A Xinjiang Police College webpage shows police officers collecting information from villagers in Kargilik (or Yecheng) County in Kashgar Prefecture, Xinjiang.

China’s Algorithms of Repression

Reverse Engineering a Xinjiang Police Mass Surveillance App

A Xinjiang Police College webpage shows police officers collecting information from villagers in Kargilik (or Yecheng) County in Kashgar Prefecture, Xinjiang.  Source: Xinjiang Police College website

Summary

Since late 2016, the Chinese government has subjected the 13 million ethnic Uyghurs and other Turkic Muslims in Xinjiang to mass arbitrary detention, forced political indoctrination, restrictions on movement, and religious oppression. Credible estimates indicate that under this heightened repression, up to one million people are being held in “political education” camps. The government’s “Strike Hard Campaign against Violent Terrorism” (Strike Hard Campaign, 严厉打击暴力恐怖活动专项行动) has turned Xinjiang into one of China’s major centers for using innovative technologies for social control.

This report provides a detailed description and analysis of a mobile app that police and other officials use to communicate with the Integrated Joint Operations Platform (IJOP, 一体化联合作战平台), one of the main systems Chinese authorities use for mass surveillance in Xinjiang. Human Rights Watch first reported on the IJOP in February 2018, noting the policing program aggregates data about people and flags to officials those it deems potentially threatening; some of those targeted are detained and sent to political education camps and other facilities. But by “reverse engineering” this mobile app, we now know specifically the kinds of behaviors and people this mass surveillance system targets.

Images of the IJOP surveillance phone app used in Xinjiang, China.

In early 2018, Human Rights Watch obtained a copy of a mass surveillance app used by police in Xinjiang, in northwest China. Human Rights Watch “reverse engineered” the app, and senior China researcher Maya Wang detailed what the process revealed.

Interview: China’s ‘Big Brother’ App

The findings have broader significance, providing an unprecedented window into how mass surveillance actually works in Xinjiang, because the IJOP system is central to a larger ecosystem of social monitoring and control in the region. They also shed light on how mass surveillance functions in China. While Xinjiang’s systems are particularly intrusive, their basic designs are similar to those the police are planning and implementing throughout China. 

Many—perhaps all—of the mass surveillance practices described in this report appear to be contrary to Chinese law. They violate the internationally guaranteed rights to privacy, to be presumed innocent until proven guilty, and to freedom of association and movement. Their impact on other rights, such as freedom of expression and religion, is profound.

 

Human Rights Watch finds that officials use the IJOP app to fulfill three broad functions: collecting personal information, reporting on activities or circumstances deemed suspicious, and prompting investigations of people the system flags as problematic.

Analysis of the IJOP app reveals that authorities are collecting massive amounts of personal information—from the color of a person’s car to their height down to the precise centimeter—and feeding it into the IJOP central system, linking that data to the person’s national identification card number. Our analysis also shows that Xinjiang authorities consider many forms of lawful, everyday, non-violent behavior—such as “not socializing with neighbors, often avoiding using the front door”—as suspicious. The app also labels the use of 51 network tools as suspicious, including many Virtual Private Networks (VPNs) and encrypted communication tools, such as WhatsApp and Viber.

The IJOP app demonstrates that Chinese authorities consider certain peaceful religious activities as suspicious, such as donating to mosques or preaching the Quran without authorization. But most of the other behavior the app considers problematic are ethnic-and religion-neutral. Our findings suggest the IJOP system surveils and collects data on everyone in Xinjiang. The system is tracking the movement of people by monitoring the “trajectory” and location data of their phones, ID cards, and vehicles; it is also monitoring the use of electricity and gas stations of everybody in the region. This is consistent with Xinjiang local government statements that emphasize officials must collect data for the IJOP system in a “comprehensive manner” from “everyone in every household.”

When the IJOP system detects irregularities or deviations from what it considers normal, such as when people are using a phone that is not registered to them, when they use more electricity than “normal,” or when they leave the area in which they are registered to live without police permission, the system flags these “micro-clues” to the authorities as suspicious and prompts an investigation. 

Another key element of IJOP system is the monitoring of personal relationships. Authorities seem to consider some of these relationships inherently suspicious. For example, the IJOP app instructs officers to investigate people who are related to people who have obtained a new phone number or who have foreign links.

The authorities have sought to justify mass surveillance in Xinjiang as a means to fight terrorism.  While the app instructs officials to check for “terrorism” and “violent audio-visual content” when conducting phone and software checks, these terms are broadly defined under Chinese laws. It also instructs officials to watch out for “adherents of Wahhabism,” a term suggesting an ultra-conservative form of Islamic belief, and “families of those…who detonated [devices] and killed themselves.” But many—if not most—behaviors the IJOP system pays special attention to have no clear relationship to terrorism or extremism. Our analysis of the IJOP system suggests that gathering information to counter genuine terrorism or extremist violence is not a central goal of the system.

The app also scores government officials on their performance in fulfilling tasks and is a tool for higher-level supervisors to assign tasks to, and keep tabs on the performance of, lower-level officials. The IJOP app, in part, aims to control government officials to ensure that they are efficiently carrying out the government’s repressive orders.

In creating the IJOP system, the Chinese government has benefitted from Chinese companies who provide them with technologies. While the Chinese government has primary responsibility for the human rights violations taking place in Xinjiang, these companies also have a responsibility under international law to respect human rights, avoid complicity in abuses, and adequately remedy them when they occur.

As detailed below, the IJOP system and some of the region’s checkpoints work together to form a series of invisible or virtual fences. Authorities describe them as a series of “filters” or “sieves” throughout the region, sifting out undesirable elements. Depending on the level of threat authorities perceive—determined by factors programmed into the IJOP system—, individuals’ freedom of movement is restricted to different degrees. Some are held captive in Xinjiang’s prisons and political education camps; others are subjected to house arrest, not allowed to leave their registered locales, not allowed to enter public places, or not allowed to leave China.  

Government control over movement in Xinjiang today bears similarities to the Mao Zedong era (1949-1976), when people were restricted to where they were registered to live and police could detain anyone for venturing outside their locales. After economic liberalization was launched in 1979, most of these controls had become largely obsolete. However, Xinjiang’s modern police state—which uses a combination of technological systems and administrative controls—empowers the authorities to reimpose a Mao-era degree of control, but in a graded manner that also meets the economy’s demands for largely free movement of labor.

The intrusive, massive collection of personal information through the IJOP app helps explain reports by Turkic Muslims in Xinjiang that government officials have asked them or their family members a bewildering array of personal questions. When government agents conduct intrusive visits to Muslims’ homes and offices, for example, they typically ask whether the residents own exercise equipment and how they communicate with families who live abroad; it appears that such officials are fulfilling requirements sent to them through apps such as the IJOP app. The IJOP app does not require government officials to inform the people whose daily lives are pored over and logged the purpose of such intrusive data collection or how their information is being used or stored, much less obtain consent for such data collection.

 

A checkpoint in Turpan, Xinjiang. Some of Xinjiang’s checkpoints are equipped with special machines that, in addition to recognizing people through their ID cards or facial recognition, are also vacuuming up people’s identifying information from their electronic devices.  © 2018 Darren Byler

The Strike Hard Campaign has shown complete disregard for the rights of Turkic Muslims to be presumed innocent until proven guilty. In Xinjiang, authorities have created a system that considers individuals suspicious based on broad and dubious criteria, and then generates lists of people to be evaluated by officials for detention. Official documents state that individuals “who ought to be taken, should be taken,” suggesting the goal is to maximize the number of people they find “untrustworthy” in detention. Such people are then subjected to police interrogation without basic procedural protections. They have no right to legal counsel, and some are subjected to torture and mistreatment, for which they have no effective redress, as we have documented in our September 2018 report. The result is Chinese authorities, bolstered by technology, arbitrarily and indefinitely detaining Turkic Muslims in Xinjiang en masse for actions and behavior that are not crimes under Chinese law.

And yet Chinese authorities continue to make wildly inaccurate claims that their “sophisticated” systems are keeping Xinjiang safe by “targeting” terrorists “with precision.” In China, the lack of an independent judiciary and free press, coupled with fierce government hostility to independent civil society organizations, means there is no way to hold the government or participating businesses accountable for their actions, including for the devastating consequences these systems inflict on people’s lives.

The Chinese government should immediately shut down the IJOP and delete all the data it has collected from individuals in Xinjiang. It should cease the Strike Hard Campaign, including all compulsory programs aimed at surveilling and controlling Turkic Muslims. All those held in political education camps should be unconditionally released and the camps shut down. The government should also investigate Party Secretary Chen Quanguo and other senior officials implicated in human rights abuses, including violating privacy rights, and grant access to Xinjiang, as requested by the Office of the United Nations High Commissioner for Human Rights and UN human rights experts.

Concerned foreign governments should impose targeted sanctions, such as the US Global Magnitsky Act, including visa bans and asset freezes, against Party Secretary Chen and other senior officials linked to abuses in the Strike Hard Campaign. They should also impose appropriate export control mechanisms to prevent the Chinese government from obtaining technologies used to violate basic rights.

 

Methodology

This report is based on “reverse engineering” a copy of the IJOP app between January 2018 and February 2019.

Procurement notices for the IJOP system show it is supplied by the Xinjiang Lianhai Cangzhi Company (新疆联海创智公司).[1] That firm is a wholly owned subsidiary of China Electronics Technology Group Corporation (CETC, 中国电子科技集团公司), a major state-owned military contractor in China.[2] CETC announced, at a March 2016 press conference, the company had been awarded a government contract to build a big data program that would collate information about citizens’ everyday behavior and flag unusual activities to predict terrorism.[3]

According to official media reports, government officials and police officers in Xinjiang use an IJOP app to communicate with the IJOP system.[4] Human Rights Watch obtained a copy of the IJOP app in early 2018. We enlisted Cure53, a Berlin-based security company, to “reverse engineer” the IJOP app in late 2018. Cure53’s technical assessment, along with dozens of screenshots generated from the app’s source codes, form the technical basis of this report. We showed the screenshots to a person who was familiar with the app, with whom we spoke during research about the IJOP system published in February 2018; he recognized the app.[5]

Human Rights Watch has released these screenshots, which are referenced throughout this report and are available online at: https://www.hrw.org/node/329384.

To reverse engineer an app means to disassemble it, looking at the data it contains and its design, to understand how it works. In this case, we sought specifically to understand how government officials and police officers are instructed to carry out surveillance tasks in Xinjiang. The version we examined was v2.1.2.7762, published on November 20, 2017.

We found that the IJOP app was developed by Hebei Far East Communication System Engineering Company (HBFEC, 河北远东通信系统工程有限公司), a company, at time of the app’s development, fully-owned by CETC.[6] An important component of the app is the AcroPhone, a “unified communication system” listed on both CETC and HBFEC’s websites as their products.[7] Human Rights Watch sent a letter to the chairmen of CETC and HBFEC seeking information on the app, the IJOP system, and related issues (see Appendix I), but had not received a response at time of writing.

Human Rights Watch did not log into the IJOP app, as we did not have a username and password to do so, nor did we connect to the IJOP system’s servers to obtain data to populate the app. This limitation means that while we were able to recreate faithfully some of the pages and menus of the IJOP app, we were unable to do so for others. We also examined the app’s source code, which provided insights into many of the pages and functions we were unable to recreate.

Statements from former Xinjiang residents used throughout this report were obtained through interviews Human Rights Watch conducted previously for our September 2018 report on Xinjiang.[8] To protect their identities, the names of all interviewees have been changed, and the location where they were interviewed, along with their place of origin and ethnicity, have been withheld. All those interviewed were informed of the purpose of the interview, its voluntary nature, and the ways in which the information would be used.

 

I. Background

We must respond to the new ways in which hostile forces and terrorists are plotting crimes by implementing all-encompassing, round-the-clock, three-dimensional prevention and control [surveillance systems], to resolutely ensure that there are no blind spots, no gaps, no blanks unfilled [in our efforts].
—Chen Quanguo, Xinjiang party secretary, in a directive issued on August 17, 2017[9]

Human Rights in China

The Chinese Communist Party (CCP, or “Party”) has ruled China since it founded the People’s Republic of China in 1949. The CCP controls the government bureaucracy, including the military, the police, and the judiciary. It also maintains a tight grip over many aspects of society and public life, including the mass media, internet, and academia. Human rights, including the rights to freedom of expression, association, assembly, and religion, are heavily curtailed. It is hostile towards human rights activists—from those who speak out against corruption to those who protest against environmental degradation—and punishes them with police harassment, detention, torture, and imprisonment. The CCP’s level of social control has gone through harsh cycles with occasional periods of relative relaxation; the years under CCP Chairman Mao Zedong (1949-1976) were particularly tumultuous and brutal.

China’s current leader, President Xi Jinping, has ushered in a period of escalating repression.[10] He scrapped term limits for the presidency in March 2018, indicating his intent to rule indefinitely.[11] He has instituted a slew of national security-related legislation that further restricts people’s rights, has pushed to “Sinicize” religion (that is, exerting greater Party control), and initiated various campaigns to shore up loyalty to the Party.  

