{"id":812,"date":"2021-08-06T18:25:47","date_gmt":"2021-08-06T15:25:47","guid":{"rendered":"https:\/\/dukva.org\/en\/?p=812"},"modified":"2021-08-06T18:25:49","modified_gmt":"2021-08-06T15:25:49","slug":"us-tech-products-enable-chinese-surveillance-in-xinjiang-researchers-find","status":"publish","type":"post","link":"https:\/\/dukva.org\/en\/us-tech-products-enable-chinese-surveillance-in-xinjiang-researchers-find\/","title":{"rendered":"US TECH PRODUCTS ENABLE CHINESE SURVEILLANCE IN XINJIANG, RESEARCHERS FIND"},"content":{"rendered":"\n<p><strong><a href=\"https:\/\/www.rfa.org\/english\/news\/uyghur\/us-tech-products-08052021185345.html\">RFA<\/a>.&nbsp;5 August 2021<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft\"><img decoding=\"async\" src=\"https:\/\/i2.wp.com\/www.uyghurcongress.org\/en\/wp-content\/uploads\/2021\/08\/unnamed-2021-08-06T182219.199.jpg?resize=169%2C95&amp;ssl=1\" alt=\"\" class=\"wp-image-45184\"\/><\/figure><\/div>\n\n\n\n<p><em>Below is an article published by&nbsp;<a href=\"https:\/\/www.rfa.org\/english\/news\/uyghur\/us-tech-products-08052021185345.html\">RFA<\/a>. Photo:AP.<\/em><\/p>\n\n\n\n<p><strong>UPDATED at 10:15 A.M. ET on 2021-08-06<\/strong><\/p>\n\n\n\n<p>U.S. technology companies are still supplying China\u2019s surveillance state with equipment and software for monitoring populations and censoring information, including in the Xinjiang region, despite damning revelations that have led to genocide accusations against Beijing, according to researchers.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>At least seven U.S. companies whose technology helped build a Chinese digital surveillance program known as the Golden Shield Project (GSP) are continuing to advance it by selling their products to China, say academic researchers Valentin Weber and Vasilis Ververis.<\/p>\n\n\n\n<p>Their report,&nbsp;\u201cChina\u2019s Surveillance State: A Global Project,\u201d&nbsp;published Tuesday, comes as U.S. companies are facing heightened scrutiny over their ties to the Chinese government\u2019s extensive and intrusive use of surveillance technology to monitor and control the populations of Xinjiang Tibet, and Hong Kong.<\/p>\n\n\n\n<p>Launched in 1998, the Golden Shield Project (GSP) is China\u2019s nationwide network-security project, featuring powerful surveillance and censorship technologies deployed by authorities to track political dissidents, activists, ethnic minorities and others seen as threats to the regime or to stability.<\/p>\n\n\n\n<p>\u201cThis assistance continues until the present day. As our report shows, Cisco, Dell, HP, IBM, Microsoft, and Oracle still supply vital equipment to Chinese police departments across the country,\u201d write Weber and Ververis.<\/p>\n\n\n\n<p>Their report also says that Intel core processors are \u201clikely being used for surveillance purposes\u201d in the Xinjiang Uyghur Autonomous Region (XUAR) \u2014 helping police monitoring at the Urumqi Diwopu International Airport in the regional capital Urumqi (in Chinese, Wulumuqi), one of the few international gateways into and out of Xinjiang.<\/p>\n\n\n\n<p>Chinese policies in the XUAR have come in for particular criticism with the U.S. government and some European legislatures have declared that persecution of the Uyghurs \u2014 including a network of internment camps believed to have held up to 1.8 million Uyghurs and other minorities since 2017 \u2014 amounts to genocide and crimes against humanity. China angrily denies the allegations.<\/p>\n\n\n\n<p>\u201cAs this report demonstrates, entities based in democracies simply ignore that the Chinese companies they collaborate with also provide technology to the Chinese police and military,\u201d says the report, whose findings are based on publicly available government bidding documents for technology products and services.<\/p>\n\n\n\n<p><strong>Troubling Chinese partners<\/strong><\/p>\n\n\n\n<p>The U.S. companies that sell into the U.S. $260 billion technology market in the world\u2019s second-biggest economy may not be aware of compromising entanglements, the report says. Many of the exports and collaboration done by third parties and subsidiaries complicates due diligence evaluations.