The Golden Shield Project (), also named National Public Security Work Informational Project, is the
Chinese nationwide network-security fundamental constructional project by the
e-government
E-government (known for electronic government) involves utilizing technology devices, such as computers and the Internet, for faster means of delivering public services to citizens and other persons in a country or region. E-government offer ...
of the
People's Republic of China
China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
. This project includes a security management information system, a criminal information system, an exit and entry administration information system, a supervisor information system, a traffic management information system, among others.
The Golden Shield Project is one of the 12 important
"golden" projects. The other "golden" projects are Golden Customs (also known as Golden Gate) (for customs), Golden Tax (for taxation), Golden Macro, Golden Finance (for financial management), Golden Auditing, Golden Security, Golden Agriculture (for agricultural information), Golden Quality (for quality supervision), Golden Water (for water conservancy information), Golden Credit, and Golden Discipline projects.
The Golden Shield Project also manages the Bureau of Public Information and Network Security Supervision, which is a bureau that is widely believed, though not officially claimed, to operate a subproject called the
Great Firewall of China
The Great Firewall (GFW; ) is the combination of legislative actions and technologies enforced by the People's Republic of China to regulate the Internet domestically. Its role in internet censorship in China is to block access to selected foreign ...
(GFW)
which is a
censorship
Censorship is the suppression of speech, public communication, or other information. This may be done on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient". Censorship can be conducted by governmen ...
and
surveillance
Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as ...
project that blocks data from foreign countries that may be unlawful in the PRC. It is operated by the
Ministry of Public Security
Ministry of Public Security can refer to:
* Ministry of Justice and Public Security (Brazil)
* Ministry of Public Security of Burundi
* Ministry of Public Security (Chile)
* Ministry of Public Security (China)
* Ministry of Public Security of Co ...
(MPS) of the
government of China
The government of the People's Republic of China is based on a system of people's congress within the parameters of a unitary communist state, in which the ruling Chinese Communist Party (CCP) enacts its policies through people's congresses. ...
. This subproject was initiated in 1998 and began operations in November 2003.
It has also seemingly been used to attack international web sites using
Man-on-the-side DDoS
In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
, for example
GitHub on 2015/03/28.
History
The political and ideological background of the Golden Shield Project is considered to be one of
Deng Xiaoping
Deng Xiaoping also Romanization of Chinese, romanised as Teng Hsiao-p'ing; born Xiansheng (). (22 August 190419 February 1997) was a Chinese statesman, revolutionary, and political theorist who served as the paramount leader of the People's R ...
's favorite sayings in the early 1980s: "If you open the window for fresh air, you have to expect some flies to blow in." The saying is related to a period of economic reform in China that became known as the "
socialist market economy
The socialist market economy (SME) is the economic system and model of economic development employed in the China, People's Republic of China. The system is a market economy with the predominance of public ownership and State-owned enterpr ...
". Superseding the
political ideologies
An ideology is a set of beliefs or values attributed to a person or group of persons, especially those held for reasons that are not purely about belief in certain knowledge, in which "practical elements are as prominent as theoretical ones". Form ...
of the
Cultural Revolution
The Cultural Revolution, formally known as the Great Proletarian Cultural Revolution, was a Social movement, sociopolitical movement in the China, People's Republic of China (PRC). It was launched by Mao Zedong in 1966 and lasted until his de ...
, the reform led China towards a
market economy
A market economy is an economic system in which the decisions regarding investment, production, and distribution to the consumers are guided by the price signals created by the forces of supply and demand. The major characteristic of a mark ...
and opened up the market for foreign investors. Nonetheless, despite the economic freedom, values and political ideas of the
Chinese Communist Party
The Communist Party of China (CPC), also translated into English as Chinese Communist Party (CCP), is the founding and One-party state, sole ruling party of the People's Republic of China (PRC). Founded in 1921, the CCP emerged victorious in the ...
have had to be protected by "swatting flies" of other unwanted ideologies.
