recommended reading

What the future of China's new Internet crackdown looks like

An Internet cafe in Peking, China

An Internet cafe in Peking, China // Andy Wong/AP

The Chinese government on Friday approved regulations that will require all of the country's Internet users to register their names, but it remains unclear when and how the ominous "real name" policy will go into effect — and what, exactly, will happen once it does. So far, the legislature has responded to a recent ramping-up in censorship with what critics call more censorship — "their intention is ... to take back that bit of space for public opinion," one told the Associated Press — and authorities maintain are policies that will "enhance protection of personal info online and safeguard public interests," according to the official state news agency. But beyond acknowledging that users will have to reveal themselves to Internet service providers, the Chinese government hasn't figured out the rest — legislation remains subject to "further deliberation and revisions." With all that uncertainty, here's what the near future of Chinese Internet freedom might look like.

Government ID for Internet Installation

How It Might Work: When the Time Warner of China comes to connect the cables, people will have to provide a government issued ID, suspects The Next Web's Josh Ong.

Censorship Factor: Medium. That scenario wouldn't have much of an effect on the average Internet user, who might have already had to do that, as China requires. The new law, however, will impact cellphone users. About 70 percent of mobile Internet users have registered with real names, according toThe New York Times's Keith Bradsher. The remaining 30 percent might not like that so much. 

Read more at The Atlantic Wire

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.