The Dark Side of the China: The Government, Society and the Great Cannon

  • Arif Sari Girne American University, Kyrenia, Cyprus;
  • Zakria Abdul Qayyum Girne American University, Kyrenia, Cyprus;
  • Onder Onursal Girne American University, Kyrenia, Cyprus;
Keywords: Quantum Insert, Golden Shield, Censorship, Government, China, Great Cannon, Great Firewall, National Firewall

Abstract

The main purpose of this research is to understand the concept of one of the main firewall technology developed within the scope of Golden Shield Project called Great Cannon and Great Firewall and elaborates the details of this tool in China. The proposed technology deployed in China has claimed to enhance the public safety and country wide national cyber security however there were many other circumstances raised from the legal, ethical and moral issues due to censorship and surveillance of this deployment. The research also elaborates and outlines the effects and technical issues of this deployment since this paper highlights the existing research trends in network security and exposing the current state of the Golden Shield project for the China with its censorship policy.

Author Biographies

Arif Sari, Girne American University, Kyrenia, Cyprus;
Department of Management Information Systems, School of Applied Sciences, European University of Lefke
Zakria Abdul Qayyum, Girne American University, Kyrenia, Cyprus;

Faculty of Business, Department of Management Information Systems,

Onder Onursal, Girne American University, Kyrenia, Cyprus;
Faculty of Business, Department of Management Information Systems,

References

(1) Mizokami, K., (November 9, 2014). The 5 Most Powerful Armies on Planet Earth. Retrieved from http://nationalinterest.org/feature/the-5-most-powerful-armies-planet-earth-11632?page=show

(2) Hagestad, W. T. (2012). 21st Century Chinese Cyberwarfare : An Examination of the Chinese Cyberthreat From Fundamentals of Communist Policy Regarding Information Warfare Through the Broad Range of Military, Civilian and Commercially Supported Cyberattack Threat Vectors. Ely, Cambridgeshire, United Kingdom: IT Governance Publishing.

(3) Evolution of Internet in China. (January 1, 2001). Retrieved from http://www.edu.cn/introduction_1378/20060323/t20060323_4285.shtml

(4) The Golden Shield Project. Retrieved from: http://gutenberg.us/articles/golden_shield_project

(5) Ensafi, R., Winter P., Mueen A., and Crandall R. A. (2015). Analyzing the Great Firewall of China Over Space and Time. Proceedings on Privacy Enhancing Technologies. Volume (1), pp. 6176

(6) Carson, B. (July 23, 2015).9 incredibly popular websites that are still blocked in China. Retrieved from http://www.businessinsider.com/websites-blocked-in-china-2015-7/#google-including-gmail-1 An Analysis of Chinas Great Cannon.

(7) Khattak, S., Javed, M., Anderson, P.D., Paxson, V. (2013) Towards Illuminating a Censorship Monitors Model to Facilitate Evasion. Retrieved from https://www.usenix.org/conference/foci13/workshop-program/presentation/Khattak

(8) Anonymous. Towards a Comprehensive Picture of the Great Firewall's DNS Censorship. In 4th USENIX Workshop on Free and Open Communications on the Internet (FOCI 14) (San Diego, CA, Aug. 2014), USENIX Association.

(9) Fan, L. (December 12, 2012). Understanding and Circumventing The Great Firewall of China. Retrieved from http://www.cs.tufts.edu/comp/116/archive/fall2015/lfan.pdf

(10) Anderson, D., (November 30, 2012). Splinternet Behind the Great Firewall of China. Retrieved from http://queue.acm.org/detail.cfm?id=2405036

(11) Farnan, O., Darer, A., Wright, J. (October 24, 2016). Poisoning the Well: Exploring the Great Firewall's Poisoned DNS Responses. Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Socie. Vienna, Austria

(12) Xu, X., Mao Z. M., and Halderman A. J (2011).Internet Censorship in China: Where Does the Filtering Occur? Retrieved from http://web.eecs.umich.edu/~zmao/Papers/china-censorship-pam11.pdf

(13) G. Lowe, P. Winters, and M. L. Marcus. The great DNS wall of China. MS, New York University. Accessed December, 21, 2007.

