WALL OF SCIENCE:
The Chinese government requires Internet firms to hide objectionable content from users, including those here in the city of Guilin. Google is the first major company to refuse to comply. Image: Martin Puddy Getty Images
Late last year a series of sophisticated Internet attacks emanating from China burrowed deep into the computer systems of some two dozen U.S. corporations, among them Northrop Grumman, Dow Chemical and Yahoo. One fought back. After revealing that the attacks targeted not only its core intellectual property but the e-mail accounts of Chinese human-rights activists, Google announced that it would stop censoring search results on Google.cn, its Chinese-language search engine. The move led to threats by the Chinese authorities to shut down Google’s operations inside China.
The charges and retaliations seem reminiscent of so much cold war bluster, and indeed this encounter could be the first great clash of the 21st century’s two emergent superpowers—Google and China. More than a battle over territory or market share, it is a conflict over ideology, one that pits a free and open Internet that empowers individuals at the expense of existing power structures against an Internet micromanaged by those powers. “What we’re talking about here is a defense of the essence of the Internet,” says Jeff Jarvis, director of the interactive journalism program at the City University of New York and author of What Would Google Do? (HarperCollins, 2009).
More than any other organization, Jarvis says, Google has both the means and the incentive to ensure that the Internet remains open. It is also one of the few organizations with a broad enough online presence to define the standard operating rules of the Internet, explains Rebecca MacKinnon, a researcher at the Center for Information Technology Policy at Princeton University. Google is “the first mover in so many different sectors,” she says. “It can set the norms for how open one can be online.”
For anticensorship advocates, Google is also one of the few organizations with enough raw computing power to significantly aid the fight against authoritarian regimes. “My hope, and
expectation, is that Google engineers who might have been a bit halfhearted about implementing censorship mandates in Google.cn could be full throttle in coming up with ways for Google to be viewed despite any network interruptions between site and user,” says Jonathan Zittrain, a co-founder of the Berkman Center for Internet and Society at Harvard University.
Google could combat China’s censorship efforts by helping those within China breach the so-called Great Firewall. As with buildings in the physical world, every location on the Internet has an address associated with it—an Internet protocol, or IP, address. In addition to filtering certain keywords, the administrators of the Great Firewall maintain a huge list of blocked IP addresses. Circumvention tools send a user to an unblocked address, then pipe in all outside information through that “proxy” IP address. Yet at any time, this tunnel could collapse. “One of these IP addresses could last forever, or for months, or for minutes” before the authorities find it and block it, says Hal Roberts, an expert in circumvention tools at the Berkman Center.
Hence, any large-scale circumvention effort requires a huge number of addresses to cycle through, along with an enormous amount of bandwidth to support all the tunneling. “If we could magically convince all Chinese people to use [these services],” Roberts says, “then someone would have to pay for the entire outgoing bandwidth of China.” That might strain Google’s resources, but not by much.
Still, there are good reasons for Google not to start this kind of proxy war. Promoting a free and open Internet is one thing; actively undermining the laws of a sovereign nation is another. Moreover, these same circumvention tools also work as anonymity tools—anyone can use proxy servers to hide their true identity. “This makes them very useful for all kinds of bad activities,” Roberts says. “They could be used to hack Google’s servers or for attacks against Google services using click fraud and spam. So there’s a strong question from Google’s point of view whether it is in their best interest to promote them.”