In the ethnic minority regions of Xinjiang and Tibet, the cost of criticizing the government is enormous. The authorities regularly forcibly disappear and indefinitely detain perceived critics and opponents of the government. This is exemplified by the life sentence handed down to Uyghur economist Ilham Tohti in 2014, and the enforced disappearance of the Panchen Lama, an important Tibetan Buddhist figure, in 1995.[12]

Mass Surveillance in China

The CCP has long embraced mass surveillance. Since 1949, the state and the Party have relied on information gathering and social management tools, such as “danwei” work units, the “hukou” residency registration system, and “dang’an” secret political files, to monitor people and maintain tight social control.[13] Government agencies regularly collect a wide range of personal information about people, ranging from their political views to information about women’s use of  birth control, and link it to their national identification card number, without people having the ability to challenge such collection.

But since 1979, mass migration and privatization during the transition to a quasi-market economy have undermined the efficacy of these older practices.[14] The 1989 pro-democracy protests—which authorities repressed, killing untold numbers of peaceful protesters and bystanders—further jolted CCP leadership into the realization that it must bolster and broaden surveillance over an increasingly mobile and demanding society. Other changes in society, ranging from the advent of the internet, globalization, a wealthier state, and people’s growing digital footprint, also contributed to the authorities’ greater interest in developing technologies for social control.

The Ministry of Public Security significantly overhauled its intelligence-gathering infrastructure in the early 2000s to achieve “information dominance” for the purpose of social control and crime-fighting.[15] It launched the Golden Shield Project around 2000, which aimed to build a nationwide network of “information arteries” across the police force, “integrated information platforms” to consolidate such information, and command centers to analyze intelligence.[16] In 2003, the ministry began to adopt a policing model called “Intelligence-Led Policing” (情报指导警务), pioneered by the British police in the 1990s, which entailed placing intelligence “at the center of all strategic and operational decision-making.”[17] Intelligence-Led Policing relies on “seamless information sharing” among “strategic decision-makers, operational officers, and frontline cops.”[18]

 

CETC’s “three-dimensional portrait and integrated data doors” – special machines that are used in some of Xinjiang’s checkpoints to vacuum up people’s identifying information from their electronic devices. This is placed at the entrance to the Aq Mosque, in Urumqi, 2018.  Credit: Joanne Smith Finley

With the Golden Shield Project and Intelligence-Led Policing model, the Ministry of Public Security aimed to integrate information silos across the police force, reducing communication inefficiency between layers of police bureaucracy and enabling the police force to predict and respond quickly to threats.

The 2008 Beijing Olympics gave the Chinese government, the CCP, and its mass surveillance agenda a further opportunity. The Party has increasingly treated “stability maintenance”—a euphemism for social control—as an overarching priority, and devoted enormous resources to security agencies for monitoring dissidents, breaking up protests, censoring the internet, and developing and implementing mass surveillance systems.[19] The 2008 protests by Tibetans across the Tibetan plateau on a range of issues including intrusive religious and cultural restrictions, and the 2009 riots in Urumqi, the capital of Xinjiang, prompted the government to step up mass surveillance and police recruitment in these minority regions.[20] Major meetings—such as the G20 in Hangzhou in 2016—are occasions for authorities to acquire new surveillance products and systems.[21]

It appears the Chinese government’s dystopian projects are bearing fruit, as these mass surveillance systems have woven an ever-tightening net around people across the country. These systems are multi-layered and overlapping. The government issues every citizen a national identification card that is essential to accessing many public and private services. This “real name registration” requirement enables authorities to collect and compile vast databases of personal profiles linked to an individual’s ID. At the same time, the government has been blanketing the country with closed-circuit surveillance cameras (CCTV).[22]  Authorities have enlisted artificial intelligence technologies, provided by private companies—some with links to the state and the military—to help them automatically identify people from public surveillance footage streams and telephone calls; they are also using big data systems to identify individuals posing political threats.[23] All these systems  are being developed and implemented without meaningful privacy protections against state surveillance. The depth, breath, and intrusiveness of the Chinese government’s mass surveillance on its citizens maybe unprecedented in modern history.[24]

These mass surveillance systems remain unchallenged in China because there are few meaningful checks on government powers. The Ministry of Public Security is accountable to no one except to the CCP—it is not required to report surveillance activities to any other government agency, or to publicly disclose this information. It is all but impossible for people to know what personal information the government collects, and how the government uses, shares, or stores their data.[25]

Mass Surveillance in Xinjiang

While mass surveillance systems in Xinjiang are based on the same basic designs described above, Xinjiang authorities seem to have gone the furthest in China in implementing them, contending that aggressive use of such systems is necessary for countering “the three [evil] forces”—separatism, terrorism, and extremism.[26] There have been a number of reported violent incidents in Xinjiang—notably the Urumqi market bombing in 2014—and the Chinese government has characterized these incidents as terrorism, blaming some of them on foreign groups.[27] The Chinese government claimed in a March 2019 White Paper on Xinjiang, that it had arrested nearly 13,000 terrorists in Xinjiang since 2014.[28] However, obtaining accurate accounts of violence in Xinjiang is extremely difficult because the government keeps tight control over this information. To what extent these incidents in Xinjiang are linked to foreign groups—as opposed to domestic incidents triggered by local or even interpersonal grievances—is also unclear.[29] Chinese laws also define terrorism and extremism in an overly broad and vague manner, such that a large range of activity relevant to ethnic and religious expression and custom are punishable and prohibited, such as wearing “abnormal” beards or veils in public places or naming babies with names that “exaggerate religious fervor.”[30]

Under the Strike Hard Campaign, Xinjiang authorities have collected biometrics, including DNA samples, fingerprints, iris scans, and blood types of all residents in the region between the ages of 12 and 65.[31] Additionally, authorities have required residents to give voice samples when they apply for passports.[32] All of this data is being entered into centralized, searchable databases.[33] The collection of these biometrics is part of the government’s drive to form a “multi-modal” biometric portrait of individuals and to gather ever more data about its citizens. All of this data can be linked in police databases to the person’s identification number, which in turn is linked to a person’s other biometric and personal information on file, such as the kind of data described in this report. The use of mass surveillance extends beyond Xinjiang and into the Turkic Muslim diaspora as authorities pressure them to provide detailed information about themselves, including their address, phone number, and school or workplace.[34] 

Xinjiang can best be described as one of several clusters of mass surveillance industries in China, each catering to the local governments where they are based, with ideas cross-fertilizing between these clusters. One hallmark of Xinjiang’s mass surveillance infrastructure is “convenience police stations”—street-corner police stations that together form a dense network of control through the region—that were brought to Xinjiang when Party Secretary Chen Quanguo transferred to the region from Tibet.[35] Another basic building block of Xinjiang’s mass surveillance infrastructure is the “grid system” of dividing populations into geometric units for tighter surveillance and service provision, which first underwent trials in Beijing in 2004.[36]

While many of the companies that enable mass surveillance in Xinjiang are Chinese companies, foreign technology, companies, and investment also play a role in supporting the Xinjiang authorities’ abuses. US-based company Thermo Fisher Scientific supplied the Xinjiang police with some of the DNA sequencers at a time when those authorities were building large-scale infrastructure to process DNA samples of Xinjiang residents.[37] A Yale University geneticist collaborated—and shared DNA samples—with a Ministry of Public Security researcher in 2014.  That collaboration enabled the ministry to identify Uyghurs’ ethnicity by examining their genetic materials.[38]

The Central IJOP System

The findings of this report are based on an examination of the IJOP app interface—rather than the central system itself, which remains largely a black box. The current findings enrich what Human Rights Watch previously knew about the system, though many questions remain.

Human Rights Watch’s previous research into the IJOP central system, which was based on government procurement documents, indicated that it gathers information from multiple sources or machine “sensors.”[39] One source is CCTV cameras, some of which have facial recognition or infrared capabilities (giving them “night vision”). Another source is “wifi sniffers,” which collect the unique identifying addresses of computers, smartphones, and other networked devices.[40] The IJOP system also receives information from some of the region’s countless checkpoints and from “visitors’ management systems” in access-controlled communities, such as residential areas and schools. In addition, these documents say some of these checkpoints “receive, in real time, predictive warnings pushed by the IJOP” so they can “identify targets … for checks and control.”[41] Our current research into the IJOP app suggests the IJOP system is pulling location information from these sensory systems to chart the movement or “trajectories” of people.

We also know—through reverse engineering the IJOP app and examining its source code—that the IJOP central system seems to draw on detailed information collected by the Xinjiang authorities about package delivery.[42] Presumably, there is a system tracking such information and feeding it to the IJOP system, which draws on some of that data in populating the app.

We know that there are at least two other apps that Xinjiang government officials use to gather personal data from residents: an app for Xinjiang officials when they conduct intrusive home visits (“新疆入户走访”[43]), and another app for collecting data on migrant workers (“基础工作小助手”[44]). While we have not had access to them, some local government reports state that the data collected via these other apps feed into the IJOP system.[45]

However, we do not know if—and how—the IJOP system is connected to other surveillance systems in China. For example, in the IJOP app screenshot tracking people who have “gone off-grid” (p. 38), the drop-down menu available for government officials includes an option to note that the person in question “has left Xinjiang.”  Presumably, if the IJOP system is connected to its counterparts elsewhere in China, it would have “known” that, and thus there would be no need to flag or investigate that person.

While the IJOP central system—and much of Xinjiang’s mass surveillance systems—are managed by the Public Security Bureau, police officers are not the only Chinese government officials tasked with mass surveillance. Since 2014, Xinjiang authorities have sent 200,000 cadres from government agencies, state-owned enterprises, and public institutions to regularly visit and surveil people. Authorities call this initiative “fanghuiju” (访惠聚). [46] In October 2016, authorities initiated a related effort, called the “Becoming Family” (结对认亲) campaign, which involves requiring officials to stay in Turkic Muslims’ homes regularly. [47] There is no evidence to suggest that families can refuse such visits. During these intrusive home visits, the cadres perform several functions, including surveillance and inputting the data of families into apps such as the IJOP.[48]

The IJOP system requires officials to respond to many perceived abnormalities in people’s lives, a grueling task for government officials. One official lamented that many colleagues have “worked so hard” to meet the IJOP’s appetite that “their eyes are so tired and reddened.”[49] These officials are under tremendous pressure to carry out the Strike Hard Campaign. Failure to fulfill its requirements can be dangerous, especially for cadres from ethnic minorities, because the Strike Hard Campaign also targets and detains officials thought to be disloyal.[50] It is unclear how long Xinjiang authorities can sustain this high volume of labor-intensive investigations, though presumably authorities may be able to collect some of the personal information in a more automated manner in the future.

Currently, much of the IJOP system appears to function as simple conditional statements—if a, then b (for example, if the person who drives the car is not the same as the person to whom the car is registered, then investigate this person)—and the app suggests the IJOP system may not be as sophisticated as authorities have publicly advertised.[51] To what extent the IJOP central system is currently using big data algorithms in analyzing the collected personal data is unclear.

The IJOP system is generating a massive dataset of personal information, and of police behavior and movements in Xinjiang. Yet it is not known how the authorities plan to use such data. In 2017, the state-owned company that built the IJOP, CETC, established a new big data national laboratory for “social security risk awareness, prevention, and control”[52] in Urumqi, together with the Xinjiang police “special investigative unit” and Ministry of Public Security big data researchers. The lab dispensed grants for the first time in July 2017 to 16 grantees; one of the co-chairs of the panel evaluating the grantees was the vice-chief of Xinjiang’s police.[53] An examination of the list of research topics suggests Chinese police are developing capabilities for “reality mining”[54] that go beyond existing forms of surveillance. By studying how people interact, using data gathered by machines such as their mobile phones or checkpoints—an approach considered more accurate than existing subjective sources for analyzing such interactions—the authorities seemingly hope to be able to understand in a more fine-grained way how people lead their lives: whom they talk to, where they go, and what they do. The goal is apparently to identify patterns of, and predict, the everyday life and resistance of its population, and, ultimately, to engineer and control reality.[55]

 

II. How the IJOP App Works: An Overview

Party Secretary Ding Jian explained the IJOP system in detail…. He randomly chose one of the households [in the village], and the technician immediately pulled out the…positioning coordinates as well as relevant information about the family…. [The party secretary] randomly chose a vehicle number and asked the operator to pull up the vehicle’s location.
—Village-based work team report, describing the village CCP secretary in Tekes County demonstrating to his superior how the IJOP system and app works, February 2018

The IJOP app is a multi-functional tool. Beyond its three broad, main functions[56]—data collection, filing of reports, and prompting “investigative missions” by police—the app has a range of other functions, including:

  • Communication function: The IJOP app relies on AcroPhone (AcroUC), a “unified communication system,” for officials to communicate across platforms (such as voice messages, emails, telephone calls).
  • Geolocation and map functions: The IJOP app logs the police officer’s GPS locations and other identifying information when they submit information to the IJOP app. The IJOP app uses a map functionality by Baidu, a major Chinese technology company, for purposes including planning the shortest route for police vehicle and officers on foot, according to the app’s source code.
  • Search function: The IJOP app allows officials to search for information about people using their name, ID number, household number used to access public utilities (户号), and building address (see Appendix III). In addition, officials can access, upon approval of their superiors, the “full profile” of a given individual.
  • Facial recognition function: The IJOP app we examined contains facial recognition functionality for checking whether a photo on an ID matches a person’s face or for cross-checking pictures on two different documents. It also contains code for facial recognition at log-in from Face++, a major Chinese company specializing in facial recognition products that it promotes for public security uses.[57] However, Human Rights Watch has confirmed independently that this code is inoperable, and the company states it has no relationship to IJOP.[58]
  • Wifi detecting: The IJOP app appears to collect data about wireless networks in range of the device. The collected data includes SSID (the service set identifier, or the name of a Wi-Fi network), encryption method, and GPS locations. Our technical investigation suggests that this possibly serves the purpose of creating a map of the existing wireless networks in the region, also known as “War Driving.”[59]  This function could also potentially be used to identify and target weakly secured wireless networks and to join them for the purpose of surveillance and infiltration. It can also be used to understand the population density, connectivity, and the produced data volume of a given area. However, it is unclear how this functionality—or the data it gathers—is used.

