Feeds

China recruits volunteer net porn police

Censors Google (again)

Top three mobile application threats

The Chinese government plans to recruit tens of thousands of volunteers by the end of the year to report "lewd" content and "uncivilized" behavior on the internet.

Government-run news agency Xinhua reports volunteers will be registered under the auspices of China's Capital Civic Enhancement Committee Office (CCECO). The government will also enlist "supervision volunteers" to patrol internet cafes for vulgar content and to prevent minors from accessing the computers.

The People's Republic definition of "lewd" includes violence, pornography, libel, or any other material that violates a tensile definition of standards of public decency.

"The aim is to shield minors from unwanted harm they might be subjected to on the internet," a CCECO director told the news agency.

China's government commonly attributes internet pornography with powers to harm both the physical and mental health of young people.

Google gated

Plans to recruit internet supervisors comes as the government announced it ahs begun blocking some Chinese-language results on Google.

The blocks were instituted over renewed concerns the search engine is linking to pornographic material.

Xinhua reports government officials summoned the executive in charge of Google China on Thursday to reprimand the business in person. The official apparently apologized for the porn and vowed prompt action to rectify the problem.

China's blockage reportedly affects Chinese-language results from any country, but not English-language searches. The office also reportedly asked Google China to stop searching foreign sites to supplement the porno ban.

Google and Baidu (China's dominant search engine) were also both publicly shamed in January over porno links. The flogging was part of a larger government crackdown on internet pornography, which has thus far resulted in more than one thousands web sites getting blocked by Chinese authorities. ®

The Essential Guide to IT Transformation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.