<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:snf="http://www.smartnews.be/snf"
     xmlns:media="http://search.yahoo.com/mrss/" >

    <channel>
        <title>The Intercept</title>
        <atom:link href="https://theintercept.com/staff/ryantate/feed/" rel="self" type="application/rss+xml" />
        <link>https://theintercept.com/staff/ryantate/</link>
        <description></description>
        <lastBuildDate>Sun, 17 May 2026 17:04:03 +0000</lastBuildDate>
        <language>en-US</language>
                <sy:updatePeriod>hourly</sy:updatePeriod>
        <sy:updateFrequency>1</sy:updateFrequency>
        <generator>https://wordpress.org/?v=6.9.4</generator>
<site xmlns="com-wordpress:feed-additions:1">220955519</site>
            <item>
                <title><![CDATA[I Want You Back: Getting My Personal Data From Amazon Was Weeks of Confusion and Tedium]]></title>
                <link>https://theintercept.com/2022/03/27/amazon-personal-data-request-dark-pattern/</link>
                <comments>https://theintercept.com/2022/03/27/amazon-personal-data-request-dark-pattern/#respond</comments>
                <pubDate>Sun, 27 Mar 2022 11:00:23 +0000</pubDate>
                                    <dc:creator><![CDATA[Nikita Mazurov]]></dc:creator>
                                		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false"></guid>
                                    <description><![CDATA[<p>I asked Amazon to provide the data it had collected on me. The process was a labyrinthine endurance test.</p>
<p>The post <a href="https://theintercept.com/2022/03/27/amazon-personal-data-request-dark-pattern/">I Want You Back: Getting My Personal Data From Amazon Was Weeks of Confusion and Tedium</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>You can view</u> the information that various websites — like <a href="https://www.facebook.com/help/212802592074644">Facebook</a>, <a href="https://support.google.com/accounts/answer/3024190">Google</a>, and <a href="https://www.linkedin.com/help/linkedin/answer/50191/downloading-your-account-data">LinkedIn</a>, to name a few — have about you by submitting a data request. A corporate data request is a curiously asymmetrical notion: These companies don&#8217;t request your information, they just take it (sometimes <a href="https://www.cesifo.org/en/publikationen/2022/working-paper/facebook-shadow-profiles">even if you don&#8217;t use their services</a>), yet you have to request your own information from them. It&#8217;s a bit like if you have a stalker who&#8217;s been shadowing you around, meticulously documenting everywhere you go, everyone you talk to, and everything you do, who&#8217;s now handing you a form to fill out if you want to see the boxes of files they&#8217;ve been keeping on you. I decided to <a href="https://www.amazon.com/gp/help/customer/display.html?nodeId=GXPU3YPMBZQRWZK2">request my data from Amazon</a>, which courteously affords me the opportunity to join the ranks of the <a href="https://www.wired.com/story/amazon-failed-to-protect-your-data-investigation/">numerous third parties that can also get my data from Amazon</a>.</p>
<h2>The Roach Motel</h2>
<p>The first thing I learned is that Amazon is in no hurry to give you your data, nor does it really encourage you to ask for it in the first place. I couldn&#8217;t even figure out how to navigate to the request page without turning to a search engine. In fact, Amazon seems keen to discourage data requests, as making one is a labyrinthine endurance test of being bounced from one webpage to the next, waiting for weeks, and then downloading, extracting, and combing through dozens of files. Requesting your data from Amazon is an exhausting procession that feels a little bit like a text adventure game designed by Franz Kafka.</p>

<p>Once you&#8217;ve actually made it to the preliminary &#8220;<a href="https://www.amazon.com/gp/help/customer/display.html?nodeId=GXPU3YPMBZQRWZK2">Request Your Personal Information</a>&#8221; page, Amazon suggests that you can also access &#8220;a lot of your personal information in Your Account.&#8221; This is the first iteration of a refrain that you will run into multiple times throughout the protracted data request process, repeated every step of the way.</p>
<!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[1] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-391639 size-large" src="https://theintercept.com/wp-content/uploads/2022/03/1-RequestMyData.jpg?w=1024" alt="Amazon 'Request My Data' selection menu. Screenshot by The Intercept." width="1024" height="654" srcset="https://theintercept.com/wp-content/uploads/2022/03/1-RequestMyData.jpg?w=1038 1038w, https://theintercept.com/wp-content/uploads/2022/03/1-RequestMyData.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2022/03/1-RequestMyData.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2022/03/1-RequestMyData.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2022/03/1-RequestMyData.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2022/03/1-RequestMyData.jpg?w=1000 1000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />
<figcaption class="caption source">Amazon&#8217;s &#8220;Request My Data&#8221; selection menu.<br/>Screenshot: The Intercept</figcaption><!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] -->
<p>After you click on &#8220;<a href="https://amazon.com/gp/privacycentral/dsar/preview.html">Request My Data</a>,&#8221; you&#8217;re taken to a page with a drop-down menu where you can &#8220;select the data that you want,&#8221; with the option &#8220;Request All Your Data&#8221; in the 16th position, at the very bottom of the menu. And in case you&#8217;ve forgotten that you can also see some of your data in your account settings, Amazon offers a helpful reminder: &#8220;Don&#8217;t forget you can access a lot of your data instantly, as well as update your personal information, from Your Account.&#8221;</p>
<p>Once you submit your request, you&#8217;re taken to the &#8220;Data Request Creation&#8221; page, which thanks you and informs you that &#8220;You&#8217;re almost done&#8230;&#8221; but now need to click a verification link in your email. Amazon at this point makes some intonations about how this email verification step is necessary because your privacy and security are the company&#8217;s top priority, though considering that when your data is available you&#8217;ll need to check your email anyway, it&#8217;s not clear how checking your email twice adds any security. And by the way, in case you&#8217;ve forgotten already, Amazon also reminds you on this page that &#8220;You can access a lot of your data instantly, as well as update your personal information, from Your Account.&#8221;</p>
<!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[2] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-391640 size-large" src="https://theintercept.com/wp-content/uploads/2022/03/2-DataRequestCreation.jpg?w=1024" alt="Amazon 'Data Request Creation' message. Screenshot by The Intercept." width="1024" height="362" srcset="https://theintercept.com/wp-content/uploads/2022/03/2-DataRequestCreation.jpg?w=1062 1062w, https://theintercept.com/wp-content/uploads/2022/03/2-DataRequestCreation.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2022/03/2-DataRequestCreation.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2022/03/2-DataRequestCreation.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2022/03/2-DataRequestCreation.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2022/03/2-DataRequestCreation.jpg?w=1000 1000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />
<figcaption class="caption source">Amazon&#8217;s &#8220;Data Request Creation&#8221; message.<br/>Screenshot: The Intercept</figcaption><!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] -->
<p>At this point, you&#8217;ll need to pop over to your email and click the &#8220;Confirm Data Request&#8221; link. Doing so will take you to the &#8220;Data Request Confirmation&#8221; page, which informs you that Amazon has &#8220;received and [is] processing your request to access your personal data.&#8221; This feels a little strange, as you don&#8217;t recall ever making Amazon jump through this many hoops when <i>it</i> wanted to access <i>your</i> data. (This page again reminds you that you can get “a lot of your data … from Your Account.&#8221;)</p>
<p>The &#8220;Data Request Confirmation&#8221; page also informs you that you may be in for a bit of a wait. Though Amazon says that it will &#8220;provide your information to you as soon as we can,&#8221; &#8220;soon&#8221; is apparently meant to be interpreted on a monthly time scale, as the page further states that &#8220;usually, this should not take more than a month.&#8221; Though of course, &#8220;in exceptional cases, for example if a request is more complex or if we are processing a high volume of requests, it might take longer.&#8221; This protracted time frame forms an intriguing juxtaposition to the otherwise universal emphasis on speed that facilitates shopping on Amazon. &#8220;If you have to click multiple buttons, if you have to wait for too long, if you have to answer a lot of information — all of those things create friction, and friction exponentially kills the joy of shopping,&#8221; Nadia Shouraboura, a former member Amazon&#8217;s management board, said in the 2014 CNBC documentary &#8220;<a href="https://www.cnbc.com/amazon-rising/">Amazon Rising</a>.&#8221;</p>
