{"id":4407,"date":"2018-11-06T20:38:52","date_gmt":"2018-11-06T20:38:52","guid":{"rendered":"https:\/\/www.iuhrdf.org\/en\/2018\/11\/06\/censoring-collective-identity-chinese-cybersecurity-policy-and-uyghurs-0\/"},"modified":"2018-11-06T20:38:52","modified_gmt":"2018-11-06T20:38:52","slug":"censoring-collective-identity-chinese-cybersecurity-policy-and-uyghurs-0","status":"publish","type":"post","link":"https:\/\/iuhrdf.org\/en\/censoring-collective-identity-chinese-cybersecurity-policy-and-uyghurs-0\/","title":{"rendered":"Censoring Collective Identity: Chinese Cybersecurity Policy and the Uyghurs"},"content":{"rendered":"<div class=\"post-content\" itemprop=\"articleBody mainEntityOfPage\" style=\"box-sizing: border-box; line-height: inherit; clear: both; width: 750px; height: auto; overflow: hidden; margin-top: 29px; color: rgb(89, 89, 89); font-family: &quot;Open Sans&quot;, sans-serif; font-size: 17px;\">\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><em style=\"box-sizing: border-box; line-height: inherit;\">The following article is the second&nbsp;in a series focusing on countries that restrict speech online&nbsp;in order to prevent \u201csocial panic\u201d or \u201canxiety amongst <\/em><\/span><em style=\"box-sizing: border-box; line-height: inherit;\"><span style=\"font-size:14px;\">citizenry<\/span><\/em><span style=\"font-size:14px;\"><em style=\"box-sizing: border-box; line-height: inherit;\">.\u201d The series will examine&nbsp;<a href=\"https:\/\/jsis.washington.edu\/news\/venezuela-cybersecurity-profile-seeking-stability-unstable-medium\/\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">Venezuela<\/a>, China, and Saudi Arabia.<\/em><\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\">It is widely known China suppresses digital activity on a grand scale. China, which&nbsp;<a href=\"https:\/\/freedomhouse.org\/report\/freedom-net-2015\/table-country-scores\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">ranked last in Internet Freedom in 2015<\/a>, commonly practices mass censorship and uses extensive surveillance to implement its policy goals and national security objectives.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn1\" name=\"_ftnref1\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[1]<\/a>&nbsp;The government\u2019s monitoring of private communications within the country is not only <\/span><span style=\"font-size:14px;\">common,<\/span><span style=\"font-size:14px;\"> but popular amongst Chinese citizens.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn2\" name=\"_ftnref2\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[2]<\/a>&nbsp;This may be due to the fact in terms of speech, the Chinese people have been described as \u201cindividually free, but collectively in chains.\u201d<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn3\" name=\"_ftnref3\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[3]<\/a><\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\">However, speech is not equal for all in China and the limits on speech have&nbsp;serious implications for groups such as the Chinese&nbsp;<a href=\"http:\/\/uyghuramerican.org\/about-uyghurs\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">Uyghurs<\/a>, especially given that some Uyghurs desire independence from China. The Chinese Uyghurs, a Turkic Muslim ethnic group who largely reside in the Uyghur Autonomous Region of Xinjiang. have a&nbsp;<a href=\"http:\/\/www.bbc.com\/news\/world-asia-china-26414014\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">long history of opposition and violence with the Chinese government<\/a>. It is no surprise this relationship exists in cyberspace as well. Chinese Uyghurs, particularly those residing in Xinjiang, face significant restrictions on digital activity. The Chinese government applies its own cybersecurity policy to silence Uyghur communication, expression, and identity.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\">The Chinese Uyghurs face significant opposition from the Chinese government, especially in <\/span><span style=\"font-size:14px;\">the recent<\/span><span style=\"font-size:14px;\"> years. Some Chinese Uyghurs desire independence from China, creating tension with the Chinese government. In the early 1990\u2019s, the Chinese government&nbsp;<a href=\"https:\/\/www.britannica.com\/place\/Xinjiang\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">attempted to integrate Xinjiang socially and ethnically<\/a>&nbsp;by increasing the population of Han Chinese within Xinjiang.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn4\" name=\"_ftnref4\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[4]<\/a>&nbsp;However, it is also at this time that the Chinese government implemented increasingly harsher religious restrictions in Xinjiang, due to the government\u2019s belief Uyghur religion and political views run antithetical to the party line. These restrictions were tightened even further after the 9\/11 attacks in the United States and the 2009 ethnic riots in Xinjiang\u2019s capital, <\/span><span style=\"font-size:14px;\">Urumpi<\/span><span style=\"font-size:14px;\">.