recommended reading

China Thwarts Its Citizens’ Access to White House Petition


People who post petitions to the White House website We the People often complain the government isn’t really paying attention to their grievances; another group, however, seems to be paying very close attention: the Chinese government.

On May 5, someone in Miami posted a We the People petition asking the White House to deport Sun Wei, a Chinese woman accused of poisoning her roommate Zhu Ling with Thallium while a student at Tsinghua University in 1995. Sun allegedly lives in the U.S. under the name Jasmine Sun.

That same day, Sina Weibo, China’s most popular social networking site, began blocking key terms from the petition including “Tsinghua,” “Sun Wei” and “Thallium,” according to a list of blocked terms maintained by China Digital Times, a site affiliated with the University of California, Berkeley, aimed at providing unfiltered news from mainland China.

Two days later, on May 7, the Chinese Propaganda Ministry ordered news outlets to not challenge information from authorities regarding the case and not to sensationalize it, according to a directive leaked to the Digital Times. The directive did not mention the White House petition but the Times drew the connection in its story.

Signatures on the Jasmine Sun petition surged on the day it was introduced and for three days after but had slowed to a near standstill by May 10, the petition’s fifth day online, according to a Nextgov analysis.

Out of roughly 141,000 signatures on the petition in early June, 83 percent included no U.S. address information, suggesting the signatures came from abroad. By contrast, only 11 percent of signatures on a petition that urged recounting the U.S. presidential election lacked U.S. address information.

Sina Weibo is like a cross between Facebook and Twitter, according to Anne Henochowicz, the Digital Times’ translation coordinator. The site typically blocks searches on controversial topics, but it’s not clear how often those terms are blocked following a specific government request and how often Weibo blocks the terms on its own initiative, she said.

“In terms of its influence on political and social issues [Sina Weibo] is something the Chinese government watches very carefully,” Henochowicz said. “In the last few years it’s proved an excellent place to bring up grievances and the government almost always responds by blocking search terms.”

Henochowicz was a translator for contractors in Washington before she began work at Digital Times.

Terms on Weibo are often un-blocked once an issue wanes in public interest, she said, and many terms related to the Sun case had been unblocked by mid-June.

Weibo has well over 500 million subscribers and temporarily blocking terms on the site is often sufficient to slow or kill the viral spread of online information, she said.

In contrast to states such as Iran and Syria that block large swathes of the open Internet, China’s become well known for its “great firewall,” which manipulates Web access so deftly that Web surfers rarely notice any information is being suppressed.

There is a common Chinese perception that Sun was not charged with Zhu Ling’s murder because of powerful family connections, Henochowicz said, and the case is viewed as evidence of government corruption.

Interest in the case was revived after a similar poisoning incident at Fudan University in Shanghai in April.

Chinese officials have appeared especially sensitive to instances of Chinese problems being appealed to the U.S. since April 2012, Henochowicz said, when a Chinese municipal official and a well-known dissident both sought refuge with American diplomats.

Wang Lijun, a vice mayor in Chongqing, sought refuge in an American consulate claiming he was being threatened by Bo Xilai, a powerful and allegedly corrupt communist party chief. The blind dissident Chen Guangcheng arrived at the American embassy in Beijing after escaping from house arrest. 

An earlier version of this story misspelled the name of Fudan University. 

(Image via roseburn3Dstudio/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.