Report: Xinjiang Residents Forced to Download Spyware App, Chinese Regime Can Track and Censor Users

Annie Wu
By Annie Wu
April 13, 2018China News
share
Report: Xinjiang Residents Forced to Download Spyware App, Chinese Regime Can Track and Censor Users
A Kazakh woman makes a phone call on June 29, 2017 in Kazakh Autonomous Prefecture of Yili, Xinjiang Uygur Autonomous Region, China. More and more Kazakh living in the mountains are engaged in tourism trade. (Wang He/Getty Images)

When news emerged last July that residents in Xinjiang, located in the northwestern frontiers of China, were required to install a surveillance app onto their mobile phones, it drew the attention of the Open Technology Fund (OTF), a U.S. government-funded program that researches and develops internet freedom technology.

On April 9, the OTF published an analysis of the app’s tech capabilities, revealing the great breadth with which the app can track and monitor a phone user’s activities.

In July 2017, Radio Free Asia (RFA) first reported that authorities in Tianshan district of Urumqi City, the capital of Xinjiang, issued a notice to residents, requesting that all Android phone users in Urumqi download an app called “Jingwang Weishi,” which translates to “defender of a clean internet” in Chinese.

The app was developed in conjunction with Urumqi police and a Chinese tech company, according to a copy of the notice obtained by RFA.

The app would be able to detect “harmful audio, video, photos, ebooks, and other electronic files” related to “violence, terror, and illegal religions,” it said. The app would then prompt the user to delete the files. If the user does not delete them promptly, “the user will be held responsible by law.”

The region of Xinjiang has long been the subject of iron-fisted suppression by the Chinese regime. In recent years, violence between the Uyghur ethnic minority and Han Chinese, who are the ethnic majority in China, has been met with harsh police tactics.

Chinese paramilitary police officers stand guard along a street in Urumqi on May 23, 2014. Xiu Hui, the head of security bureau, labor camp and prison in Xinjiang, was placed under investigation in January 2016. (Goh Chai Hin/AFP/Getty Images)
Chinese paramilitary police officers stand guard along a street in Urumqi, Xinjiang, on May 23, 2014. (Goh Chai Hin/AFP/Getty Images)

Xinjiang residents are subject to surveillance in their everyday lives—from constant security presence in public areas, to requirements to register their ID information for store purchases. In recent months,  residents have been detained in “political education centers,” where they are forced to view propaganda content promoting Chinese identity, according to Human Rights Watch.

The new app is the regime’s latest form of surveillance using high tech innovation. The mention of “terror” in the notice could be a reference to the Chinese regime’s labeling of Uyghurs—a majority of whom are Muslim—as a terror threat, which has been the regime’s justification for persecuting Uyghurs and suppressing their faith.

In July, RFA had reported that 10 women of Kazakh ethnicity were arrested after downloading “Jing Wang.” The police said their crime was posting content the authorities deemed inappropriate on WeChat, a popular Chinese social media platform.

The OTF conducted a security audit of the app and found that it could extract information about the phone’s model, subscriber ID, filenames, and other specs. This allows a third party to easily track the mobile device and its contents.

With “Jing Wang” installed, every file stored on the mobile device is sent to a government server for monitoring.

The app scans the device’s external storage for files, records the names, sizes, pathways, and other specs, then compares them to a list of identifiers from the server. If the app identifies a “suspect” file, it will prompt the user to delete it.

The OTF also found that the information sent to the government server was in plaintext, which meant “someone with a trivial amount of technical knowledge” could easily intercept and manipulate the data.

“Such techniques could be easily extended across the Chinese population or to other repressive environments,” the OTF warned.

The organization published the list of Jing Wang’s targeted identifiers in the hopes that tech experts could help determine what types of content the app has deemed “dangerous.”

From The Epoch Times

 

Recommended Video:

ntd newsletter icon
Sign up for NTD Daily
What you need to know, summarized in one email.
Stay informed with accurate news you can trust.
By registering for the newsletter, you agree to the Privacy Policy.
Comments