Data Collection

The IJOP app prompts government officials to collect detailed personal data from people in Xinjiang.

 

In screen 1, officials are prompted to choose the circumstances under which information is being collected by using a drop-down menu. The five choices are:

  • “during home visits,”
  • “on the streets,”
  • in “political education camps,”
  • “during registration for those who travel abroad,” and
  • “when collecting information from whose ‘hukou’ (or registered residency) is in Xinjiang but living in the mainland.”[60]

Although not shown on the screenshot, officials with “administrative rights”[61]—likely higher-level officials—are also presented with a sixth choice: “when collecting information from foreign nationals who have entered [Xinjiang].”

Officials are then prompted to log and submit to the IJOP central system a range of information about the person, from the person’s height, to their blood type, to their political affiliation.

There is a second main page that belongs to this set of data collection tasks, but we were unable to generate it when reverse-engineering the app. We examined the source code and found that this second page is prompting officials to collect even more information from people, including their religious and political status and activities abroad. This page also reveals that there are 36 “person types” to whom the authorities are paying special attention. 

 

© 2019 Human Rights Watch
 

On this page, the IJOP app requests different types of data depending on the type of situation in which information is being collected. For example, when officials are collecting information from people “on the street,” “in political education camps,” or “during registration for those who have gone abroad,” the app further prompts them to choose from a drop-down menu whether the person in question belongs to one of 36 types of problematic “person types.” 

Filing Reports

The app allows officers to file reports about people, vehicles, objects, and events they find suspicious. Human Rights Watch was able to replicate most of the pages in this set of

tasks, and we have included some of them in Appendix IV. They are structured similarly to each other, in that they ask officers to log a written description of the suspicious person, vehicle, or event, log its location and identifying information (for example, license plate number, or ID card number), and add any relevant photos or audio recordings.

Investigative Missions

The most interesting—and revealing—part of the app is the group of tasks called “investigative missions” (调查任务). Mission instructions are sent directly via the IJOP central system to officers, requiring them to investigate certain individuals, vehicles, or events and provide feedback.

The IJOP app source code contains two simple mock examples. One states the person’s problem:

Suspicious person Zhang San, whose address is Xinjiang Urumqi, ID number 653222198502043265, phone number 18965983265. That person has repeatedly appeared in inappropriate locations, and he displays [or his clothing shows] strong religiousness.[1]

Another contains a mock mission:

Reporter name: Zhang Sanfeng

Report text: Suspicious person Maimaiti Muhemuti, who originally lives in Xinjiang’s Urumqi, ID number 653222198502043215, phone number 13803021458.

Report time: 2017-09-25 14:01:53

[Mission] text: Please carefully investigate whether he is still lives in Urumqi and investigate his family situation.

 

Screen 2

In screen 2, the official receives a description of the mission. The official can then view the details of the mission, conduct their investigation, and then fill out the feedback form. The missions can entail collecting extensive personal information from the individual.

In screen 3, officials are prompted to collect further identifying information about people’s vehicles by opening related screens with information about the vehicle, including color and type, as well as the license plate number and a picture of the vehicle. Entering such information presumably enables cameras equipped with artificial intelligence capabilities to recognize and keep track of the vehicle as it travels and passes through vehicle checkpoints.

 

Officials are also prompted to log whether the people in question use a list of 51 “suspicious” internet tools, and if so, their account number.[62] Most of these tools are foreign messaging tools, such as Viber, WhatsApp, and Telegram, but also include Virtual Private Networks (VPNs).

Officials are also prompted, through related screens, to log individuals’:

  • Bank information (which bank they use and the bank account number),
  • Family members (name, ID number, relationship, phone number), and
  • “Suspiciousness,” and, if so, explain whether they require further investigation.
     

III. Categories of People Authorities Find Suspicious

The investigative missions reveal the categories of people the authorities are focused on:

People Who Move into or out of Registered Residency Area

Internal Migrants

Analysis of the IJOP app suggests that Xinjiang authorities target internal migrants—those who are found outside their hukou area—for heightened monitoring and surveillance.[63] The IJOP system sends officers alerts with the “trajectory” information of a person who has moved into, or out of, their registered locale. Screens 4 and 5 are nearly identical except screen 4 is for people who have moved into a particular locale and screen 5 is for those who have moved out of that locale.

 

Screen 4

 

Screen 5

Officials—likely those who are in the locale to which the migrants have moved, judging from the context—are dispatched to visit the internal migrants who have been thus flagged, or people associated with them. Screen 6 suggests that officials are instructed to find out when the migrants move in, reasons for the move, their temporary address, and the personal particulars of people related to this person. Then, on a subsequent screen, officials are prompted to add the name, ID number, and phone number of each related person, and whether this migrant is suspicious.

Similarly, officials are dispatched to investigate cases of people who have left their locale. The list of questions that officers are prompted to ask is similar (see screen 7). Again, the purpose is to track where people have gone, their relationships, and who they are travelling or spending time with.

 

Screen 6

 

Screen 7

People Who Go Abroad “For Too Long”

 

Screen 8

“Investigative mission” instructions are also sent to officers to look into people who went abroad or have been abroad “for too long” (逾期未归, or “overdue” persons). Screen 8 gives officials detailed information about such individuals, including which country they went to, reason for leaving, and their last recorded movement or “trajectory” in the country.

Officials are prompted to investigate such cases by interrogating the person in question or their family members and other social relations. The app prompts the official to investigate whether this person has gone abroad, and if so, which country they went to and the reasons for the trip (see screen 9).[64]

The app then prompts officials to add the person’s contacts abroad by opening a related page. Finally, the app asks officials to note if they think this person’s activities abroad are suspicious, and to describe the reasons for their suspicion.

 

If the officer is interrogating an “overdue person,” the app also prompts the officer to check the person’s phone. Officials are prompted to check and log, via a drop-down menu, whether the person’s phone contains “suspicious content,” including a VPN, “unusual software (or software that few people use),” “harmful URLs [or webpages],” or “violent terrorism audio-visuals.”

People Returning from Abroad

Another apparent function of the “investigative mission” feature of the IJOP app is the “prevention of people from returning from abroad.”[65] This is an objective that is repeatedly referenced in official documents of Xinjiang’s Strike Hard Campaign, one which appears to stem from concerns about returning “jihadists.”[66] In practice, it means heightened restrictions on border crossings.[67]

The details of this task are not clear because we were unable to generate the relevant pages through reverse engineering. The source code suggests that this mission flags irregularities concerning a person’s passport and immigration status, and that it allows those with administrative rights to designate responsibility for handling a person flagged in this category to another official.[68]

People Who Have Problematic Relationships

People Targeted in Operation “913” 

The IJOP app reveals that officials are prompted to investigate people identified as targets in a crackdown with the code name “913.”[69] Evidence contained in the IJOP app suggests the “913” crackdown focuses on individuals with “problematic” content and software on their mobile phones.[70] In screen 10, the IJOP system sends an alert to officials about such a target, giving extensive, identifying details about the target’s phone, including the phone’s unique identifier (IMEI number), base station information that can be used to track the movement of the phone user[71], where this person can generally be found, and whether the person has removed “unlawful software” from the phone.

 

 

Screen 11

Although we were unable to generate the screenshot for what appears to be the corresponding feedback page, entitled “feedback [form] on mobile phone investigation”[72] (手机调查反馈), that page’s source code shows that the official is prompted to probe the “913” target or their relations by asking them about their phone and software use, such as why they use the “problematic” software. This feedback form appears to be the only page in the app that uses the term “terrorism,” and we found no additional references to it in the source code.[73] Given the context, it might be that the official is prompted to note if the mobile phone or software use involves terrorism. The officials then note whether the person they are talking to seems suspicious and requires further police investigation.

The feedback page leads to subsequent screens for the officials to log information, which we were able to generate. In screen 11, the official can log people’s foreign links and software they use to contact people outside China. A drop-down menu lists eight foreign communication and VPN tools: Hotspot VPN, IPSEC, L2TP, line, Viber, VPN dialogs, WhatsApp, and Payeco (a Chinese e-payment tool, 易联). The individual’s account name for each tool or app is also logged.

Former Xinjiang residents told Human Rights Watch government officials and police routinely ask them for their phones and check their content without an explanation or warrant. According to Nurmuhemmet, a Turkic Muslim from Xinjiang:

I was driving when I was stopped by the traffic police…. Then a few SWAT police officers came and demanded that I give them my phone. I did, and they plugged the phone in.… There were different kinds of cables for different types of phones. They plugged in my iPhone, but I didn’t see what they were searching for. They handed the phone back to me after five minutes, and I was allowed to leave. Then a few days later when I was at the gas station, my wife also had her phone checked while waiting for me. Earlier, the neighborhood office told residents that they can go to the police to get their phones checked “for free” to see if there’s anything “problematic.” [74]

Nurmuhemmet said people were scared because it is unclear to them what exactly was being banned:

People didn’t know if what they have on their phones – apps, website content – is considered “unlawful” or “terrorist.” I don’t know what the unlawful content is either – I’ve heard about it, but I haven’t never seen it.[75]

The fact that people are left guessing what content may irk the authorities reflects the arbitrary nature of online and offline surveillance in the region. Many interviewees told Human Rights watch they refrain from saying anything substantial when communicating with their families or neighbors, or on social media.

A number of interviewees said they or their family members have been detained for having foreign software such as WhatsApp or a VPN on their phones during these checks. Inzhu, who resides outside China but whose husband travels regularly back to Xinjiang, said:

[M]y husband…told me that they took his phone and they found WhatsApp on it, and they handed the phone back. He told them in [the foreign country he lives in], a new phone comes with WhatsApp already installed. So, they asked for a receipt, and I sent my husband a receipt for the phone.[76]

Shortly after, the authorities took Inzhu’s husband away to a political education camp, where, as best we can ascertain, he remains in detention.

Embassy Alert

 

Screen 12

The IJOP app seems to send officials what it calls “embassy alert.” Screen 12 displays the person’s ID number, hukou address, and “disposal measures.” There is also a facial recognition component, as the screen shows the extent to which the person’s ID photo matches the photo of that person. At the bottom of the screen, the officer can click on the blue bottom, which says “confirm [and] check.” The purpose of this page is not entirely clear, but this page may be identifying people associated with embassies—either embassy staff or foreign nationals—and ordering officials to check them or to take certain measures against them as specified by the IJOP system.

“Four Associations”

 

Screen 13

The IJOP app suggests Xinjiang authorities track people’s personal relationships and consider broad categories of relationship problematic. One category of problematic relationships is called “Four Associations” (四关联), which the source code suggests refers to people who are “linked to the clues of cases” (关联案件线索), people “linked to those on the run” (关联在逃人员), people “linked to those abroad” (关联境外人员), and people “linked to those who are being especially watched” (关联关注人员).

The IJOP app suggests the IJOP center sends alerts to officials about people with these problematic relationships, and prompts officials to further investigate and provide feedback on these relationships along with details about the person (see screen 13). The officer is also prompted to note the person’s behavior, and whether the person seems suspicious and needs to be investigated further.

Unusual Electricity Use

The IJOP app appears to draw from a database of people’s electricity usage and send officers to investigate and provide feedback on those determined to have used an “unusual” amount of electricity, indicating that the authorities are surveilling electricity usage across Xinjiang’s population.[77]

In screen 14, the officer is presented with an alert detailing the person’s electricity usage, including the dates when unusual power consumption was recorded, and the relevant meter reading.

 

The official is prompted to investigate the reasons for unusual electricity consumption. The official can choose from a drop-down menu that allows them to note if the person:

  • Had purchased “new electronics for domestic use”;
  • Was doing “renovation”;
  • Is a “farmer”;
  • Possess “cutting or wielding tools or other electronics that have no reasonable domestic use”;
  • Is suspicious because there is “no explanation”; and
  • Other.

It also prompts the officer to decide whether this requires an “in-depth investigation” by the police, and, if so, why.

Mobile Phones, ID Cards, and Vehicles that Have Gone “Off-Grid”

The IJOP center also sends officials to investigate cases when an individual’s phone, ID card, or vehicle has gone “off-grid.” Screen 15 displays the prompt sent to officials requesting them to investigate a phone number that the system has lost track of.  The officer is prompted to probe, using a drop-down menu, why the phone went off-grid. The officer is then asked to note whether the person questioned seems suspicious and whether the case needs further investigation.

