Throttling Dissent: China's New Leaders Refine Internet Control | Freedom House

This special report is based on the 2013 China chapter of Freedom House’s annual Freedom on the Net survey. Freedom on the Net is a comparative analysis of internet freedom with a unique methodology, and includes a detailed narrative report and a numerical score for each country assessed. The 2013 edition, which will be published in September, covers 60 countries. Past editions are available at

China’s numerical score will be published as part of the full report. However, as the home of one of the most systematically controlled and monitored online environments in the world, it will no doubt retain its place among countries where Freedom House categorizes the internet as Not Free. As the Freedom on the Net 2012 survey noted, China increasingly serves as an incubator for sophisticated new types of internet restrictions, providing a model for other authoritarian countries.

For this reason, Freedom House is publishing the 2013 China narrative as a special report, examining key developments during the Freedom on the Net coverage period (May 1, 2012, through April 30, 2013) in the context of the recent leadership change in the Chinese Communist Party. Like all Freedom on the Net narratives, the report offers a comprehensive examination of three aspects of internet freedom:


Obstacles to Access:

What prevents users from getting online?

This section examines infrastructure and the costs associated with internet access, as well as the legal, regulatory, and economic environment for service providers.

Limits on Content:

What can internet users say and do?

This section looks at content that is banned by law, filtered, blocked, or voluntarily censored. It also examines the diversity of digital media and the impact of civic mobilization online.

Violations of User Rights:

What are the repercussions for online activity?

Do internet users risk imprisonment, harassment, or attacks—whether physical or digital? This section also assesses online surveillance and privacy violations.

A full checklist of the methodological questions that served as a foundation for the narrative is available at //

PDF versionPDF version