Feeds

China blocks Google. Allegedly

Up to old tricks

  • alert
  • submit to reddit

Top three mobile application threats

Chinese authorities are feared to have blocked access to popular search engine, Google, ahead of the Communist Party congress in November.

Access to Google began being blocked from Saturday, according to Reuters, with experts claiming that the block is coming directly out of Beijing.

China has blocked many foreign news services in the past buut this is believed to be the first time that a search engine has been censored in this way. No other search engines - including those serviced by Google - are thought to have been hit by the action.

Chinese authorities - not known for their liberal attitudes - are believed to have taken the action because Google seemingly provides a window to porn and could also compromise national security.

Already deeply suspicious of just about everything, China is no stranger to using such strong-arm tactics to regulate the Internet.

Last November the Chinese Government shut down 17,500 Internet cafes for failing to block sites considered subversive or pornographic.

In July 2001 Beijing shut 2,000 cybercafes and suspended a further 6,000 amid fears that the nation's youth were becoming Net addicts.

And last year a report by the Human Rights Watch (HRW) found that China has introduced more than 60 sets of regulations to govern Internet content since the government began permitting commercial Internet accounts in 1995.

No one from Google was available for comment at the time of writing. ®

Related Stories

China closes 17,488 Net cafes
IT companies urged to help human rights in China

The Essential Guide to IT Transformation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.