{"id":2407,"date":"2016-01-27T00:15:16","date_gmt":"2016-01-27T00:15:16","guid":{"rendered":"https:\/\/www.iuhrdf.org\/en\/2016\/01\/27\/chinas-comprehensive-counter-terrorism-law\/"},"modified":"2016-01-27T00:15:16","modified_gmt":"2016-01-27T00:15:16","slug":"chinas-comprehensive-counter-terrorism-law","status":"publish","type":"post","link":"https:\/\/iuhrdf.org\/en\/chinas-comprehensive-counter-terrorism-law\/","title":{"rendered":"China\u2019s Comprehensive Counter-Terrorism Law"},"content":{"rendered":"<p>A closer look at the contents of China\u2019s first comprehensive anti-terrorism law.<\/p>\n<div style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\">By&nbsp;Zunyou Zhou<\/div>\n<div style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\">January 23, 2016<\/div>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\"><a href=\"http:\/\/news.xinhuanet.com\/politics\/2015-12\/27\/c_128571798.htm\" style=\"color: rgb(7, 130, 193);\" target=\"_blank\" rel=\"noopener\">China\u2019s first comprehensive anti-terrorism bill<\/a>, passed at the end of 2015, took effect on the first day of 2016. Prior to its passage,&nbsp;<a href=\"http:\/\/www.npc.gov.cn\/npc\/xinwen\/lfgz\/flca\/2014-11\/03\/content_1885027.htm\" style=\"color: rgb(7, 130, 193);\" target=\"_blank\" rel=\"noopener\">the draft law<\/a>&nbsp;had attracted harsh criticism from human rights groups, technology companies, and the U.S. government. Despite obvious advances compared to the two previous draft versions, the final law has been denounced as \u201csweeping\u201d and \u201ctough\u201d by Western media.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\">In their reporting on the final law, the Western media usually associated it with the&nbsp;<a href=\"http:\/\/thediplomat.com\/2015\/11\/isis-chinese-hostage-executed\/\" style=\"color: rgb(7, 130, 193);\" target=\"_blank\" rel=\"noopener\">execution of a Chinese national<\/a>&nbsp;by the Islamic State, numerous deadly attacks by Uyghur extremists, the Christmas terrorism alert in the shopping neighborhood of Sanlitun in Beijing, and the expulsion of a French journalist from China for her article blaming government policy for terrorist activities. All these incidents make up the backdrop against which the law emerged and will be implemented.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\"><strong>A Comprehensive Law<\/strong><\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\">According to the legislature, the drafting of this law was guided by President Xi Jinping\u2019s \u201coverall national security outlook.\u201d Judging by the multi-faceted and far-reaching measures it has adopted, the law may be called \u201ccomprehensive\u201d in the true sense of the word.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\">The law consists of 97 articles in 10 chapters. While the first and last chapters involve general and supplementary provisions, the other chapters deal with major issues on counter-terrorism such as terrorism designation (chapter 2), prevention (chapter 3), intelligence gathering (chapter 4), investigation (chapter 5), emergency response (chapter 6), international cooperation (chapter 7), safeguards (chapter 8), and legal liabilities (chapter 9).<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\">This article will highlight four specific aspects of the law: (1) China\u2019s definition of terrorism; (2) obligating technology companies to provide technical support for counter-terrorism purposes; (3) placing restrictions on the reporting of terrorist attacks and government responses; and (4) implementing a \u201cpeople\u2019s war on terrorism.\u201d<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\"><strong>Definition of Terrorism<\/strong><\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\">In the final law, the revised definition of terrorism reads as follows: \u201cAny advocacy or activity that, by means of violence, sabotage, or threat, aims to create social panic, undermine public safety, infringe on personal and property rights, or coerce a state organ or an international organization, in order to achieve political, ideological, or other objectives.\u201d<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\">The legislature\u2019s removal of the term \u201cthought\u201d from&nbsp;<a href=\"http:\/\/thediplomat.com\/2015\/02\/how-china-defines-terrorism\" style=\"color: rgb(7, 130, 193);\" target=\"_blank\" rel=\"noopener\">the initial definition<\/a>&nbsp;of terrorism (namely, \u201cany thought, speech or activity that \u2026\u201d) is a welcome step, but the term \u201cadvocacy\u201d (\u4e3b\u5f20) in the current definition is&nbsp;<a href=\"http:\/\/www.scmp.com\/comment\/insight-opinion\/article\/1731061\/defining-terrorism-china-should-heed-global-practices\" style=\"color: rgb(7, 130, 193);\" target=\"_blank\" rel=\"noopener\">vague enough<\/a>&nbsp;to be interpreted either as \u201cthought\u201d or as \u201cspeech.