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn5\" name=\"_ftnref5\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[5]<\/a>&nbsp;For example, in 2015&nbsp;<a href=\"http:\/\/www.aljazeera.com\/news\/2015\/06\/china-bans-ramadan-fasting-muslim-region-150618070016245.html\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">China banned students and teachers from fasting and ordered restaurants to stay open during Ramadan<\/a>.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn6\" name=\"_ftnref6\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[6]<\/a>&nbsp;The increase of government regulations in Xinjiang has created more tension and violence in the region. Violence between Uyghur separatists and Han Chinese continue to the present day<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn7\" name=\"_ftnref7\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[7]<\/a>&nbsp;and the state views Uyghur separatists as part of a global jihad, especially connected with the&nbsp;<a href=\"http:\/\/www.cfr.org\/china\/east-turkestan-islamic-movement-etim\/p9179\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">Turkistan Islamic Party<\/a>&nbsp;(TIP), which China believes has ties to Al-Qaeda.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn8\" name=\"_ftnref8\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[8]<\/a><\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\">China likely perceives the Uyghurs as a threat due to its general concern with any collective action movement, a goal for some Uyghurs.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn9\" name=\"_ftnref9\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[9]<\/a>&nbsp;A&nbsp;<a href=\"http:\/\/gking.harvard.edu\/files\/censored.pdf\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">2013 study<\/a>&nbsp;about China\u2019s social media censorship practices illustrated that the Chinese government is not concerned with expressing individual criticism, such as an individual communicating their disapproval of Chinese politicians and policies.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn10\" name=\"_ftnref10\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[10]<\/a>&nbsp;But if this criticism encourages mobilization towards collective action, the post will be flagged as inappropriate and likely removed.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn11\" name=\"_ftnref11\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[11]<\/a>&nbsp;Flagging occurred&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=bLu6fsdla-8\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">regardless of whether the post expressed criticism or praise of China<\/a>,<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn12\" name=\"_ftnref12\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[12]<\/a>&nbsp;the only common link was a call for mobilization.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn13\" name=\"_ftnref13\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[13]<\/a>&nbsp;It is important to keep these findings in mind as a framework for China\u2019s censorship of Uyghur communications and expression.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\">China\u2019s vague legislation and ambiguous legal phrases help reinforce the Chinese government\u2019s suppression of collective expression. For example,&nbsp;<a href=\"http:\/\/thediplomat.com\/2016\/01\/chinas-comprehensive-counter-terrorism-law\/\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">China\u2019s 2015 Anti-Terrorism Bill<\/a>&nbsp;defines terrorism as:<\/span><\/p>\n<blockquote style=\"box-sizing: border-box; line-height: inherit; padding-left: 16px; margin: 0px 0px 29px; font-size: 21.25px; border-left: 3px solid rgb(233, 230, 240);\">\n<p style=\"box-sizing: border-box; line-height: 1.55; margin-top: 0px; margin-bottom: 0px; font-size: 21px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased; font-family: &quot;Encode Sans Compressed&quot;, sans-serif;\"><span style=\"font-size:14px;\">Any advocacy or activity that, by means of violence, sabotage, or threat, aims to create social panic, undermine public safety, infringe on personal and property rights, or coerce a state organ or an international organization, in order to achieve political, ideological, or other objectives.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn14\" name=\"_ftnref14\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[14]<\/a><\/span><\/p>\n<\/blockquote>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\">As is the case with other Chinese laws, the Bill contains vague language that is open for interpretation, leaving ample room for state interpretation of the term \u201cterrorism.\u201d This means the term could be expanded to include activists or anyone else with views at odds with the Communist Party.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn15\" name=\"_ftnref15\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[15]<\/a>&nbsp;In addition, the phrase \u201csocial panic\u201d invokes collective action as per the 2013 study mentioned above. The importance of suppressing collective action is a guiding principle in how China assesses threats and, therefore, why China broadly views Uyghurs as a threatening movement.