 

 

Screen 16

 

Screen 17

 

Screen 18

 

Screen 19

Similarly, the IJOP center sends officers alerts about vehicles that have gone “off-grid,” telling the officer the location in which the vehicle was last noted in the computer system (see screen 16).

We were unable to generate the screenshot for the corresponding feedback form, but an examination of the source code suggests that officers are prompted to investigate the case and provide feedback in a similar manner. Here the drop-down menu of reasons includes:

    Not selected; The vehicle has gone out of Xinjiang; The vehicle has been left unused; The vehicle is being repaired; The vehicle can no longer be used; The vehicle has been lent to someone else; The vehicle has been sold but the car registration has not been transferred; The vehicle has been sold but the car registration has been transferred; and Other.
  •  
  •  
  •  

In a similar manner, the IJOP system alerts officers when ID cards have gone “off-grid.” Here is a list of options for officials to choose from in investigating the reasons:

    Gone to seek work elsewhere; Gone to school; Gone on a tour; In hospital; Moved hukou; Left the country; Left Xinjiang; Subjected to criminal detention; Subjected to political education; Whereabouts unclear; and Other.
  •  
  •  
  •  

Mismatched Identities

The IJOP system alerts officials to instances when people are using cars, phones, or ID cards that are not registered to them.

Screen 17 suggests the IJOP system alerts officers to cases in which there is a “mismatch between the person and the vehicle (人车不符).” The system spots such mismatches by monitoring whether the registered owner of the car is the same as the person who gets gasoline for the car at gas stations. The screenshot below also shows that the IJOP monitors the time and frequency of gas station visits.

Since July 1, 2016, Xinjiang authorities have implemented a “real name” registration system for gas stations, in which gas station entrances are equipped with systems that recognize vehicles’ number plates and collect the identity of drivers, and require the drivers to swipe their ID cards before they can get gas.[78] The app suggests the IJOP system receives information from this “real name” registration system.

The corresponding feedback form requires officials to investigate. While we were unable to generate a screenshot of the form, the source code suggests officials are required to investigate mismatches, choosing the reasons from a drop-down menu, and deciding whether the incident is suspicious and requires further investigation.[79]

Similarly, the IJOP app sends officials alerts about people who are not using ID cards registered to them, presumably when going through checkpoints dotted throughout the region, or in other circumstances where IDs are required. Although the screenshot did not generate properly, the form asks for a description of the issue, followed by personal particulars such as ID card number, as well as the person’s “trajectory information” (see screen 18). The IJOP app then prompts officials to find out the reasons for the mismatch.[80]

The IJOP system also alerts officials when people are using phones that do not belong to them, giving the officials information about the case and the personal particulars of the person who is registered to the phone account, such as their ID number (see screen 19). It is unclear how the system “knows” that a person is using a phone that does not belong to them.[81] Officials are again required to log the reasons for the mismatch and decide if the person is suspicious.[82]

The data fields included in the IJOP system may help explain some of the bizarre interactions former Xinjiang residents described to Human Rights Watch, in which Xinjiang officials demanded specific and detailed personal information about them or their family members living abroad. Aylin, a woman in her early 20s, said:

The official called my mom and asked her how many years she has had this phone number.… She said, “11,” and the police said, “You’re lying, it’s 7!” She got frightened and then accidentally cut off the phone call.[83]

Aylin said her mother then went to get a new SIM card using her son’s ID card. Two days later, the authorities detained the mother and son for purchasing and using this SIM card to call Aylin.

“Problematic” Individuals

 

Screen 20

The app suggests officers are prompted to investigate certain individuals deemed “problematic.” Screen 20 shows such an alert detailing the “problem,” along with personal particulars of the individual.

An examination of the source code suggests that the following categories of people are considered “problematic”:

    People related to those whose whereabouts are unclear; People related to internal migrants; People related to those who are monitored by the IJOP; People related to those who cannot be contacted; People related to those who use the identification documents of dead people; People related to those whose phone number and identity is mismatched; People related to those who have left the country three days ago; People related to those who have not returned after leaving the country 30 or more days ago; People related to those who have not returned after leaving the country [for over a] half year; People related to those who have not returned after leaving the country [for over] one year; People related to those [newly] held in detention centers for endangering security; People related to those who have started a new phone number account; and Others.
  •  
  •  
  •  

Officials are then prompted to investigate these people and fill in a feedback form, which asks the officer to obtain a wide range of personal data about the individual, such as their means of transport, internet tools, bank information, and family members (the form is nearly identical to screen 3).

For each category of personal information, officials are prompted to add details such as the person’s means of transport. Officials can then log the license plate number of their vehicle, if any, the vehicle color and the vehicle type by opening a related screen. Similarly, there are pages for officials to input information about the person’s social media account tools and number, bank account information, and information about their family members.

 

Screen 21

 

Screen 22

 

Screen 23

Officers are also prompted to gather more information about specific “problems” concerning the individual or their relations. The app gives officers “hints,” depending on the “problem” type, suggesting they ask the person about:

    The whereabouts of the person who has gone missing; Why they had come to this county; Why their relative travels and stays with “nine types of monitored individuals”; Why their relative’s phone number cannot be contacted; Why their relative uses the identification documents of dead people; Who is using the mobile phone number registered with their identity; Why their relative left China, whether have they been in contact with the relative, and when [the relative] crossed the border; Recent activities that involve their relative and people who endanger security, and why their relation travels and lives with detained individuals; and Why their relative has obtained a new phone number account.
  •  
  •  
  •  

Finally, the officers are required to report back to the IJOP center whether these individuals require further police investigation.

“Problematic” Vehicles

Officials are also alerted to certain vehicles and prompted to investigate (see screen 21).

An examination of the feedback form’s source code shows it prompts officers to investigate the relationship between the driver and the owner of the vehicle, and logs the owner’s particulars (e.g., name, phone, ID card number), presumably because the system detected a mismatch between the two identities or detected that the information was missing.

“Matched” Persons

 The IJOP system sends alerts sent to officers, that contain information concerning when an individual passed through a checkpoint location and their ID, suggesting that the IJOP system picks out people as they go through Xinjiang’s checkpoints (see screen 22). People are “picked out” or “matched” by the system through their ID cards, mobile phone MAC addresses, IMEI number, or facial recognition. This finding suggests some of Xinjiang’s

checkpoints are not merely recognizing people through their ID cards or facial recognition—identification procedures that people know they are undergoing at these checkpoints.

Instead, the equipment at some of the checkpoints—called “three-dimensional portrait and integrated data doors” (三维人像综合数据门)—are vacuuming up people’s identifying information from their electronic devices.[84] Unbeknownst to the person going through the checkpoints, these “data doors” are detecting and collecting MAC addresses and IMEI numbers of the person’s phones, and logging such data for identification and tracking purposes.

In addition, the screenshot below suggests that officers are told to take certain actions regarding these “matched” individuals (处理措施). The source code suggests three forms of action: subject them to information collection (信息采集), keep them for interrogation (滞留审查), or arrest them immediately (立即抓捕).

For “matched” individuals, officers are prompted to find out and log, among other things:

  • Whether the person’s phone has “suspicious” content;
  • Whether the person had “applied to go on leave” from their hukou region;
  • Whether they have left their hukou area in the past year;
  • What reasons the person has for leaving (the options in the drop-down menu are: “doing business,” “going to school,” “no reasonable explanation,” or “other”).

The official is also required to log the personal particulars of people found together with the “matched” persons (see screen 23).

Ehmet, a Turkic Muslim released from a political education camp in Xinjiang in 2017, found his movements were still being restricted after his release. He told Human Rights Watch:

When I tried going out of the region, my ID would [make a sound] at police checkpoints.... The police told me I could not go out of [the hukou] region, because I was blacklisted. So, I went to the police in my village, and said, “I have kids and I need authorization to go….” But the police wouldn't give the authorization, so I couldn't leave the region. I got very angry and said, "You either kill me, or you put me in prison, or I’ll kill myself."[85]

Eventually, Ehmet was allowed to leave the region. A number of people who left Xinjiang in recent years told Human Rights Watch of similar experiences: that they or their family members had experienced similar movement restrictions.

Alim said he was released after spending several weeks in a police detention center for “disturbing social order”:

Everywhere in Xinjiang there were checkpoints. For the first week [after I was released], I was able to go everywhere. But then, I was entering a mall, and an orange alarm went off... the police already arrived, and they escorted me to the police station. I said to them, “I was in detention center and you guys released me because I was innocent.…” The police [at the police station] told me, “Just don’t go to any public places.”  I said, “It was fine for the first week and I was able to go places.” The police said, “They update the list every day.” I said, “What do I do now? Just stay home?” He said, “Yes, that’s better than this, right?”[86]

In many of the cases described to Human Rights Watch, the authorities made decisions about restricting people’s movement without any notification or avenues for redress. Alim recalled another incident:

We went to this waterpark right next to a lake, in a county that belongs to the city where I live. We went there, and on the way back, we had to go through a checkpoint…the orange alarm went off…they questioned me. I asked them, “What happened?” They said, “You’re supposed to get permission if you go out of [the city].” I said, “I didn’t know.”

Alim then spent the next weeks at home and did not go anywhere: “My friend and I would go to the internet cafes to play video games, but I didn’t want to go, to go to the police station again.”[87]

People also told Human Rights Watch their movement had been restricted simply for being connected to those the IJOP system considers problematic. According to Nur:

When my family and I were entering Urumqi after I was released.… the machines went “du du du” when our IDs were swiped. They called me into the office and asked us what crimes we had committed and why we were flagged, and they called our police station; our police explained that I and my family were blacklisted because I was a [foreign] national and because I was detained. [My family] said their ID cards have been making noise when going through the checkpoints ever since I was taken away.[88]

“Matched” Vehicles

 

Screen 24

The IJOP system sends officials an alert about certain vehicles, flagging two types: second-hand vehicles and vehicles that belong to people on a “watch list” (布控对象车辆预警). The source code does not give a precise definition of the latter and we are not aware of any Chinese law or policy defining the term or detailing a process by which a person’s vehicle is put on a police watch list or how to appeal such a designation.

Screen 24 shows the alert page, which gives details about the vehicle’s license plate as well as the car’s physical characteristics. It also gives the location and time that the “data collection devices” captured the information—likely to include the region’s vehicle checkpoints—and the action required.

A corresponding feedback form, which we were unable to generate but which was indicated in the source code, says officials are required to log the driver’s ID and phone numbers, and note whether the driver is the same person as the registrant of the car. If not, the official is prompted to investigate the reasons for the difference and log them using a drop-down menu:

    Not selected; Borrowing the vehicle from friends and family; Vehicle used for business; The vehicle has not finished the process of transferring ownership; and Other.
  •  
  •  
  •  

The form also asks officials to search the vehicle for contraband or forbidden items.[89] It then asks officials to determine whether the vehicle needs another round of checks and, if not, to select from a drop-down menu the reason further checks are not needed:

    Not selected; Borrowing the vehicle from a family member; Borrowing the vehicle from an acquaintance; Is in the process of transferring the ownership of the vehicle; Rental car; Vehicle belongs to employer [or business]; and Other.
  •  
  •  
  •  

The form also prompts officials to see if the phones—presumably of the driver, but perhaps also of all the passengers—contain “suspicious” software (see screen 25). The person’s ID and phone number are logged, along with a drop-down menu that allows officials to log whether the suspicious phone content concerns VPN, unusual software, suspicious websites, or others. The system also prompts the officer to log the identity and phone and ID numbers of the person travelling in the “matched” vehicle see screen 26).

 

Screen 25

 

Screen 26

IV. Applicable Legal Standards

International and Domestic Law

The International Covenant on Civil and Political Rights, which China signed in 1998 but has not ratified, provides that no one shall be subjected to arbitrary or unlawful interference with their privacy, family, home, or correspondence, and that everyone has the right to the protection of the law against such interference.[90] Any interference with the right to privacy, including the collection, retention, and use of an individual’s personal data, must be necessary and proportionate for a legitimate aim, and subject to a clear and public legal framework. Such a framework must ensure that the collection, retention, and use of personal data is:

a) necessary to the achievement of a legitimate aim such as public safety, and in the sense that less intrusive measures are unavailable;
b) appropriately restricted to ensure the action is proportionate to the legitimate aim; and
c) subject to authorization and oversight by an independent body, as well as other safeguards that are sufficient to prevent and address abuses.[91]

The right to privacy is also a gateway to the enjoyment of other rights, particularly the right to freedom of opinion and expression.[92]

Current Chinese laws do not meet these international privacy standards and do not provide meaningful protections against unlawful or abusive government surveillance. Article 40 of the Chinese Constitution guarantees people’s “privacy of correspondence,”[93] but China does not have a unified privacy or data protection law.[94] Although the government shows growing interest to regulate private companies’ collection of consumer data, such regulations are limited to the commercial sphere.[95]

There are Chinese laws, regulations, directives, and rules that empower various government entities to collect and use miscellaneous personal data, and some give authorities wide powers in data collection. For example, state security-related legislation, such as the State Security Law, invests police and other state security agents with the broad power “to collect intelligence involving state security.” Such laws that grant unfettered discretion to the bodies ordering or carrying out surveillance violate international privacy rights norms that require that surveillance, even if it is for a legitimate aim, must be proportionate and necessary.[96]

But even given these powers, the Chinese authorities’ collection and use of personal data—particularly with respect to mass surveillance—have little legal basis.[97] In Xinjiang, the regional Implementation Methods of the Counter-Terrorism Law requires that delivery, telecommunications, internet, finance, hostel, long-distance bus, and rental car companies implement the real-name registration system.[98] But apart from this requirement, many mass surveillance practices described in this report do not appear to be authorized by Chinese law and on their face appear to violate it.