The
Internet in China
China has been on the Internet intermittently since May 1989 and on a permanent basis since 20 April 1994, although with heavily Internet censorship in China, censored access. In 2008, China became the country with the largest population on th ...
arrived in 1994, as the inevitable consequence of and supporting tool for the "
socialist market economy
The socialist market economy (SME) is the economic system and model of economic development employed in the China, People's Republic of China. The system is a market economy with the predominance of public ownership and State-owned enterpr ...
". As availability of the Internet has gradually increased, it has become a common communication platform and tool for trading information.
The Ministry of Public Security took initial steps to control Internet use in 1997, when it issued comprehensive regulations governing its use. The key sections, Articles 46, are the following:
In 1998, the Chinese Communist Party feared that the
China Democracy Party (CDP) would breed a powerful new network that the party elites might not be able to control. The CDP was immediately banned, followed by arrests and imprisonment. That same year, the Golden Shield project was started. The first part of the project lasted eight years and was completed in 2006. The second part began in 2006 and ended in 2008. On 6 December 2002, 300 people in charge of the Golden Shield project from 31
provinces
A province is an administrative division within a country or state. The term derives from the ancient Roman , which was the major territorial and administrative unit of the Roman Empire's territorial possessions outside Italy. The term ''provi ...
and
cities
A city is a human settlement of a substantial size. The term "city" has different meanings around the world and in some places the settlement can be very small. Even where the term is limited to larger settlements, there is no universally agree ...
throughout China participated in a four-day inaugural "Comprehensive Exhibition on Chinese Information System". At the exhibition, many western high-tech products, including
Internet security
Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules ...
,
video monitoring and human
face recognition were purchased. It is estimated that around 30,000-50,000 police are employed in this gigantic project.
A subsystem of the Golden Shield has been nicknamed "
the Great Firewall" (防火长城) (a term that first appeared in a Wired magazine article in 1997) in reference to its role as a
network firewall
In computing, a firewall is a network security system that Network monitoring, monitors and controls incoming and outgoing network traffic based on configurable security rules. A firewall typically establishes a barrier between a trusted network a ...
and to the ancient
Great Wall of China
The Great Wall of China (, literally "ten thousand ''li'' long wall") is a series of fortifications in China. They were built across the historical northern borders of ancient Chinese states and Imperial China as protection against vario ...
. This part of the project includes the ability to block content by preventing
IP address
An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
es from being routed through and consists of standard firewalls and
proxy servers at the six
Internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
gateways. The system also selectively engages in
DNS cache poisoning when particular sites are requested. The government does not appear to be systematically examining Internet content, as this appears to be technically impractical.
Because of its disconnection from the larger world of IP routing protocols, the network contained within the Great Firewall has been described as "the Chinese autonomous
routing domain".
During the
2008 Summer Olympics
The 2008 Summer Olympics (), officially the Games of the XXIX Olympiad () and officially branded as Beijing 2008 (), were an international multisport event held from 8 to 24 August 2008, in Beijing, China. A total of 10,942 athletes fro ...
, Chinese officials told Internet providers to prepare to unblock access from certain
Internet café
An Internet café, also known as a cybercafé, is a Coffeehouse, café (or a convenience store or a fully dedicated Internet access business) that provides the use of computers with high bandwidth Internet access on the payment of a fee. Usage ...
s, access jacks in hotel rooms and conference centers where foreigners were expected to work or stay.
Differences from the Great Firewall
The Golden Shield Project is distinct from the
Great Firewall (GFW), which has a different mission. The differences are listed below:
Politically,
# The GFW is a tool for the propaganda system, whereas the Golden Shield Project is a tool for the public security system.
# The original requirements of the GFW are from
the 610 office, whereas the original requirements of the Golden Shield Project are from the public security department.
# The GFW is a national gateway for filtering foreign websites, whereas the Golden Shield Project is for monitoring the domestic internet.
Technically,
# The GFW is attached to the three national internet exchange centres, and then spread to some of the
ISPs to implement the blocking effect, whereas the Golden Shield Project stations in the most exchange centres and data centres.