<!-- BLOCK(photo)[3](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[3] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-391641 size-large" src="https://theintercept.com/wp-content/uploads/2022/03/3-DataRequestConfirmation.jpg?w=1024" alt="Amazon 'Data Request Confirmation' message. Screenshot by The Intercept." width="1024" height="365" srcset="https://theintercept.com/wp-content/uploads/2022/03/3-DataRequestConfirmation.jpg?w=1062 1062w, https://theintercept.com/wp-content/uploads/2022/03/3-DataRequestConfirmation.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2022/03/3-DataRequestConfirmation.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2022/03/3-DataRequestConfirmation.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2022/03/3-DataRequestConfirmation.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2022/03/3-DataRequestConfirmation.jpg?w=1000 1000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />
<figcaption class="caption source">Amazon&#8217;s &#8220;Data Request Confirmation&#8221; message.<br/>Screenshot: The Intercept</figcaption><!-- END-CONTENT(photo)[3] --></figure><!-- END-BLOCK(photo)[3] -->
<p>Given Amazon&#8217;s obsession with speed and eliminating friction to foster faster consumerism, the dawdling data solicitation process seems like it just might be intentional, designed to dissuade requests. A far simpler explanation comes through an invocation of <a href="https://en.wikipedia.org/wiki/Hanlon%27s_razor">Hanlon&#8217;s razor</a><a href="https://en.wikipedia.org/wiki/Hanlon%27s_razor">,</a> the old adage to &#8220;never attribute to malice that which is adequately explained by stupidity.&#8221; Amazon whistleblowers cited by Politico have said that the company &#8220;<a href="https://www.politico.eu/article/data-at-risk-amazon-security-threat">has a poor grasp of what data it has, where it is stored and who has access to it.</a>&#8221; If that’s the case, then it stands to reason that it can take a month or more for Amazon to process a data request. As former Amazon chief information security officer Gary Gagnon succinctly put it in an interview with Reveal, &#8220;<a href="https://revealnews.org/article/inside-amazons-failures-to-protect-your-data-internal-voyeurs-bribery-schemes-and-backdoor-access/">we have no fucking idea where our data </a><a href="https://revealnews.org/article/inside-amazons-failures-to-protect-your-data-internal-voyeurs-bribery-schemes-and-backdoor-access/">is</a>.&#8221;</p>
<p>Asked whether the company takes a long time to fulfill data requests because it doesn&#8217;t have a good grasp on where customer data is kept, Amazon spokesperson Jen Bemisderfer said the company &#8220;strongly reject[s] the assertion that we don’t keep track of customer data. Producing [customer data] reports requires that we know where data is stored. Amazon maintains multiple and complementary tools and processes to systematically identify where personal data is stored and how it flows.&#8221;</p>

<p>Bemisderfer did not directly address a question about whether Amazon intentionally makes the data request process difficult, instead writing, &#8220;We are committed to providing customers with access to their information and are always looking for ways to improve the customer experience.&#8221;</p>
<p>It ultimately took about 19 days for Amazon to fulfill my data request, in stark contrast to its reported median time of 1.5 days to process a data request, as per the company&#8217;s <a href="https://www.amazon.com/gp/help/customer/display.html?nodeId=GC5HB5DVMU5Y8CJ2">California Consumer Privacy Act disclosure for 2020</a>. There was no option for expedited Amazon Prime data delivery and no button equivalent to an instantaneous Buy Now (née 1-Click) option when selecting my data. When the data was finally ready, Amazon sent me an email expressing outright jubilation at the fact that it had managed to find my information, stating: &#8220;We are happy to confirm that we have completed your data request.&#8221; And since it&#8217;d been a few weeks, Amazon also understandably thought that I could use another reminder that I could &#8220;find all the available information&#8221; related to my Amazon profile (&#8220;including reviews&#8221;) on my profile page.</p>
<!-- BLOCK(photo)[5](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22991px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 991px;"><!-- CONTENT(photo)[5] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-391642 size-large" src="https://theintercept.com/wp-content/uploads/2022/03/4-YourPersonalDataIsReady.jpg?w=991" alt="Amazon 'Your personal data is ready to download' email. Screenshot by The Intercept." width="991" height="1024" srcset="https://theintercept.com/wp-content/uploads/2022/03/4-YourPersonalDataIsReady.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2022/03/4-YourPersonalDataIsReady.jpg?w=290 290w, https://theintercept.com/wp-content/uploads/2022/03/4-YourPersonalDataIsReady.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2022/03/4-YourPersonalDataIsReady.jpg?w=991 991w, https://theintercept.com/wp-content/uploads/2022/03/4-YourPersonalDataIsReady.jpg?w=540 540w" sizes="auto, (max-width: 991px) 100vw, 991px" />
<figcaption class="caption source">Amazon&#8217;s &#8220;Your personal data is ready to download&#8221; email.<br/>Screenshot: The Intercept</figcaption><!-- END-CONTENT(photo)[5] --></figure><!-- END-BLOCK(photo)[5] -->
<p>Clicking the link to download the data in the arrival email in turn took me to the &#8220;Download your Amazon Data&#8221; page, which once again (for the sixth and, mercifully, final time) helpfully reminded me that &#8220;You can access a lot of your data instantly, as well as update your personal information, from Your Account.&#8221;</p>
<p>On the data download page, under the veneer of endless consumer choice, I was presented with a total of 74 separate zip files that had to be downloaded individually (though enterprising users have built scripts to help <a href="https://browserflow.app/shared/61e979ed-47f4-4c94-b5a5-3ade00da0a36">automate the process</a>). This turn toward extreme granularity is doubtlessly not unappreciated by the ever-discerning consumer who, despite explicitly requesting all of their data from the drop-down menu earlier in the request process, may nonetheless now only wish to download the cryptic Advertising.1.zip and Advertising.3.zip but may studiously want to avoid Advertising.2.zip, and is therefore thankful to be spared the burden of being saddled with two additional kilobytes of extraneous data.</p>
<!-- BLOCK(photo)[6](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22right%22%2C%22width%22%3A%22540px%22%7D) --><figure class="img-wrap align-right  width-fixed" style="width: 540px;"><!-- CONTENT(photo)[6] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-391643 size-large" src="https://theintercept.com/wp-content/uploads/2022/03/5-74Zips.jpg?w=208" alt="Amazon data download page, with 74 separate zip files to download if you want all of your data." width="208" height="1024" srcset="https://theintercept.com/wp-content/uploads/2022/03/5-74Zips.jpg?w=61 61w, https://theintercept.com/wp-content/uploads/2022/03/5-74Zips.jpg?w=208 208w, https://theintercept.com/wp-content/uploads/2022/03/5-74Zips.jpg?zoom=2 416w, https://theintercept.com/wp-content/uploads/2022/03/5-74Zips.jpg?zoom=3 624w" sizes="auto, (max-width: 208px) 100vw, 208px" />
<figcaption class="caption source">The Amazon data download page that Nikita Mazurov received.<br/>Screenshot: The Intercept</figcaption><!-- END-CONTENT(photo)[6] --></figure><!-- END-BLOCK(photo)[6] -->
<p>Amazon is here employing a kind of reverse <a href="https://darkpatternstipline.org/">dark pattern</a>: Instead of irksome layout gimmicks designed to trick users into inadvertently doing things (like subscribing to mailing lists), Amazon is using an irksome layout pattern to discourage you from downloading all of your data. Specifically, this is kind of a &#8220;<a href="https://www.wired.com/story/how-to-spot-avoid-dark-patterns/">roach motel</a>&#8221; model reminiscent of when Yahoo presented users with <a href="https://twitter.com/richgreenhill/status/998666579675107328">more than 300 buttons</a> to individually press to opt out of third-party data collection from its partners. Except in Amazon&#8217;s case, you have to go through this process to merely view your data, not opt out of it.</p>
<h2>&#8220;You Can Access a Lot of Your Data&#8221;</h2>
