Feeds

Steelie Neelie batters at China's Great Firewall

Censorship screen also illicit trade barrier, claims EC

Intelligent flash storage arrays

China's Great Firewall is acting as a block to international business and should be tackled by the World Trade Organisation (WTO), according to European Competiton Commissioner Neelie Kroes.

In Shanghai today, she said that the array of technical measures designed by Beijing to stop citizens accessing banned websites was also harming European trade with China.

"It is one of those issues that needs to be tackled within the WTO," Reuters reports she said.

Traditionally trade barriers have been put up by imposing levies on imported goods or by blocking foreign ownership.

Under World Trade Organisation rules, a complaint about a trade barrier merits investigation and possibly dispute resolution procedures, whereby the WTO could impose a legal verdict on the Great Firewall. Because the European Union acts as a bloc at WTO level, Kroes was speaking for all member states today, including the UK.

"I am pushing wherever I can just to get European enterprises a level playing field in China and the other way around. It should be reciprocal," Kroes said.

The Great Firewall blocks access to hundreds of Western websites including news sites, merchants and social networks.

Kroes' statement suggests a new form of diplomatic leverage could be applied by the West against the Great Firewall. China has largely ignored criticism of censorship in human rights terms, notably in the run up to the Beijing Olympics, but attacking its free trade credentials may prove more embarrassing. ®

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.