For example, Chinese law does not generally empower government employees to search the phones or collect the DNA samples of members of the public. Only crime investigators, such as the police can do so during the investigation of a specific criminal case.[99] Even if people are being investigated for a crime, the police must present “a search warrant…to the person to be searched.”[100] There is no sign, based on interviews with former Xinjiang residents that Human Rights Watch conducted in 2018, that Xinjiang government officials or the police produce any search warrant prior to demanding to look through people’s phones.[101]

In addition, many of the behaviors and relationships that set off red flags with the IJOP system are not crimes according to Chinese law. For example, no Chinese law or regulations define an “overdue” person, specify the length of time people are allowed to stay abroad, or prohibit extended stays. Chinese law also does not make it a criminal offense for individuals to use WhatsApp, Telegram, or any of the foreign communication tools or VPNs.[102] The broad “watch lists” or the flagging of people by the IJOP system described in this report have no legal basis: Chinese law only empowers the police to track people  if they are suspected of crimes in specific criminal investigations.[103] 

There is very little information available about how, and how securely, the data collected by IJOP system is stored, who can receive or share the data, and under what circumstances, if ever, the data is deleted.[104] There is no formal system for people to find out what information is held about them in the IJOP system, and no way to obtain redress for abuses associated with the collection, dissemination, and use of their data.

Businesses and Human Rights

While the Chinese government has the primary obligation to respect, protect, and fulfill human rights under international human rights law, businesses—including Chinese and international companies operating in Xinjiang—also have human rights responsibilities.[105] The “Protect, Respect, and Remedy” framework, articulated most notably in the United Nations Guiding Principles on Business and Human Rights, reflect the expectation that businesses should respect human rights, avoid complicity in abuses, and adequately remedy them when they occur. The Guiding Principles urge businesses to exercise due diligence to identify, prevent, mitigate, and account for the impact of their activities on human rights.[106]


Recommendations

To the Government of the People’s Republic of China:

  • Shut down the Integrated Joint Operations Platform (IJOP) in Xinjiang and delete all data it has collected;
  • Suspend the collection and use of biometrics in Xinjiang until there is a comprehensive national law that protects people’s privacy;
  • Cease immediately the “Strike Hard Campaign against Violent Terrorism” (Strike Hard Campaign) in Xinjiang, including all compulsory programs aimed at surveilling and controlling Turkic Muslims;
  • Impartially investigate Party Secretary Chen Quanguo and other senior officials implicated in alleged abusive mass surveillance practices associated with the Strike Hard Campaign, and appropriately hold those responsible to account; and
  • Grant access to Xinjiang, as requested by the UN high commissioner for human rights and several UN special procedures.

To the National People’s Congress Standing Committee:

  • Draft and adopt legislation relevant to biometric and personal data to ensure its collection is compliant with international human rights standards:
    • The standards set forth in such legislation should be part of a larger legal framework ensuring that any collection, use, access, dissemination, and retention of such data is necessary; that less intrusive measures are not available; and that collection and use of such data are narrowly tailored and proportionate to a legitimate purpose, such as public safety.
    • To ensure these standards are enforced, any biometric data program should include: independent authorization for collection and use of the data, public notification that authorities are collecting the data, means of independent oversight of the program, and avenues for people to challenge abuses and obtain remedies.
    • The standing committee should also ensure relevant authorities publish information about the collection and use of biometric-based recognition technology, including about databases that have been created and how they are being used.

To Concerned Governments:

  • Impose targeted sanctions, such as the US Global Magnitsky Act and other protocols, including visa-ban and freezing assets, against Party Secretary Chen Quanguo and other senior officials linked to abuses in the Strike Hard Campaign;
  • Impose appropriate export control mechanisms to deny the Chinese government—and Chinese companies enabling government abuses—access to technologies used to violate basic rights, including by adding CETC and others named in this report to existing export control lists;
  • Ensure that state-run institutions, including universities, do not engage with the Xinjiang police and Chinese technology companies that are linked to human rights abuses against Turkic Muslims in Xinjiang; and
  • Push for an international fact-finding mission to assess the situation in Xinjiang and report to the UN Human Rights Council. 

To the United Nations:

  • UN Secretary-General Antonio Guterres and other senior UN officials should raise concerns publicly and privately with the Chinese government about human rights violations arising from the Strike Hard Campaign; 
  • Senior UN officials should act to ensure civil society activists can safely report on Chinese government abuses in Xinjiang and elsewhere to UN human rights mechanisms; and 
  • Senior UN officials should support Chinese civil society groups by resisting attempts by the Chinese government at the UN Department of Economic and Social Affairs (DESA) to block accreditation of groups advocating for the rights of Turkic Muslims in Xinjiang. 

To Chinese and International Companies Operating in Xinjiang, including CETC, HBFEC, Baidu, and Hikvision:

  • Ensure business operations are not supporting the Strike Hard Campaign, in particular, the mass surveillance and biometric profiling systems run by the Xinjiang Bureau of Public Security;
  • Ensure business arrangements with the Xinjiang police or other security forces do not contribute to abuses and promptly act to end such relationships when there is evidence that they do;
  • Adopt explicit policies in support of human rights and establish procedures to ensure company operations do not result in, or contribute to, human rights abuses; and
  • Analyze the human rights impacts of proposed investments or operations and implement strategies to prevent and mitigate adverse impacts. Such “human rights impact assessments” should be conducted in coordination with civil society groups and human rights experts.

Acknowledgments

This report was researched and written by Maya Wang, senior China researcher in the Asia Division at Human Rights Watch. The reverse engineering process was guided by information security director Seamus Tuohy. The report was edited by Sophie Richardson, China director. Dinah PoKempner, general counsel, and James Ross, legal and policy director, provided legal review. Joseph Saunders, deputy program director, provided program review. An associate in the Asia Division provided editing and production assistance. The report was prepared for publication by Fitzroy Hepkins, administrative manager.

We are grateful to Cure53 for their work in reverse engineering the IJOP app.

We are particularly indebted to Greg Walton, an independent expert on cyber security and mass surveillance in China, who volunteered countless hours throughout this report’s research process, providing technical advice and invaluable insights. He also commented on an early version of the report. 

We are grateful to another external reviewer who also commented on an early version of the report but who does not wish to be named.

We thank all the people from Xinjiang who shared their stories with us as part of the research for our September 2018 report.

 

 

[1] “Big Data Fuels Crackdown in Minority Region,” Human Rights Watch news release, February 26, 2018, https://www.hrw.org/news/2018/02/26/china-big-data-fuels-crackdown-minority-region.

[2] Both CETC and HBFEC have been added to the US Department of Commerce’s export control list in August 2018 for posing a “significant risk” to US national security, and are subjected to restrictions to US dual military and civilian use technologies. Sarah Zheng, “US slaps export controls on dozens of Chinese firms over ‘threat to national security’ as trade tensions escalate,” South China Morning Post, August 2, 2018, https://www.scmp.com/news/china/diplomacy-defence/article/2157932/us-slaps-export-controls-dozens-chinese-firms-over (accessed April 15, 2019). For more information about the CETC and its numerous subsidiaries—many of them do not acknowledge relationships to CETC and thus are difficult to track—see Matthew Luce, “A Model Company: CETC Celebrates 10 Years of Civil-Military Integration,” China Brief , vol. 12 issue 4, February 21, 2012, https://jamestown.org/program/a-model-company-cetc-celebrates-10-years-of-civil-military-integration/ (accessed April 15, 2019).

[3] Shai Oster, “China Tries Its Hand at Pre-Crime,” Bloomberg, March 4, 2016, https://www.bloomberg.com/news/articles/2016-03-03/china-tries-its-hand-at-pre-crime (accessed March 26, 2019).

[4] “Siyeke Village Work Team Is Using the Xinjiang Home Visit App Well in Promoting Informationization of Home Visit Work (斯也克村工作队扎实用好“新疆入户走访”APP 推动入户走访信息化),” Xinjiang Zhongtai State-owned Company official WeChat account (中泰零距离), July 31, 2017, https://mp.weixin.qq.com/s/x2owHxX13F0iVC36u_bqzw (accessed March 28, 2019); “Karakax County Held a Training on How to Use the IJOP App and the Home Visit Collection System App (墨玉县召开一体化APP和入户采集系统APP操作使用培训会),” Organizing Department of the Karakax County CCP Committee official WeChat account (墨玉党建), February 24, 2017, https://mp.weixin.qq.com/s/UFfVIC1O-Dh0UmElNcbCRg (accessed March 28, 2019); “Autonomous Prefecture Office of the Fanghuiju Leading Group Held a Work Meeting (自治州“访惠聚”驻村工作领导小组办公室召开工作会议),” Organizing Department of the Changji Hui Autonomous Prefecture CCP Committee official WeChat account run by the(昌吉访惠聚), April 13, 2018,  https://mp.weixin.qq.com/s/rjKLM67F8ujeae5Ws0Ik9A (accessed March 28, 2019).

[5] The interviewee was quoted in “Big Data Fuels Crackdown in Minority Region,” Human Rights Watch news release, February 26, 2018, https://www.hrw.org/news/2018/02/26/china-big-data-fuels-crackdown-minority-region (accessed March 25, 2019).

[6] Human Rights Watch found the following copyright information in the IJOP app: “Copyright © 2014-2016 HBFEC.” We were able to further verify that the IJOP app was indeed developed by HBFEC by matching its digital certificate with that of another app officially release by HBFEC. HBFEC was founded by CETC and until 2017—when the IJOP was already developed and being deployed—it was fully-owned by CETC. CETC sold HBFEC in 2017 to GCI Science & Technology Co., Ltd (广州杰赛科技股份有限公司), but continues to partly own—at nearly 40 percent ownership—HBFEC, through two of its research institutes (CETC’s number 7 and number 14 research institutes). For the major owners of GCI Science & Technology Co., Ltd, see “Jesse Technology (002544) Major Shareholder (杰赛科技(002544)  主要股东),”Sina Finance (新浪财经), October 26, 2018, http://vip.stock.finance.sina.com.cn/corp/go.php/vCI_StockHolder/stockid/002544/displaytype/30.phtml (accessed April 15, 2018).

[7] “Acro®UC Unified Communication System (Acro®UC统一通信系统),” CETC, March 21, 2014, http://www.cti.ac.cn/Products/system/network/Switching/2014/0321/699.html (accessed March 27, 2019); “Unified Communication (统一通信),” HBFEC, undated, http://www.hbfec.com.cn/showpr.php?id=185 (accessed March 27, 2019).

[8] For more information about these interviewees, see Human Rights Watch, “Eradicating Ideological Viruses”: China’s Campaign of Repression Against Xinjiang’s Muslims, September 9, 2018, https://www.hrw.org/report/2018/09/09/eradicating-ideological-viruses/chinas-campaign-repression-against-xinjiangs#.

[9] “Chen Quaguo: Build a Strong Copper and Iron Counter-Terrorism Wall to Ensure Social Stability in Xinjiang (陈全国:筑起反恐维稳的铜墙铁壁 确保新疆社会大局和谐稳定),” China National Radio, August 19, 2017, http://news.cnr.cn/native/city/20170819/t20170819_523908751.shtml (accessed March 28, 2019). For an explanation of some of the terms used in this quotation, see Human Rights Watch, Tibet: A Glossary of Repression, interactive material, June 19, 2017, https://www.hrw.org/video-photos/interactive/2017/06/20/tibet-glossary-repression.

[10] John Garnaut, “Engineers of the Soul: Ideology in Xi Jinping's China,” a speech reposted on Sinocism Blog , January 17, 2019, https://nb.sinocism.com/p/engineers-of-the-soul-ideology-in (accessed March 28, 2019).

[11] Human Rights Watch, World Report 2019, China chapter, https://www.hrw.org/world-report/2019/country-chapters/china-and-tibet.

[12] “Ilham Tohti: 2016 Martin Ennals Award Laureate for Human Rights Defenders,” Human Rights Watch news release, October 11, 2016, https://www.hrw.org/news/2016/10/11/ilham-tohti-2016-martin-ennals-award-laureate-human-rights-defenders; “China urged to release Panchen Lama after 20 years,” BBC, May 17, 2015, https://www.bbc.com/news/world-asia-china-32771242 (accessed April 15, 2018).  

[13] Priyanka Juneja, “China’s Hukou System,” the Diplomat, July 14, 2017, https://thediplomat.com/2017/07/chinas-hukou-system/ (accessed April 15, 2018); Andrew Jacobs, “A Rare Look Into One’s Life on File in China,” New York Times, March 15, 2015, https://sinosphere.blogs.nytimes.com/2015/03/15/a-rare-look-into-ones-life-on-file-in-china/ (accessed April 15, 2018); Xiaobo Lu and Elizabeth J. Perry, ed., Danwei: The Changing Chinese Workplace in Historical and Comparative Perspective, (London: Routledge, 1997).

