Tuesday, 02 January 2024 12:17 GMT

How The AP Uncovered US Big Techs Role In Chinas Digital Police State


(MENAFN- Live Mint) BEIJING - Over the past quarter century, American tech companies to a large degree designed and built China's surveillance state, playing a far greater role in enabling human rights abuses than previously known, the Associated Press has found .

journalists spoke to more than 100 sources, scoured tens of thousands of documents, and obtained several major leaks of internal and classified material, the existence of which is being reported here for the first time.

Researchers and reporters have raised questions about American technology in Chinese policing before. Companies have pushed back, saying they weren't aware of or responsible for the way their technology was being used.

But found Chinese police and state-owned defense contractors partnered with American tech firms - especially IBM - to design China's surveillance apparatus from the top down. American tech companies not only knew, some also directly pitched their tech as tools for Chinese police to control citizens. IBM and other companies that responded said they fully complied with all laws, sanctions and U.S. export controls governing business in China, past and present.

reporters and freelance partners spent three years combing through tens of thousands of documents, including:

-Thousands of pages of classified government documents, blueprints, and accounting ledgers from a Chinese military contractor and IBM partner. They were taken out of China by a whistleblower and handed to by an intermediary, both of whom declined to be named for fear of retribution.

-Over 20,000 leaked internal emails and a large database from Landasoft, a Chinese surveillance company and former IBM partner. They were obtained from an intermediary who declined to be identified for fear of retribution. Landasoft sold the software used to flag and detain people in China's far western region of Xinjiang during a brutal government crackdown.

- Hundreds of marketing presentations, flyers, pamphlets and posts, often obtained from the companies themselves, at policing trade expos, on company and third-party websites and on official accounts on WeChat, a Chinese social media platform. Many advertised their gear directly for use by Chinese police or surveillance firms and were marked“internal.”

-Over 4,000 Chinese procurement bids given to by ChinaFile, a digital magazine published by the non-profit Asia Society, as well as others found separately by reporters. Many showed purchases of American and foreign technology by Chinese police.

-Publicly available records, including Chinese research papers, news articles, corporate reports, and court judgments. Most were obtained in China, where access to such information is growing increasingly tight.

The investigation started with a massive trove of internal emails and a database from Landasoft, the Chinese surveillance firm, obtained by Yael Grauer, a freelance journalist. Grauer worked with journalists to verify, analyze, and report out its contents.

The emails and documents revealed Landasoft software was at the heart of China's mass detention campaign in Xinjiang - targeting, tracking and grading virtually the entire native Uyghur population to forcibly assimilate and subdue them. The leaked material was peppered with references to American firms.

Reporters searched phone numbers and cross-checked the leaked material with publicly available information to confirm its authenticity. Chinese corporate records revealed Landasoft's links to IBM as a reseller of IBM's i2 police surveillance analysis software. Analysis of the leaked emails revealed Landasoft staff said their software was copied from i2 and customized for the Chinese market.

Reporters traced IBM's partnership with Landasoft and affiliated companies back to the 2000s. Classified Chinese government documents obtained by revealed that IBM and other American companies played an instrumental role in Beijing's surveillance apparatus from the very beginning.

Three outside experts on Chinese surveillance judged the classified documents as authentic.

“It is effectively inconceivable that they are not legitimate,” said Conor Healy, research affairs director for IPVM, a surveillance research publication. Healy added the documents are“consistent with the hundreds of documents on government technology deployments I have reviewed over the years.”

The sought sources in a dozen territories across three continents. That included dozens of current and former executives, officials, officers, and engineers from China - a difficult task given widespread fear and surveillance. Many felt compelled to speak out, but the majority did so anonymously, worried for the safety of themselves and their families.

At times, reporters themselves were ensnared themselves by China's digital police state: They were tracked down, stopped and hauled in for questioning.

Together, the evidence compiled revealed how American companies brought“predictive policing” to China, enabling Chinese police to preemptively detain people for crimes they have not even committed. Such systems mine a vast array of information - texts, calls, payments, flights, video, DNA swabs, mail deliveries, the internet, even water and power use - to unearth individuals deemed suspicious and predict their movements.

The partnership between American firms and the Chinese police laid the groundwork for China's digital surveillance state as it exists today - the largest and most sophisticated on earth.

__

Contact 's global investigative team at ... or

This article was generated from an automated news agency feed without modifications to text.

MENAFN09092025007365015876ID1110034786

Legal Disclaimer:
MENAFN provides the information “as is” without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the provider above.

Search