Thursday, August 18, 2011

Chinese political prisoners sue tech giant Cisco

Aug. 16, 2011 Global Post

Chinese political prisoners are suing one of the world's largest technology companies, Cisco, for allegedly helping the Chinese Communist Party to monitor, censor and suppress the Chinese people.

Daniel Ward, of U.S. law firm Ward & Ward, has brought the case on behalf of Du Daobin, Zhou Yuanzhi, Liu Xianbin and 10 unnamed other people, claiming that Cisco provided the technology and expertise that the ruling party used to suppress its people.

He compared Cisco's actions to "IBM's behavior in Nazi Germany", Australia's Fairfax Media reports.

Cisco denies the allegations.

"Cisco has, for years now, knowingly aided and abetted the Chinese Communist Party's ongoing efforts to stifle the free speech and discourse of its citizenry," Mr Ward told Fairfax Media journalist Asher Moses.

"Dating back to the early 2000s, Cisco competed for contracts with the Chinese Communist Party (CCP) to help design, develop and implement the 'Golden Shield Project' - a rather Orwellian euphemism for the Chinese Communist Party's ongoing effort to monitor, track and censor all internet traffic into and out of China," The Sydney Morning Herald website, published by Fairfax, reports.

Du spent three years in jail, Zhou is a prisoner in his own home and Liu has served two months of a 10-year sentence, court documents say.

All three claim to have been tortured and abused over articles they published online.

Cisco helped the CCP build its Golden Shield - also known as the Great Firewall of China - and Policenet systems.

Cisco is accused of training Chinese engineers in how to use its technology to carry out surveillance of online activity and suppress dissident activity, SMH reports.

"With the assistance of Cisco, the CCP is now capable of detecting, identifying and tracking perceived threats to the CCP's power, and blocking 'harmful' websites," the complaint reads.

The case is being funded by the Laogai Research Foundation, whose executive director, Harry Wu, spent 19 years in Chinese labor camps but now lives in America.

"Cisco is a company that would do business with any partner so long as it turns a profit, even at the expense of our people's rights and freedoms," Wu said recently.

SMH reports:

In a leaked internal Cisco presentation from 2002, seen by Fairfax Media, the company reveals how its products can address China's goals of "maintaining stability", "stop the network-related crimes" and "combat 'Falun Gong' evil religion and other hostiles".

The document also has a page discussing "Networked prisons and jails", describing how information about a suspect travels through Cisco's system from the time a suspect is first jailed to when they are released. The system links jails and police departments and Mr Wu argues it "directly aided in tracking down dissidents and keeping them under oppressive surveillance".

"They aren't just selling routers to a corrupt regime. They are selling the technology, training and software specifically designed to monitor, censor and suppress the Chinese people," said Ward.

"And they are doing so knowing full well how the CCP treats dissenters."

Cisco said it did not operate networks in China or elsewhere - it just provided the equipment - and denied it customized its products in any way that would facilitate censorship or repression, it reports.

"There is no basis for these allegations against Cisco, and we intend to vigorously defend against them," the company said in a statement.

12 comments:

Field Engineer said...

Very nice blog, Thanks for sharing great article.
You are providing wonderful information, it is very useful to us.
Keep posting like this informative articles.
Thank you.

From: Field Engineer
Get to know about Cyber Security Specialist.

NOC Performance from Servers said...

Managed Network Services gives you access to a wider pool of experts to help manage your growing business network needs. It provides proactive support to ensure issues are fixed in a timely manner and offers improved IT security to help protect your customers and employees. It also simplifies your cost management, resulting in a more productive and cost-effective business.

saichinni said...

Very nice blog, Thanks for sharing great article.
You are providing wonderful information, it is very useful to us.
Keep posting like this informative articles.
Thank you.
Canada Tourist Visa consultancy India

Tech Kulture said...

Thanks for sharing a great article.
You are providing wonderful information, it is very useful to us.
Keep posting like this informative articles.
Thank you.

Get to know about kisscartoon

sammu said...

Very nice blog, Thanks for sharing great article.
You are providing wonderful information, it is very useful to us.
Keep posting like this informative articles.
Thank you.

Get to know about [pii_email_a42277285fa7a777ff7e].

Uzuitengen said...

ISC888 ฝาก-ถอน รวดเร็ว ขั้นต่ำเพียง 100 บาท คุณก็สามารถร่วมสนุกกับเกมเดิมพันออนไลน์ทุกรูปแบบภายในเว็บไซต์ของเรา สามารถใช้บริการได้ตลอดเวลา ISC888 สมัคร ได้ตลอด 24 ชั่วโมง. สมัครง่าย ไม่ยุ่งยาก ใช้เวลาไม่เกิน 5 นาที คุณก็สามารถเล่นเกมเดิมพันออนไลน์

kumarfield29 said...

A DHCP Engineer (dynamic host client protocol) is an IT professional usually involved in the maintenance of the connectivity of network for an organization. Engineers play a vital role to implement and supervise the computer networks that support in-house voice, data, videos and wireless network services with a dynamic IP address.
dhcp

kumarfield29 said...

Many people who are looking to start a career in engineering, and those who do can find inspiration in everything that they see, and everywhere they go. We live in a world that is advancing every day due to technology and industry, and we need more people interested in engineering careers on offer in the world.

engineer salary

Anonymous said...
This comment has been removed by the author.
Anonymous said...

Thanks for sharing informative, quality content

SalezShark CRM software free edition is available for 60 days trial, offering all the crucial features your business needs. The prerequisites include costs, Contributes, contact management, multichannel marketing, events, and activities, etc...

learnquranonline said...

Our experience with students enables us to determine the fastest and most effective teaching methods Ijazah in Al Jazariyyah

Chris Albert said...

security breach meaning
How to Protect A Business From a Data Breach
Almost all cyberattacks can be prevented, and all it takes is a few simple strategies. These include:

Education
Training doesn’t just end with your team. You need to ensure that you are aware of how your business can be attacked and then put preventative measures in place.