Skip to main content

Online Censorship

  • Chapter
  • First Online:
Human Rights and Digital Technology
  • 813 Accesses

Abstract

The Internet provides a virtual locale for the highly diverse carnival of human experience, offering a display of the best, and the worst of human nature. 1 As far as the latter is concerned, citizens expect their state to protect vulnerable populations, particularly minors, from online content that is hateful, violent, or pornographic in nature by eliminating proscribed material from the Web. This chapter will examine the practice of online censorship in two very different settings: the closed Internet system in China and the open Internet system in Europe. In each case, the state acts as a guarantor of content, censoring proscribed material according to the law in place. However, not all material that is censored is hateful, violent or pornographic; some, in fact, is highly political. The Chinese authorities have shown little tolerance for online activity that may threaten the monopoly of one-party rule in China, whereas European states have pursued a broad policy of hate speech censorship that has been extended to religious radicalism in recent years due to efforts to counteract online recruitment for jihadism. This chapter will compare and contrast (1) the interaction between Internet technology systems and censorship methods, (2) the legal constructs that frame government censorship policies, (3) the contested nature of information on the Internet, and (4) the impact of censorship on Internet users in both Europe and China. This chapter argues that, regardless of the governance system, digital censorship may violate or promote human rights according to the context. In the case of both China and Europe, Internet censorship has been relatively ineffective in countering real or perceived threats to the state and poses a problem for many in society who question the legitimacy of government officials more concerned with public opinion than the safeguarding of constitutional values.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Bibliography

  • Agence France Presse. (2014). China has massive internet breakdown reportedly caused by their own censoring tools. January 23. Retrieved April 3, 2016, from http://www.businessinsider.com/chinas-internet-breakdown-reportedly-caused-by-censoring-tools-2014-1?IR=T

  • Amnesty International. (2002). People’s Republic of China: State control of the internet in China. Index number: ASA 17/007/2002. Retrieved April 3, 2016, from https://www.amnesty.org/en/documents/ASA17/007/2002/en

  • Ang, P.H. (1997). How countries are regulating internet content. 7th Annual Conference of the Internet Society, Kuala Lumpur. Internet Society. Retrieved March 17, 2016, from http://www.isoc.org/inet97/proceedings/B1/B1_3.HTM

  • Associated Press. (2015) Poland’s lawmakers approve new law on state media control. Associated Press. Retrieved December 30, 2015, from http://www.ap.org (home page).

  • Bamman, D., O’Connor, B., & Smith, N. (2012). Censorship and deletion practices in Chinese social media. First Monday, 17(3), 2.

    Google Scholar 

  • Bekmezian, H. (2016, March 17). Le Sénat enterre la déchéance de nationalité. Le Monde.

    Google Scholar 

  • Bertho, A. (2016, March 25). De la rage sans espoir au martyre: penser la complexité du jihadisme. Libération.

    Google Scholar 

  • Bilewicz, M., Marchlewska, M., Soral, W., Winiewski, M. (2014). Hate speech in Poland 2014: Summary of the national opinion poll. Stefan Batory Foundation, Warsaw. Retrieved March 17, 2016, from http://www.ngofund.org.pl (home page).

  • Bouzar, D., Caupenne, C., & Valsan, S. (2014). La Metamorphose operée chez le jeune par les nouveaux discours terroristes. Paris: CPDSI.

    Google Scholar 

  • Bunn, M. (2015, February). Reimagining repression: New censorship theory and after. History and Theory, 54, 25–44.

    Article  Google Scholar 

  • Burgat, F. (2015, December 1). Réponse à Olivier Roy: les non-dits de l’islamisation de la radicalité. L’Obs avec Rue 89.

    Google Scholar 

  • Butler, J. (1997). Excitable speech: A politics of the performative. New York: Routledge.

