ABSTRACT
Desiring to control political ideas shared within its borders, China fosters its own domestic Internet communications platforms where it can better enforce its laws and more tightly control political expression. Access to foreign platforms failing to comply with China's requirements on speech restrictions are often wholesale blocked by the country's national firewall. However, some technologies, such as the Web and email, are too universal to wholesale block and are restricted discriminately. While China's restrictions to Web access have been extensively studied, our work provides a look into email censorship in China.
In this work, we study censorship on Tencent's QQMail, the most popular email platform in China. We introduce a technique to test whether QQMail automatically censors a message, without requiring control of any Internet endpoints in China or any accounts on the QQMail platform, finding 173 combinations of keywords that trigger automated censorship of multiple political topics. We also discover that some censored keyword combinations have extenuating keyword combinations, any of whose presence disables the corresponding censored combination's censorship. Many of these extenuating terms are as politically sensitive as the censored combinations they are extenuating. We find that the motivation behind such extenuating terms is puzzling, defying easy explanation.
References
- Anonymous. 2014. Towards a Comprehensive Picture of the Great Firewall's DNS Censorship. USENIX Workshop on Free and Open Communications on the Internet (2014). https://www.usenix.org/system/files/conference/foci14/foci14-anonymous.pdfGoogle Scholar
- Miguel Araujo. 2017. What is QQ Mail and what is it for? Available at https://www.qqmail.info/what-is-qq-mail-and-what-is-it-for.html. (2017).Google Scholar
- Kevin Bock, George Hughey, Louis-Henri Merino, Tania Arya, Daniel Liscinsky, Regina Pogosian, and Dave Levin. 2020. Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion. In Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication. 586--598.Google Scholar
- Carolyn Clancy. 2020. Country overview: China. Available at https://help.returnpath.com/hc/en-us/articles/220562707-Country-overview-China-. (2020).Google Scholar
- Jedidiah R. Crandall, Masashi Crete-Nishihata, Jeffrey Knockel, Sarah McKune, Adam Senft, Diana Tseng, and Greg Wiseman. 2013. Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC. First Monday 18, 7 (6 2013). http://firstmonday.org/ojs/index.php/fm/article/view/4628/3727Google Scholar
- Jedidiah R. Crandall, Daniel Zinn, Michael Byrd, Earl Barr, and Ric East. 2007. ConceptDoppler: A weather tracker for Internet censorship. In 14th ACM Conference on Computer and Communications Security, Oct. 29-Nov 2, 2007. 1--18.Google Scholar
- James Doubek. 2018. China Removes Presidential Term Limits, Enabling Xi Jinping To Rule Indefinitely. (3 2018).Google Scholar
- Barney Glaser and Anselm Strauss. 2006. The Discovery of Grounded Theory: Strategies for Qualitative Research. INternational and Pan-American Copyright Conventions, New Jersey.Google Scholar
- Google. [n. d.]. Create task-specific email addresses. Available at https://support.google.com/a/users/answer/9308648?hl=en. ([n. d.]).Google Scholar
- Seth Hardy. 2013. Asia Chats: Investigating Regionally-based Keyword Censorship in LINE. Technical Report. Citizen Lab, University of Toronto. https://citizenlab.ca/2013/11/asia-chats-investigating-regionally-based-keyword-censorship-line/Google Scholar
- Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, and Michalis Polychronakis. 2021. How Great is the Great Firewall? Measuring China's DNS Censorship. (2021). arXiv:cs.CR/2106.02167Google Scholar
- Gary King, Jennifer Pan, and Margaret Roberts. 2013. How Censorship in China Allows Government Criticism but Silences Collective Expression. American Political Science Review 107, 2 (2013), 326--343.Google Scholar
Cross Ref
- Jeffrey Knockel, Masashi Crete-Nishihata, Jason Q. Ng, Adam Senft, and Jedidiah R. Crandall. 2015. Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China. In 5th USENIX Workshop on Free and Open Communications on the Internet.Google Scholar
- Jeffrey Knockel, Masashi Crete-Nishihata, and Lotus Ruan. 2018. The effect of information controls on developers in China: An analysis of censorship in Chinese open source projects. In First Workshop on NLP for Internet Freedom. https://www.aclweb.org/anthology/W18-4201Google Scholar
- Jeffrey Knockel, Lotus Ruan, and Masashi Crete-Nishihata. 2017. Measuring Decentralization of Chinese Keyword Censorship via Mobile Games. In 7th USENIX Workshop on Free and Open Communications on the Internet. https://www.usenix.org/conference/foci17/workshop-program/presentation/knockelGoogle Scholar
- Rebecca MacKinnon. 2009. China's Censorship 2.0: How companies censor bloggers. First Monday 14, 2 (2009). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2378/2089Google Scholar
- Blake Miller. 2019. The Limits of Commercialized Censorship in China. (2019). https://doi.org/10.31235/osf.io/wn7prGoogle Scholar
- Bei Qin, David Strömberg, and Yanhui Wu. 2017. Why Does China Allow Freer Social Media? Protests versus Surveillance and Propaganda. Journal of Economic Perspectives 31, 1 (2017), 117--140.Google Scholar
Cross Ref
- R Rambert, Z Weinberg, D Barradas, and N Christin. 2021. Chinese wall or Swiss cheese? Keyword filtering in the Great Firewall of China. In Proceedings of the 30th Web Conference (WWW'21). Ljubljana, Slovenia (online).Google Scholar
- Lotus Ruan, Jeffrey Knockel, Jason Q. Ng, and Masashi Crete-Nishihata. 2016. One App, Two Systems: How WeChat uses one censorship policy in China and another internationally. Technical Report. Citizen Lab, University of Toronto. https://citizenlab.ca/2016/11/wechat-china-censorship-one-app-two-systems/Google Scholar
- Taiyi Sun and Quansheng Zhao. 2021. Delegated Censorship: The Dynamic, Layered, and Multistage Information Control Regime in China. Politics & Society (2021), 00323292211013181.Google Scholar
- Tokachu. 2006. The Not-So-Great Firewall of China. 2600 23, 4 (2006), 58--60.Google Scholar
- United Nations. 2011. EASTERN TURKISTAN ISLAMIC MOVEMENT. Technical Report.Google Scholar
- United States Department of State and the Broadcasting Board of Governors Office of Inspector General. 2010. Report of Inspection: Voice of America's Chinese Branch. Available at https://www.stateoig.gov/system/files/145823.pdf. (2010).Google Scholar
- Ruohan Xiong and Jeffrey Knockel. 2019. An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message. In 9th USENIX Workshop on Free and Open Communications on the Internet. Santa Clara.Google Scholar
- Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R Crandall, and Dan S Wallach. 2013. The Velocity of Censorship: High-fidelity Detection of Microblog Post Deletions. In Proceedings of the 22nd USENIX Conference on Security. 227--240.Google Scholar
- 国家互联网应急中心. 2003. 中国互联网反垃圾邮件的现状. (9 2003). https://www.cert.org.cn/publish/main/49/2012/20120330182937909855444/20120330182937909855444_.htmlGoogle Scholar
- 秦兝. 2015. 详述GFW对SMTP协议的三种封锁手法. Available at https://fqrouter.tumblr.com/post/43400982633/gfwsmtp. (2015).Google Scholar
Index Terms
Measuring QQMail's automated email censorship in China





Comments