The Technological Surveillance that Led to Persecution in China.

megaphone-2

Advisory: Be careful of what you read on social media. The algorithms used by these platforms have no regard for Biblical truth. They target your emotions to keep you engaged on their site so their advertisers can drop more ads. These platforms exist to enrich their stockholders. Consider God’s promise to Believers in James 1:5, “If any of you lacks wisdom, you should ask God, who gives generously to all without finding fault, and it will be given to you.”

Featured Story

Prior to the Chinese police hanging high-powered surveillance cameras and locking up ethnic minorities by the hundreds of thousands in China’s western region of Xinjiang, China’s hackers went to work building malware.

The Chinese hacking campaign, which researchers at Lookout — the San Francisco mobile security firm — had started as early as 2013 and continues to this day, was part of a broad and incredibly illusive effort to pull in data from the devices that know their people best: their phones.

Lookout found links between eight types of malicious software (some previously known, others not) that explain how groups connected to China’s government surveilled Android phones used by Xinjiang’s largely Muslim Uighur population on a scale far larger than had been realized before.

The timeline suggests the hacking campaign was an early cornerstone in China’s Uighur surveillance efforts that would later extend to collecting blood samples, voice prints, facial scans and other personal data to transform Xinjiang into a virtual police state. Much of the biometric data collection was done with the helping hand of United States companies sharing intellectual property with the CCP.

The tools the hackers created hid in keyboards (Key-logger) used by Uighurs and disguised themselves as commonly used applications in third-party websites. Some could remotely turn on a phone’s microphone, record calls or export photos, phone locations and conversations on chat apps. Others were embedded in apps that hosted Uighur-language news, Uighur-targeted beauty tips, religious texts like the Quran and details of the latest Muslim cleric arrests.

The Lookout Threat Intelligence team has discovered four Android surveillanceware tools, which we named SilkBean, DoubleAgent, CarbonSteal, and GoldenEagle. These four interconnected malware tools are elements of much larger mAPT (mobile advanced persistent threat) campaigns originating in China, and primarily targeting the Uyghur ethnic minority. Activity of these surveillance campaigns has been observed as far back as 2013.

Apurva Kumar, Lookout Staff Security Intelligence Engineer

A about 10 years ago, the People’s Liberation Army’s hackers were notable not so much for the complexity of their attacks but presented challenges due to the sheer the volume of their attacks. But under threat of American sanctions, President Xi Jinping of China struck an agreement with President Barack Obama in 2015 to cease hacking American targets for commercial gain. The agreement stuck for a time, with a significant decline in Chinese hacks on the United States.

Following the noted decline in cyber attacks on U.S. private entities, researchers determined that simultaneously China had turned its most advanced hacking tools on its own people. In overlapping discoveries, researchers at Google, Volexity, (a private security firm) and the Citizen Lab at the University of Toronto’s Munk School of Public Affairs separately uncovered what looked to be an advanced Chinese hack against iPhones and Android phones belonging to Chinese Uighurs and Tibetans throughout the world.

In 2015, the in Beijing authorities grew “desperate” to track fast-growing Uighur communications online, Mr. Byler said. Uighurs began to fear that their online chats discussing Islam or politics were risky. Savvier Uighurs took to owning a second “clean phone,” said Mr. Byler, who lived in Xinjiang in 2015.

Following the attempted deterrence of surveillance by the oppressed Uighurs, the police began confiscating their phones. In some cases, they returned them months later with new spyware installed. Other times, people were handed back entirely different phones. Officials visiting Uighur villages regularly recorded the serial numbers used to identify smartphones. They lined the streets with new hardware that tracked people’s phones as they walked past.

The compromised apps mimicked VPNs, which are used to set up secure web connections and view prohibited content inside China. They also targeted apps frequently used by Uighurs for shopping, video games, music streaming, adult media and travel booking, as well as specialized Uighur keyboard apps. Some offered Uighurs beauty and traditional-medicine tips. Others impersonated apps from Twitter, Facebook, QQ — the Chinese instant messaging service — and the search giant Baidu.

It’s imperative that we take note of China’s use of DNA sequencing data to produce biometric facial recognition software. This armed the Chinese communist party with the ability to find any face, as long as they’ve attained DNA samples from the subject before hand. But as we know, the CCP has already done that among other jurassic measures. So the question remains, why has the American public not been made aware of the lengths that the CCP has gone to persecute these people?

The answer to that is simple, it’s because many Americans will see the most raw results of malicious intent behind a computer. This single topic of conversation alone is enough to make someone who takes interest in technology wonder what is next for America. Considering the divide we’ve seen in society due to COVID-19 propaganda. The person next to you on a bus could be experiencing life in America completely bought into Fauci’s lies. But your choice to refuse vaccination could become troublesome for the sleeping sheep. Only because the lying “omniscient” medical practitioners suggest as such. Stay inquisitive in the word of God, and the world around you.

watchman-on-wall

Tagged In

Newsletter

Must Read

Long-Journey-Home-1
One-Thing
Mark-Cahill-Ministries-1
One-Blinding-Vision

Other Sources

USSANews

Latest News

Health Care Commentary Don’t Let the Media Confuse You: Obamacare Is a Policy Failure

By StevieRay Hansen | January 4, 2017

Leave it to the media, which spent the latter half of 2016 highlighting how outrageously expensive Obamacare premiums were becoming, to suddenly shift gears in…

Read More

Pro-Israel activist can’t wait for Obama’s, Kerry’s exit Wednesday, January 4, 2017

By StevieRay Hansen | January 4, 2017

An expert on Islamic terrorism is blasting the Obama administration for its recent mistreatment of Israel at the United Nations. In one of its first…

Read More

Obama Going Out in a Blaze of Self-interest

By StevieRay Hansen | January 4, 2017

Town [Jonah Goldberg](http://townhall.com/columnists/jonahgoldberg) [TownHall.com](http://townhall.com/columnists/jonahgoldberg/2017/01/04/obama-going-out-in-a-blaze-of-selfinterest-n2266576) Posted: Jan 04, 2017 12:01 AM Of all Barack Obama’s costumes, the most ill-fitting is that of the hawk. The guise…

Read More

Dems can’t figure out what went wrong

By StevieRay Hansen | January 4, 2017

Billy Davis, Steve Jordahl [(OneNewsNow.com)](https://www.onenewsnow.com/politics-govt/2017/01/04/dems-cant-figure-out-what-went-wrong) Democratic leaders still reeling from Election Day should reconsider their party’s disdain for people of faith, says a Christian apologist.…

Read More

Today’s Verse….

By StevieRay Hansen | January 3, 2017

Thoughts on Today’s Verse…. We cannot renew ourselves on our own. We can guard ourselves from corrupting influences. We can offer ourselves to God and…

Read More
Focused-Protection-1
Place Your Ad Here

We make every effort to acknowledge sources used in our news articles. In a few cases, the sources were lost due to a technological glitch. If you believe we have not given sufficient credit for your source material, please contact us, and we will be more than happy to link to your article.

Bryce Abbott

Leave a Comment