[14] Maya Wang (Human Rights Watch), “China’s Dystopian Push to Revolutionize Surveillance,” commentary, Washington Post, August 18, 2017, https://www.hrw.org/news/2017/08/18/chinas-dystopian-push-revolutionize-surveillance (accessed March 25, 2019). See also Zhou Yongkang, “Strengthen and Facilitate Social Stability and Harmony (加强促进社会稳定和谐),” People’s Daily, October 26, 2006.

[15] Edward Schwarck, “Intelligence and Informatization: the Rise of the Ministry of Public Security in Intelligence Work in China,” The China Journal, vol. 80, March 28, 2018, https://www.journals.uchicago.edu/doi/abs/10.1086/697089 (accessed March 27, 2019).

[16] Ibid. See also Greg Walton, China’s Golden Shield: Corporations and the Development of Surveillance Technology in the People’s Republic of China, (Montreal: International Centre for Human Rights and Development, 2001).  

[17] Edward Schwarck, “Behind the Golden Shield: China Reforms Public Security Intelligence,” China Brief , vol. 17 issue 16, December 8, 2017, https://jamestown.org/program/behind-golden-shield-china-reforms-public-security-intelligence/ (accessed April 15, 2018). There is a rich policy and academic literature on the human rights implications of ILP. See, for example, Organization for Security and Co-operation in Europe, “OSCE Guidebook: Intelligence-Led Policing,” TNTD/SPMU Publication Series, Vol. 13 (June 2017), https://www.osce.org/chairmanship/327476?download=true.

[18] Ibid. In addition, the IJOP also owes its influence to a new People’s Liberation Army doctrine, a hi-tech C4ISR (command, control, communications, computers, intelligence, surveillance, and reconnaissance) “system of systems.” The application of this military doctrine, and the supporting technology, to civilian policing, as exhibited in the IJOP, is a worrying development that indicates the extent to which policing in Xinjiang is based on a military model. For C4ISR, see Kevin McCauley, “PLA System of Systems Operations: Enabling Joint Operations,” Jamestown Foundation, January 2017, https://jamestown.org/product/pla-system-systems-operations-enabling-joint-operations-kevin-mccauley/.

[19] For a discussion about how “stability maintenance” became a top CCP priority, see Carl Minzner and Wang Yuhua, “Rise of the Chinese Security State,” China Quarterly, vol. 222 (2015): 339-359, accessed March 28, 2019, doi.org/10.1017/S0305741015000430.

[20] Adrian Zenz, “In Xinjiang and Tibet, Police Surveillance 'Exceeds East Germany,'” The News Lens, February 14, 2018, https://international.thenewslens.com/article/89867 (accessed March 27, 2019).

[21] “Zhejiang Maker: Facial Recognition Used at G20 Summit (浙江创客:人脸识别系统 “黑”科技服务G20峰会),” Zhejiang Radio and TV Group (浙江广播电视集团), August 17, 2016, http://n.cztv.com/news/12183147.html (accessed March 27, 2019)

[22] It is unclear exactly when the Chinese government started installing CCTV cameras across the country, but a 2005 “opinion” document issued by the central government (CCP Central Committee Political and Legal Committee and the CCP Committee for Comprehensive Management of Public Security’s Joint Opinion on Deepening the Development of Security  (中央政法委员会、中央社会治安综合治理委员会关于深入开展平安建设的意见)) is believed to have spurred some of the installations. Shenzhen, for example, started installing them en masse since 2006, as part of the Public Security Bureau’s Safe City initiative. See “Shenzhen Has Installed 1.34 Million Surveillance Cameras Since 2006 (自2006年来 深圳共建134万摄像头),” Security.asmag.com.cn (防知识网), May 19, 2017, http://security.asmag.com.cn/news/201705/91285.html (accessed March 27, 2019). Efforts to increase CCTV coverage in China’s urban areas are generally known as Project Skynet (天网工程).  Equivalent efforts to expand surveillance camera coverage in the rural areas, known as Project Sharp Eyes (雪亮), started around 2016. See Chen Shixian and Li Zhen, “What is Project Skynet (“天网”网什么),” People’s Weekly (人民周刊), Issue 20, 2017, http://paper.people.com.cn/rmzk/html/2017-11/20/content_1825998.htm. China had 176 million surveillance cameras in public and private spaces in operation in 2016, and the speed of growth is expected to see that screen more than triple to reach 626 million by 2020, according to market research by IHS Markit. See “China Has Installed 176 Million Surveillance Cameras and the Market Is Still Expanding  (中国安装了 1.76 亿个监控摄像头,这市场还在增长),” Q Daily, November 21, 2017,  https://www.qdaily.com/articles/47431.html (accessed March 27, 2019).

[23] Maya Wang (Human Rights Watch), “China’s Dystopian Push to Revolutionize Surveillance,” commentary, Washington Post, August 18, 2017, https://www.hrw.org/news/2017/08/18/chinas-dystopian-push-revolutionize-surveillance; “Police DNA Database Threatens Privacy,” Human Rights Watch news release, May 15, 2016, https://www.hrw.org/news/2017/05/15/china-police-dna-database-threatens-privacy; “Voice Biometric Collection Threatens Privacy,” Human Rights Watch news release, October 22, 2017, https://www.hrw.org/news/2017/10/22/china-voice-biometric-collection-threatens-privacy; Josh Chin and Liza Lin, “China’s All-Seeing Surveillance State Is Reading Its Citizens’ Faces,”  Wall Street Journal, June 26, 2017, https://www.wsj.com/articles/the-all-seeing-surveillance-state-feared-in-the-west-is-a-reality-in-china-1498493020 (accessed April 15, 2019)

[24] Even in democracies, surveillance powers can erode democratic institutions and give governments a sinister degree of power over their citizens. But the existence of privacy laws, independent courts, a free media, and civil society organizations help to expose and check these developments. Human Rights Watch, Dark Side: Secret Origins of Evidence in US Criminal Cases, January 9, 2018, https://www.hrw.org/report/2018/01/09/dark-side/secret-origins-evidence-us-criminal-cases; Human Rights Watch, “Not in it for Justice”: How California’s Pretrial Detention and Bail System Unfairly Punishes Poor People, April 22, 2017, https://www.hrw.org/report/2017/04/11/not-it-justice/how-californias-pretrial-detention-and-bail-system-unfairly.

[25] Occasionally lawyers and individuals have filed lawsuits against Chinese public security agencies for collecting their biometric information in violation of the law, though the outcomes of these cases are unclear. At any rate, China’s legal system provides a limited role for judicial precedents. For such a case, see Li Dawei, “An Analysis on the Legitimacy of Basic Data Collection by Public Security: An Administrative Litigation Case Study (浅析公安基础信息采集的合法性 ——从一则行政诉讼案说起),” Jiangsu Xieda Lawfirm (江苏谐达律师事务所), March 15, 2017, http://www.xdlvshi.com/shownews.asp?id=846.  

[26] For example, in a 2019 work report, Xinjiang Governor Shohrat Zakir said, “Keep implementing the Strike Hard Campaign and maintain a consistently hardline approach towards the ‘Three Forces’; Strengthen prevention and containment measures while building a three-dimensional, informatized prevention and containment system regarding law and order (持续开展严打专项斗争,始终保持对“三股势力”的严打高压态势。全面加强社会面防控,构建起了立体化、信息化的社会治安防控体系。).” See “Work Report of the Xinjiang Uyghur Automounts Region (新疆维吾尔自治区政府工作报告),” Xinjiang Daily (新疆日报), February 14, 2019, http://district.ce.cn/newarea/roll/201902/14/t20190214_31476190.shtml (accessed March 25, 2019).  

[27] “Xinjiang Bombing an Atrocity, Restraint Needed,” Human Rights Watch news release, May 23, 2014, https://www.hrw.org/news/2014/05/23/china-xinjiang-bombing-atrocity-restraint-needed; “Credibly Investigate Xinjiang Blast,” Human Rights Watch news release, September 22, 2016, https://www.hrw.org/news/2016/09/22/china-credibly-investigate-xinjiang-blast; “Allow Independent Investigations Into Xinjiang Violence,” Human Rights Watch news release, November 23, 2015, https://www.hrw.org/news/2015/11/23/china-allow-independent-investigations-xinjiang-violence. The Chinese government has attributed some incidents to the East Turkistan Islamic Movement (ETIM). However, the group’s existence, strength, and threat level has been debated. The Turkistan Islamic Party (TIP), which many consider to be part of ETIM, has claimed responsibility for the Urumqi and Beijing attacks. See Jonathan Kaiman, “Islamist group claims responsibility for attack on China's Tiananmen Square,” the Guardian, November 25, 2013, https://www.theguardian.com/world/2013/nov/25/islamist-china-tiananmen-beijing-attack (accessed July 10, 2018); Michael Martina and Megha Rajagopalan, “Islamist group claims China station bombing: SITE,” Reuters, May 14, 2014, https://www.reuters.com/article/us-china-xinjiang/islamist-group-claims-china-station-bombing-site-idUSBREA4D07H20140514 (accessed July 10, 2018). Some Uyghurs have also joined armed extremist groups in Syria. For an overview of Chinese nationals joining extremist groups in Syria, see Colin P. Clarke and Paul Rexton Kan, “Uighur Foreign Fighters: An Under-examined Jihadist Challenge,” International Center for Counter-Terrorism, November 2017, https://icct.nl/wp-content/uploads/2017/11/ClarkeKan-Uighur-Foreign-Fighters-An-Underexamined-Jihadist-Challenge-Nov-2017-1.pdf; Jacob Zenn, “An Overview of Chinese Fighters and Anti-Chinese Militant Groups in Syria and Iraq,” China Brief, vol. 14 issue 19, October 10, 2014, https://jamestown.org/program/an-overview-of-chinese-fighters-and-anti-chinese-militant-groups-in-syria-and-iraq/; Thomas Joscelyn, “Analysis: The Turkistan Islamic Party’s jihad in Syria,” FDD’s Long War Journal, July 10, 2018, https://www.longwarjournal.org/archives/2018/07/analysis-the-turkistan-islamic-partys-jihad-in-syria.php; and Caleb Weiss, “Turkistan Islamic Party parades in northwestern Syria,” FDD’s Long War Journal, November 5, 2017, https://www.longwarjournal.org/archives/2017/11/turkistan-islamic-party-parades-in-northwestern-syria.php.

[28] Ben Blanchard, “China says 13,000 'terrorists' arrested in Xinjiang since 2014,” Reuters, March 18, 2019, https://www.reuters.com/article/us-china-xinjiang/china-says-13000-terrorists-arrested-in-xinjiang-since-2014-idUSKCN1QZ08T (accessed March 27, 2019).

[29] Outside Xinjiang, there have been numerous reports of public violence involving Han Chinese, the dominant majority ethnic group in China, though the state media generally report the attackers’ motives as being “angry with society” or interpersonal grievances. See, for example, “15 killed in China arson, knife attacks,” AFP, February 9, 2019, https://www.straitstimes.com/asia/east-asia/15-killed-in-china-arson-knife-attacks. Even when the targets are public facilities the authorities tend to characterize the cases as “criminal”—versus political or terrorist—in nature. See, for example, Shannon Tiezzi, “17 Mail Bombs Kill 7 in China's Guangxi Province,” The Diplomat, October 1, 2015, https://thediplomat.com/2015/10/17-mail-bombs-kill-7-in-chinas-guangxi-province/

[30] “Disclose Details of Terrorism Convictions,” Human Rights Watch news release, March 16, 2017, https://www.hrw.org/news/2017/03/16/china-disclose-details-terrorism-convictions (accessed March 26, 2019); Sophie Richardson, “China Bans Many Muslim Baby Names in Xinjiang,” commentary, Human Rights Watch dispatch, April 24, 2017, https://www.hrw.org/news/2017/04/24/china-bans-many-muslim-baby-names-xinjiang.

[31] “Minority Region Collects DNA from Millions,” Human Rights Watch news release, December 13, 2017, https://www.hrw.org/news/2017/12/13/china-minority-region-collects-dna-millions. Human Rights Watch has found evidence suggesting that elsewhere in China, the police have compelled ordinary people unconnected to crimes to provide biometrics including DNA and voice samples and input them into centralized and searchable databases. However, no other regions in China have compelled an entire population to submit these biometrics on such a large scale. See “Police DNA Database Threatens Privacy,” Human Rights Watch news release, May 15, 2016, https://www.hrw.org/news/2017/05/15/china-police-dna-database-threatens-privacy; ” Voice Biometric Collection Threatens Privacy,” Human Rights Watch news release, October 22, 2017, https://www.hrw.org/news/2017/10/22/china-voice-biometric-collection-threatens-privacy.

[32] Voice Biometric Collection Threatens Privacy,” Human Rights Watch news release, October 22, 2017, https://www.hrw.org/news/2017/10/22/china-voice-biometric-collection-threatens-privacy.

[33] Ibid.; “Police DNA Database Threatens Privacy,” Human Rights Watch news release, May 15, 2016, https://www.hrw.org/news/2017/05/15/china-police-dna-database-threatens-privacy.