# The GFW is very powerful in scientific research, including many
information security
Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
scientists, such as people from
Harbin Institute of Technology,
Chinese Academy of Sciences
The Chinese Academy of Sciences (CAS; ) is the national academy for natural sciences and the highest consultancy for science and technology of the People's Republic of China. It is the world's largest research organization, with 106 research i ...
, and
Beijing University of Posts and Telecommunications
Beijing, Chinese postal romanization, previously romanized as Peking, is the capital city of China. With more than 22 million residents, it is the world's List of national capitals by population, most populous national capital city as well as ...
, whereas the Golden Shield Project is less powerful in scientific research.
# The GFW is built by
Fang Binxing, whereas the Golden Shield Project is built by
Shen Changxiang.
Actions and purpose
The Golden Shield Project contains an integrated, multi-layered system, involving technical, administrative, public security, national security, publicity and many other departments. This project was planning to finish within five years, separated into two phases.
Phase I
The first phase of the project focused on the construction of the first-level, second-level, and the third-level information communication network, application database, shared platform, etc. The period was three years.
According to the
Xinhua News Agency
Xinhua News Agency (English pronunciation: ),J. C. Wells: Longman Pronunciation Dictionary, 3rd ed., for both British and American English or New China News Agency, is the official state news agency of the People's Republic of China. It is a ...
, since September 2003, the
Public Security
Public security or public safety is the prevention of and protection from events that could endanger the safety and security of the public from significant danger, injury, or property damage. It is often conducted by a state government to ensu ...
department of China has recorded 96% of the population information of mainland China into the database. In other words, the information of 1.25 billion out of 1.3 billion people has recorded in the information database of the
Public Security
Public security or public safety is the prevention of and protection from events that could endanger the safety and security of the public from significant danger, injury, or property damage. It is often conducted by a state government to ensu ...
department of China. Within three years, phase I project has finished the first-level, second-level, and the third-level backbone network and access network. This network has covered public security organs at all levels. The grass-roots teams of public security organs have accessed to the backbone network with the coverage rate 90%, that is to say, every 100 police officers have 40 computers connected to the network of the phase I project. The
Ministry of Public Security of the People's Republic of China
Ministry may refer to:
Government
* Ministry (collective executive), the complete body of government ministers under the leadership of a prime minister
* Ministry (government department), a department of a government
Religion
* Christian mi ...
said that the phase I project had significantly enhanced the combat effectiveness of public security.
Members participated in the phase I project include
Tsinghua University
Tsinghua University (THU) is a public university in Haidian, Beijing, China. It is affiliated with and funded by the Ministry of Education of China. The university is part of Project 211, Project 985, and the Double First-Class Constructio ...
from China, and some high-tech companies from the United States of America, the United Kingdom, Israel, etc.
Cisco Systems
Cisco Systems, Inc. (using the trademark Cisco) is an American multinational corporation, multinational digital communications technology conglomerate (company), conglomerate corporation headquartered in San Jose, California. Cisco develops, m ...
from the United States of America has provided massive hardware devices for this project, and therefore was criticized by some members of the
United States Congress
The United States Congress is the legislature, legislative branch of the federal government of the United States. It is a Bicameralism, bicameral legislature, including a Lower house, lower body, the United States House of Representatives, ...
. According to an internal Cisco document, Cisco viewed China's Great Firewall and its Internet censorship as an opportunity to expand its business with China.
According to
China Central Television
China Central Television (CCTV) is the State media, national television broadcaster of China, established in 1958. CCTV is operated by the National Radio and Television Administration which reports directly to the Publicity Department of th ...