<p>Once you&#8217;ve gone through and painstakingly downloaded all of the zip files, you need to extract the contents of each one either using a program included with your operating system or (if you can’t find one already on your computer) a free tool like <a href="https://www.7-zip.org/download.html">7-Zip</a>. The extracted data is predominantly in the form of CSV files, which can be opened in a spreadsheet editor like Calc, included with the free office productivity suite <a href="https://www.libreoffice.org/download/download/">LibreOffice</a>. (Microsoft Excel will work too.)</p>
<p>While Amazon&#8217;s reminders that you can access “a lot” of your data by looking around your account and profile settings is doubtlessly true (given that “a lot” is a nebulous quantifier), what becomes apparent when looking over your requested Amazon data is that the company collects a lot of information that you <i>cannot</i> view in those settings.</p>
<p>In skimming over this trove, one thing became very clear right away: Amazon sure seems to love to retain information. Though the company states that it is legally required to keep certain data like order history, other information like search keywords seems to be retained at Amazon&#8217;s discretion. The company intricately logs chat and email interactions you&#8217;ve had with buyers, sellers, and Amazon; your cart history; your orders, returns, and reviews; and your searches (for the past three-and-a-half years), or at least those made while logged into your account. The spreadsheet that lists your search history (Retail.Search-Data.Retail.Customer.Engagement.csv in Retail.Search-Data.zip) contains 65 fields with information like search terms, your IP address, how many search results you clicked on, how many search results you added to your basket, and how many search results you ended up buying. The file also includes fields with unclear titles. For instance, one column marked &#8220;Shopping Refinement&#8221; sporadically lists cryptic strings of numbers like &#8220;26,444,740,832,600,000&#8221; for various search queries.</p>
<p>Aside from keeping a meticulous ledger of all your site activity, Amazon also takes the liberty of holding on to data you may have had the mistaken impression you deleted. If you click &#8220;Remove&#8221; on any address you have stored in the &#8220;<a href="https://www.amazon.com/a/addresses/">Your Addresses</a>&#8221; portion of your Amazon account, this in fact only removes the address from that page, not from Amazon&#8217;s records. Addresses that you have removed from your account are merely labeled as &#8220;Is Address Active: No&#8221; in Retail.Addresses.pdf (within Retail.Addresses.zip). On its &#8220;<a href="https://www.amazon.com/gp/help/customer/display.html?nodeId=GQT5HV6YYGNDSFNW">Add and Manage Addresses</a>&#8221; customer service page, Amazon makes no mention of the fact that deleted addresses are only deleted from being visible to you on your account page and are not actually deleted from Amazon&#8217;s servers. Given that account recovery security questions for various services can be along the lines of &#8220;What&#8217;s the name of the first street you lived on?&#8221; or the fact that people sometimes use their old house or apartment numbers as their PINs, gaining access to a user&#8217;s comprehensive list of old addresses can be particularly advantageous for someone who has access to your Amazon account and wants to expand their reach.</p>
<p>Amazon&#8217;s advertising data on you is inexplicably divided across three zip files. Advertising.3PAudiences.csv (in Advertising.1.zip) lists &#8220;Audiences in which you are included via 3rd Parties.&#8221; It&#8217;s not explained how Amazon acquires this third-party audience data, but according to this dataset I apparently am a homeowner, in possession of a luxury sedan and SUV, and in the 45 to 54 age range. This was all news to me, as I am none of those things. It genuinely feels good to know that Amazon is wasting resources on harvesting inaccurate audience demographic information from third parties.</p>
<p>The two Advertising.AdvertiserAudiences.csv files (in Advertising.1.zip and Advetising.2.zip), meanwhile, list &#8220;Advertisers who brought audiences in which you are included.&#8221; It&#8217;s not clear what this field actually means — for instance, if &#8220;brought&#8221; is a typo for &#8220;bought&#8221; — but at any rate, my data is apparently somehow linked to a total of 167 advertisers, including Carrington College, Clever Cutter, Fitbit, HCA Healthcare, the Leukemia &amp; Lymphoma Society, and something called Animal Friends. Three Canadian banks — Bank of Montreal, Royal Bank of Canada, and Scotiabank — are disproportionately represented in this list of advertisers that have hoovered up my data; I don&#8217;t know why, though I did several times order gifts to Canada.</p>
<p>There are also zip files dedicated to other Amazon services like Alexa, Amazon Games, Amazon Music, Kindle, and Prime Video. I don&#8217;t make use of those, so mine were empty, though it does at this point come as no surprise that Amazon keeps track of, for example, how long you watch individual Prime Video offerings and which country you are in when viewing them, or which books you read on your Kindle, down to which pages you look at.</p>
<p>Overall, from my Amazon data request I learned that I never did find a good &#8220;DIY plasma ball kit&#8221; or a decent &#8220;summer watermelon recipes&#8221; book, but I am decidedly happy that Amazon thinks I&#8217;m a 45 to 54-year-old luxury sedan-driving homeowner and that multiple Canadian banks have a competing interest in me.</p>
<h2>Minimizing Data Exposure</h2>
<p>There are numerous steps one could take to minimize the amount of information Amazon is able to collect. You could be sure that you&#8217;re using ad-blocking software like <a href="https://ublockorigin.com/">uBlock Origin</a> to reduce the chance of advertisers tracking your browsing habits and buying or selling that information. You can also peruse Amazon through the private mode in your browser, or at least while being logged out of your Amazon account. And if you don&#8217;t want Amazon to have your IP address, home address, phone number, and credit card information, you could always use a virtual private network for browsing, a Post Office box for shipping, a temporary burner phone number for account verification, and a temporary or virtual credit card number. It may also not be an entirely bad idea to periodically start fresh, via Amazon&#8217;s ever-helpful &#8220;<a href="https://www.amazon.com/gp/help/customer/display.html?nodeId=GDK92DNLSGWTV6MP">Request the Closure of Your Account and the Deletion of Your Personal Information</a>&#8221; page.</p>
<p>The post <a href="https://theintercept.com/2022/03/27/amazon-personal-data-request-dark-pattern/">I Want You Back: Getting My Personal Data From Amazon Was Weeks of Confusion and Tedium</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2022/03/27/amazon-personal-data-request-dark-pattern/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2022/03/amazon-data-The-intercept-SH.jpg?fit=2000%2C1000' width='2000' height='1000' /><post-id xmlns="com-wordpress:feed-additions:1">391593</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2022/03/1-RequestMyData.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2022/03/1-RequestMyData.jpg?fit=1038%2C663" medium="image">
			<media:title type="html">1-RequestMyData</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2022/03/1-RequestMyData.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2022/03/2-DataRequestCreation.jpg?fit=1062%2C375" medium="image">
			<media:title type="html">2-DataRequestCreation</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2022/03/2-DataRequestCreation.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2022/03/3-DataRequestConfirmation.jpg?fit=1062%2C379" medium="image">
			<media:title type="html">3-DataRequestConfirmation</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2022/03/3-DataRequestConfirmation.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/AP26082605579783-e1778506910463.jpg?w=440&#038;h=440&#038;crop=1" medium="image">
			<media:title type="html">FILE - An abortion-rights activist holds a box of mifepristone pills as demonstrators from both anti-abortion and abortion-rights groups rally outside the Supreme Court in Washington, March 26, 2024. (AP Photo/Amanda Andrade-Rhoades, File)</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/AP26134108104724-e1778870882992.jpg?w=440&#038;h=440&#038;crop=1" medium="image">
			<media:title type="html">U.S. Secretary of Defense Pete Hegseth, left, and White House Deputy Chief of Staff Stephen Miller attend a bilateral meeting between U.S. President Donald Trump and Chinese President Xi Jinping at the Great Hall of the People in Beijing, Thursday, May 14, 2026.</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2275507964-e1778875710976.jpg?w=440&#038;h=440&#038;crop=1" medium="image">