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\">In addition, in 2015 China began to enact expansive new national security legislation to specifically address extremists\u2019 use of information and communication technology (ICT). It is likely that violence and unrest in Xinjiang acted as a catalyst for this legislation. It is important to note that these laws do not necessarily provide many new provisions or <\/span><span style=\"font-size:14px;\">practices,<\/span><span style=\"font-size:14px;\"> but <\/span><span style=\"font-size:14px;\">instead<\/span><span style=\"font-size:14px;\"> are seen by academics and analysts as legal support for existing Chinese government activity.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn16\" name=\"_ftnref16\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[16]<\/a>&nbsp;Similar to the nature of recent Chinese national security laws, this new law is vague and broad allowing the Chinese government to interpret and regulate legislation as needed.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn17\" name=\"_ftnref17\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[17]<\/a>&nbsp;<a href=\"https:\/\/www.theguardian.com\/world\/2015\/jul\/01\/china-national-security-law-internet-regulation-cyberspace-xi-jinping\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">The National Security Law<\/a>, which passed in June 2015, openly stresses the importance of national sovereignty and state stability. The law describes the significance of \u201cprotect(ing) people\u2019s fundamental interests\u201d and explicitly states that China has national security interests in cyberspace in addition to diverse <\/span><span style=\"font-size:14px;\">arenas<\/span><span style=\"font-size:14px;\"> such as outer space, the Arctic, and oceans.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn18\" name=\"_ftnref18\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[18]<\/a>&nbsp;The law specifically recognizes the Internet as a key medium within China. It emphasizes Beijing should maintain sovereignty over the Internet in addition to providing \u201csecure and controllable\u201d information systems.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn19\" name=\"_ftnref19\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[19]<\/a><\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\">The vagueness of regulations offers too wide of a definition for what the state describes as state endangerment. State endangerment is likely to mean anything that undermines national security. Researchers believe this will significantly reduce any role government criticism may have and others consider the law to allow regulations on the Xinjiang region to continue indefinitely.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn20\" name=\"_ftnref20\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[20]<\/a>&nbsp;The Chinese government\u2019s exact methods of its strict censorship of the Internet in Xinjiang are unknown. Although, it is safe to assume Chinese prefers to perform mass censorship of programs than scrub for individual content. For example, in 2009&nbsp;<a href=\"http:\/\/news.bbc.co.uk\/2\/hi\/asia-pacific\/8682145.stm\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">the Chinese government blocked or shut access to the Internet in Xinjiang for ten months<\/a>.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn21\" name=\"_ftnref21\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[21]<\/a><\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\">Although federal legislation was created with issues in Xinjiang in mind, China also directly created new legislation and practices specific to Xinjiang in order to severely limit the flow of information from Chinese Uyghurs. These regulations began in the weeks leading up to the passage of the Anti-Terrorism Bill and intend to reduce <\/span><span style=\"font-size:14px;\">anonymity<\/span><span style=\"font-size:14px;\"> of those using ICT products. ICT companies and those in Xinjiang who provide instant communications services and online storage or audiovisual sharing services must register their services or set up servers in the region.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn22\" name=\"_ftnref22\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[22]<\/a>&nbsp; Users of such services must also register with the state using a phone number or a national ID number.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn23\" name=\"_ftnref23\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[23]<\/a><\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\">Xinjiang residents have attempted to evade such regulations. Uyghurs in Xinjiang use&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Virtual_private_network\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">VPNs<\/a>&nbsp;to get past censors and use&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/WeChat\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">WeChat<\/a>, a Chinese social-media service that is difficult to censor due to its direct private group messaging.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn24\" name=\"_ftnref24\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[24]<\/a>&nbsp;Chinese authorities have suspended access to WeChat and 16 other social media platforms in response.&nbsp;<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn25\" name=\"_ftnref25\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[25]<\/a>&nbsp;Some Uyghurs have responded to the increase in Chinese censorship by spreading material by way of jump drives or switching to non-smart phones as Uyghurs believe a lack of connectivity to the Internet is more secure.