale implementation in China. Besides the various difficulties China faced during the twentieth

century that hampered IT development, another obstacle that prevented the mechanization of Chinese

bureaucracy was the problem of character input, which was not solved practically until after the advent

of the personal computer. For the national census, computers were first used by the State Planning

Commission in 1982, and then personal computers in 1990 (Wang: 2001). As mentioned before, local

police stations have long been a key component of census tabulation in China. Similarly, the National

Crime Information Center, the F.B.I.'s centralized information system for law enforcement agencies

nationwide was established in 1967 and contains records on property as well as individuals, including

convicted sex offenders, foreign fugitives, identity theft, immigration violators, missing persons,

protection orders, supervised release, unidentified persons, U.S. Secret Service protection, violent

gangs and terrorist organizations and wanted persons (Federal Bureau Investigation website). The

Chinese version, as part of Golden Shield, as only recently gone online.

The United Kingdom sits in the middle of the spectrum of centralized population registers in

Western nations. The UK first established a national population register early in 1939 at the beginning

of World War II under Registrar-General Sylvanus Percival Vivian and continued to operate until 1952,

when Clarence Willcock refused to hand over his identification to the police. The register was

duplicated, however, for the National Health Service before being dismantled. Vivian echoed one of his

heroes Jeremy Bentham, the 18th century British philosopher who is most famous for designing the

Page 15: Dave Lyons - China's Golden Shield Project

Panopticon Prison, when he wrote that national registration ought to be a discrete “invisible net”, so as

not to upset British citizens. Similar to the NCIC, Britain launched the Police National Computer

system in 1974, which has grown from a stolen vehicles database to include many of the features

included in the NCIC. At the same time Great Britain also launched the Driver and Vehicle Licensing

Center (now the Driver and Vehicle Licensing Agency), which contains records for all drivers and

vehicles in Great Britain and is linked to the PNC (Agar: 2003). Agar points out that the Metropolitan

Police attempted to compile nationwide registers of “habitual criminals” as early as 1869. In the early

20th century, Scotland Yard not only had a central Criminal Records Office linked to 200 stations across

the country by telegraph and wireless, but also cooperated with the Secret Service Bureau MI5, whose

own Central Registry contained 250,000 names of aliens and “suspicious persons” by 1917 and was

used in border control. Britain now has numerous national databases containing information on

individuals, posing varying threats to privacy and civil rights (Anderson: 2009), despite a long-standing

belief that gathering such information is traditionally “un-British” (Agar: 2003).

The role of the state in approving personal names has an extraordinarily long history in Western

nations. Indeed, they were essentially invented and required by the state. As James C. Scott writes in

his book, Seeing Like a State:

The development of the personal surname (literally, a name added to another name, and not to be

confused with a permanent patronym) went hand in hand with the development of written, official

documents such as tithe records, manorial dues rolls, marriage registers, censuses, tax records, and

land records. They were necessary to the successful conduct of any administrative exercise involving

large numbers of people who had to be individually identified and were not personally known to the

authorities. Imagine the dilemma of a tithe or capitation-tax collector faced with a male population, 90

percent of whom bore just six Christian names (John, William, Thomas, Robert, Richard and Henry).

Some second designation was essential for the records, and, if the subject suggested none, it was

Page 16: Dave Lyons - China's Golden Shield Project

invented for him by the recording clerk (Scott: 1999).

In some Western countries, such as New Zealand and Denmark, baby names have been either

rejected or are circumscribed by a government list (Associated Press: 2007, Alvarez: 2004).

Most aspects of the Golden Shield Project replicate systems and services found in Western

developed nations to varying degrees, with the exception of the cyberpolice. The cyberpolice however,

are only a small part of the overall Project, as well as being only one component of the Chinese

government's apparatus to monitor and censor Internet content. Rather than being described as

'Orwellian', it is more accurate to describe Golden Shield as part of a larger process of upgrading the

office machinery of the Chinese government, and cope with problems of migration and crime that have

emerged due to economic reform. At the same time, the introduction of a national universal identifier

number simultaneously changes the relationship of the government and the people from one of a fixed

“resident” belonging to a collective community, to a mobile, individualized “citizen”. While this

reduces the amount of bureaucratic paperwork and visible control over the average citizen, it also gives

more concentrated power to the public security organs to monitor and track targeted individuals.