, phase I cost 6.4 billion
yuan. On 6 December 2002, there came the "2002 China Large Institutions Informationization Exhibition", 300 leaders from the
Ministry of Public Security of the People's Republic of China
Ministry may refer to:
Government
* Ministry (collective executive), the complete body of government ministers under the leadership of a prime minister
* Ministry (government department), a department of a government
Religion
* Christian mi ...
and from other
public security bureaus of 31 provinces or municipalities attended the exhibition. There were many western high-tech products, including network security, video surveillance and face recognition. It was estimated that about 30000 police officers have been employed to maintain the system. There was a multi-level system to track netizens violating the provisions. Netizens who want to use the internet in a cybercafé are required to show their
Resident Identity Cards. If some violating event happened, the owner of the cybercafé can send the personal information to the police through the internet. It is called a public security automation system, but it is actually an integrated, multi-layered, internet blocking and monitoring system, involving the technical, administrative, public security, national security, publicity, etc. The features are known as: readable, listenable, and thinkable.
Phase II
The phase II project started in 2006. The main task was to enhance the terminal construction, and the public security business application system, trying to informatize of the public security work. The period was two years.
Based on the phase I project, phase II project expanded the information application types of public security business, and informationized further public security information. The key points of this project included application system construction, system integration, the expansion of information centre, and information construction in central and western provinces. The system of was planning to strengthen the integration, to share and analysis of information. It would greatly enhance the information for the public security work support.
Censored content
Mainland Chinese
Internet censorship programs have censored Web sites that include (among other things):
* Web sites belonging to "outlawed" or suppressed groups, such as pro-democracy activists and
Falun Gong.
* News sources that often cover topics that are considered defamatory against China, such as
police brutality
Police brutality is the excessive and unwarranted use of force by law enforcement against an individual or Public order policing, a group. It is an extreme form of police misconduct and is a civil rights violation. Police brutality includes, b ...
, the
1989 Tiananmen Square protests and massacre
The Tiananmen Square protests, known within China as the June Fourth Incident, were student-led demonstrations held in Tiananmen Square in Beijing, China, lasting from 15 April to 4 June 1989. After weeks of unsuccessful attempts between t ...
,
freedom of speech
Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The rights, right to freedom of expression has been r ...
, and
democracy
Democracy (from , ''dēmos'' 'people' and ''kratos'' 'rule') is a form of government in which political power is vested in the people or the population of a state. Under a minimalist definition of democracy, rulers are elected through competitiv ...
sites.
These sites include
Voice of America
Voice of America (VOA or VoA) is an international broadcasting network funded by the federal government of the United States that by law has editorial independence from the government. It is the largest and oldest of the American internation ...
and the Chinese edition of
BBC News
BBC News is an operational business division of the British Broadcasting Corporation (BBC) responsible for the gathering and broadcasting of news and current affairs in the UK and around the world. The department is the world's largest broad ...
.
* Sites related to the
Taiwan
Taiwan, officially the Republic of China (ROC), is a country in East Asia. The main geography of Taiwan, island of Taiwan, also known as ''Formosa'', lies between the East China Sea, East and South China Seas in the northwestern Pacific Ocea ...
ese government, media, or other organizations, including sites dedicated to religious content, and most large Taiwanese community websites or
blog
A blog (a Clipping (morphology), truncation of "weblog") is an informational website consisting of discrete, often informal diary-style text entries also known as posts. Posts are typically displayed in Reverse chronology, reverse chronologic ...
s.
* Web sites that contain anything the Chinese authorities regard as
obscenity
An obscenity is any utterance or act that strongly offends the prevalent morality of the time. It is derived from the Latin , , "boding ill; disgusting; indecent", of uncertain etymology. Generally, the term can be used to indicate strong moral ...
or
pornography
Pornography (colloquially called porn or porno) is Sexual suggestiveness, sexually suggestive material, such as a picture, video, text, or audio, intended for sexual arousal. Made for consumption by adults, pornographic depictions have evolv ...
.
* Web sites relating to
criminal
In ordinary language, a crime is an unlawful act punishable by a State (polity), state or other authority. The term ''crime'' does not, in modern criminal law, have any simple and universally accepted definition,Farmer, Lindsay: "Crime, definiti ...
activity.
