Democracy would suffer if Google left China, says MIT panel
IDG News Service - Analyzing the quarrel between Google and China raises questions of how the Web helps an oppressed country develop democracy, according to participants in an MIT panel discussion.
"The search engine has become an important tool to help the central government become more transparent," said panelist Xiaojian Zhao, a Chinese journalist studying at MIT on a fellowship, during the discussion Wednesday. "The search engine will aid Chinese democracy."
Yasheng Huang, China program professor at MIT's Sloan School of Management, agreed, but went a step further, saying that the Internet has fostered freedom and transparency in China more than the combination of foreign aid, the rise of the middle class and other economic growth factors.
"Google leaving China undermines that process," Huang said.
The clamor began last December when Google claimed that Gmail accounts of Chinese human rights activists were targeted by hackers using malware and phishing scams, while some accounts were breached. While no evidence has been uncovered to indisputably prove that claim, the Chinese government is widely believed to have sponsored the attacks.
Google reacted to the security issues in early January, stopping the censoring of its search results in China. The Chinese government mandated censorship as a condition of Google operating its search services there. In a blog post announcing its decision, Google said that it was reevaluating its Chinese business and realized that disobeying the government may force it to exit the country. To provide unrestricted search, Google redirected users from its Chinese Web site to its Hong Kong search engine.
Chinese Web users can access the country's top search engine, Baidu, but Huang said he does not trust the site because money influences its rankings. Since Google stopped filtering its results, instead of Baidu's top three results being paid rankings, the top 10 results are now paid, he said.
Ultimately, Google and China's dispute is a conflict between the Internet's basic premise of unrestricted access and the government's desire for control.
"The Internet was born on unfettered access, a strong value behind freedom," Huang said. "China has a different set of values, there is an emphasis on control."
And increasing levels of dissent among China's population have motivated the government to further tighten the Internet, said Craig Simons, a journalist who covered China for 10 years and is studying at MIT on a fellowship. The number of protests against the government over pollution and social conditions has increased as people use the Web to communicate by e-mail, blogs and bulletin boards, Simon said. This led hackers to target e-mail accounts of dissenters, he said.
"There is a massive liberalization at the bottom so the government is tightening controls at the top," Simons said. "The government has taken the position that they need to take control of content on the Internet."
- After Google-China dust-up, cyberwar emerges as a threat
- Targeted attacks test enterprise security controls
- Is the U.S. the nation most vulnerable to cyberattack?
- In cyberwar, who's in charge?
- Schmidt: Private sector key to stopping Google-style attacks
- Threat of cyberattacks from overseas high, federal IT execs say
- Estonia readies for the next cyberattack
- Think tank in Estonia ponders war in cyberspace
- Botnets 'the Swiss Army knife of attack tools'
- 'Cyber War' author: U.S. needs radical changes to protect against attacks
- Special report: Web giants attacked
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- The Shortfall of Network Load Balancing
- Applications running across networks encounter a wide range of performance, security, and availability challenges as IT department strive to deliver fast, secure access...
- Leave No App Behind with Software Defined Application Services
- F5 Software Defined Application Services (SDAS) is the next-generation model for delivering application services that enables service injection, consumption, automation, and orchestration across...
- Five Key Issues for DNS - The Next Network Management Challenge
- Since every icon and URL and all embedded content on a website requires a DNS lookup, loading complex sites necessitates hundreds of DNS...
- Architecting the Network of the Future
- Networks need to change, as does the way IT thinks about and manages them. In addition to reliability, IT must now add higher... All Government IT White Papers
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Why Are Customers Really Deploying an NGFW? It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer...
- All Government IT Webcasts