Feeds

China tosses New York Times into shredder in family fortunes row

Great Firewall stoked ahead of power handover

The Power of One eBook: Top reasons to choose HP BladeSystem

China’s censors have blocked the New York Times website after the paper ran a story alleging relatives of outgoing prime minister Wen Jiabao amassed a $2.7bn fortune.

The article, which became unavailable in the country just hours after publication, claimed members of Wen's family benefited from regulatory and government decisions made after he came to power in 2003. The newspaper accused relatives of 'Grandpa Wen' - a vocal critic of corruption - of taking steps to hide their riches from prying eyes. They deny the allegations.

Although there’s no suggestion of any wrongdoing on his part, the report is damaging to a political party party still reeling from the Bo Xilai scandal. As the party prepares for its leadership handover, a key task for the incoming team is reducing the huge wealth gap across the People’s Republic.

Not only is the NYT's English and Chinese language sites blocked, discussion of Wen on social networks is being curtailed by the nation's microblogging platforms, thanks to censorship of certain keywords.

China Digital Times has compiled a lengthy list of some of the words that are now banned on Twitter-like Sina Weibo, including New York Times, Grandpa Wen and Wen Yunsong – the name of Wen’s son.

Wen's family members have since hit back at NYT through their lawyers: in a statement published on the front page of the South China Morning Post on Sunday, they said “the so-called ‘hidden riches’ of Wen Jiabao’s family members in the New York Times’ report do not exist”.

The once-in-a-decade leadership handover in China is a hugely politically sensitive time, during which web censorship is routinely tightened to stifle any dissent. However commentators are curious to see how it is handled this year – it'll be the first National People's Congress formed in the age of social networking.

The Ministry of Industry and Information Technology has tried to reassure users that there will be no internet shutdown, although euphemistically pointed to network clean-up operations, and ongoing maintenance and repair in order to “guarantee the smooth network operation”, Caixin reported. ®

Top three mobile application threats

More from The Register

next story
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.