Feeds

Filter Great Firewall of China's architects at US borders - petition

Dear web censors, wish you weren't here, lots of love, 7,000 Americans

Build a business case: developing custom apps

A petition hosted by the White House calls for the computer scientists who built the "Great Firewall" of China to be denied entry to the US.

The petition was submitted to the Obama administration on Friday, and has already garnered almost 7,000 signatures from American citizens who oppose China's extensive web censoring "firewall".

If the appeal reaches the 100,000 mark by 24 February, White House staff will be obliged to review it, send it to “the appropriate policy experts” and issue an official response.

The full wording of the petition is as follows:

People work on information technology always need to communicate and exchange knowledges between countries. If some of them use their skills and technology for blocking people to use internet for certain governments, all the other countries should boycott such behavior.

If they apply to enter US, for example to attend a technology conference, as a responsible government has always valued freedom, it reasonable to deny it.

Although the petition is aimed at all those who contribute to internet censorship, singled out for particular attention are the chief architects of the Great Firewall – arguably the world’s most successful and comprehensive web filtering system.

A brief list posted to coding site Github names and shames Fang Binxing, often dubbed the Father of the Great Firewall, Weili Han – associate professor at Shanghai’s Fudan University – and Gang Xiong of the Chinese Academy of Science’s Institute of Computing Technology.

While the petition has little chance of success, not least because the identities of most of those involved in the shadowy censorship project remain a mystery, it’s another sign of the growing calls from within the US for the Obama administration to pursue a strategy of reciprocity with China.

One particularly contentious area has been the awarding of work visas to journalists – something the Chinese authorities are far less keen to do than their counterparts in Washington.

In September 2011, US Congressman Dana Rohrabacher introduced the Chinese Media Reciprocity Act. Although never enacted, it called for US I-visas to be issued to Chinese state media only on a one-for-one basis. ®

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
True fact: 1 in 4 Brits are now TERRORISTS
YouGov poll reveals terrible truth about the enemy within
Hello, police, El Reg here. Are we a bunch of terrorists now?
Do Brits risk arrest for watching beheading video nasty? We asked the fuzz
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
NBN Co claims 96 mbps download speeds for FTTN trial
Umina trial also delivers 30 mbps uploads, but exact rig used not revealed
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Felony charges? Harsh! Alleged Anon hackers plead guilty to misdemeanours
US judge questions harsh sentence sought by prosecutors
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?