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn26\" name=\"_ftnref26\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[26]<\/a><\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\">The private sector, consisting of domestic and foreign ICT companies, plays a key role in the management and implementation of the Chinese government\u2019s digital communication policies. Chinese businesses are expected to ultimately support the state\u2019s goals. In April 2016, the Chinese President, Xi Jinping, held a meeting of influential technology leaders to describe his vision for the future of the Chinese Internet as well as a \u201c<a href=\"http:\/\/blogs.wsj.com\/chinarealtime\/2016\/04\/20\/in-xi-jinpings-meeting-with-chinese-tech-chiefs-a-reminder-of-state-control\/\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">clean and healthy cyberspace<\/a>.\u201d<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn27\" name=\"_ftnref27\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[27]<\/a>The 2015 Anti-Terrorism Bill explicitly focuses on the responsibility of the private sector in the state\u2019s efforts to prevent and investigate terrorist attacks. The law requires that companies provide decryption and technical support, usually internal monitoring, in some capacity to assist public and state security organizations. The Chinese government does not offer tangible examples for actions that would constitute complying with these requests; therefore, companies currently have a limited understanding of how to comply.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\">It is important to note that <\/span><span style=\"font-size:14px;\">execution<\/span><span style=\"font-size:14px;\"> of the bill and its requirements for ICT companies to assist in decryption and internal monitoring relies on local governments for enforcement. For example, it may be the <\/span><span style=\"font-size:14px;\">case specific<\/span><span style=\"font-size:14px;\"> ministries will choose not to implement the law at all.&nbsp; The decentralization of law enforcement makes it difficult to understand the application on extremists in the country at large, or privacy of citizens for that matter, due to the irregularities in <\/span><span style=\"font-size:14px;\">application<\/span><span style=\"font-size:14px;\">.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\">Chinese technology companies have actively altered their businesses to satisfy Chinese government policy goals. Many companies create special departments or increase their workforce to address digital communication by Uyghurs.&nbsp;<a href=\"http:\/\/www.tencent.com\/en-us\/index.shtml\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">Tencent<\/a>, a Chinese company, has added more than 600 employees with specialized knowledge, such as knowledge of the Uyghur language, to monitor content.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn28\" name=\"_ftnref28\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[28]<\/a>&nbsp;However, some Chinese ICT companies are having trouble correctly identifying what qualifies as harmful content and defer to the Ministry of Public Security to ensure higher efficiency in stopping the spread of extremist content. These difficulties in defining harmful content have large implications as it is more likely the China government will broadly define harmful content as supposed to <\/span><span style=\"font-size:14px;\">taking<\/span><span style=\"font-size:14px;\"> a more nuanced approach. The only explicit understanding of harmful content came in April 2015, when the regional High Court, People\u2019s Procuratorate and Public Security departments issues a list of banned audiovisual products that promote violence and terrorism, most notably those that teach how to create explosive weaponry.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn29\" name=\"_ftnref29\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[29]<\/a><\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\">China attempts to prevent the Chinese Uyghurs from using the Internet to find a sense of belonging and connection to the rest of the Muslim world\u2013something that is otherwise absent in mainstream Chinese society. The Chinese government largely views Islamic content to be dangerous to national security, as the Uyghurs constitute a collective and global movement. Some Uyghur separatists and affiliated organizations such as the Turkestan Islamic Party use the Internet to promote and share religious, sometimes jihadist information. The Turkistan Islamic Party, formerly known as the East Turkestan Islamic Movement (ETIM), is active in disseminating extremist propaganda online. Content released by the TIP on its website and other social media sites is mainly used to encourage prospect jihadi-Uyghurs to publicize their attacks.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn30\" name=\"_ftnref30\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[30]<\/a>&nbsp;The TIP <\/span><span style=\"font-size:14px;\">have<\/span><span style=\"font-size:14px;\"> also released Uyghur language videos praising violent attacks, such as those at a train station in Urumqi.