			<media:title type="html">TENERIFE, SPAIN - MAY 10: American citizens (Dressed in blue) are evacuated in a small boat from the MV Hondius after docking in the Granadilla Port  on May 10, 2026 in Tenerife, part of the Canary Islands, Spain. The cruise ship MV Hondius, which had three passengers die from Hantavirus last month and eight more reported cases, is expected to arrive on Sunday May 10 in Tenerife, where the remaining passengers will be repatriated to their respective countries. At a press conference this week, representatives of the World Health Organization (WHO) emphasized the outbreak of this rare virus did not constitute a pandemic, but it has stirred anxieties in the Canary Islands and elsewhere. (Photo by Chris McGrath/Getty Images)</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2022/03/4-YourPersonalDataIsReady.jpg?fit=1000%2C1033" medium="image">
			<media:title type="html">4-YourPersonalDataIsReady</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2022/03/4-YourPersonalDataIsReady.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2022/03/5-74Zips.jpg?fit=1053%2C5173" medium="image">
			<media:title type="html">5-74Zips</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2022/03/5-74Zips.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[My Husband Died on 9/11. I Am Still Waiting for a Trial of His Killers.]]></title>
                <link>https://theintercept.com/2021/09/04/911-justice-department-terrorists-accountability/</link>
                <comments>https://theintercept.com/2021/09/04/911-justice-department-terrorists-accountability/#respond</comments>
                <pubDate>Sat, 04 Sep 2021 12:00:06 +0000</pubDate>
                                    <dc:creator><![CDATA[Kristen Breitweiser]]></dc:creator>
                                		<category><![CDATA[Justice]]></category>
		<category><![CDATA[Voices]]></category>

                <guid isPermaLink="false"></guid>
                                    <description><![CDATA[<p>We haven't brought any 9/11 conspirators to justice, despite torture and decades of war.</p>
<p>The post <a href="https://theintercept.com/2021/09/04/911-justice-department-terrorists-accountability/">My Husband Died on 9/11. I Am Still Waiting for a Trial of His Killers.</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[0] -->
<img data-recalc-dims="1" height="1024" width="1024" decoding="async" class="aligncenter size-large wp-image-369109" src="https://theintercept.com/wp-content/uploads/2021/09/GettyImages-99608085-edit2.jpg?fit=1024%2C1024" alt="UNITED STATES - NOVEMBER 23:  Colleen Ryan of New Jersey, holds a photo of an office staff in which all but two parished in the attacks on the World Trade Center including her brother John J. Ryan. Families of Sept. 11 victims gathered on Upper Senate Park, Tuesday, to urge Congress to set up a commission to investigate the events that led up to the terrorist attacks.  (Photo By Tom Williams/Roll Call/Getty Images)" />
<figcaption class="caption source">Colleen Ryan holds a photo of an office staff, all but two of whom died in the attacks on the World Trade Center on September 11, including her brother, to urge Congress to set up a commission to investigate the events that led up to the attacks, on Nov. 23, 2002.<br/>Photo: Tom Williams/Roll Call/Getty Images</figcaption><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] -->
<p><u>After the World</u> Trade Center bombing in 1993, the U.S. Justice Department brought the co-conspirators before the federal court in the Southern District of New York for a criminal trial.</p>
<p>After the 1998 bombings of U.S. embassies in Kenya and Tanzania killed 12 Americans and more than 200 others, the U.S. Justice Department similarly brought the perpetrators to public criminal trials in downtown Manhattan.</p>
<p>Notably, both the World Trade Center bombing and the embassy bombings involved many of the same operatives, training camps, financial banking networks, communications facilities and hubs, methods of communications, sources, and methods of travel, travel networks, and travel &#8220;identifiers&#8221; as the 9/11 attacks. In fact, Al Qaeda was closely linked to the World Trade Center bombing and orchestrated the embassy attacks as well as the bombing of the USS Cole in Yemen in October 2000.</p>

<p>Of course, the number killed in the 9/11 attacks far eclipses the count of those injured and killed in the World Trade Center 1993 bombing, the embassy bombings, and the USS Cole bombing combined. Historically speaking, the 9/11 families are the largest group of terrorism victims for terrorist attacks carried out inside the country. And yet the U.S. Justice Department has never indicted and fully prosecuted one co-conspirator for the crime.</p>
<p>Quite inexplicably, the 3,000 homicides by hijacking and bombing on September 11 will go unanswered for in these United States. Even the case of Zacarias Moussaoui, who pleaded guilty to conspiracy for failing to prevent the attacks, was a <a href="http://content.time.com/time/magazine/article/0,9171,524419,00.html">debacle</a> that for the 9/11 families only raised more <a href="https://www.huffpost.com/entry/fisa-not-to-blame-for-mou_b_13310">uncomfortable questions</a> surrounding the U.S. government’s abject and <a href="https://oig.justice.gov/sites/default/files/archive/special/s0606/chapter6.htm">systemic failures</a>. As the Associated Press reported, “The FBI agent who arrested Zacarias Moussaoui in August 2001 testified &#8230; [that] he spent almost four weeks trying to warn U.S. officials about the radical Islamic student pilot but &#8216;<a href="https://www.vaildaily.com/news/fbi-agent-who-arrested-moussaoui-says-bureau-superiors-thwarted-chance-to-avoid-911-attacks/">criminal negligence’</a> by superiors in Washington thwarted a chance to stop the 9/11 attacks.”</p>

<p>Without justice and accountability, the very dangerous message sent to terrorist murderers is that they may operate with free license to kill innocent civilians — not just in places far from Americans, like Afghanistan, but also closer to their home, in the streets of lower Manhattan on sunny, blue-skied mornings. With the consent of Presidents George W. Bush, Barack Obama, Donald Trump and Joe Biden; Attorneys General John Ashcroft, Alberto Gonzales, Michael Mukasey, Loretta Lynch, Eric Holder, Jeff Sessions, William Barr, and Merrick Garland; Manhattan District Attorneys Robert Morgenthau and Cy Vance Jr. — all of whom, as the saying goes, could <a href="https://www.washingtonpost.com/news/wonk/wp/2014/11/24/the-single-chart-that-shows-that-grand-juries-indict-99-99-percent-of-the-time/">easily indict</a> even a “<a href="https://www.wsj.com/articles/indict-a-ham-sandwich-remains-on-the-menu-for-judges-prosecutors-1527863063">ham sandwich</a>” — and two decades&#8217; worth of prestigious members of Congress vowing to &#8220;never forget,&#8221; a demand has never been made for full truth, transparency, accountability, and justice for the 3,000 dead.</p>
<p>Why?</p>
<h3>Screaming Facts and Official Silence</h3>
<p>I have studied this issue extensively, testifying twice before Congress and, with other 9/11 widows, forcing the creation of the National Commission on Terrorist Attacks Upon the United States, known as the 9/11 Commission, and helping push through some of the national security reforms it recommended. I’ve had scores of communications over 20 years with presidents and members of their national security councils, members of Congress, the director of the FBI, heads of counterterrorism divisions and joint terror task forces, CIA officials, ex-CIA agents, FBI agents and ex-FBI agents, former NSA analysts, whistleblowers, and even terrorist defense attorneys. I believe it’s clear that the U.S. government has plenty of evidence and information in its files to refer enough incriminating facts and irrefutable evidence to a myriad of grand juries, secure indictments, and thereafter prosecute all of the living 9/11 conspirators who contributed to the homicide of 3,000 innocent people on the morning of September 11, 2001. And yet justice is simply not sought.</p>
<p>Rather pointedly, the 9/11 hijackers did not act alone.</p>
<p>They had a substantial support network that was deeply embedded inside the United States and abroad for nearly a decade prior to, on, and after the 9/11 attacks. It is my understanding that this support network spanned several states including California; Arizona; Nevada; Washington; Minnesota; Oklahoma; Illinois; Florida; North Carolina; Virginia; Massachusetts; Maine; New York; New Jersey; and Texas. The support network also included several countries like Germany; Spain; France; the U.K.; Egypt; Kenya; Tanzania; Sudan; Yemen; Saudi Arabia; the United Arab Emirates; Qatar; Pakistan; Malaysia; Thailand; Iran; and Afghanistan.</p>
<!-- BLOCK(promote-post)[3](%7B%22componentName%22%3A%22PROMOTE_POST%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22slug%22%3A%22the-911-wars%22%2C%22crop%22%3A%22promo%22%7D) --><aside class="promote-banner">
    <a class="promote-banner__link" href="/collections/the-911-wars/">
              <span class="promote-banner__image">
