Democracy would suffer if Google left China, says MIT panel
IDG News Service - Analyzing the quarrel between Google and China raises questions of how the Web helps an oppressed country develop democracy, according to participants in an MIT panel discussion.
"The search engine has become an important tool to help the central government become more transparent," said panelist Xiaojian Zhao, a Chinese journalist studying at MIT on a fellowship, during the discussion Wednesday. "The search engine will aid Chinese democracy."
Yasheng Huang, China program professor at MIT's Sloan School of Management, agreed, but went a step further, saying that the Internet has fostered freedom and transparency in China more than the combination of foreign aid, the rise of the middle class and other economic growth factors.
"Google leaving China undermines that process," Huang said.
The clamor began last December when Google claimed that Gmail accounts of Chinese human rights activists were targeted by hackers using malware and phishing scams, while some accounts were breached. While no evidence has been uncovered to indisputably prove that claim, the Chinese government is widely believed to have sponsored the attacks.
Google reacted to the security issues in early January, stopping the censoring of its search results in China. The Chinese government mandated censorship as a condition of Google operating its search services there. In a blog post announcing its decision, Google said that it was reevaluating its Chinese business and realized that disobeying the government may force it to exit the country. To provide unrestricted search, Google redirected users from its Chinese Web site to its Hong Kong search engine.
Chinese Web users can access the country's top search engine, Baidu, but Huang said he does not trust the site because money influences its rankings. Since Google stopped filtering its results, instead of Baidu's top three results being paid rankings, the top 10 results are now paid, he said.
Ultimately, Google and China's dispute is a conflict between the Internet's basic premise of unrestricted access and the government's desire for control.
"The Internet was born on unfettered access, a strong value behind freedom," Huang said. "China has a different set of values, there is an emphasis on control."
And increasing levels of dissent among China's population have motivated the government to further tighten the Internet, said Craig Simons, a journalist who covered China for 10 years and is studying at MIT on a fellowship. The number of protests against the government over pollution and social conditions has increased as people use the Web to communicate by e-mail, blogs and bulletin boards, Simon said. This led hackers to target e-mail accounts of dissenters, he said.
"There is a massive liberalization at the bottom so the government is tightening controls at the top," Simons said. "The government has taken the position that they need to take control of content on the Internet."
- After Google-China dust-up, cyberwar emerges as a threat
- Targeted attacks test enterprise security controls
- Is the U.S. the nation most vulnerable to cyberattack?
- In cyberwar, who's in charge?
- Schmidt: Private sector key to stopping Google-style attacks
- Threat of cyberattacks from overseas high, federal IT execs say
- Estonia readies for the next cyberattack
- Think tank in Estonia ponders war in cyberspace
- Botnets 'the Swiss Army knife of attack tools'
- 'Cyber War' author: U.S. needs radical changes to protect against attacks
- Special report: Web giants attacked
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Mission Critical: Managing Mobile Applications & Content
- Smartphones, tablets and other mobile devices have become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of...
- Securing Mobility, From Device to Network
- At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Planning for Mobile Success
- Many organizations are seeing clear and quantifiable benefits from the deployment of mobile technologies that provide access to data and applications any time,...
- The Challenges and Opportunities of Mobile Application Development
- Nearly all business users now demand mobile devices--their own or company-owned--along with anywhere access to corporate applications and data. What turns mobile devices... All Government IT White Papers
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- All Government IT Webcasts