    Google Scholar 

  • Cazeneuve, B., et al. (2016, March 8). La Lutte Contre le Terrorisme, Statement. Gouvernement.fr. Retrieved March 17, 2016, from http://www.gouvernement.fr/action/la-lutte-contre-le-terrorisme

  • Chapman, A. (2015). Don’t bring a dove to a Polish hawk fight: As Poland readies for its presidential election, one thing is certain: Russia is a threat. Foreign Policy. Retrieved May 9, 2015, fromhttp://foreignpolicy.com/2015/05/09/dont-bring-a-dove-to-a-polish-hawk-fight-presidential-election-russia-ukraine http://foreignpolicy.com (home page).

  • Cheung, J. (2015). China’s great firewall just got taller. Open democracy. Retrieved July 14, 2015, from https://www.opendemocracy.net (home page).

  • China Daily Online (2015). Snapshot of Xi on making internet an interconnected world. Retrieved January 6, 2016, from http://www.chinadaily.com.cn/china/2015-12/11/content_22692734_7.htm

  • China Digital Times. (2016). Fifty cent party. Retrieved March 19, 2016, from http://chinadigitaltimes.net/space/Fifty_Cent_Party

  • China Internet Network Information Center. (2012). The 30th Statistical report on internet development in China. Retrieved January 31, 2013, from http://www1.cnnic.cn (home page).

  • China Internet Network Information Center. (2013) The 31st Statistical report on internet development in China. Retrieved January 31, 2013, from http://www1.cnnic.cn (home page).

  • China Internet Network Information Center. (2016) The 37th Statistical report on internet development in China. Retrieved March 17, 2016, from http://www1.cnnic.cn (home page).

  • Clayton, R., Murdoch, S. J., & Watson R. N. M. (2006). Ignoring the great firewall of China. 6th Workshop on Privacy Enhancing Technologies Conference Paper, Cambridge.

    Google Scholar 

  • Congressional Executive Commission on China. (2002a) Interim provisions on the administration of internet publication, Article 17, CECC. Retrieved March 17, 2016, from http://www.cecc.gov (home page).

  • Congressional Executive Commission on China. (2002b) International agreements and domestic legislation affecting freedom of expression. Order No. 292, CECC. Retrieved March 17, 2016, from http://www.cecc.gov (home page).

  • Congressional Executive Commission on China. (2002c). PRC legal provisions: Regulations on the administration of internet access service business establishments. CECC. Retrieved March 17, 2016, from http://www.cecc.gov (home page).

  • Conseil National Numérique. (2014, July 15). Avis n°2014-3 sur l’article 9 du projet de loi renforçant les dispositions relatives à la lutte contre le terrorisme. Conseil National Numérique.

    Google Scholar 

  • Cornevin, C. (2016, February 3). Islamisme: 8250 individus radicalisés en France. Le Figaro.

    Google Scholar 

  • Council of Europe. (1953). European convention for the protection of human rights and fundamental freedoms. 231 U.N.T.S. 222, Article 10, Council of Europe, Rome.

    Google Scholar 

  • Council of Europe. (2003). Additional protocol to the convention on cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems. European Treaty Series, 189.

    Google Scholar 

  • Einhorn, B. (2013). World of warcraft no longer rules in China. Bloomberg. Retrieved July 11, 2016, from http://www.bloomberg.com/bw/articles/2013-07-11/world-of-warcraft-no-longer-rules-in-china

  • Esarey, A., & Xiao, Q. (2011). Digital communication and political change in China. International Journal of Communication, 5, 289–319.

    Google Scholar 

  • European Commission. (2016). Antitrust: E-commerce sector inquiry finds geo-blocking is widespread throughout EU. Retrieved April 4, 2016, from http://europa.eu/rapid/press-release_IP-16-922_en.htm

  • Eurostat. (2015). Information society statistics—households and individuals. Retrieved April 3, 2016, from http://ec.europa.eu/eurostat/statistics (homepage).

  • Fallows, J. (2008, March). The connection has been reset. The Atlantic.