          <img loading="lazy" decoding="async" width="300" height="150" src="https://theintercept.com/wp-content/uploads/2021/08/911-wars-final-1.jpg?fit=300%2C150" class="attachment-medium size-medium" alt="" srcset="https://theintercept.com/wp-content/uploads/2021/08/911-wars-final-1.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2021/08/911-wars-final-1.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2021/08/911-wars-final-1.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2021/08/911-wars-final-1.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2021/08/911-wars-final-1.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2021/08/911-wars-final-1.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2021/08/911-wars-final-1.jpg?w=1000 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" />        </span>
            <div class="promote-banner__text">
        
        <h2 class="promote-banner__title">The 9/11 Wars</h2>
      </div>
    </a>
  </aside><!-- END-BLOCK(promote-post)[3] -->
<p><a href="https://www.vanityfair.com/news/2004/11/path-to-9-11-200411">Known and lethal terrorists</a> openly and freely operated inside the U.S. for years before the 9/11 attacks, and yet authorities failed to <a href="https://www.vanityfair.com/news/2004/11/path-to-9-11-200411">prevent the cold-blooded murders</a> of our 3,000 loved ones. More than 14 U.S. local and federal jurisdictions had law enforcement agencies that brushed up against the 9/11 hijackers and their supporters. Moreover, more than 18 foreign law enforcement counterparts also investigated some of those involved in the 9/11 attacks. They unearthed evidence, wrote reports, monitored activities, watched money wires, and investigated stock sales, arms and weapons shipments across borders, eyebrow-raising passports and visa documents, and lethal operatives roaming the world, planning murder, with impunity. These people remain fully aware of the truth and how their one part of the damning puzzle fits together. Yet none speak out.</p>
<p>Indeed, when a person looks at the facts and circumstances of the 9/11 attacks, taken as a whole, it would seem implausible that not one individual, entity, bank, or business has been fully prosecuted and found criminally responsible as a co-conspirator for the crime that took place. I say a crime, because my husband’s death certificate, like every other 9/11 victim’s, lists the manner of his death as &#8220;homicide,&#8221; not &#8220;war.&#8221; And yet our nation, a democracy based upon the rule of law, that supposedly protects and entitles all of its citizens with a Constitution and clear Bill of Rights (and certainly the most basic universal human right to live and not be blown up in a building) has not found, and will not ever find, it necessary to hold any co-conspirator of the 9/11 hijackers accountable in a court of criminal law. The typically exceedingly <a href="https://www.washingtonpost.com/news/wonk/wp/2014/11/24/the-single-chart-that-shows-that-grand-juries-indict-99-99-percent-of-the-time/">easy-to-meet thresholds</a> for who and what qualifies as a criminal &#8220;co-conspirator&#8221; and &#8220;conspiracy&#8221; have never quite been met by the screaming facts and circumstances of 9/11 — and I’d argue that’s by systemic prosecutorial choice to look the other way for matters of political expediency, cover-up, or in the best case scenario, sheer embarrassment.</p>
<!-- BLOCK(photo)[4](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22large%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed large-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[4] -->
<img loading="lazy" decoding="async" width="2048" height="1192" class="aligncenter size-large wp-image-369111" src="https://theintercept.com/wp-content/uploads/2021/09/GettyImages-1233825082.jpg" alt="In this file photo taken on November 29, 2001 United States Marines from Bravo Co. of the 15th MEU (Marine Expeditionary Unity) march into the barracks in full battle gear as they arrive very early morning at the US Marines forward base in southern Afghanistan. - Launched in the wake of the September 11 attacks, the war in Afghanistan claimed the lives of tens of thousands of Afghans along with around 2,400 US soldiers and saw trillions squandered in what has largely been deemed a failed nation-building project. (Photo by JIM HOLLANDER / POOL / AFP) (Photo by JIM HOLLANDER/POOL/AFP via Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2021/09/GettyImages-1233825082.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2021/09/GettyImages-1233825082.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2021/09/GettyImages-1233825082.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2021/09/GettyImages-1233825082.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2021/09/GettyImages-1233825082.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2021/09/GettyImages-1233825082.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2021/09/GettyImages-1233825082.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source pullright">U.S. Marines arrive at a base in southern Afghanistan on Nov. 29, 2001.<br/>Photo: Jim Hollander/Pool/AFP via Getty Images</figcaption><!-- END-CONTENT(photo)[4] --></figure><!-- END-BLOCK(photo)[4] -->
<h3>Hijacking the Bill of Rights</h3>
<p>While not using the September 11 murders to prosecute the obvious crime and deliver justice to the 9/11 families, this country&#8217;s leaders have alternatively used the 3,000 homicides to do many other things — none of which have anything to do with serving and protecting the best interests of civilians and 9/11 victims, but everything to do with government overreach and the trampling of Americans&#8217; constitutional rights. It wasn&#8217;t Osama bin Laden and Al Qaeda that cracked the bedrock of our hallowed democracy; it was our very own leaders who carried out their own hijacking of our Bill of Rights in the wake of 9/11.</p>
<p>On the backs of the 9/11 dead, our leaders have chosen to start wars, some of which were illegal and based upon the shady unilateral decisions of presidents (both Democrat and Republican). These wars, which have lasted two full decades, cost trillions of dollars, the lives and physical and mental well-being of hundreds of thousands of U.S. troops, and the lives of hundreds of thousands of innocent civilians who were unlucky enough to be caught up in &#8220;American-made&#8221; war zones. All of these wars, interventions, and occupations have only further fomented terrorism and clearly inflamed global hostilities toward American foreign policy &#8220;objectives&#8221; that have little to do with what is truly in the best interests of citizens here or abroad.</p>
<!-- BLOCK(pullquote)[5](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22left%22%7D) --><blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><!-- CONTENT(pullquote)[5] -->On the backs of the 9/11 dead, our leaders have chosen to start wars, some of which were illegal and based upon the shady unilateral decisions of presidents.<!-- END-CONTENT(pullquote)[5] --></blockquote><!-- END-BLOCK(pullquote)[5] -->
<p>I can say this with unimpeachable authority since I speak, firsthand, as one small piece of the collateral damage of four decades&#8217; worth of this nation&#8217;s bad foreign policy decisions, starting in the 1980s with the Iran-Contra affair and the arming of the mujahideen to fight the Soviets in Afghanistan; both President George H.W. Bush and the younger President Bush overlooking their oil-rich Saudi friends before and after 9/11; Obama’s inexplicable veto of the Justice Against Sponsors of Terrorism Act that was meant to hold terrorists and their co-sponsors accountable; Trump rubbing magical orbs with Saudi leaders prior to Jamal Khashoggi getting sliced into bits; and ultimately bookended by Biden’s horrifying, grossly mismanaged withdrawal from Afghanistan.</p>
<p>Our government passed legislation in the name of 9/11 that has eviscerated our constitutional rights based upon the premise that such legislative action (the Patriot Act, Titles I-X, and subsequent reauthorizations by all presidents, Democrat or Republican) was needed to keep us safe from terrorists, when <a href="https://www.huffpost.com/entry/the-kings-red-herring_b_12589">the truth is that all the information, evidence, and legal authorities</a> the U.S. government needed to prevent the 9/11 attacks was readily available and at its fingertips beforehand. If only it had chosen to use that information to stop bin Laden and his operatives before they very successfully blew up my husband Ron’s building.</p>
<p>As the former chair and vice chair of the 9/11 Commission — Tom Kean and Lee Hamilton, respectively — have alarmingly confirmed, the 9/11 attacks were preventable because everything needed to prevent them was there before the attacks occurred. It wasn&#8217;t an intelligence wall that stopped information from flowing before 9/11; it was purposeful (and I&#8217;d argue criminal) withholding of evidence and information by foreign and domestic intelligence agencies that enabled Al Qaeda operatives to carry out their attacks unhampered. Chillingly, such purposeful withholding of information continues to this very day, since with no further executive or congressional demand for responsibility or accountability for 9/11, there is simply no incentive for our intelligence officials and policymakers to alter their toxic patterns, including repeated cost-benefit analyses in which the cost is only ever paid by the innocent — known as “collateral damage” — both here and abroad. Truly, is it any real surprise that former CIA Director George Tenet provided bad intelligence on weapons of mass destruction that led us into a war with Iraq, when just a few years before he had carried out poor intelligence decision-making (and cherry-picking of information) that left us vulnerable to the 9/11 attacks? Incidentally, Tenet was given the Medal of Freedom. He should be in jail.</p>