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn31\" name=\"_ftnref31\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[31]<\/a><\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\">Chinese oppression of Uyghur access to digital services and Uyghur digital speech is effectively suppressing Uyghur identity. China is not only preventing jihadist information from being <\/span><span style=\"font-size:14px;\">disseminated,<\/span><span style=\"font-size:14px;\"> but also information about <\/span><span style=\"font-size:14px;\">a broader<\/span><span style=\"font-size:14px;\"> religious communities and practices. By limiting connections to the broader Muslim world, the Chinese government limits Uyghurs from acquiring information about how to be a pious Muslim. These policies not only inhibit practices of Uyghur <\/span><span style=\"font-size:14px;\">culture,<\/span><span style=\"font-size:14px;\"> but also negatively impact&nbsp;local commerce and development, which appears to be yet another reason for Uyghurs to be unsatisfied with the Chinese government.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\">These oppressive tactics appear to be increasing with growing budgets. For the first time since 2013,&nbsp;<a href=\"http:\/\/www.rfa.org\/english\/news\/china\/china-security-03082016144158.html\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">China\u2019s domestic security budget ($25.6 million) will surpass <\/a><\/span><a href=\"http:\/\/www.rfa.org\/english\/news\/china\/china-security-03082016144158.html\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\"><span style=\"font-size:14px;\">it<\/span><\/a><span style=\"font-size:14px;\"><a href=\"http:\/\/www.rfa.org\/english\/news\/china\/china-security-03082016144158.html\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\"> defense spending<\/a>.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn32\" name=\"_ftnref32\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[32]<\/a>&nbsp;A budget increase could be linked to the current construction a big data platform capable of massive state surveillance, &nbsp;or what has described by a Chinese engineer as a \u201c<a href=\"http:\/\/arstechnica.com\/information-technology\/2016\/03\/china-is-building-a-big-data-plaform-for-precrime\/\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">unified information environment<\/a>.\u201d<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn33\" name=\"_ftnref33\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[33]<\/a>&nbsp;The Chief Engineer has hinted that the project would be able to <\/span><span style=\"font-size:14px;\">cross reference<\/span><span style=\"font-size:14px;\"> bank account information, consumption patterns, surveillance camera footage and job-related information to create \u201c<a href=\"http:\/\/www.bloomberg.com\/news\/articles\/2016-03-03\/china-tries-its-hand-at-pre-crime\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">portrait(s) of a suspect(s)<\/a>.\u201d<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn34\" name=\"_ftnref34\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[34]<\/a>&nbsp;There appears to be no official release of such a program or the possibility that such a program is not in use already<\/span><span style=\"font-size:14px;\">.An<\/span><span style=\"font-size:14px;\"> executive for the project said that this platform would be tested in regions where there was violent opposition to <\/span><span style=\"font-size:14px;\">Communist<\/span><span style=\"font-size:14px;\"> rule, specifically focused on Xinjiang and Tibet.<a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftn35\" name=\"_ftnref35\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[35]<\/a>This platform may be further evidence of China\u2019s broad programs and laws as well as its targeted execution of such. This relationship is due to its stronger concern of organized collective movements rather than individual content, which is a larger focus within Western cyberspace.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\">Given the current relevance of and fear of global jihad as well as China\u2019s preparation to pass a new cybersecurity law, it does not appear the Chinese government will reduce its broad censorship of the Uyghurs anytime soon.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><i style=\"box-sizing: border-box; line-height: inherit;\">This publication was made possible in part by a grant from Carnegie Corporation of New York. The statements made and views expressed are solely the responsibility of the author.<\/i><\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref1\" name=\"_ftn1\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[1]<\/a>&nbsp;<a href=\"http:\/\/www.nytimes.com\/2015\/10\/30\/world\/asia\/freedom-house-report-china-internet-freedom.html\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">Edward Wong, \u201cChina Ranks Last of 65 Nations <\/a><\/span><a href=\"http:\/\/www.nytimes.com\/2015\/10\/30\/world\/asia\/freedom-house-report-china-internet-freedom.html\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\"><span style=\"font-size:14px;\">in<\/span><\/a><span style=\"font-size:14px;\"><a href=\"http:\/\/www.nytimes.com\/2015\/10\/30\/world\/asia\/freedom-house-report-china-internet-freedom.html\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\"> Internet Freedom,\u201d&nbsp;<em style=\"box-sizing: border-box; line-height: inherit;\">The New York Times<\/em>, October 29, 2015<\/a>.