    Google Scholar 

  • Florini, A., Lai, H., & Tan, Y. (2012). China experiments: From local innovations to national reform. Washington, DC: Brookings Institute.

    Google Scholar 

  • Freedom House. (2015). Freedom on the net: China. Freedom House. Retrieved March 18, 2016, from https://freedomhouse.org/report/freedom-net/2015/china

  • Global Internet Liberty Campaign. (1998). Privacy and human rights: An international survey of privacy laws and practice. Retrieved April 3, 2016, from http://gilc.org/privacy/survey

  • GreatFire.org. (2014). Authorities launch man-in-the-middle attack on Google. GreatFire.org Blog. Retrieved January 6, 2016, from https://en.greatfire.org/blog/2014/sep/authorities-launch-man-middle-attack-google

  • Hatton, C. (2016). Is Weibo on the way out? BBC China Blog. Retrieved January 6, 2016, from http://www.bbc.com/news/blogs-china-blog-31598865

  • House of Representatives. (1994). Communications Assistance for Law Enforcement Act, 103rd Congress, 2nd Session, H.R. 4922, The Library of Congress. Retrieved March 13, 2016, fromhttp://thomas.loc.gov/cgi-bin/query/z?c103:H.R.1494.IH: https://www.loc.gov (home page).

  • Jiang, M. (2010). Spaces of authoritarian deliberation: Online public deliberation in China. In B. He & E. J. Leib (Eds.), The search for deliberative democracy in China (pp. 261–287). New York: Palgrave Macmillan.

    Google Scholar 

  • Jin, L. (2008). Chinese outline BBS sphere: What BBS has brought to China? Thesis (S.M.), Massachusetts Institute of Technology, Dept. of Comparative Media Studies.

    Google Scholar 

  • Kandziora, K. (2016). Le théâtre menacé de censure en Pologne, Arte. Retrieved March 17, 2016, from http://info.arte.tv/fr/tentative-de-censure-wroclaw

  • Kelly, S., Cook, S., & Truong, M. Eds. (2012). Freedom of the Net 2012: A global assessment of internet and digital media. Freedom House, p. 131.

    Google Scholar 

  • Kepel, G. (2015). Passion française: les voix des cités. Paris: Gallimard.

    Google Scholar 

  • King, G., Pan, J., & Roberts, M. E. (2013). How censorship in China allows government criticism but silences collective expression. American Political Science Review, 102(2), 1–18.

    Google Scholar 

  • Kunzru, H. (1997, January 6). Austria turns off. Wired Magazine. Retrieved April 3, 2016, from http://www.wired.com/1997/06/austria-turns-off

  • Laurent, S. (2015, December 21). Etat d’urgence: la carte des perquisitions administratives. Le Monde.

    Google Scholar 

  • Lei, Y. (2011). The political consequences of the rise of the internet: Political beliefs and practices of Chinese netizens. Political Communication, 28(3), 291–322.

    Article  Google Scholar 

  • Loi no. 2014-1353. (2014). Renforçant les dispositions relatives à la lutte contre le terrorisme, JORF n°0263 du 14 novembre 2014’, Article 9, p. 19162, Texte n° 5.

    Google Scholar 

  • Loi no. 2015-912. (2015). Relative au renseignement, JORF n°0171 du 26 juillet 2015’, p. 12735, Texte n° 2.

    Google Scholar 

  • Lu, G. (2008). Old school BBS: The Chinese social networking phenomenon. ReadWrite. Retrieved March 17, 2016, from http://readwrite.com/2008/01/16/bbs_china_social_networking

  • Lu, J., & Weber, I. (2007). Internet and self-regulation in China: The cultural logic of controlled commodification. Media Culture & Society, 29(5), 772–789.

    Article  Google Scholar 

  • Lyon, D. (2001). Facing the future. Seeking ethics for everyday surveillance, 3(3), 171–181.

    Google Scholar 

  • Majed, Z. (2014). Syrie, La Révolution Orpheline. Paris: Actes Sud et l’Orient des Livres.