English References

Agar, Jon, 2003, The Government Machine: A Revolutionary History of the Computer, MIT Press, Cambridge.

Alvarez, L., 2004, “Picked baby's name? Not so fast, in Denmark”, New York Times. Retrieved from

http://www.nytimes.com/2004/10/08/world/europe/08iht-danes.html?scp=1&sq=Picked%20baby%27s%20name?%20Not%20so%20fast,%20in%20Den

Page 17: Dave Lyons - China's Golden Shield Project

mark&st=cse on April 20, 2009

Anderson, R., Brown, I., Dowty, T., Inglesant, P., Heath, W., Sasse, A., 2009, Database State, The Joseph Rowntree Reform Trust Ltd., York.

Associated Press, 2007, “4Real? Baby Name Blocked”, 6abc.com. Retrieved from http://abclocal.go.com/wpvi/story?section=news/bizarre&id=5408136 on April 20, 2009

Audette, D., 1966, “Computer Technology in Communist China, 1956-1965”, Communications of the ACM, 9(9) 655-661.

August, O., 2007, “The Great Firewall: China’s Misguided - and Futile - Attempt to Control What Happens Online,” Wired (23 October), at http://www.wired.com/politics/security/magazine/15-11/ff_chinafirewall, accessed April 20, 2009.

Bandurski, D. 2008, “China's Guerrilla War on the Web”, Far Eastern Economic Review. Retrieved from http://feer.com/essays/2008/august/chinas-guerrilla-war-for-the-web on April 20, 2009.

BBC News website, 2002, “CCTV 'not a crime deterrent', news.bbc.co.uk, retrieved from http://news.bbc.co.uk/2/hi/uk_news/2192911.stm on April 20, 2009

Brown, C.L., 2008, “China's second generation national ID card: merging culture, industry and technology”, Playing the Identity Card: Surveillance, Security and Identification in Global Perspective. Edited by Colin J. Bennett, David Lyon. Routledge.

Chen, X., 2002, “Community and Policing Strategies: A Chinese Approach to Crime Control”, Policing and Society, 12(1), 1-13.

Dutton, M. 1988, “Policing the Chinese Household: a comparison of ancient and modern forms”, Economy and Society, 17(2), 195-224

Fallows, J., 2008, “The Connection Has Been Reset,” Atlantic (March), at http://www.theatlantic.com/doc/200803/chinese-firewall, accessed April 20, 2009.

Federal Bureau of Investigation website, “What is the NCIC?”, Retrieved from http://www.fbi.gov/hq/cjisd/ncic_brochure.htm on April 20, 2009.

Page 18: Dave Lyons - China's Golden Shield Project

Gao, Q., Zhang, X., Yang, S., Chen, S. (1986), “Vector Computer 757”, Journal of Computer Science & Technology, 1(3), 1-14.

Guo Liang, 2006, “Under the Golden Shine: China's Efforts to Bridge Government and Citizens”, United Nations Centre for Regional Development.

Human Rights Watch, 2006, “How Censorship Works in China: A Brief Overview”, Race to the Bottom: Corporate Complicity in Chinese Internet Censorship. Retrieved from http://www.hrw.org/reports/2006/china0806/3.htm on April 20, 2009.

LaFreniere, S., April 20, 2009, Name Not on Our List? Change It, China Says, New York Times. Retrieved from

http://www.nytimes.com/2009/04/21/world/asia/21china.html?_r=1&ref=asia&pagewanted=all on April 23, 2009

Lavely, W. 2001, First Impressions of the 2000 Census of China, Population and Development Review, 27(4), 755-769.

Keane, M. 2006, “China's National Resident Identity Card: Identity and Population Management in Transition”, UCLA Pacific Basin Law Journal, 23(2), 212-242.

Klein, N. 2008. “China’s All–Seeing Eye,” Rolling Stone (28 May), at http://www.rollingstone.com/politics/story/20797485/chinas_allseeing_eye, retrieved April 20, 2009.

MacKinnon, R. 2009, “China's Censorship 2.0: How companies censor bloggers”, First Monday, 14(2-2). Retrieved from http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2378/2089 on April 20, 2009.