(14) Anonymous (2012). The Collateral Damage of Internet Censorship by DNS Injection. ACM SIGCOMM Computer Communication Review. Volume 42, Number 3

(15) Clayton, R., Murdoch, S., Watson, R.: Ignoring the Great Firewall of China. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 2035. Springer, Heidelberg (2006)

(16) Xu, Y. (March 8, 2016) Deconstructing the Great Firewall of China. Retrieved from https://blog.thousandeyes.com/deconstructing-great-firewall-china/

(17) Verkamp, J.P. and Gupt, M, (2012). Inferring Mechanics of Web Censorship Around the World. Retrieved from https://www.usenix.org/conference/foci12/workshop-program/presentation/Verkamp [19] Marczak, B., Weaver, N., Dalek, J. (April 10, 2015). Chinas Great Cannon. Retrieved from https://citizenlab.org/2015/04/chinas-great-cannon/

(18) Using Baidu ?? to steer millions of computers to launch denial of service attacks, (March 25, 2015). Retrieved from https://drive.google.com/file/d/0ByrxblDXR_yqeUNZYU5WcjFCbXM/view?pli=1

(19) Xu, Y. (March 14, 2016). The Emergence of Chinas New Weapon: the Great Cannon. Retrieved from https://blog.thousandeyes.com/chinas-new-weapon-great-cannon/

(20) Lee, M. (January 25, 2016 ). China's Nearly 700 Million Internet Users Are Hot For Online Finance. Retrieved from http://www.forbes.com/sites/melanieleest/2016/01/25/chinas-nearly-700-million-internet-users-are-hot-for-online-finance/#100192b01391

(21) The Chian Great War, http://edition.cnn.com/2015/10/25/asia/china-war-internet-great-firewall/

(22) Xu, Y. ( May 11, 2016). The Ongoing War Between Chinas Great Firewall and Circumvention Tools Retrieved from https://blog.thousandeyes.com/the-war-between-chinas-great-firewall-and-circumvention-tools/

(23) Tor: Overview. Retrieved from https://www.torproject.org/about/overview

(24) Ensafi, R., Winter P., Mueen A., and Crandall R. A. (2015). Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proceedings of the 2015 ACM Conference on Internet Measurement Conference

(25) Sari, A. (2016); "E-Government Attempts in Small Island Developing States: The Rate of Corruption with Virtualization, Science and Engineering Ethcis, Springer , pp.XX. ISSN-O: 1353-3452, DOI: 10.1007/s11948-016-9848-0.

(26) Sari, A., Akkaya, M., Abdalla B., (2017) Assessing e-Government systems success in Jordan (e-JC): A validation of TAM and IS Success model. International Journal of Computer Science and Information Security, Vol.15, No.2, pp.277-304, ISSN:1947-5500.

(27) Alzubi, A., Sari, A., (2016) Deployment of Elliptic Curve Cryptography (ECC) to Enhance Message Integrity in Wireless Body Area Network. International Journal of Computer Science and Information Security, Vol.14, No.11, pp.1146-1153, ISSN:1947-5500.

(28) Alzubi, A. and Sari, A. (2016) Deployment of Hash Function to Enhance Message Integrity in Wireless Body Area Network (WBAN). Int. J. Communications, Network and System Sciences, Vol.9,No.12, pp. 613-621. http://dx.doi.org/10.4236/ijcns.2016.912047

(29) Sari, A., Rahnama, B., Eweoya, I., Agdelen, Z. (2016) Energizing the Advanced Encryption Standard (AES) for Better Performance. International Journal of Scientific & Engineering Research, Vol.7, No.4, pp.992-1000, ISSN 2229-5518.

(30) Rahnama, B., Sari, A., & Ghafour, M. Y. (2016). Countering RSA Vulnerabilities and Its Replacement by ECC: Elliptic Curve Cryptographic Scheme for Key Generation. In D. G., M. Singh, & M. Jayanthi (Eds.) Network Security Attacks and Countermeasures (pp. 270-312). Hershey, PA: Information Science Reference. doi:10.4018/978-1-4666-8761-5.ch012

(31) Sari, A. and Karay, M. (2015) Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks. Int. J. Communications, Network and System Sciences, Vol.8, No.13, pp. 567-577. Doi: http://dx.doi.org/10.4236/ijcns.2015.813051.

(32) Sari, A. and Karay, M. (2015) Comparative Analysis of Wireless Security Protocols: WEP vs WPA. International Journal of Communications, Network and System Sciences, Vol. 8, No.12, pp. 483-491. doi: http://10.4236/ijcns.2015.812043.