<p>During the past 20 years, extrajudicial drone strikes, illegal renditions, unlawful and inhuman torture, and indefinite detentions have become the norm — all done, as well, in the name of our loved ones and to prevent another 9/11. Sadly, these inhumane and unlawful methods do not make any of us safer; they just allow presidents to unilaterally act outside the law, without oversight. Moreover, in addition to being a stain on the legacy of America, these unlawful methods have also further robbed the 9/11 families of our right to justice and our ability to hold terrorists accountable. None of the people detained at Guantánamo Bay with direct links to the 9/11 attacks (including the mastermind Khalid Sheikh Mohammed and alleged co-conspirators like Ramzi bin al-Shibh and Walid bin Attash, known as Khallad) are likely to ever be tried and brought to justice. Congress blocked their transfer to civilian courts in the U.S., and even within the military commission system at Guantánamo, trials are going nowhere <a href="https://www.npr.org/2019/11/14/778944195/a-legacy-of-torture-is-preventing-trials-at-guant-namo">because they were tortured</a> by the CIA.</p>
<!-- BLOCK(photo)[6](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22large%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed large-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[6] -->
<img loading="lazy" decoding="async" width="3000" height="2025" class="aligncenter size-large wp-image-369112" src="https://theintercept.com/wp-content/uploads/2021/09/GettyImages-93183645.jpg" alt="Theresa Regan (2nd L), who lost her husband and FDNY firefighter Donald Regan at the South Tower of the World Trade Center during the 9/11 terrorists attacks, listens with her son Peter (L) and daughterJill (3rd L) during a hearing before the Senate Judiciary Committee on Capitol Hill November 18, 2009 in Washington, DC." srcset="https://theintercept.com/wp-content/uploads/2021/09/GettyImages-93183645.jpg?w=3000 3000w, https://theintercept.com/wp-content/uploads/2021/09/GettyImages-93183645.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2021/09/GettyImages-93183645.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2021/09/GettyImages-93183645.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2021/09/GettyImages-93183645.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2021/09/GettyImages-93183645.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2021/09/GettyImages-93183645.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2021/09/GettyImages-93183645.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2021/09/GettyImages-93183645.jpg?w=2400 2400w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source pullright">Theresa Regan, second left, who lost her husband during the 9/11 terrorists attacks, listens with her son Peter, left, and daughter Jill, third left, during a Senate Judiciary Committee hearing on Nov. 18, 2009, in Washington, D.C.<br/>Photo: Alex Wong/Getty Images</figcaption><!-- END-CONTENT(photo)[6] --></figure><!-- END-BLOCK(photo)[6] -->
<h3>Lonely Fight for Truth</h3>
<p>So without being able to hold the known 9/11 terrorists in custody accountable, and without any standing indictments or prosecutions meted out by the Department of Justice against the other identifiable co-conspirators, the job of seeking out accountability and justice has fallen on the shoulders of the 9/11 families, who were left to take matters of justice into our own hands through the second-rate route of civil litigation. Unlike the embassy bombing and the 1993 World Trade Center attack victims, who were able to use evidence brought forth during the government&#8217;s public trials and prosecutions of the perpetrators of the killers of their loved ones, the 9/11 families have never been given such help, assistance, access to evidence, or prosecutorial favor. This leaves us alone and with a stark disadvantage as we try to hold terrorists and their co-conspirators accountable for the murder of our loved ones in federal civil court. For a country that invokes 9/11 so freely to start wars and attack terrorists and innocent civilians around them with drones, and expands executive branch powers beyond anything our Founding Fathers would have ever felt comfortable with, such use of the 9/11 tagline abruptly halts at the courthouse steps.</p>
<!-- BLOCK(pullquote)[7](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[7] -->For a country that invokes 9/11 so freely to start wars and attack terrorists and innocent civilians around them with drones, such use of the 9/11 tagline abruptly halts at the courthouse steps.<!-- END-CONTENT(pullquote)[7] --></blockquote><!-- END-BLOCK(pullquote)[7] -->
<p>For 20 years, the 9/11 families have only faced a Department of Justice that spends more of its time covering up for terrorists and terrorist co-conspirators, errant intelligence community agents, and officials&#8217; bad (arguably criminal) decisions that either directly killed or in many ways strongly contributed to the mass murder of our innocent loved ones. Year after year, Department of Justice lawyers, attorneys general, and prosecutors willfully choose to not help the 9/11 families as we fight the terrorists in court; they nastily refuse to share or declassify the information and evidence they have in their files so that we can nail terrorists and terrorist supporters. Instead, horrifically, some U.S. prosecutors literally sit on the side of the defendants (in this case, Saudi Arabia) and help the key evidence we need <a href="https://www.nytimes.com/2020/01/23/magazine/9-11-saudi-arabia-fbi.html">stay secret</a>.</p>
<p>Two decades down, it is now enough. We believe it is time for our families to have closure and truth.</p>
<p>We believe that all information surrounding 9/11 should be made public. Using the Khashoggi case as precedent, we want all members of Congress to be fully briefed on the 9/11 case files. Moreover, we want members of Congress to pass meaningful legislation that will achieve the same transparency, accountability, and justice that they called for immediately after Khashoggi was killed.</p>
<p>We want Biden to release the 9/11 files to the American public just as he released intelligence from the Khashoggi files. And just as sanctions were assessed against Saudi Crown Prince Mohammed bin Salman’s “Tiger Squad” for Khashoggi’s murder, we want sanctions to be brought against those Saudis implicated in 9/11. If the powers of the Magnitsky Act <a href="https://home.treasury.gov/news/press-releases/sm547">applied</a> to the gross human rights violation that occurred when Khashoggi was murdered and dismembered with a bone saw, then it should also apply to the gross human rights violations that occurred when thousands of people were crushed to death on the morning of September 11.</p>
<p>Most pointedly, the Khashoggi reports and evidence were used to publicly incriminate a sitting Saudi crown prince. We, too, believe that the 9/11 evidence should be used to incriminate any Saudi, be they a member of the royal family, part of an intelligence service, a diplomat — anyone, regardless of privilege. Please note that in the Khashoggi matter, information from wiretaps of a Saudi royal&#8217;s private communications, which implicated him in Khashoggi’s murder, were <a href="https://www.washingtonpost.com/world/national-security/cia-concludes-saudi-crown-prince-ordered-jamal-khashoggis-assassination/2018/11/16/98c89fe6-e9b2-11e8-a939-9469f1166f9d_story.html">leaked</a>, and an intelligence summary was <a href="https://www.dni.gov/files/ODNI/documents/assessments/Assessment-Saudi-Gov-Role-in-JK-Death-20210226v2.pdf">officially released</a>, openly stating that Salman approved the killing. Such highly sensitive information clearly collected through secret sources and methods was somehow breezily declassified and made available to the public. And yet the 9/11 families cannot get basic wiretap information surrounding an Al Qaeda communications hub in Yemen from 1998-2001 <a href="https://www.newyorker.com/magazine/2014/01/13/the-al-qaeda-switchboard">or NSA intercepts</a> for the 9/11 hijackers’ phone calls from inside the U.S. — cases that don&#8217;t involve the surveillance of a sitting Saudi crown prince, just the private communications of Osama bin Laden and his Al Qaeda operatives planning attacks like the embassy bombings, the USS Cole Bombing, and 9/11. So why can’t Americans read the transcripts of those conversations and know what the NSA, CIA, FBI, Saudi intelligence, and other intelligence agencies heard about those attacks before they happened? Why can’t such information be used by the 9/11 families so that we can hold terrorists and their co-conspirators accountable?</p>