* Sites linked with the
Dalai Lama
The Dalai Lama (, ; ) is the head of the Gelug school of Tibetan Buddhism. The term is part of the full title "Holiness Knowing Everything Vajradhara Dalai Lama" (圣 识一切 瓦齐尔达喇 达赖 喇嘛) given by Altan Khan, the first Shu ...
, his teachings or the
International Tibet Independence Movement.
* Most blogging sites experience frequent or permanent outages.
* Web sites deemed as subversive.
Blocked web sites are indexed to a lesser degree, if at all, by some Chinese
search engines
Search engines, including web search engines, selection-based search engines, metasearch engines, desktop search tools, and web portals and vertical market websites have a search facility for online databases.
By content/topic
Gene ...
. This sometimes has considerable impact on search results.
According to ''
The New York Times
''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'',
Google
Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
has set up computer systems inside China that try to access Web sites outside the country. If a site is inaccessible, then it is added to
Google China's blacklist.
However, once unblocked, the Web sites will be reindexed.
Referring to Google's first-hand experience of the great firewall, there is some hope in the international community that it will reveal some of its secrets.
Simon Davies, founder of London-based pressure group
Privacy International, is now challenging Google to reveal the technology it once used at China's behest. "That way, we can understand the nature of the beast and, perhaps, develop circumvention measures so there can be an opening up of communications." "That would be a dossier of extraordinary importance to human rights," Davies says. Google has yet to respond to his call.
Bypass techniques
Because the Great Firewall blocks destination IP addresses and domain names and inspects the data being sent or received, a basic censorship circumvention strategy is to use proxy nodes and encrypt the data. Most circumvention tools combine these two mechanisms.
["Splinternet Behind the Great Firewall of China: The Fight Against GFW"]
Daniel Anderson, ''Queue'', Association for Computing Machinery (ACM), Vol. 10, No. 11 (29 November 2012), doi:10.1145/2390756.2405036. Retrieved 11 October 2013.
*
Proxy servers outside China can be used, although using just a simple open proxy (HTTP or SOCKS) without also using an encrypted tunnel (such as HTTPS) does little to circumvent the sophisticated censors.
[
* Companies can establish regional Web sites within China. This prevents their content from going through the Great Firewall of China; however, it requires companies to apply for local ICP licenses.
* ]Onion routing
Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to the layers of an onion. The encrypted data is transmitted through a series o ...
and Garlic routing, such as I2P or Tor
Tor, TOR or ToR may refer to:
Places
* Toronto, Canada
** Toronto Raptors
* Tor, Pallars, a village in Spain
* Tor, former name of Sloviansk, Ukraine, a city
* Mount Tor, Tasmania, Australia, an extinct volcano
* Tor Bay, Devon, England
* Tor ...
, can be used.[
* Freegate, Ultrasurf, and Psiphon are free programs that circumvent the China firewall using multiple open proxies, but still behave as though the user is in China.][
* VPNs (virtual private network) and SSH (secure shell) are the powerful and stable tools for bypassing surveillance technologies. They use the same basic approaches, proxies and encrypted channels, used by other circumvention tools, but depend on a private host, a virtual host, or an account outside of China, rather than open, free proxies.][
* Open application programming interface (API) used by Twitter which enables to post and retrieve tweets on sites other than Twitter. "The idea is that coders elsewhere get to Twitter, and offer up feeds at their own URLs—which the government has to chase down one by one." says Jonathan Zittrain, co-director of Harvard's ]Berkman Klein Center for Internet & Society
The Berkman Klein Center for Internet & Society is a research center at Harvard University that focuses on the study of cyberspace. Founded at Harvard Law School, the center traditionally focused on internet-related legal issues. On May 15, 2008, ...
.
* Reconfiguration at the end points of communication, encryption, discarding reset packets according to the TTL value (time to live) by distinguishing those resets generated by the Firewall and those made by end user, not routing any further packets to sites that have triggered blocking behavior.