(33) Sari, A., Onursal, O. and Akkaya, M. (2015) Review of the Security Issues in Vehicular Ad Hoc Net-works (VANET). Int. J. Communications, Network and System Sciences, Vol. 8, No.13, pp. 552-566. http://dx.doi.org/10.4236/ijcns.2015.813050 .

(34) Cambazoglu, ?. and Sari, A. (2015) Collision Avoidance in Mobile Wireless Ad-Hoc Networks with Enhanced MACAW Protocol Suite. Int. J. Communications, Network and System Sciences, Vol.8, No.13, pp. 533-542. http://dx.doi.org/10.4236/ijcns.2015.813048.

(35) Kirencigil, B.Z., Yilmaz, O., Sari, A., (2016) Unified 3-tier Security Mechanism to Enhance Data Security in Mobile Wireless Networks. International Journal of Scientific & Engineering Research, Vol.7, No.4, pp. 1001-1011, ISSN 2229-5518.

(36) Sari, A. (2015) Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite. International Journal of Communications", Network and System Sciences, Vol.8, No.3, pp. 29-42. doi: http://dx.doi.org/10.4236/ijcns.2015.83004.

(37) Yilmaz, O., Kirencigil, B.Z., Sari, A., (2016) VAN Based theoretical EDI Framework to enhance organizational data security for B2B transactions and comparison of B2B cryptographic application models.International Journal of Scientific & Engineering Research, Vol.7, No.4, pp. 1012-1020,

ISSN 2229-5518.

(38) Sari, A., (2015), Security Issues in Mobile Wireless Ad Hoc Networks: A Comparative Survey of Methods and Techniques to Provide Security in Wireless Ad Hoc Networks, New Threats and Countermeasures in Digital Crime and Cyber Terrorism, (pp. 66-94). Hershey, PA: IGI Global. doi:10.4018/978-1-4666-8345-7. April 2015.

(39) Sari, A. (2015) Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks. International Journal of Communications, Network and System Sciences, Vol. 8, No.3, pp. 19-28. doi: http://dx.doi.org/10.4236/ijcns.2015.83003.

(40) Sari, A. and Akkaya, M. (2015) Fault Tolerance Mechanisms in Distributed Systems. International Journal of Communications, Network and System Sciences, Vol.8, No.12, pp. 471-482. doi: http://10.4236/ijcns.2015.812042.

(41) Sari, A. (2015) A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications. Journal of Information Security, Vol.6, No.2, pp. 142-154. doi: http://dx.doi.org/10.4236/jis.2015.62015.

(42) Sari, A. (2014); Security Approaches in IEEE 802.11 MANET Performance Evaluation of USM and RAS, International Journal of Communications, Network, and System Sciences, Vol.7, No.9, pp. 365-372, ISSN: 1913-3723; ISSN-P: 1913-3715, DOI: http://dx.doi.org/10.4236/ijcns.2014.79038.

(43) Rahnama, B.; Sari, A.; Makvandi, R., "Countering PCIe Gen. 3 data transfer rate imperfection using serial data interconnect," Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), 2013 International Conference on , vol., no., pp.579,582, 9-11 May 2013 doi: http://doi.acm.org/10.1109/TAEECE.2013.6557339.

(44) Sari, A.; Rahnama, B., (2013) "Simulation of 802.11 Physical Layer Attacks in MANET," Computational Intelligence, Communication Systems and Networks (CICSyN), 2013 Fifth International Conference on , vol., no., pp.334,337, 5-7 June 2013, http://dx.doi.org/10.1109/CICSYN.2013.79 .

(45) Sari, A., Rahnama, B (2013). Addressing security challenges in WiMAX environment. In Proceedings of the 6th International Conference on Security of Information and Networks (SIN '13). ACM, New York, NY, USA, 454-456. DOI=10.1145/2523514.2523586 http://doi.acm.org/10.1145/2523514.2523586

(46) Sari, A. (2014); Security Issues in RFID Middleware Systems: A Case of Network Layer Attacks: Proposed EPC Implementation for Network Layer Attacks, Transactions on Networks & Communications, Society for Science and Education, United Kingdom, Vol.2, No.5, pp. 1-6, ISSN: 2054-7420, DOI: http://dx.doi.org/10.14738/tnc.25.431.

Published
2017-12-31