    Google Scholar 

  • Manners, I. (2008). The normative ethics of the European Union. International Affairs, 84(1), 45–60.

    Article  Google Scholar 

  • McGonagle, T. (2015). Freedom of expression: Still a precondition for democracy? Conference Report, Strasbourg, Council of Europe. Retrieved March 16, 2016, from http://www.ivir.nl/publicaties/download/1707

  • Mill, J. S. (2008). On liberty. Boston, MA: Bedford St Martin’s.

    Google Scholar 

  • Müller, B. (Ed.). (2004). Censorship and cultural regulation in the modern age. Amsterdam: Rodopi.

    Google Scholar 

  • National People’s Congress. (1982). Constitution of the People’s Republic of China, Fifth National People’s Congress. Retrieved January 10, 2015, from http://en.people.cn/constitution/constitution.html

  • Ng, T. (2015). Chinese celebrity’s air pollution video stirs online dust-up. South China Morning Post. Retrieved February 25, 2016, from http://www.scmp.com (home page).

  • Perry, S., & Roda, C. (2013). Conceptualizing and contextualizing the changing nature of internet usage in China. China and the new internet world. The Eleventh Chinese Internet Research Conference (CIRC11), Oxford Internet Institute, Oxford.

    Google Scholar 

  • Pihl, N. (2011). Why Sina Weibo is winning. Tech Rice.

    Google Scholar 

  • Poncet, G. (2014). La France, en route vers la censure d’Internet. Le Point. Retrieved March 17, 2016, from http://www.lepoint.fr (home page).

  • Qiang, C. Z. (2007). China’s information revolution: Managing the economic and social transformation. The World Bank. Retrieved March 17, 2016, from http://www.worldbank.org (home page).

  • Reuters. (2015). China to ban online impersonation accounts, enforce real-name registration. Thomson Reuters. Retrieved January 6, 2016, from http://uk.reuters.com (home page).

  • Secretary General of the Council of Europe. (2015). State of democracy, human rights and the rule of law in Europe: A shared responsibility for democratic security in Europe. Council of Europe, p. 10.

    Google Scholar 

  • Sénat de la République Française. (2016). Le contrôle et l’évaluation des dispositifs législatifs relatifs à la sécurité intérieure et à la lutte contre le terrorisme: Annexes, Sénat de la République Français. Retrieved January 17, 2016, from http://www.senat.fr/ (home page).

  • Shaohui, T. (2014). China inspects online videos in porn, rumour crackdown. Xinhua. Retrieved January 6, 2016, from http://news.xinhuanet.com/english/china/2014-11/06/c_133771062.htm

  • Shaohui, T. (2015). China beefs up cyber police force. Xinhua. Retrieved January 6, 2016, from http://news.xinhuanet.com/english/2015-08/12/c_134509062.htm

    Google Scholar 

  • Shapiro, I. (2012). On non-domination. University of Toronto Law Journal, 62(3), 293–336.

    Article  Google Scholar 

  • Shirk, S. (Ed.). (2011). Changing media, changing China. New York: Oxford University Press.

    Google Scholar 

  • Spence, J. (2001). Treason by the book. London: Allen Lane History, Penguin Books.

    Google Scholar 

  • Standing Committee. (2015). China’s draft cybersecurity Law. National People’s Congress of the People’s Republic of China. Retrieved March 17, 2016, from http://chinalawtranslate.com/cybersecuritydraft

  • State Council of the People’s Republic of China. (1997). Computer information network and internet security, protection, and management regulations. State Council PRC, Section 5.

    Google Scholar 

  • Stop-Dijihadism. (2015). Stop djihadisme index. Gouvernement.fr. Retrieved December 30, 2015, from http://www.stop-djihadisme.gouv.fr/index.html

  • Tai, Z. (2006). The internet in China: Cyberspace and civil society. New York: Routledge.

