Minitrue: Liu Han’s Wealth, PLA Corruption
The following censorship instructions, issued to the media by government authorities, have been leaked and distributed online. The name of the issuing body has been omitted to protect the source.
No website is to promote the article “The Network of Authority and the Criminal Underworld: the History of Liu Han’s Wealth.”
The trial of mining tycoon Liu Han for murder and corruption charges began early last month, and marked the first public trial of an individual connected to the ongoing graft investigation centered around retired security chief Zhou Yongkang. In his trial, Liu said that much of his fortune was made in mutually beneficial deals with government officials. The article “The Network of Authority and the Criminal Underworld: the History of Liu Han’s Wealth” (权力网与黑社会：刘汉的财富史) can be read in Chinese.
High-ranking military officials have recently become casualties of the Xi administration’s widespread anti-corruption drive. In late March, prosecutors filed charges against comer PLA general Gu Junshan, removed from his post in 2012 at the start of a long-running investigation into his alleged corruption. Last month, a related graft investigation into the former vice-chairman of the Central Military Commission was dropped when it was revealed that he had terminal cancer. At The New York Times, Jonathan Ansfield noted that this development may mark the beginning of Xi’s focus on “tightening his own control of the Army.” The Global Times’ commentary “Army Corruption Must Come First” (军队反腐必须走在前面) can be read in Chinese.
CDT collects directives from a variety of sources and checks them against official Chinese media reports to confirm their implementation.
Since directives are sometimes communicated orally to journalists and editors, who then leak them online, the wording published here may not be exact. The original publication date on CDT Chinese is noted after the directives; the date given may indicate when the directive was leaked, rather than when it was issued. CDT does its utmost to verify dates and wording, but also takes precautions to protect the source.