<p>Jamal Khashoggi was not an American citizen. In fact, he was a close <a href="https://news.yahoo.com/i-just-fell-apart-crying-heartbreak-to-you-a-murdered-journalists-yearslong-relationship-with-osama-bin-laden-090022641.html">friend of Osama bin Laden&#8217;s and said he wept when he was killed</a>, adding that he wished bin Laden had not &#8220;succumbed to anger.” Our loved ones were Americans. And their cold-blooded, brutal murders in broad daylight should be given the same transparency, accountability, and justice. On the 20th anniversary of the 9/11 attacks, there should be nothing left to hide. As Biden has directed in a more recent context, all terrorists and their co-conspirators should be “hunt[ed] down and made to pay” for their crimes.</p>
<p>The post <a href="https://theintercept.com/2021/09/04/911-justice-department-terrorists-accountability/">My Husband Died on 9/11. I Am Still Waiting for a Trial of His Killers.</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2021/09/04/911-justice-department-terrorists-accountability/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2021/09/GettyImages-99608085-crop2.jpg?fit=1907%2C953' width='1907' height='953' /><post-id xmlns="com-wordpress:feed-additions:1">368872</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/09/GettyImages-99608085-edit2.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2021/09/GettyImages-99608085-edit2.jpg?fit=1907%2C1261" medium="image">
			<media:title type="html">Colleen Ryan of New Jersey, holds a photo of an office staff</media:title>
			<media:description type="html">Colleen Ryan, holds a photo of an office staff in which all but two parished in the attacks on the World Trade Center including her brother to urge Congress to set up a commission to investigate the events that led up to the terrorist attacks on 
November 23, 2002.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/09/GettyImages-99608085-edit2.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/AP26082605579783-e1778506910463.jpg?w=440&#038;h=440&#038;crop=1" medium="image">
			<media:title type="html">FILE - An abortion-rights activist holds a box of mifepristone pills as demonstrators from both anti-abortion and abortion-rights groups rally outside the Supreme Court in Washington, March 26, 2024. (AP Photo/Amanda Andrade-Rhoades, File)</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/AP26134108104724-e1778870882992.jpg?w=440&#038;h=440&#038;crop=1" medium="image">
			<media:title type="html">U.S. Secretary of Defense Pete Hegseth, left, and White House Deputy Chief of Staff Stephen Miller attend a bilateral meeting between U.S. President Donald Trump and Chinese President Xi Jinping at the Great Hall of the People in Beijing, Thursday, May 14, 2026.</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2026/05/GettyImages-2275507964-e1778875710976.jpg?w=440&#038;h=440&#038;crop=1" medium="image">
			<media:title type="html">TENERIFE, SPAIN - MAY 10: American citizens (Dressed in blue) are evacuated in a small boat from the MV Hondius after docking in the Granadilla Port  on May 10, 2026 in Tenerife, part of the Canary Islands, Spain. The cruise ship MV Hondius, which had three passengers die from Hantavirus last month and eight more reported cases, is expected to arrive on Sunday May 10 in Tenerife, where the remaining passengers will be repatriated to their respective countries. At a press conference this week, representatives of the World Health Organization (WHO) emphasized the outbreak of this rare virus did not constitute a pandemic, but it has stirred anxieties in the Canary Islands and elsewhere. (Photo by Chris McGrath/Getty Images)</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2021/08/911-wars-final-1.jpg?fit=300%2C150" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2021/09/GettyImages-1233825082.jpg?fit=2048%2C1192" medium="image">
			<media:title type="html">FILES-AFGHANISTAN-US-CONFLICT-PHOTOESSAY</media:title>
			<media:description type="html">United States Marines from Bravo Co. of the 15th MEU (Marine Expeditionary Unity) march into the barracks in full battle gear as they arrive at the US Marines forward base in southern Afghanistan on November 29, 2001</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/09/GettyImages-1233825082.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2021/09/GettyImages-93183645.jpg?fit=3000%2C2025" medium="image">
			<media:title type="html">Holder Faces Questions On Gitmo Trials And Ft Hood At Senate Hearing</media:title>
			<media:description type="html">Theresa Regan (2nd L), who lost her husband and FDNY firefighter Donald Regan at the South Tower of the World Trade Center during the 9/11 terrorists attacks, listens with her son Peter (L) and daughterJill (3rd L) during a hearing before the Senate Judiciary Committee on Capitol Hill November 18, 2009 in Washington, DC.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/09/GettyImages-93183645.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[Securely Erasing Your iPhone or iPad — With a Power Drill]]></title>
                <link>https://theintercept.com/2021/06/12/iphone-ipad-erase-power-drill/</link>
                <comments>https://theintercept.com/2021/06/12/iphone-ipad-erase-power-drill/#respond</comments>
                <pubDate>Sat, 12 Jun 2021 12:00:19 +0000</pubDate>
                                    <dc:creator><![CDATA[Nikita Mazurov]]></dc:creator>
                                		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=359353</guid>
                                    <description><![CDATA[<p>If you can’t power on your mobile device, Apple has no answers for you. But you can still obliterate the data. Here’s how.</p>
<p>The post <a href="https://theintercept.com/2021/06/12/iphone-ipad-erase-power-drill/">Securely Erasing Your iPhone or iPad — With a Power Drill</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>If you have</u> an iPhone or iPad you&#8217;re planning to give away or recycle, you&#8217;ll of course want to make sure that any sensitive information on it is not recoverable.</p>
<p>There is an official way to do this, and an unofficial one. This article focuses on the latter.</p>
<p>But first, let’s go over the official route to wiping your device, which is ideal if it is an option for you. This technique erases a specific iPhone or iPad encryption key — one, under normal use, that starts the processing of decrypting your content; erasing this key renders all of your data <a href="https://manuals.info.apple.com/MANUALS/1000/MA1902/en_US/apple-platform-security-guide.pdf">cryptographically inaccessible</a>.</p>

<p>You’ll need an iPhone or iPad that turns on just fine and that you can either navigate using the touchscreen or connect to your computer. Apple provides instructions for <a href="https://support.apple.com/en-ca/guide/iphone/iph7a2a9399b/ios">iPhones</a> and <a href="https://support.apple.com/en-ca/guide/ipad/ipad8f91b5e3/ipados">iPads</a>, directing you to the Settings app, where you can perform a reset of the device (by going to Settings &gt; General &gt; Reset &gt; Erase all Content and Settings). The same instructions also let you know what to do if you can&#8217;t get into the Settings app on your device: You can try to hook it up to your laptop or desktop device and perform a reset that way. If the computer reset method doesn&#8217;t work, Apple also provides instructions on how to wipe the device by booting it into <a href="https://support.apple.com/en-us/HT201263">recovery mode</a>. If your device won&#8217;t even turn on, Apple also provides a few additional <a href="https://support.apple.com/en-ca/HT201412">troubleshooting steps</a> to take, like performing a force restart and making sure the device is charged.</p>
<h3>When the Official Ways Don&#8217;t Work</h3>
<p>But what do you do if you&#8217;ve tried all of Apple&#8217;s troubleshooting steps, and your device still won&#8217;t turn on or connect to your computer — and contains sensitive information that you want to be sure is not recoverable?</p>
<p>If you have set a strong passcode on your device, the good news is that the passcode also acts as part of your device&#8217;s encryption key, meaning that the data on your device is <a href="https://support.apple.com/en-ca/guide/security/sec20230a10d/web">encrypted</a>. If your passcode is hard to guess, someone who takes your device won&#8217;t be able to get into it under normal circumstances.</p>
<p>That said, every once in a while, <a href="https://www.zdnet.com/article/most-iphone-ipad-unlocked-with-new-passcode-bypass-trick/">vulnerabilities</a> are <a href="https://www.securityweek.com/passcode-bypass-method-exposes-photos-contacts-iphone-xs">discovered</a> that bypass lock screen passcodes — and these are just the ones that are made public. Exploit vendors can pay <a href="https://zerodium.com/program.html">millions</a> to privately acquire vulnerabilities, while some forensics companies claim to have the capability to access all iPhones and iPads and to be able to &#8220;<a href="https://www.cellebrite.com/en/ufed-premium/">tackle your locked and encrypted devices</a>.&#8221;</p>