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref2\" name=\"_ftn2\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[2]<\/a>&nbsp;<a href=\"https:\/\/www.washingtonpost.com\/opinions\/cyber-surveillance-is-a-way-of-life-in-china\/2016\/01\/29\/e4e856dc-c476-11e5-a4aa-f25866ba0dc6_story.html\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">Peter Fuhrman, \u201cGovernment Cyber-Surveillance Is the Norm in China \u2014 and It\u2019s Popular,\u201d&nbsp;<em style=\"box-sizing: border-box; line-height: inherit;\">The Washington Post<\/em>, January 29, 2016<\/a>.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref3\" name=\"_ftn3\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[3]<\/a>&nbsp;<\/span><a href=\"https:\/\/www.youtube.com\/watch?v=bLu6fsdla-8\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\"><span style=\"font-size:14px;\">Faculti<\/span><\/a><span style=\"font-size:14px;\"><a href=\"https:\/\/www.youtube.com\/watch?v=bLu6fsdla-8\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">,&nbsp;<em style=\"box-sizing: border-box; line-height: inherit;\">How Censorship in China Allows Government Criticism but Silences Collective Expression \u2013 Gary King<\/em>, accessed June 3, 2016.<\/a><\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref4\" name=\"_ftn4\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[4]<\/a>&nbsp;<a href=\"https:\/\/www.britannica.com\/place\/Xinjiang\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">\u201cXinjiang | Autonomous Region, China | Britannica.com,\u201d accessed August 15, 2016<\/a>.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref5\" name=\"_ftn5\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[5]<\/a>&nbsp;<a href=\"http:\/\/www.wsj.com\/articles\/web-preaches-jihad-to-chinas-muslim-uighurs-1403663568\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">Ned Levin, \u201cWeb Preaches Jihad to China\u2019s Muslim Uighurs,\u201d&nbsp;<em style=\"box-sizing: border-box; line-height: inherit;\">Wall Street Journal<\/em>, June 25, 2014, sec. World<\/a>.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref6\" name=\"_ftn6\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[6]<\/a>&nbsp;<a href=\"http:\/\/www.aljazeera.com\/news\/2015\/06\/china-bans-ramadan-fasting-muslim-region-150618070016245.html\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">\u201cChina Bans Muslims from Fasting Ramadan in Xinjiang,\u201d accessed August 16, 2016.<\/a><\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref7\" name=\"_ftn7\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[7]<\/a>&nbsp;<a href=\"http:\/\/www.rfa.org\/english\/news\/uyghur\/violence-03032015142042.html\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">Richard Finney, \u201cAs Many as 700 Died in Xinjiang Violence Over Last Two Years, Rights Group Says,\u201d&nbsp;<em style=\"box-sizing: border-box; line-height: inherit;\">Radio Free Asia<\/em>, March 3, 2015.<\/a><\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref8\" name=\"_ftn8\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[8]<\/a>&nbsp;<a href=\"http:\/\/www.wsj.com\/articles\/web-preaches-jihad-to-chinas-muslim-uighurs-1403663568\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">Levin, \u201cWeb Preaches Jihad to China\u2019s Muslim Uighurs.\u201d<\/a><\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref9\" name=\"_ftn9\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[9]<\/a>&nbsp;<a href=\"http:\/\/gking.harvard.edu\/files\/gking\/files\/censored.pdf?m=1450429582\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">Gary King, Jennifer Pan, and Margaret E. Roberts, \u201cHow Censorship in China Allows Government Criticism but Silences Collective Expression,\u201d&nbsp;<em style=\"box-sizing: border-box; line-height: inherit;\">American Political Science Review<\/em>&nbsp;107, no. 2 (May 2013).<\/a><\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref10\" name=\"_ftn10\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[10]<\/a>&nbsp;Ibid.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref11\" name=\"_ftn11\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[11]<\/a>&nbsp;Ibid.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref12\" name=\"_ftn12\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[12]<\/a>&nbsp;<\/span><a href=\"https:\/\/youtu.be\/bLu6fsdla-8\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\"><span style=\"font-size:14px;\">Faculti<\/span><\/a><span style=\"font-size:14px;\"><a href=\"https:\/\/youtu.be\/bLu6fsdla-8\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">,&nbsp;<em style=\"box-sizing: border-box; line-height: inherit;\">How Censorship in China Allows Government Criticism but Silences Collective Expression \u2013 Gary King<\/em>.<\/a><\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref13\" name=\"_ftn13\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[13]<\/a>&nbsp;Ibid.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref14\" name=\"_ftn14\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[14]<\/a>&nbsp;Zunyou Zhou, \u201cChina\u2019s Comprehensive Counter-Terrorism Law,\u201d&nbsp;<em style=\"box-sizing: border-box; line-height: inherit;\">The Diplomat<\/em>, January 23, 2016.