[34] For the use of targeted digital surveillance against the Uyghur diaspora, see Stevens Le Blond, Adina Uritesc, Cédric Gilbert, Zheng Leong Chua and Prateek Saxena, “A Look at Targeted Attacks Through the Lens of an NGO,” (San Diego: USENIX Association, 23rd USENIX Security Symposium, August 20-22, 2014), https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-blond.pdf (accessed March 28, 2019).

[35] Adrian Zenz and James Leibold, “Chen Quanguo: The Strongman Behind Beijing’s Securitization Strategy in Tibet and Xinjiang,” China Brief, vol.17 issue 12, https://jamestown.org/program/chen-quanguo-the-strongman-behind-beijings-securitization-strategy-in-tibet-and-xinjiang/ (accessed March 27, 2019).

[36] Kang Jingling, “A Summary of Research on Community Grid Management in China (国内社区网格化管理研究综述),” Chinese Academy of Social Sciences(中国社会科学网), October 28, 2013, http://www.cssn.cn/sf/bwsf_gl/201312/t20131205_895684.shtml.

[37] “Minority Region Collects DNA from Millions,” Human Rights Watch news release, December 13, 2017, https://www.hrw.org/news/2017/12/13/china-minority-region-collects-dna-millions. Thermo Fisher Scientific announced in February 2019, that it would stop the sale and servicing of equipment to Xinjiang police. Natasha Khan, “American Firm, Citing Ethics Code, Won’t Sell Genetic Sequencers in Xinjiang,” Wall Street Journal, February 20, 2019, https://www.wsj.com/articles/thermo-fisher-to-stop-sales-of-genetic-sequencers-to-chinas-xinjiang-region-11550694620 (accessed March 25, 2019).

[38] Suilee Wee, “China Uses DNA to Track Its People, With the Help of American Expertise,” New York Times, https://www.nytimes.com/2019/02/21/business/china-xinjiang-uighur-dna-thermo-fisher.html (March 25, 2019).

[39] “Big Data Fuels Crackdown in Minority Region,” Human Rights Watch news release, February 26, 2018, https://www.hrw.org/news/2018/02/26/china-big-data-fuels-crackdown-minority-region (accessed March 25, 2019).

[40] Follow-up research by Human Rights Watch shows that Hikvision, a CETC subsidiary, won a contract in 2017 to supply equipment to the IJOP. Charles Rollet, “In China’s Far West, Companies Cash in on Surveillance Program That Targets Muslims,” Foreign Policy, June 13, 2018, https://foreignpolicy.com/2018/06/13/in-chinas-far-west-companies-cash-in-on-surveillance-program-that-targets-muslims/ (accessed April 15, 2019).

[41] Ibid.

[42] The information collected includes the name and address of the delivery company, who received the packages, whether the packages were received by the person named on the package, package number, the phone number of the person who has received the package, package type, the date and time for signing the package, x-ray photos of the package, and photos of the package before and after it has been opened.

[43] References to this app being used by local government officials in Xinjiang include, for example, “Bearing responsibility in our hearts, serving is our mission: remembering the outstanding former Communist Party Secretary of the Biesituobie Township of Xinyuan County, You Qisheng(初心是责任 使命是奉献——追记自治州优秀共产党员、新源县别斯托别乡原党委书记尤旗升),” Yili CCP Organization Department official WeChat account (伊犁组工), December 11, 2018, https://mp.weixin.qq.com/s/cEqB5kNviWWJqtnZFL5cQw (accessed March 26, 2019); “Altai City Jiefang Road Street to carry out information collection and entry using home visit app (阿勒泰市解放路街道开展入户走访APP信息采集录入),” Altai City Government Jiefang Road Office official WeChat account (解放路关注), September 20, 2017, https://mp.weixin.qq.com/s/kaQ6IIxTr4oP2YAcWO3k0w (accessed March 26, 2019).

[44]  For references to this app being used in Xinjiang, see, for example, “Kilzisu Kirghiz Fully Accomplishes ‘Basic Work Assistant’ Phone App Training (克州圆满完成“基础工作小助手”手机APP送教培训工作),” Kizilsu Kirghiz Autonomous Prefecture Public Security Bureau Political Department official WeChat account (克州警事儿), March 6, 2017, https://mp.weixin.qq.com/s/84l6deRuq_wdcTMXejkRiA (accessed March 26, 2019).

[45] “Small Data is related to big interests: Saitula Town starts a new round of data collection using home visit app (小数据关系大利益 ——赛图拉镇开启新一轮入户走访APP信息录入工作),” Saitula Town in Pishan County, Xinjiang public WeChat account (赛图拉镇零距离), November 29, 2017, https://mp.weixin.qq.com/s/hKPVgRUWLWfY5H13al263g (accessed March 26, 2019); “Seriously implement multiple measures for the benefit of the welfare of the people (多措并举重实做 笃行务实为民生),” Emin County CCP Commission on Disciplinary Inspection public WeChat account (额敏清风), May 11, 2017. Post has since been deleted, but a copy is available upon request.

[46] An acronym that stands for “Visit the People, Benefit the People, and Get Together the Hearts of the People” (访民情、惠民生、聚民心).

[47] “Visiting Officials Occupy Homes in Muslim Region,” Human Rights Watch news release, May 13, 2018, https://www.hrw.org/news/2018/05/13/china-visiting-officials-occupy-homes-muslim-region (accessed March 26, 2019).

[48] Cadres participating in the fanghuiju programs are trained to use the IJOP app. See, for example: “Agedala Town Planning Committee Trains Fanghuiju Work Teams on IJOP App (阿格达拉镇筹建委员会开展对访惠聚工作队开展一体化联合作战平台手机客户端(APP)使用培训),” August 29, 2017, Qinghe County Government (青河县人民政府), http://www.xjqh.gov.cn/Item/78040.aspx (accessed January 25, 2018);

[49] “Assistant Bureau Chief Fang Xia Visits and Inspects Fanghuiju Work Teams (方侠副厅长调研“访惠聚”驻村工作并看望驻村工作队),” Xinjiang Uyghur Autonomous Region Department of Agricultural and Rural Affairs (新疆维吾尔自治区农业农村厅), July 24, 2017, http://www.xj-agri.gov.cn/gjxw/37501.jhtml (accessed March 26, 2019).

[50] Human Rights Watch, “Eradicating Ideological Viruses”: China’s Campaign of Repression Against Xinjiang’s Muslims, September 9, 2018, https://www.hrw.org/report/2018/09/09/eradicating-ideological-viruses/chinas-campaign-repression-against-xinjiangs#.

[51] See, for example, “Fanghuiju work warns people’s hearts (心系“访惠聚” 慰问暖人心),” Agricultural Department’s Fanghuiju Work Team in Ateqiabisi Village, Qiaolaketiereke Town, Tekesi County (农业局驻特克斯县乔拉克铁热克镇阿特恰比斯村工作队), February 5, 2018, http://www.zgtks.gov.cn/shishixinwen/zwdt/2018-02-05/55504.html (accessed December 7, 2018).

[52] “The Opening Ceremony of the National Engineering Laboratory for Social Security Risk Awareness and Prevention and Control of Big Data Applications in Gaoxin (Xinshi) District, Urumqi, Xinjiang (社会安全风险感知与防控大数据应用国家工程实验室在新疆乌鲁木齐高新区(新市区)揭牌),” yaxin.com (亚心网), July 24, 2017, http://news.sina.com.cn/o/2017-07-24/doc-ifyihrwk2049751.shtml (accessed October 24, 2018).

[53] “National engineering laboratory director’s fund review meeting was successfully held (国家工程实验室主任基金项目评审会成功举办),” Sohu.com (搜狐), http://www.sohu.com/a/240423264_757363  (accessed March 25, 2019);  “Notice by the National Engineering Laboratory for Social Security Risk Awareness and Prevention and Control of Big Data Applications Regarding the review of the 2017-2018 director’s fund projects (社会安全风险感知与防控大数据应用国家工程实验室关于开展2017-2018年度主任基金项目复评工作的通知),” Sohu.com (搜狐), http://www.sohu.com/a/238144191_757363. The latter gives an official list of 36 candidates. It is unclear who are the grantees, but a post by one of the finalists includes a partial list. See “Do you have an honor like this? (这么swag的荣誉,你们有吗?),” Zhihu.com (知乎), https://zhuanlan.zhihu.com/p/46422703 (accessed March 28, 2019). 

[54] Kate Greene, “Reality Mining,” MIT Technology Review, February 19, 2008, http://www2.technologyreview.com/news/409598/tr10-reality-mining/ (accessed March 26, 2019).

[55] Rogier Creemers made this point in Mara Hvistendahl “A revered rocket scientist set in motion China’s mass surveillance of its citizens,” Science, March 14, 2018, https://www.sciencemag.org/news/2018/03/revered-rocket-scientist-set-motion-china-s-mass-surveillance-its-citizens (accessed March 26, 2019). The Chinese government’s interests in engineering and controlling reality has its roots in Chinese communist ideology. Former China journalist and Australian government advisor John Garnaut made this point in a 2017 speech: “By creating a fully enclosed system, controlling all incentives and disincentives, and ‘breaking’ individuals physically, socially and psychologically, they found they could condition the human mind in the same way that Pavlov had learned to condition dogs in a Moscow laboratory a few years earlier.” Garnaut, “Engineers of the Soul: Ideology in Xi Jinping’s China,” a speech reposted by Sinocism Blog, January 17, 2019, https://nb.sinocism.com/p/engineers-of-the-soul-ideology-in.

[56] The names of these three broad functions come from a screenshot of the IJOP app that allows officials to have an overview of the tasks accomplished by those whom they supervise. See Appendix II for screenshots relevant for the supervision and scoring of officials in the IJOP app.

[57] Megvii, the owner of Face++, states it “services the Ministry of Public Security” and describes its Urban Eyes Intelligent Security System as “used in 32 provincial and municipal police bureaus.” Megvii homepage, https://megvii.com/ (accessed May 29, 2019) and “Megvii (Face++) Appears Together with the Ministry of Science and Technology in 2018 Shanghai International Technology Import-Export Exchange Expo (旷视科技Face++联合科技部重磅亮相2018上交会),” https://megvii.com/newscenter/42 (accessed May 29, 2019).

[58] Megvii (Face++), through its representative Brunswick Group, explained that the Face++ code is available to developers on a publicly accessible platform, and that the account information found in the IJOP was not actively connecting to their servers.  It stated it has no relationship with IJOP. Email Correspondence from Megvii to Human Rights Watch, May 1 and May 27, 2019.  Human Rights Watch agrees that it is not unusual for developers to leave non-functional code in an app. Subsequent analysis of the app showed that the Face++ facial recognition function was not connected to the user interfaces in the IJOP app that police would use.

[59] Kern, Benjamin D., “Whacking, Joyriding And War-Driving: Roaming Use Of Wi-Fi And The Law,” CIPerati, vol. 2 issue 4, American Bar Association (December 2005), http://apps.americanbar.org/buslaw/committees/CL320010pub/newsletter/0009/ (accessed April 15, 2019).

[60] In Chinese, “mainland” is often used to denote parts of China exclusive of minority regions such as Xinjiang and Tibet, as well as of the “special administrative regions” of Hong Kong and Macau.

[61] Administrative rights are permissions granted by administrators of the system to some users that allow them to create, delete, and modify items and settings.

[62] The 51 “suspicious”  internet tools are: LINE, Voxer, SKYPE, DiDi, WhatsApp, ChatOn, KakaoTalk, Viber, Path, kik, Telegram, Hike Message, COCO, IM+, Badoo, Tango,   Whisper, Raidcall, Hangouts, Google TALK, nimbuzz, hi, iMessage, Zello, KeeChat, Diaspra, wickr, MSN, pqchat, BBM, talkbox, IPSec, Hotspot VPN, L2TP, freevpn, PPTP, Fqrouter, ark vpn, 易联 (Payeco), Seed4Me VPN, vpn unlimited, super vpn, Onavo Protect, OpenVPN, vpn dialogs, easyVPN, VPN Shield, GreenVPN, Astrill VPN, VPN for Phone, and Global VPN.

 

[63]  This practice would be consistent with government documents and social media reports about Xinjiang’s Strike Hard Campaign that describe internal migrants as one of the major social groups targeted for mass surveillance and control. See, for example, Point 14 “Strengthen the Management of Internal Migrants” in the “Baluntai Town Implementation Plan on Counter-Terrorism, Stability Maintenance, and on Winning ‘The Three Tough Wars’ and ‘the People’s War’ (巴伦台镇反恐维稳打好 “三场硬仗” 打赢 “一场人民战争” 的实施方案),” May 30, 2017. The document was posted on Hejing County Agricultural Anti-Corruption Net (和静县农廉网), a website run by the Hejing County Commission on Disciplinary Inspection (和静县纪律检查委员会) and the Hejing County Agricultural Economics Bureau (和静县农经局), though it has since been deleted (copy on file with Human Rights Watch).

[64] Officers have to choose from a drop-down menu whether the person is “studying,” “doing business,” “being a tourist,” or “other.”

[65] An objective known in Chinese as “Anti-Reflux” (防回流).