<\/p>\n\n\n\n<p>Among the Chinese companies that use U.S. technology to provide surveillance and censorship services are several that have deployed systems in the XUAR, even as Washington has stepped up scrutiny of corporate supply chains to stop American firms from abetting forced labor and other repressive practices.<\/p>\n\n\n\n<p>Beijing Zhongke Fuxing Information Technology Co. Ltd., for example, has a \u201cdisturbing involvement in Xinjiang,\u201d where it has completed several digital surveillance-related projects and equipped detention centers, the report says.<\/p>\n\n\n\n<p>The company lists U.S. tech concerns Microsoft, IBM, Intel, HP, Oracle, CISCO and Dell EMC\u2019s Greenplum as its commercial partners.<\/p>\n\n\n\n<p>Another Chinese company, Xiamen Dragon Information Technology Co. Ltd., provides public security intelligence platforms, including face capture equipment that uses the Intel XEON dual 6-core processor to identify mobile devices and information from instant-messaging software from smartphones.<\/p>\n\n\n\n<p>The firm, whose international partners include Microsoft, Oracle, Dell, HP, IBM and Cisco, also provides a system that allows police to apply ethnic tags such as Uyghur, Tibetan, and Han Chinese to a subject to help it discover groups of people.<\/p>\n\n\n\n<p>Xiamen Dragon signed an agreement with the Tibet Autonomous Region\u2019s Public Security Department in 2017 to build a big data and cloud computing product to foster a \u201csafe Tibet\u201d and a \u201cstable social atmosphere,\u201d the report says.<\/p>\n\n\n\n<p>China\u2019s Neusoft Corp., whose Golden Shield role included helping the Ministry of Public Security build its National Basic Population Information Resource Database project in the early 2000s, also helps XUAR authorities process data collected from the household registration system, fingerprint collection, and facial recognition. It has subsidiaries in the U.S., Japan, and Europe, and cooperates with Intel on network technology, the researchers say.<\/p>\n\n\n\n<p><strong>\u2018Due diligence is ineffective\u2019<\/strong><\/p>\n\n\n\n<p>\u201cOur findings show that U.S. technology companies\u2019 due diligence is ineffective,\u201d Weber said in an email to RFA. \u201cA change in behavior will unlikely come from companies themselves, since they\u2019re profit driven.\u201d<\/p>\n\n\n\n<p>\u201cIf the U.S. government is really concerned about what is happening in Xinjiang\u2026then it needs to make clear to U.S. companies that if they continue to be complicit in China\u2019s surveillance state this may come at a financial cost for them at home,\u201d he said. \u201cThis may induce a change in behavior abroad.\u201d<\/p>\n\n\n\n<p>RFA contacted the U.S. companies mentioned in the report for comment and received responses from Intel Corp., Microsoft Corp. and IBM Corp.<\/p>\n\n\n\n<p>\u201cWhile we do not always know nor can we control what products our customers create or the applications end-users may develop, Intel does not support or tolerate our products being used to violate human rights,\u201d said Nancy Sanchez from Intel\u2019s corporate communications office in an email.<\/p>\n\n\n\n<p>\u201cWhere we become aware of a concern that Intel products are being used by a business partner in connection with abuses of human rights, we will restrict or cease business with the third party until and unless we have high confidence that Intel\u2019s products are not being used to violate human rights,\u201d she said.<\/p>\n\n\n\n<p>Microsoft has put in place \u201ca robust set of policies intended to safeguard against the misuse of our technology, including refusing to deploy technologies like facial recognition in ways that may put people\u2019s safety or human rights at risk,\u201d said a spokesperson said the Redmond, Washington-based company.<\/p>\n\n\n\n<p>\u201cWe require our partners to abide by these policies, and we investigate and enforce violations up to ending the relationship,\u201d the spokesperson said in an email. \u201cWe regularly review our operations and engage policymakers, academia, industry, and advocacy organizations to continually improve our policies.\u201d<\/p>\n\n\n\n<p>IBM opposes and does not condone the use of technology for mass surveillance, racial profiling, violations of basic human rights and freedoms, or any purpose that conflicts with the company\u2019s values and principles, said Chris Mumma from IBM\u2019s external relations office in an email.