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref15\" name=\"_ftn15\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[15]<\/a>&nbsp;<a href=\"http:\/\/www.dailydot.com\/politics\/china-anti-terrorism-law-encryption-debate-adam-segal-interview\/\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">Eric Geller, \u201cChina Expert Adam Segal: U.S. Companies Should Worry about Beijing\u2019s New Anti-Terrorism Law,\u201d&nbsp;<em style=\"box-sizing: border-box; line-height: inherit;\">The Daily Dot<\/em>, December 29, 2015.<\/a><\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref16\" name=\"_ftn16\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[16]<\/a>&nbsp;Ibid.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref17\" name=\"_ftn17\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[17]<\/a>&nbsp;<a href=\"http:\/\/www.wsj.com\/articles\/china-passes-law-clamping-down-on-foreign-ngos-1461853978\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">Josh Chin, \u201cChina Gives Police Broad Powers Over Foreign Nonprofits,\u201d&nbsp;<em style=\"box-sizing: border-box; line-height: inherit;\">Wall Street Journal<\/em>, April 28, 2016, sec. World<\/a>.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref18\" name=\"_ftn18\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[18]<\/a>&nbsp;<a href=\"http:\/\/www.theguardian.com\/world\/2015\/jul\/01\/china-national-security-law-internet-regulation-cyberspace-xi-jinping\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">\u201cChina Passes New National Security Law Extending Control over Internet,\u201d&nbsp;<em style=\"box-sizing: border-box; line-height: inherit;\">The Guardian<\/em>, July 1, 2015<\/a>.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref19\" name=\"_ftn19\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[19]<\/a>&nbsp;Ibid.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref20\" name=\"_ftn20\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[20]<\/a>&nbsp;Ibid.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref21\" name=\"_ftn21\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[21]<\/a>&nbsp;<a href=\"http:\/\/news.bbc.co.uk\/2\/hi\/asia-pacific\/8682145.stm\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">Chris Hogg, \u201cChina Restores Xinjiang Internet,\u201d&nbsp;<em style=\"box-sizing: border-box; line-height: inherit;\">BBC<\/em>, May 14, 2010, sec. Asia-Pacific<\/a>.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref22\" name=\"_ftn22\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[22]<\/a>&nbsp;<a href=\"http:\/\/europe.chinadaily.com.cn\/china\/2015-01\/09\/content_19279465.htm\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">Gao Bo and Cao Yin, \u201cXinjiang Enforces New Website Rules,\u201d&nbsp;<em style=\"box-sizing: border-box; line-height: inherit;\">China Daily<\/em>, January 9, 2015<\/a>.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref23\" name=\"_ftn23\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[23]<\/a>&nbsp;<a href=\"https:\/\/freedomhouse.org\/report\/freedom-net\/2015\/china\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">\u201cChina | Country Report | Freedom on the Net | 2015,\u201d accessed May 20, 2016<\/a>.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref24\" name=\"_ftn24\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[24]<\/a>&nbsp;<a href=\"http:\/\/www.wsj.com\/articles\/web-preaches-jihad-to-chinas-muslim-uighurs-1403663568\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">Levin, \u201cWeb Preaches Jihad to China\u2019s Muslim Uighurs.\u201d<\/a><\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref25\" name=\"_ftn25\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[25]<\/a>&nbsp;<a href=\"http:\/\/www.rfa.org\/english\/news\/uyghur\/police-increase-checks-of-smartphone-users-in-xinjiang-01082016133532.html\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">\u201cPolice Increase Checks of Uyghur Smartphone Users in Xinjiang,\u201d&nbsp;<em style=\"box-sizing: border-box; line-height: inherit;\">Radio Free Asia<\/em>, January 8, 2016<\/a>.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref26\" name=\"_ftn26\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[26]<\/a>&nbsp;<a href=\"http:\/\/www.wsj.com\/articles\/web-preaches-jihad-to-chinas-muslim-uighurs-1403663568\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">Levin, \u201cWeb Preaches Jihad to China\u2019s Muslim Uighurs.\u201d<\/a><\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref27\" name=\"_ftn27\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[27]<\/a>&nbsp;<a href=\"http:\/\/blogs.wsj.com\/chinarealtime\/2016\/04\/20\/in-xi-jinpings-meeting-with-chinese-tech-chiefs-a-reminder-of-state-control\/\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">Eva Dou, \u201cIn Xi Jinping\u2019s Meeting with Chinese Tech Chiefs, A Reminder of State Control \u2013 China Real Time Report \u2013 WSJ,\u201d accessed April 22, 2016<\/a>.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref28\" name=\"_ftn28\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[28]<\/a>&nbsp;<a href=\"http:\/\/usa.chinadaily.com.cn\/epaper\/2014-07\/08\/content_17670221.htm\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">Cao Yin, \u201cOnline Videos Help to Spur Terror attacks|Focus|chinadaily.com.cn,\u201d&nbsp;<em style=\"box-sizing: border-box; line-height: inherit;\">China Daily<\/em>, July 8, 2014<\/a>.