The Technological Surveillance that Led to Persecution in China.

megaphone-2

Advisory: Be careful of what you read on social media. The algorithms used by these platforms have no regard for Biblical truth. They target your emotions to keep you engaged on their site so their advertisers can drop more ads. These platforms exist to enrich their stockholders. Consider God’s promise to Believers in James 1:5, “If any of you lacks wisdom, you should ask God, who gives generously to all without finding fault, and it will be given to you.”

Featured Story

Prior to the Chinese police hanging high-powered surveillance cameras and locking up ethnic minorities by the hundreds of thousands in China’s western region of Xinjiang, China’s hackers went to work building malware.

The Chinese hacking campaign, which researchers at Lookout — the San Francisco mobile security firm — had started as early as 2013 and continues to this day, was part of a broad and incredibly illusive effort to pull in data from the devices that know their people best: their phones.

Lookout found links between eight types of malicious software (some previously known, others not) that explain how groups connected to China’s government surveilled Android phones used by Xinjiang’s largely Muslim Uighur population on a scale far larger than had been realized before.

The timeline suggests the hacking campaign was an early cornerstone in China’s Uighur surveillance efforts that would later extend to collecting blood samples, voice prints, facial scans and other personal data to transform Xinjiang into a virtual police state. Much of the biometric data collection was done with the helping hand of United States companies sharing intellectual property with the CCP.

The tools the hackers created hid in keyboards (Key-logger) used by Uighurs and disguised themselves as commonly used applications in third-party websites. Some could remotely turn on a phone’s microphone, record calls or export photos, phone locations and conversations on chat apps. Others were embedded in apps that hosted Uighur-language news, Uighur-targeted beauty tips, religious texts like the Quran and details of the latest Muslim cleric arrests.

The Lookout Threat Intelligence team has discovered four Android surveillanceware tools, which we named SilkBean, DoubleAgent, CarbonSteal, and GoldenEagle. These four interconnected malware tools are elements of much larger mAPT (mobile advanced persistent threat) campaigns originating in China, and primarily targeting the Uyghur ethnic minority. Activity of these surveillance campaigns has been observed as far back as 2013.

Apurva Kumar, Lookout Staff Security Intelligence Engineer

A about 10 years ago, the People’s Liberation Army’s hackers were notable not so much for the complexity of their attacks but presented challenges due to the sheer the volume of their attacks. But under threat of American sanctions, President Xi Jinping of China struck an agreement with President Barack Obama in 2015 to cease hacking American targets for commercial gain. The agreement stuck for a time, with a significant decline in Chinese hacks on the United States.

Following the noted decline in cyber attacks on U.S. private entities, researchers determined that simultaneously China had turned its most advanced hacking tools on its own people. In overlapping discoveries, researchers at Google, Volexity, (a private security firm) and the Citizen Lab at the University of Toronto’s Munk School of Public Affairs separately uncovered what looked to be an advanced Chinese hack against iPhones and Android phones belonging to Chinese Uighurs and Tibetans throughout the world.

In 2015, the in Beijing authorities grew “desperate” to track fast-growing Uighur communications online, Mr. Byler said. Uighurs began to fear that their online chats discussing Islam or politics were risky. Savvier Uighurs took to owning a second “clean phone,” said Mr. Byler, who lived in Xinjiang in 2015.

Following the attempted deterrence of surveillance by the oppressed Uighurs, the police began confiscating their phones. In some cases, they returned them months later with new spyware installed. Other times, people were handed back entirely different phones. Officials visiting Uighur villages regularly recorded the serial numbers used to identify smartphones. They lined the streets with new hardware that tracked people’s phones as they walked past.

The compromised apps mimicked VPNs, which are used to set up secure web connections and view prohibited content inside China. They also targeted apps frequently used by Uighurs for shopping, video games, music streaming, adult media and travel booking, as well as specialized Uighur keyboard apps. Some offered Uighurs beauty and traditional-medicine tips. Others impersonated apps from Twitter, Facebook, QQ — the Chinese instant messaging service — and the search giant Baidu.

It’s imperative that we take note of China’s use of DNA sequencing data to produce biometric facial recognition software. This armed the Chinese communist party with the ability to find any face, as long as they’ve attained DNA samples from the subject before hand. But as we know, the CCP has already done that among other jurassic measures. So the question remains, why has the American public not been made aware of the lengths that the CCP has gone to persecute these people?

The answer to that is simple, it’s because many Americans will see the most raw results of malicious intent behind a computer. This single topic of conversation alone is enough to make someone who takes interest in technology wonder what is next for America. Considering the divide we’ve seen in society due to COVID-19 propaganda. The person next to you on a bus could be experiencing life in America completely bought into Fauci’s lies. But your choice to refuse vaccination could become troublesome for the sleeping sheep. Only because the lying “omniscient” medical practitioners suggest as such. Stay inquisitive in the word of God, and the world around you.

watchman-on-wall

Tagged In

Newsletter

Must Read

Long-Journey-Home-1
One-Thing
Mark-Cahill-Ministries-1
One-Blinding-Vision

Other Sources

USSANews

Latest News

Watchman: Google FakeBook and Others Cannot and Will Not Stop Prophecy: The Real-Time Gog and Magog Connection Between Russia and Hamas

By StevieRay Hansen | May 2, 2024

SRH: Gives Warning: Gog and Magog Have Taken Shape as the Banking System Collapses, New Leaders Are Emerging to Oppose the Davos Crowd, Led by…

Read More

Watchman: Vaccines From Hell It Should Be Remembered That We Were Warned Early in 2020 That These mRNA Designs Would Modify DNA. Trump’s Warp Speed Gained Precedence, and People Formed Lines. Surgeon General of Florida Says mRNA is an “Anti-Christ Product” – Tucker Carlson Interview,They Want Us Dead

By StevieRay Hansen | May 2, 2024

HNewsWire: Dr. Joseph Ladapo again raised concerns about the delivery of “nucleic acid contaminants” in the vaccines and the “risk of DNA integration” into cells.…

Read More

Watchman: The Biden Administration Is Going By Hitler’s Maxim, “Make Them up as You Go.” These Are the Specifics: At Eagle Pass, Texas Begins to Detain and Fine Undocumented Immigrants. When Someone Challenges Biden and Obama’s Corrupt Low-Life Policies, the Administration Becomes More Tense Between Them, and Biden and Obama Become Agitated, Message From TX Screw You!

By StevieRay Hansen | May 2, 2024

By SRH, Texas authorities began arresting illegal immigrants at Shelby Park in Eagle Pass on Wednesday after the state’s attorney general defied a cease-and-desist letter…

Read More

Watchman Show’s The Worst Fake News: Google and the Cost of ‘Data Voids’ During a Plandemic, Millions Died and Google is still # 1 Search Engine?

By StevieRay Hansen | May 2, 2024

Was a Nazi slogan brandished at a Reopen Illinois rally? The answer depends on what you search, and when you search for it. HNewsWire: ACROSS…

Read More

Watchman: DC Has Become Enemy Territory

By StevieRay Hansen | May 2, 2024

By SRH: A recent move by Judge Tanya Chutkan suggests that the former president’s trial on January 6th may be postponed. Two former prosecutors claim…

Read More
Focused-Protection-1
Place Your Ad Here

We make every effort to acknowledge sources used in our news articles. In a few cases, the sources were lost due to a technological glitch. If you believe we have not given sufficient credit for your source material, please contact us, and we will be more than happy to link to your article.

Bryce Abbott

Leave a Comment