Feeds

China tosses New York Times into shredder in family fortunes row

Great Firewall stoked ahead of power handover

The Power of One Infographic

China’s censors have blocked the New York Times website after the paper ran a story alleging relatives of outgoing prime minister Wen Jiabao amassed a $2.7bn fortune.

The article, which became unavailable in the country just hours after publication, claimed members of Wen's family benefited from regulatory and government decisions made after he came to power in 2003. The newspaper accused relatives of 'Grandpa Wen' - a vocal critic of corruption - of taking steps to hide their riches from prying eyes. They deny the allegations.

Although there’s no suggestion of any wrongdoing on his part, the report is damaging to a political party party still reeling from the Bo Xilai scandal. As the party prepares for its leadership handover, a key task for the incoming team is reducing the huge wealth gap across the People’s Republic.

Not only is the NYT's English and Chinese language sites blocked, discussion of Wen on social networks is being curtailed by the nation's microblogging platforms, thanks to censorship of certain keywords.

China Digital Times has compiled a lengthy list of some of the words that are now banned on Twitter-like Sina Weibo, including New York Times, Grandpa Wen and Wen Yunsong – the name of Wen’s son.

Wen's family members have since hit back at NYT through their lawyers: in a statement published on the front page of the South China Morning Post on Sunday, they said “the so-called ‘hidden riches’ of Wen Jiabao’s family members in the New York Times’ report do not exist”.

The once-in-a-decade leadership handover in China is a hugely politically sensitive time, during which web censorship is routinely tightened to stifle any dissent. However commentators are curious to see how it is handled this year – it'll be the first National People's Congress formed in the age of social networking.

The Ministry of Industry and Information Technology has tried to reassure users that there will be no internet shutdown, although euphemistically pointed to network clean-up operations, and ongoing maintenance and repair in order to “guarantee the smooth network operation”, Caixin reported. ®

Mobile application security vulnerability report

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
Price cuts, new features coming for Office 365 small biz customers
New plans for companies with up to 300 staff to launch in fall
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.