Exporting technology
Reporters Without Borders
Reporters Without Borders (RWB; ; RSF) is an international non-profit and non-governmental organisation, non-governmental organization headquartered in Paris, which focuses on safeguarding the right to freedom of information. It describes its a ...
suspects that countries such as Australia
Australia, officially the Commonwealth of Australia, is a country comprising mainland Australia, the mainland of the Australia (continent), Australian continent, the island of Tasmania and list of islands of Australia, numerous smaller isl ...
, Cuba
Cuba, officially the Republic of Cuba, is an island country, comprising the island of Cuba (largest island), Isla de la Juventud, and List of islands of Cuba, 4,195 islands, islets and cays surrounding the main island. It is located where the ...
, Vietnam
Vietnam, officially the Socialist Republic of Vietnam (SRV), is a country at the eastern edge of mainland Southeast Asia, with an area of about and a population of over 100 million, making it the world's List of countries and depende ...
, Zimbabwe
file:Zimbabwe, relief map.jpg, upright=1.22, Zimbabwe, relief map
Zimbabwe, officially the Republic of Zimbabwe, is a landlocked country in Southeast Africa, between the Zambezi and Limpopo Rivers, bordered by South Africa to the south, Bots ...
and Belarus
Belarus, officially the Republic of Belarus, is a landlocked country in Eastern Europe. It is bordered by Russia to the east and northeast, Ukraine to the south, Poland to the west, and Lithuania and Latvia to the northwest. Belarus spans an a ...
have obtained surveillance technology from China although the censorships in these countries are not much in comparison to China.
Since at least 2015, the Russian Roskomnadzor agency collaborates with Chinese Great Firewall security officials in implementing its data retention and filtering infrastructure. Since the 2022 Russian invasion of Ukraine
On 24 February 2022, , starting the largest and deadliest war in Europe since World War II, in a major escalation of the Russo-Ukrainian War, conflict between the two countries which began in 2014. The fighting has caused hundreds of thou ...
, in order to combat disinformation and enforce the war censorship law, Russia authorities began improving and widening the capabilities of this system.
See also
* Blocking of Wikipedia by China
* Censorship in China
Censorship in the People's Republic of China (PRC) is mandated by the country's ruling party, the Chinese Communist Party (CCP). It is one of the strictest censorship regimes in the world. The government censors content for mainly political re ...
* Cypher
* Green Dam Youth Escort
* Human rights in China
Human rights in the People's Republic of China are poor, as per reviews by international bodies, such as human rights treaty bodies and the United Nations Human Rights Council's Universal Periodic Review. The Chinese Communist Party (CCP), th ...
* International Freedom of Expression Exchange
IFEX, formerly International Freedom of Expression Exchange, is a global network of more than 119 independent non-governmental organisations that work at a local, national, regional, or international level to defend and promote freedom of expre ...
– monitor
Internet censorship in China
* Internet censorship in the People's Republic of China
The People's Republic of China (PRC) internet censorship, censors both the publishing and viewing of online material. Many controversial events are censored from news coverage, preventing many Chinese citizens from knowing about the actions of ...
* Internet in China
China has been on the Internet intermittently since May 1989 and on a permanent basis since 20 April 1994, although with heavily Internet censorship in China, censored access. In 2008, China became the country with the largest population on th ...
* List of government surveillance projects
* Media of China
The mass media in the People's Republic of China primarily consists of television, newspapers, radio, and magazines. Since the start of the 21st century, the Internet has also emerged as an important form of mass media and is under the direct ...
* Politics of China
In the People's Republic of China, politics functions within a socialist state framework based on the system of people's congress under the leadership of the Chinese Communist Party (CCP), with the National People's Congress (NPC) functionin ...
* Splinternet
The splinternet (also referred to as cyber-balkanization or internet balkanization) is a characterization of the Internet as splintering and dividing due to various factors, such as technology, commerce, politics, nationalism, religion, and diver ...
* '' Who Controls the Internet?''
Notes
References
External links
China Digital Times: Internet Control
Breaking Through the "Golden Shield"
{{DEFAULTSORT:Great Firewall of China
Internet censorship in China
1998 establishments in China
2003 establishments in China