\u201d The legislature may have intended to punish the dissemination of terrorist thoughts or speech by including \u201cadvocacy\u201d, but it appears to fail to understand that such an act of terrorist propaganda is part and parcel of terrorist \u201cactivity.\u201d<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\">Although there is no globally recognized definition of terrorism, the international community has reached a high degree of consensus.&nbsp;<a href=\"http:\/\/www.jamestown.org\/programs\/chinabrief\/single\/?tx_ttnews%5Btt_news%5D=44173&amp;cHash=dc00eedd4c61b21c691b9700b1468049#.Vk7denarSig\" style=\"color: rgb(7, 130, 193);\" target=\"_blank\" rel=\"noopener\">Compared with definitions<\/a>&nbsp;proposed by the UN in its Draft Comprehensive Convention on International Terrorism and used by the EU in its Framework Decision of June 2, 2002 on Combating Terrorism, the current Chinese definition, albeit open to wide interpretation, has been brought quite close to international consensus.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\"><strong>\u201cBackdoor Provisions\u201d<\/strong><\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\">Until today, most of the debate on the law has been focused on the so-called \u201cbackdoor provisions.\u201d These portions of the draft law would have required telecommunications operators and Internet service providers to provide the Chinese government with \u201cbackdoor\u201d access to their products, to handover encryption codes for review, and to store local user data on servers within China. In an interview with&nbsp;<em>Reuters<\/em>&nbsp;in March 2015, U.S. President Barack Obama sharply criticized the law, saying that such provisions would subject U.S. technology companies to Chinese snooping and that he had raised his concerns with President Xi Jinping.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\">To the relief of many, the final law abandons the above-mentioned demands for encryption review and data localization but retains the original text on the requirement for providing the government with technical support, including backdoor access and decryption, for the prevention and investigation of terrorist activities.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\">In defending the \u201cbackdoor provisions,\u201d Chinese officials usually claim that such rules are in line with internationally recognized practices, partly because other countries, including the United States and the United Kingdom, have been demanding the very same from technology companies. It is true that officials in both countries often use the rhetoric of counter-terrorism to call for legal norms that enable law enforcement access to encrypted data. In this sense, the Chinese accusation of the Western double standards on terrorism hits the mark. However, since such attempts have not been successful, it is not correct to say that the Chinese rules in this regard conform to international standards.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\"><strong>Reporting Restrictions<\/strong><\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\">China\u2019s new law also places restrictions on the reporting of terrorist attacks and government responses. Pursuant to the new law, no one is allowed to disseminate details of terrorist incidents that may lead to copycat acts, nor may they spread cruel or inhuman images. Moreover, no one is allowed to publish identifying information on response personnel or hostages, nor on anti-terror responses, with the exception that the news media may do so with the permission of the counter-terrorism agencies exclusively responsible for releasing such information.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\">While China is known for maintaining a powerful censorship apparatus to curtail the flow of information on many sensitive topics, its censorship of terrorism-related information is even more severe. The lawmakers may have wished to avoid political repercussions from terrorist attacks by censoring terrorism-related information, but such a policy has the potential to backfire in the long term.&nbsp;<a href=\"http:\/\/www.scmp.com\/comment\/insight-opinion\/article\/1214554\/media-censorship-terrorism-chinese-soil-only-feeds-rumours\" style=\"color: rgb(7, 130, 193);\" target=\"_blank\" rel=\"noopener\">This is because<\/a>&nbsp;public ignorance of the true state of terrorism affects people\u2019s ability to cooperate with the government in its counter-terrorism efforts. Further, freedom of the press is not only a fundamental human right but also a major foundation of democracy.