Martinsen, J. 2009, “Zhao “left crescent” needs a new name”, Danwei. Retrieved from http://www.danwei.org/language/zhao_left_crescent_needs_a_new.php April 20, 2009.

Scott, J. C. 1998, Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed, Yale University Press, New Haven and London.

Social Security Administration, 1997, “Report to Congress on Options for Enhancing the Social Security Card”, retrieved from http://www.ssa.gov/history/reports/ssnreportc2.html on April 29, 2009.

Page 19: Dave Lyons - China's Golden Shield Project

U.S. Census Bureau: History, retrieved from http://www.census.gov/history/index.html on April 20, 2009.

Walton, G., 2001, China's golden shield: corporations and the development of surveillance technology in the People's Republic of China. Montreal: International Centre for Human Rights and Development, at http://www.ichrdd.ca, accessed April 20, 2009.

Wang F.L., 2004, “Reformed Migration Control and New Targeted People: China's Hukou System in the 2000s”, The China Quarterly, 177, 115-132.

Wang F., 2001, “China: Censuses of 1982 and 1990”, IPUMSI Microdata Handbook, Integrated Public Use Microdata Series International, retrieved from https://international.ipums.org/international/index.html on April 20, 2009.

Wong, K.C., 2001, “Community Policing in China: Philosophy, Law and Practice”, International Journal of the Sociology of Law, 29, 127-147.

Zhang, Jinhua, 2005 “Good Governance Through E-Governance? Assessing China's E-Government Strategy”, Journal of E-Government, 2(4), 39-72.

Chinese Websites

Central People's Government of the PRC, January 23, 2006, [社会稳定 ]全国人口信息管理系统建设成效显著 ([Social Stability] National Population Information Management System Produces Outstanding Results). Retrieved from http://www.gov.cn/ztzl/2006-01/23/content_168430.htm on April 20, 2009

Central People's Government of the PRC, January 9, 2009, 公安部 :服务大局攻坚克难 08年治安管理工作回顾 (MPS: Providing Services, Overcoming Challenges 2008 Review of Public Security Supervision Work). Retrieved from http://www.gov.cn/gzdt/2009-01/09/content_1200336.htm on April 20, 2009

China.com.cn, February 27, 2003, 金盾工程 (Golden Shield). Retrieved from http://www.china.com.cn/chinese/zhuanti/283732.htm on April 20, 2009. Chinabyte.com, December 25, 2006 , 身份证生成器现身网络 实名制形同虚设 (ID Number Generator Appears Online, Real Name Registration Appears Set Up in Vain). Retrieved from

http://net.chinabyte.com/320/3019820.shtml on April 20, 2009

China Economic Net, October 16, 2007, 今日关注 :看信息网络如何成为180万民警的好帮手 (Daily Focus: How Information Networks Aid 1.8 Million Cops), October 16, 2007. Retrieved from http://finance.ce.cn/law/home/sh/200710/16/t20071016_12663884.shtml on April 20, 2009

Page 20: Dave Lyons - China's Golden Shield Project

China Market Intelligence Center, August 29, 2006, 十二金 推动电子政务辉煌 (Twelve Goldens: Promoting Glorious E-Government Services). Retrieved from http://media.ccidnet.com/art/2983/20060829/883157_1.html on April 20, 2009.

E-Gov.org.cn, March 10, 2008 , 十二金工程 (The 12 Golden Projects). Retrieved from http://www.e-gov.org.cn/news/news007/2008-03-10/85519.html on April 20, 2009

Handan Municipal Government, April 22, 2005, 河北省人口信息管理系统建设实施方案 (Hebei Provi nce Population Management System Construction and Implementation Program). Retrieved from http://qlgk.hd.gov.cn/zcfg/P020050422324914662948.doc April 20, 2009

IT168.com, March 27, 2007, 全国婚姻联网登记能保证一夫一妻? (Can a National Marriage Network Eliminate Bigamy?) Retrieved from http://cio.it168.com/t/2007-03-27/200703270928152.shtml April 20, 2009