    Google Scholar 

  • Tai, Z. (2010). Internet surveillance in China from golden shield to green dam. In F. Duarte, R. J. Firmino, & C. Ultramari (Eds.), ICTs for mobile and ubiquitous urban infrastructures: Surveillance, locative media and global networks. Hershey, PA: IGI Global.

    Google Scholar 

  • Tan, Z., Mueller, M., & Foster, W. (1997). China’s new internet regulations: Two steps forward, one step back. Communications of the ACM, 40(12), 11–16.

    Article  Google Scholar 

  • United Nations General Assembly. (1966). International Covenant of Civil and Political Rights, G.A. res. 2200A (XXI), 21 U.N. GAOR Supp. (No. 16) at 52, U.N. Doc. A/6316 (1966), 999 U.N.T.S. 171, entered into force 23 March 1976, article 19.

    Google Scholar 

  • Wang F. (2014, August 7–8). Site-blocking orders in the EU: Justifications and feasibility. 14th Annual Intellectual Property Scholars Conference (IPSC), Boalt Hall School of Law, University of California, Berkeley.

    Google Scholar 

  • Weber, A. (2014). Manual on hate speech. Strasbourg: Council of Europe.

    Google Scholar 

  • World Economic Forum. (2015). Global information technology report: China. World Economic Forum. Retrieved March 17, 2016, from http://www.weforum.org (home page).

  • Xi, J. (2013). Outline of Xi Jinping’s speech at the National Propaganda and Ideology Work Conference (网传习近平8•19讲话全文:言论方面要敢抓敢管敢于亮剑). China Digital Times. Retrieved October 23, 2016 from http://chinadigitaltimes.net/chinese/2013/11

    Google Scholar 

  • Xiao, Q. (2011). The rise of online public opinion and its impact. In S. Shirk (Ed.), Changing media, changing China. New York: Oxford University Press.

    Google Scholar 

  • Xiao Q. (2013). The grass-mud horse lexicon: Translating the resistance discourse of Chinese netizens. China Digital Times. Retrieved March 17, 2016, from http://chinadigitaltimes.net (home page).

  • Xinhua. (2015). Sina faces suspension over lack of censorship. China Daily. Retrieved January 6, 2016, from http://www.chinadaily.com.cn/business/tech/2015-04/11/content_20410487.htm

  • Xinhua. (2016). China vows to make Party’s voice strongest in cyberspace. Xinhuanet. Retrieved January 17, 2016, from http://news.xinhuanet.com/english/2016-01/07/c_134986363.htm

  • Yang, G. (2009). The power of the internet in China: Citizen activism online. New York: Columbia University Press.

    Google Scholar 

  • Yin, C. (2015). Push for real IDs to expand. China Daily. Retrieved January 14, 2015, from http://usa.chinadaily.com.cn/china/2015-01/14/content_19312751.htm

  • Yuan, G. (2015). Blocking VPN is for internet safety: Official. China Daily. Retrieved January 6, 2016, from http://usa.chinadaily.com.cn (home page).

  • Yuen, S. (2015). Becoming a cyber power. China Perspectives, 2015(2), 53–58.

    Google Scholar 

  • Zhang, X., & Zheng, Y. (Eds.). (2009). China’s information and communications technology revolution: Social changes and state responses. London: Routledge.

    Google Scholar 

  • Zheng, S., & Ward, M. R. (2011). The effects of market liberalization and privatization on Chinese telecommunications. China Economic Review, 22(2), 210–220.

    Article  Google Scholar 

  • Zheng, Y. (2008). Technological empowerment: The internet, state, and society in China. Stanford, CA: Stanford University Press.

    Google Scholar 

  • Zhou, Y. (2006). Historicizing online politics: Telegraphy, the internet and political participation in China. Stanford, CA: Stanford University Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Copyright information

© 2017 The Author(s)

About this chapter

Cite this chapter

Perry, S., Roda, C. (2017). Online Censorship. In: Human Rights and Digital Technology. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-58805-0_4

Download citation

Publish with us

Policies and ethics