<\/p>\n\n\n\n<p>\u201cWe enforce rigorous processes across our global operations to protect against direct or third-party business engagements that may run counter to these commitments,\u201d he said. \u201cAs a company focused on operating responsibly, IBM continually reviews and strengthens our screening processes based on global best practices and evolving circumstances worldwide.\u201d<\/p>\n\n\n\n<p>Weber and Ververis recommend that companies that do business with Chinese tech firms increase due diligence, and they urge governments to review Chinese-owned firms that operate or own subsidiaries in their territories to determine whether the companies supply Chinese public security bureaus and the military.<\/p>\n\n\n\n<p>Their report also recommends that U.S. companies check third-party contractors that buy their products in China to ensure that tech exports are not used in systems deployed by public security bureaus.<\/p>\n\n\n\n<p><strong>\u2018Absolutely reprehensible\u2019<\/strong><\/p>\n\n\n\n<p>Uyghur rights groups criticized the U.S. companies for abetting surveillance and other abusive policies toward the 12 million Uyghurs in the XUAR.<\/p>\n\n\n\n<p>\u201cIt is absolutely reprehensible that U.S. companies are powering the Chinese state and putting billions of innocent people at risk globally, as well as being complicit in the Uyghur genocide,\u201d said Rushan Abbas, executive director of Washington-based Campaign for Uyghurs, in an email to RFA.<\/p>\n\n\n\n<p>\u201cIn particular, as this police state and tools of oppression have been perfected in carrying out the Uyghur genocide, our government must recognize that swift action is needed to halt the sale of American equipment to a genocidal regime,\u201d she said.<\/p>\n\n\n\n<p>Companies providing technology to China despite the genocide accusations, increasing U.S. sanctions of senior Chinese officials, and blacklists of Chinese companies for using Uyghur forced labor, \u201cwill be held accountable in the future for their shameful role,\u201d said Dolkun Isa, president of the Germany-based World Uyghur Congress.<\/p>\n\n\n\n<p>\u201cThe material and technical support continuously provided by some American and Western high-tech companies to China means they\u2019re actively aiding and abetting China\u2019s genocide of Uyghurs,\u201d he wrote in an email to RFA.<\/p>\n\n\n\n<p>\u201cThese companies should immediately stop aiding and abetting China\u2019s genocide of Uyghurs by cutting any material and technical support they provide to a totalitarian regime that not only commits genocide against Uyghurs but also poses the biggest national security threat to the U.S.-led Western democracies,\u201d he said.<\/p>\n\n\n\n<p>The Weber and Ververis report was supported by a grant from UK-based Top10VPN.com, a website that reviews virtual private network services and publishes news and investigations on digital privacy and internet security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>RFA.&nbsp;5 August 2021 Below is an article published by&nbsp;RFA. Photo:AP. UPDATED at 10:15 A.M. ET on 2021-08-06 U.S. technology companies are still supplying China\u2019s surveillance state with equipment and software for monitoring populations and censoring information, including in the Xinjiang<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[35],"tags":[],"_links":{"self":[{"href":"https:\/\/dukva.org\/en\/wp-json\/wp\/v2\/posts\/812"}],"collection":[{"href":"https:\/\/dukva.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dukva.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dukva.org\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dukva.org\/en\/wp-json\/wp\/v2\/comments?post=812"}],"version-history":[{"count":1,"href":"https:\/\/dukva.org\/en\/wp-json\/wp\/v2\/posts\/812\/revisions"}],"predecessor-version":[{"id":813,"href":"https:\/\/dukva.org\/en\/wp-json\/wp\/v2\/posts\/812\/revisions\/813"}],"wp:attachment":[{"href":"https:\/\/dukva.org\/en\/wp-json\/wp\/v2\/media?parent=812"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dukva.org\/en\/wp-json\/wp\/v2\/categories?post=812"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dukva.org\/en\/wp-json\/wp\/v2\/tags?post=812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}