Ministry of Commerce, July 15, 2006, 第二代身份证阅读器公安部门指定生产厂商全国招募合作伙伴 (MPS Designates Card Reader Manufacturers as Partners for 2nd Gen ID Card). Retrieved from http://blog.mofcom.gov.cn/column/print.shtml?/hgjj/200607/20060700009443 by Diigo at http://www.diigo.com/cached?url=http%3A%2F%2Fblog.mofcom.gov.cn%2Fcolumn%2Fprint.shtml%3F%2Fhgjj%2F200607%2F20060700009443 on May 13, 2007

Ministry of Public Security, March 29, 2006, 科技强警示范城市建设经验交流:青岛——向奥帆赛交出一份合格答卷 (Testbed Cities Experiences Using Technology to Strengthen Policing: Qingdao – Qualified to Hold Olympic Sailing Events). Retrieved from http://www.mps.gov.cn/n16/n1252/n1912/n3052/126130.html on April 20, 2009

Ministry of Public Security, April 10, 2006, 科技强警示范城市建设经验交流:威海——辽阔海域架起科技网 (Testbed cities share experiences on using science and technology to strengthen urban policing: Weihai – A vast sea raises up a high tech network). Retrieved from http://www.mps.gov.cn/n16/n1252/n1912/n3052/126437.html on April 20, 2009

Ministry of Public Security, April 13, 2006, 科技强警示范城市建设经验交流:广州——实现警务装备现代化 (Testbed Cities share experiences on using science and technology to strengthen urban policing: Guangzhou – Successfully Modernizing Police Services). Retrieved from http://www.mps.gov.cn/n16/n1237/n1402/126538.html April 20, 2009

Nanfang Weekend, August 18, 2005, “”. Retrieved from http://www.nanfangdaily.com.cn/zm/20050818/xw/szxw1/200508180019.asp via the Internet Archive at http://web.archive.org/web/20050924195629/http://www.nanfangdaily.com.cn/zm/20050818/xw/szxw1

Page 21: Dave Lyons - China's Golden Shield Project

/200508180019.asp on April 20, 2009. English translation available at http://zonaeuropa.com/20050821_1.htm.

National Development and Reform Commission, November 27, 2006, “金盾工程 ”通过国家验收 (Golden Shield Passes National Inspection). Retrieved from http://www.sdpc.gov.cn/zdxm/t20061127_95509.htm on April 20, 2009

People's Daily, January 4, 2002 , 百城联网工程 ”联结250个地市6.5亿人口信息网上查 (100 City Network Project links 250 cities and 650 million searchable individual records). Retrieved from http://past.people.com.cn/GB/shehui/47/20020104/641589.html on April 20, 2009

Shantou Daily, May 11, 2007, 汕头机场首次查获假 “二代证” (Shantou Airport Captures Its First Fake “Second Gen ID Card”). Retrieved from http://www.dahuawang.com/localnews/showlocal.asp?no=88264 April 20, 2009

Sichuan News, April 9, 2009, 婚姻登记联网 重婚就要现形 (Marriage Registration Network Allows Detection of Bigamy). Retrieved from http://sichuan.scol.com.cn/lsxw/20090409/200949103637.htm April 20, 2009

Sina.com, April 8, 2006, 机场首次查获第二代假身份证 (Airport Catches First Fake 2nd Gen ID). Retrieved

from http://news.sina.com.cn/c/2006-04-08/04068649034s.shtml on April 20, 2009

Sina.com, February 7, 2007, 中国信息化杂志:金色盾牌 信息铸就 (China Informatization Magazine: Golden Shield, An Informational Foundation). Retrieved from

http://tech.sina.com.cn/it/2007-02-07/10321373856.shtml on April 20, 2009

Sohu.com, March 14, 2001, 一卡多用全国联网,第二代身份证绝对智能 (A Single Multipurpose Networked Card, The Second Generation ID Card is Truly Intelligent(. Retrieved from http://news.sohu.com/10/31/news144333110.shtml April 20, 2009

Yangcheng Evening News, December 15, 2008, 网络警察:守护虚拟世界的卫士 (Cyberpolice: Guardians of the Virtual World). Retrieved from http://www.ycwb.com/ePaper/ycwb/html/2008-12/15/content_382746.htm on April 20, 2009.