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\"><strong>People\u2019s War<\/strong><\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\">The \u201c<a href=\"http:\/\/thediplomat.com\/2014\/08\/chinas-peoples-war-against-terrorism\" style=\"color: rgb(7, 130, 193);\" target=\"_blank\" rel=\"noopener\">people\u2019s war<\/a>\u201d strategy that highlights the participation of civilians has been recognized as a top principle of the counter-terrorism law (Article 5). Specifically, the law says that the authorities should establish joint coordination mechanisms to mobilize grassroots organizations (Article 8), set up formal forces or volunteer groups in the communities (Article 74), and encourage civilians to work as informants to promote intelligence gathering (Article 44).<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\">Meanwhile, the law stipulates that all organizations and individuals have the duty to assist and cooperate with the authorities (Article 9), and promises that honors and rewards should be given to those who have provided outstanding support in the prevention of terrorist activities (Article 10) and those who have been injured or killed for performing their anti-terror civil duties (Article 75).<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\">In fact, China has long implemented a \u201cpeople\u2019s war\u201d strategy in its fight against terrorism. On August 1, 2014 alone, more than&nbsp;<a href=\"http:\/\/news.ts.cn\/content\/2014-08\/03\/content_10294985_all.htm\" style=\"color: rgb(7, 130, 193);\" target=\"_blank\" rel=\"noopener\">30,000 local residents<\/a>&nbsp;in Hotan Prefecture, Xinjiang were mobilized to join hands with the police in a successful manhunt for 10 suspected terrorists. Beijing has also started recruiting local residents to act as security volunteers. \u201cChaoyang Masses,\u201d a group of such volunteers in the Chaoyang district of Beijing, was&nbsp;<a href=\"http:\/\/news.xinhuanet.com\/politics\/2015-07\/06\/c_1115833905.htm\" style=\"color: rgb(7, 130, 193);\" target=\"_blank\" rel=\"noopener\">jokingly nicknamed<\/a>&nbsp;one of the top-tier intelligence agencies in the world, on par with the United States\u2019 CIA, the Soviet-era KGB, Israel\u2019s Mossad, and the British MI6.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\">Terrorists live among the people, terrorist attacks occur before the eyes of the people, and terrorism threatens the lives of the people. So the people have an unparalleled advantage compared with uniformed, specialized security forces.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\"><strong>Conclusion<\/strong><\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\">The law is designed to meet China\u2019s urgent, key needs in its fight against the serious threat of terrorism. Aside from the backdoor provisions (which have sparked considerable controversy out of fear of industrial espionage), most parts of the law involve granting enormous discretionary powers to a government that already has broad, intrusive competences. These new powers will inevitably affect fundamental human rights.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\">In order to strike a proper balance between security and liberty, the legislature should have considered introducing corresponding appropriate legal protections against potential human rights violations. A general clause on the protection of human rights in counter-terrorism actions such as Article 6 of the law, however, definitely falls short. In the future, China should, as an alternative solution, adopt additional regulations to strengthen the protection of civil liberties in its counter-terrorism activities.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 18.9091px;\"><em>Dr. Zunyou Zhou is head of the China section at the Max Planck Institute for Foreign and International Criminal Law.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A closer look at the contents of China\u2019s first comprehensive anti-terrorism law.<\/p>\n","protected":false},"author":3,"featured_media":2406,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"topic":[],"class_list":["post-2407","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"_links":{"self":[{"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/posts\/2407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/comments?post=2407"}],"version-history":[{"count":0,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/posts\/2407\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/media\/2406"}],"wp:attachment":[{"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/media?parent=2407"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/categories?post=2407"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/tags?post=2407"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/topic?post=2407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}