recommended reading

China Thwarts Its Citizens’ Access to White House Petition

roseburn3Dstudio/Shutterstock.com

People who post petitions to the White House website We the People often complain the government isn’t really paying attention to their grievances; another group, however, seems to be paying very close attention: the Chinese government.

On May 5, someone in Miami posted a We the People petition asking the White House to deport Sun Wei, a Chinese woman accused of poisoning her roommate Zhu Ling with Thallium while a student at Tsinghua University in 1995. Sun allegedly lives in the U.S. under the name Jasmine Sun.

That same day, Sina Weibo, China’s most popular social networking site, began blocking key terms from the petition including “Tsinghua,” “Sun Wei” and “Thallium,” according to a list of blocked terms maintained by China Digital Times, a site affiliated with the University of California, Berkeley, aimed at providing unfiltered news from mainland China.

Two days later, on May 7, the Chinese Propaganda Ministry ordered news outlets to not challenge information from authorities regarding the case and not to sensationalize it, according to a directive leaked to the Digital Times. The directive did not mention the White House petition but the Times drew the connection in its story.

Signatures on the Jasmine Sun petition surged on the day it was introduced and for three days after but had slowed to a near standstill by May 10, the petition’s fifth day online, according to a Nextgov analysis.

Out of roughly 141,000 signatures on the petition in early June, 83 percent included no U.S. address information, suggesting the signatures came from abroad. By contrast, only 11 percent of signatures on a petition that urged recounting the U.S. presidential election lacked U.S. address information.

Sina Weibo is like a cross between Facebook and Twitter, according to Anne Henochowicz, the Digital Times’ translation coordinator. The site typically blocks searches on controversial topics, but it’s not clear how often those terms are blocked following a specific government request and how often Weibo blocks the terms on its own initiative, she said.

“In terms of its influence on political and social issues [Sina Weibo] is something the Chinese government watches very carefully,” Henochowicz said. “In the last few years it’s proved an excellent place to bring up grievances and the government almost always responds by blocking search terms.”

Henochowicz was a translator for contractors in Washington before she began work at Digital Times.

Terms on Weibo are often un-blocked once an issue wanes in public interest, she said, and many terms related to the Sun case had been unblocked by mid-June.

Weibo has well over 500 million subscribers and temporarily blocking terms on the site is often sufficient to slow or kill the viral spread of online information, she said.

In contrast to states such as Iran and Syria that block large swathes of the open Internet, China’s become well known for its “great firewall,” which manipulates Web access so deftly that Web surfers rarely notice any information is being suppressed.

There is a common Chinese perception that Sun was not charged with Zhu Ling’s murder because of powerful family connections, Henochowicz said, and the case is viewed as evidence of government corruption.

Interest in the case was revived after a similar poisoning incident at Fudan University in Shanghai in April.

Chinese officials have appeared especially sensitive to instances of Chinese problems being appealed to the U.S. since April 2012, Henochowicz said, when a Chinese municipal official and a well-known dissident both sought refuge with American diplomats.

Wang Lijun, a vice mayor in Chongqing, sought refuge in an American consulate claiming he was being threatened by Bo Xilai, a powerful and allegedly corrupt communist party chief. The blind dissident Chen Guangcheng arrived at the American embassy in Beijing after escaping from house arrest. 

An earlier version of this story misspelled the name of Fudan University. 

(Image via roseburn3Dstudio/Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.