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref29\" name=\"_ftn29\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[29]<\/a>&nbsp;<a href=\"http:\/\/www.chinadaily.com.cn\/china\/2015-01\/09\/content_19279410.htm\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">\u201cXinjiang Enforces New Website Rules \u2013 China \u2013 Chinadaily.com.cn,\u201d accessed August 17, 2016<\/a>.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref30\" name=\"_ftn30\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[30]<\/a>&nbsp;<a href=\"http:\/\/www.wsj.com\/articles\/web-preaches-jihad-to-chinas-muslim-uighurs-1403663568\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">Levin, \u201cWeb Preaches Jihad to China\u2019s Muslim Uighurs.\u201d<\/a><\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref31\" name=\"_ftn31\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[31]<\/a>&nbsp;Ibid.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref32\" name=\"_ftn32\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[32]<\/a>&nbsp;<a href=\"http:\/\/www.rfa.org\/english\/news\/china\/china-security-03082016144158.html\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">\u201cChina to Spend \u2018At Least\u2019 U.S.$25 Billion on \u2018Maintaining Stability,\u2019\u201d&nbsp;<em style=\"box-sizing: border-box; line-height: inherit;\">Radio Free Asia<\/em>, accessed August 16, 2016<\/a>.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref33\" name=\"_ftn33\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[33]<\/a>&nbsp;<a href=\"http:\/\/arstechnica.com\/information-technology\/2016\/03\/china-is-building-a-big-data-plaform-for-precrime\/\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">Sean Gallagher, \u201cChina Is Building a Big Data Platform for \u2018precrime,\u2019\u201d&nbsp;<em style=\"box-sizing: border-box; line-height: inherit;\">Ars Technica<\/em>, March 9, 2016<\/a>.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref34\" name=\"_ftn34\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[34]<\/a>&nbsp;<a href=\"http:\/\/www.bloomberg.com\/news\/articles\/2016-03-03\/china-tries-its-hand-at-pre-crime\" style=\"box-sizing: border-box; line-height: inherit; background: 0px 0px; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">Shai Oster, \u201cChina Tries Its Hand at Pre-Crime,\u201d&nbsp;<em style=\"box-sizing: border-box; line-height: inherit;\">Bloomberg<\/em>, March 3, 2016<\/a>.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><a href=\"https:\/\/jsis.washington.edu\/news\/censoring-collective-identity-chinese-cybersecurity-policy-uyghurs\/#_ftnref35\" name=\"_ftn35\" style=\"box-sizing: border-box; line-height: inherit; background-image: initial; background-position: 0px 0px; background-repeat: initial; color: rgb(0, 92, 150); transition: all 0.25s ease 0s;\">[35]<\/a>&nbsp;Ibid.<\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased;\"><span style=\"font-size:14px;\"><i style=\"box-sizing: border-box; line-height: inherit; color: rgb(34, 34, 34); font-family: arial, sans-serif; font-size: 12.8px;\">&nbsp;<\/i><\/span><\/p>\n<\/div>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; font-size: 17px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased; font-family: &quot;Open Sans&quot;, sans-serif;\"><span style=\"font-size:14px;\"><em style=\"box-sizing: border-box; line-height: inherit;\">This publication was made possible in part by a grant from Carnegie Corporation of New York. The statements made and views expressed are solely the responsibility of the author.<\/em><\/span><\/p>\n<p style=\"box-sizing: border-box; line-height: 1.72222; margin-top: 0px; margin-bottom: 14.5px; font-size: 17px; color: rgb(61, 61, 61); -webkit-font-smoothing: antialiased; font-family: &quot;Open Sans&quot;, sans-serif;\"><span style=\"font-size:14px;\"><em style=\"box-sizing: border-box; line-height: inherit;\">Source: JSIS Washington<\/em><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following article is the second&nbsp;in a series focusing on countries that restrict speech online&nbsp;in order to prevent \u201csocial panic\u201d or \u201canxiety amongst citizenry.\u201d The series will examine&nbsp;Venezuela, China, and&#8230;<\/p>\n","protected":false},"author":4,"featured_media":4406,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"topic":[],"class_list":["post-4407","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"_links":{"self":[{"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/posts\/4407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/comments?post=4407"}],"version-history":[{"count":0,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/posts\/4407\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/media\/4406"}],"wp:attachment":[{"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/media?parent=4407"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/categories?post=4407"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/tags?post=4407"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/topic?post=4407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}