[66] See, for example, “Notice on the Breakdown of Major inspection Duties of the Kashgar Region in 2018  (关于印发《喀什地区2018年督查工作要点责任分解方案》的通知),” Kashgar Government (喀什政府信息网),   http://www.kashi.gov.cn/Government/PublicInfoShow.aspx?ID=2851 (accessed June 15, 2018); and “An Overview of the Political and Legal Work in the Autonomous Regions Since the 18th National Congress of the Communist Party of China (破浪前行谋发展 砥砺奋进铸辉煌——党的十八大以来自治州政法工作综述),”  July 7, 2017, http://www.bzsmlt.com/zxqymh/zdtw/3564.jhtml  (accessed August 17, 2018).

[67] People have to obtain approvals through multiple administrative agencies and Turkic Muslims have complained that it is nearly impossible for them to obtain such approvals. “Passports Arbitrarily Recalled in Xinjiang,” Human Rights Watch news release, November 21, 2016, https://www.hrw.org/news/2016/11/21/china-passports-arbitrarily-recalled-xinjiang.

[68] While the wording in this screenshot seems ambiguous, the source code includes the term “PassportWarnActivity.” Other missions labelled with “warn” or “warning” require officials to look into (核查) irregularities, such as mismatches between the person and the ID they are using.

[69] The code name “913” is repeatedly mentioned in the source code of this collection of pages in the IJOP app. The code name “913” was also mentioned by a Kashgar resident in an interview published in August 2018. Emily Feng, “Crackdown in Xinjiang: Where have all the people gone?”  Financial Times,  August 5, 2018 https://www.ft.com/content/ac0ffb2e-8b36-11e8-b18d-0181731a0340 (accessed March 27, 2019). Alfiya, the Kashgar resident, is quoted saying “many people, mostly the men, were imprisoned for so-called ‘913’ crimes: having forbidden digital content on their phones.”

[70] It is unclear, however, how the IJOP system identifies someone or their phone as a 913 target—i.e., what sources of information are available to the IJOP system to make such an identification, and whether the system “finds out” through more of a manual process (such as during manual phone searches) or through a more technical process.  There were reports earlier that some Xinjiang residents have been required to install spyware on their phones, but the relationship between this spyware and the IJOP is unclear. Joseph Cox, “Chinese Government Forces Residents To Install Surveillance App With Awful Security,” Motherboard, https://motherboard.vice.com/en_us/article/ne94dg/jingwang-app-no-encryption-china-force-install-urumqi-xinjiang (accessed March 27, 2019).

[71] This includes location of base station (Local Area Code), which is used to identify the sector in which the base transceiver station is situated, and Cell ID, a unique number used to identify each base transceiver station.

[72] This is the “CheckNineInfoActivity” in the IJOP app source code.

[73] However, there are references to “violence media” (暴恐音视频) in the source code, all of them in the pages related to Operation 913.

[74] Human Rights Watch interview with Nurmuhemmet (pseudonym), who left Xinjiang in 2017, June 20, 2018.

[75] Ibid.

[76] Human Rights Watch interview with Inzhu (pseudonym), 50, a former teacher with three daughters who left Xinjiang in 2017 and whose husband is in a political education camp, May 20, 2018.

[77] See  “[Academics] Law and Order Risk Warning Methods Based on Unusual Power Consumption Patterns (「學術」基於異常用電行為識別的社會治安風險預警方法),” KK News, March 27, 2017, https://kknews.cc/zh-hk/tech/k8ylx9q.html (academic article by researchers affiliated with CETC and the Xinjiang Public Security Bureau Special Investigation Unit discussing how to use individuals’ patterns of electricity use to predict their socio-political threat level).

[78] “Implementation of ‘Real Name’ Registration System Begins Today at Some Gas Stations in Xinjiang (今起疆内部分加油站实行实名制),” Xinjiang Cable TV (新疆卫视), July 1, 2016, https://item.btime.com/30o95hlkbvu8mcaecs1b1e6kiph.

[79]The drop-down menu options are: “Not selected”; “Borrowed [car]”; “Bought/Sold [car]”; “Rental [car]”; “Hired [car]”; and “Other”.

[80]The drop-down menu options are: “Not selected”; “Haven’t yet cancelled the account”; “Lent it to someone else”; “Lost”; and “Other”.

 

[81] One plausible explanation is the “data doors” at some of Xinjiang’s checkpoints, which covertly gather the identifying information of people’s electronic devices and feed such information into the IJOP system, enables the IJOP system to pick out such a mismatch.

[82] The drop-down menu choices are: “Not selected”; “Lent it to someone else; “Opened an account [using that person’s identity] without that person’s permission”; and “Other”.

[83] Human Rights Watch interview with Aylin (pseudonym), university student who is pursuing an education abroad and whose mother is in a political education camp, location withheld, May 19, 2018.

[84] Screen 22 makes reference to “data doors” (数据门). Procurement documents related to the IJOP give their full names (三维人像数据门). See, for example, “Tender Award Notice Naming the Only Supplier for Stating that Checkpoints of Hotan City Public Security Bureau (和田市公安局治安检查站项目单一来源采购预中标公公示公告),” Bidcenter.com.cn (采招网), February 6, 2017, http://www.bidcenter.com.cn/newscontent-34635681-4.html

[85] Human Rights Watch interview with former detainee Ehmet (pseudonym), May 15, 2018.

[86] Ibid.

[87] Human Rights Watch interview with former detainee Alim (pseudonym), May 29, 2018.

[88] Human Rights Watch interview with former detainee Nur (pseudonym), March 22, 2018.

[89] It is unclear if Xinjiang authorities have published a formal list of contraband items for private vehicles. In Xinjiang’s capital, Urumqi, all liquids – including water – lighters, and powders are banned from public transport. “All Urumqi Public Buses Ban Liquids, Lighters (乌市所有公交车禁带液体、打火机),” Legal Daily (法制网), July 25, 2014, http://www.legaldaily.com.cn/index/content/2014-07/25/content_5687467.htm (accessed August 14, 2018);“All Urumqi Public Buses Ban Liquids, Lighters (乌鲁木齐市所有公交车禁带液体、打火机),” Tianshan (天山网), July 25, 2014, http://news.ts.cn/content/2014-07/25/content_10212180_all.htm (August 14, 2018).

[90] International Covenant on Civil and Political Rights, adopted December 16, 1966, G.A. Res. 2200A (XXI), 21 U.N. GAOR Supp. (No. 16) at 52, U.N. Doc. A/6316 (1966), 999 U.N.T.S. 171, entered into force Mar. 23, 1976, art. 17.

[91] See “The Right to Privacy in the Digital Age,” Report of the Office of the United Nations High Commissioner for Human Rights, June 30, 2014, para. 25, https://www.ohchr.org/en/issues/digitalage/pages/digitalageindex.aspx (accessed March 27, 2019).

[92] See UN General Assembly, “The Right to Privacy in a Digital Age,” Resolution 68/167, A/RES/68/167, January 21, 2014, https://undocs.org/A/RES/68/167 (accessed April 15, 2019); UN Human Rights Council, “Report of the Special Rapporteur on the promotion and protection of human rights and fundamental freedoms

while countering terrorism, Martin Scheinin, A/HRC/13/37, December 28, 2009, https://undocs.org/A/HRC/13/37 (accessed April 15, 2019); and UN Human Rights Council, “The promotion, protection and enjoyment of human rights on the

Internet,” Resolution 20/8, A/HRC/RES/20/8, July 16, 2012, https://documents-dds-ny.un.org/doc/RESOLUTION/GEN/G12/153/25/PDF/G1215325.pdf?OpenElement (accessed April 15, 2019).

[93] Constitution of the People’s Republic of China, art. 40 (“Freedom and privacy of correspondence of citizens of the People’s Republic of China are protected by law. No organization or individual may, on any ground, infringe upon citizens’ freedom and privacy of correspondence, except in cases where, to meet the needs of State security or of criminal investigation, public security or procuratorial organs are permitted to censor correspondence in accordance with the procedures prescribed by law.”).

[94] Zhou Xiaopeng, “Personal Data Protection Law Is Keenly Anticipated” (个人信息保护立法翘首可期), December 16, 2018, Legal Daily (法制网), http://www.legaldaily.com.cn/index_article/content/2018-12/16/content_7720094.htm.

[95] Samm Sacks and Lorand Laskai, “China’s Privacy Conundrum,” Slate, February 7, 2019, https://slate.com/technology/2019/02/china-consumer-data-protection-privacy-surveillance.html.

[96] “The Right to Privacy in the Digital Age,” Report of the Office of the United Nations High Commissioner for Human Rights, June 30, 2014, para. 25, https://www.ohchr.org/en/issues/digitalage/pages/digitalageindex.aspx (accessed March 27, 2019).

[97] For a discussion of the legality of the Ministry of Public Security’s Golden Shield Project, see Zhizheng Wang, “Systematic government access to private-sector data in China,” July 23, 2012, International Data Privacy Law, Volume 2, Issue 4, 1 November 2012, pp. 220–229, https://doi.org/10.1093/idpl/ips017.

[98] These requirements are set out in articles 19 and 20 of the Xinjiang Implementation Methods of the Counter-Terrorism Law (新疆维吾尔自治区实施《中华人民共和国反恐怖主义法》办法), promulgated on July 29, 2016 by the Xinjiang Uyghur Autonomous Region National People’s Congress Standing Committee and effective since August 1, 2016.

[99] Chinese Criminal Procedure Law, art. 130, 148. Article 130 states that in the course of criminal investigations, to “ascertain certain features, conditions of injuries, or physical conditions of a victim or a criminal suspect, a physical examination may be conducted, and fingerprints, blood, urine and other biological samples may be collected. If a criminal suspect refuses to be examined, the investigators, when they deem it necessary, may conduct a compulsory examination.” Article 148 of the Criminal Procedure Law allows criminal investigators to wiretap criminal suspects as well as anyone connected to the crime for serious crimes, including endangering state security, terrorism, organized crime, drug-related crimes, and corruption. Such wiretapping does not require a court warrant – approval from supervisors in the relevant criminal investigation units is adequate under the law; Xinjiang Implementation Measures of the Counter-Terrorism Law, art. 31. Article 31 states that when investigating those suspected of terrorism and extremism, the police can gather people’s biometrics.

[100] Chinese Criminal Procedure Law, art. 135.

[101] Human Rights Watch, “Eradicating Ideological Viruses”: China’s Campaign of Repression Against Xinjiang’s Muslims, September 9, 2018, https://www.hrw.org/report/2018/09/09/eradicating-ideological-viruses/chinas-campaign-repression-against-xinjiangs#.

[102] The Chinese government has increasingly tightened control over VPN services, particularly their provision. It ran a VPN “clean-up” campaign between January 2017 and March 31, 2018, during which individuals in China were punished—one with imprisonment—for offering VPN services. See Celia Chen, “Chinese VPN user fined for accessing overseas websites as part of Beijing’s ongoing ‘clean up’ of internet,” South China Morning Post,  January 7, 2019, https://www.scmp.com/tech/policy/article/2180960/chinese-vpn-user-fined-accessing-overseas-websites-part-beijings-ongoing. See also Sophie Richardson, “China’s Latest Onslaught on the Internet,” commentary, Human Rights Watch dispatch, March 30, 2017, https://www.hrw.org/news/2017/03/30/chinas-latest-onslaught-internet. Also, in April 2017, the Chinese government released a Draft Encryption Law that, if passed, could restrict commercial use of encryption to only pre-approved domestic products. See “Protecting Your Security and Rights Online,” Human Rights Watch news release, December 11, 2018, https://www.hrw.org/news/2018/12/11/protecting-your-security-and-rights-online.

[103] Criminal Procedure Law, art. 153, and the Law on Supervision (中华人民共和国监察法), arts. 29 - 30, give criminal investigators authority to put criminal suspects on wanted lists and track them down.

[104] A data leak discovered in February 2019 involving SenseNet, a facial recognition company helping Xinjiang authorities conduct mass surveillance, suggests that the personal, real-time data of people in Xinjiang is poorly secured. See “China data leak exposes mass surveillance in Xinjiang,” Channel News Asia, February 19, 2019, https://www.channelnewsasia.com/news/asia/china-data-leak-exposes-mass-surveillance-in-xinjiang-11258856.

[105] See UN Committee on Economic, Social and Cultural Rights, General Comment No. 24 (2017) on State obligations under the International Covenant on Economic, Social and Cultural Rights in the context of business activities, E/C.12/GC/24, August 10, 2017.  The preambles to key human rights treaties recognize that ensuring respect for human rights is a shared responsibility that extends to “every organ of society,” not only to states. In addition, the preamble of the International Covenant on Economic, Social and Cultural Rights, to which China is party, recognizes that “individuals” have human rights responsibilities, a term that can encompass juridical persons (including businesses) as well as natural persons.

[106] UN Human Rights Council, Report of the Special Representative of the Secretary-General on the issue of human rights and transnational corporations and other business enterprises, John Ruggie, “Guiding Principles on Business and Human Rights: Implementing the United Nations ‘Protect, Respect and Remedy’ Framework,” A/HRC/17/31, March 21, 2011,http://www.business-humanrights.org/media/documents/ruggie/ruggie-guiding-principles-21-mar-2011.pdf (accessed August 5, 2014) (“Guiding Principles on Business and Human Rights”).

 

Region / Country