@mittfh: I agree. This is probably designed for operatives in China to be able to report to Home.
However, wouldn't this be best handled by some form of P2P VPN setup with layered, proxied encryption? In Gnutella lingo, if you VPNed to an Ultrakeeper, then were assigned a "virtual IP" by that Ultrakeeper (since it would know, or could query, if there was an available [IPv6 presumably] address), you could massquarade around on this P2P network as the virt IP and appear to be coming from the Ultrakeeper. When you do search requests, the request itself is encrypted (think SSL or somesuch), which are propogated THROUGH the Ultrakeeper, rather than from your computer, so it looks like the Ultrakeeper is performing the search. Using your virtIP as the "return" address in the network, which is being routed "physically" as the Ultrakeeper's IP, no one would know it was you, unless they could match you up as a machine that connected to said server through some ISP logging. But that is where layered proxying comes in. The CDC (Cult of the Dead Cow, not the gov agency) wrote a similar encrypted proxying network for their Chinese "associates." It would proxy HTTP requests through random end-points in the network, at any range of depth (usually around 6 or more) and popped out to the internet at some unrestricted (US, Sweden, etc) end-point which would perform the actually GET request and pass the info back along the line. Each point only knew the next point in line, rather than the whole. This kept anonymity between P2P users as well, as one machine did not know every node in the network, nor could they request that info.
Anyway, a good, multi-layed network with encrypted information ought to be enough of a deterant, until the Firewall in question decides to block VPN traffic. Then you could just masquarade as HTTPS or some other definately-allowed traffic (port 22 perhaps? We know China doesn't block that particular one...). Of course, the obvious downside is the amount of traffic that would be proxied through the "Ultrakeeper"s, but I'm sure the gov't would be more than happy to compensate people who wish to become one. $30/mo (extra, for upgraded internet services) for 200,000 ppl across the globe is less than an old F16 every couple of months. I say 200,000, since it would be quite a long time before all 200,000 are found out and blocked by the tGFoC if the initial connect-list is handled properly.