<p>If you can&#8217;t access your device, the most careful approach to wiping it is to destroy the flash memory chip that houses your data. This way you don&#8217;t have to lose sleep if you didn&#8217;t use a strong passcode, or worry about a forensics vendor being able to recover any of your personal information.</p>
<h3>Taking Apart Your Device</h3>
<p>In this example, we’re destroying the flash memory chip from an iPad 6. You can find detailed teardowns for different versions of <a href="https://www.ifixit.com/Search?query=ipad">iPads</a> and <a href="https://www.ifixit.com/Search?query=iphone">iPhones</a>, or other devices, on <a href="https://www.ifixit.com/">iFixIt</a>. Regardless of the specific model, the general process of physically destroying data is the same: Take the screen off the iPhone or iPad, find the logic board, and then destroy the flash memory chip.</p>
<p>To get to the flash memory chip, you&#8217;re first going to take your iPad apart. The first thing to do is to take off the iPad&#8217;s touchscreen digitizer panel to be able to access the rest of the iPad&#8217;s internal components. There are commercial <a href="https://www.ifixit.com/Device/iOpener">tools</a> to help take the panel off, but you can also take a heat gun to the perimeter of the iPad panel to loosen the adhesive holding it in place, and then take the panel off with the help of a <a href="https://www.google.com/search?tbm=shop&amp;q=mobile+pry+tool">pry tool</a>. Once you&#8217;ve removed the digitizer panel, the next step is to unscrew the screen to detach it from the iPad enclosure and access the rest of the iPad&#8217;s internal components.</p>
<p>Once you&#8217;ve removed the screen, you&#8217;ll see the iPad&#8217;s battery taking up the bulk of the enclosure, and a metal cover on the side. The cover houses the iPad&#8217;s logic board, which in turn contains the flash memory chip where the iPad stores all of your data.</p>
<!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[1] --> <a href="https://theintercept.com/wp-content/uploads/2050/06/ipadkill1.jpg"><img data-recalc-dims="1" height="99999" width="1000" decoding="async" class="aligncenter size-article-large wp-image-359644" src="https://theintercept.com/wp-content/uploads/2050/06/ipadkill1.jpg?fit=1000%2C99999" alt="" /></a>
<figcaption class="caption source">Covered iPad logic board — located next to the battery — visible once the touchscreen panel and screen have been removed.<br/>Photo: Nikita Mazurov</figcaption><!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] -->
<p>Remove all of the screws and connecting cables which may be holding the logic board in place, and take off the board&#8217;s cover.</p>
<p>The flash memory chip is silver in color and sits in its own metallic enclosure to the side of the logic board, next to the black processor chip.</p>
<!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[2] --> <img data-recalc-dims="1" height="99999" width="1000" decoding="async" class="aligncenter size-article-large wp-image-359646" src="https://theintercept.com/wp-content/uploads/2050/06/ipadkill2.jpg?fit=1000%2C99999" alt="" />
<figcaption class="caption source">The iPad flash memory chip located on the logic board, next to the processor chip.<br/>Photo: Nikita Mazurov</figcaption><!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] -->
<p>Now just take a regular power drill and drill through the memory chip, and you can see your data turn into powder. At this point, you can continue drilling holes in the chip until it eventually falls apart. As always when working with power tools, you should be sure to wear personal protective equipment, such as goggles and gloves, and maintain a <a href="https://ohsonline.com/articles/2010/03/19/power-tool-safety-tips-from-osha.aspx">safe work area</a>.</p>
<!-- BLOCK(youtube)[3](%7B%22componentName%22%3A%22YOUTUBE%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22sourceId%22%3A%22FcNBqDlmZck%22%2C%22sourceName%22%3A%22youtube%22%2C%22start%22%3A%22%22%7D) --><iframe loading='lazy' class='social-iframe social-iframe--youtube' width='100%' src='//www.youtube.com/embed/FcNBqDlmZck?enablejsapi=1' frameborder='0' allowfullscreen></iframe><!-- END-BLOCK(youtube)[3] -->
<p>You can now safely dispose of the disassembled iPad in accordance with your local electronics disposal regulations.</p>
<p>&nbsp;</p>
<p>The post <a href="https://theintercept.com/2021/06/12/iphone-ipad-erase-power-drill/">Securely Erasing Your iPhone or iPad — With a Power Drill</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2021/06/12/iphone-ipad-erase-power-drill/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2021/06/iphone-drill-theintercept.jpg?fit=2000%2C1000' width='2000' height='1000' /><post-id xmlns="com-wordpress:feed-additions:1">359353</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2050/06/ipadkill1.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2050/06/ipadkill1.jpg?fit=1086%2C1355" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2050/06/ipadkill1.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2050/06/ipadkill2.jpg?fit=2427%2C507" medium="image">
			<media:description type="html">The iPad flash memory chip located on the logic board, next to the processor chip</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2050/06/ipadkill2.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[Millions of Leaked Police Files Detail Suffocating Surveillance of China's Uyghur Minority]]></title>
                <link>https://theintercept.com/2021/01/29/china-uyghur-muslim-surveillance-police/</link>
                <comments>https://theintercept.com/2021/01/29/china-uyghur-muslim-surveillance-police/#respond</comments>
                <pubDate>Fri, 29 Jan 2021 08:00:15 +0000</pubDate>
                                    <dc:creator><![CDATA[Yael Grauer]]></dc:creator>
                                		<category><![CDATA[Special Investigations]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[World]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=342556</guid>
                                    <description><![CDATA[<p>Invasive digital monitoring and community informants drive a system all too ready to classify Muslims in Ürümqi as extremists and terrorists.</p>
<p>The post <a href="https://theintercept.com/2021/01/29/china-uyghur-muslim-surveillance-police/">Millions of Leaked Police Files Detail Suffocating Surveillance of China&#8217;s Uyghur Minority</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><!-- INLINE(dropcap)[0](%7B%22componentName%22%3A%22DROPCAP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22resource%22%3Anull%7D)(%7B%22text%22%3A%22T%22%7D) --><span data-shortcode-type='dropcap' class='dropcap'><!-- INLINE-CONTENT(dropcap)[0] -->T<!-- END-INLINE-CONTENT(dropcap)[0] --></span><!-- END-INLINE(dropcap)[0] --><u>he order came</u> through a police automation system in Ürümqi, the largest city in China’s northwest Xinjiang region. The system had distributed a report — an “intelligence information judgment,” as local authorities called it — that the female relative of a purported extremist had been offered free travel to Yunnan, a picturesque province to the south.</p>
<p>The woman found the offer on the smartphone messaging app <!-- INLINE(tooltip)[1](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22A%20smartphone%20app%20that%20is%20ubiquitous%20in%20China%2C%20used%20not%20just%20for%20messaging%20but%20also%20to%20pay%20bills%20and%20to%20share%20photos%20and%20news.%20It%20is%20used%20extensively%20by%20Chinese%20authorities%2C%20including%20as%20an%20instrument%20of%20social%20control.%22%7D) --><span data-tooltip="A smartphone app that is ubiquitous in China, used not just for messaging but also to pay bills and to share photos and news. It is used extensively by Chinese authorities, including as an instrument of social control." class="tooltip"><!-- INLINE-CONTENT(tooltip)[1] -->WeChat<!-- END-INLINE-CONTENT(tooltip)[1] --></span><!-- END-INLINE(tooltip)[1] -->, in a group known simply as “Travelers.” Authorities homed in on the group because of ethnic and family ties; its members included Muslim minorities like <!-- INLINE(tooltip)[2](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Historically%20the%20largest%20ethnic%20group%20in%20Xinjiang%2C%20Uyghurs%20are%20predominately%20Muslim%2C%20speak%20their%20own%20Turkic%20language%2C%20and%20have%20long%20faced%20discrimination%20under%20Chinese%20rule.%20Upwards%20of%20one%20million%20Uyghurs%20have%20been%20detained%20in%20camps%2C%20according%20to%20some%20estimates.%22%7D) --><span data-tooltip="Historically the largest ethnic group in Xinjiang, Uyghurs are predominately Muslim, speak their own Turkic language, and have long faced discrimination under Chinese rule. Upwards of one million Uyghurs have been detained in camps, according to some estimates." class="tooltip"><!-- INLINE-CONTENT(tooltip)[2] -->Uyghurs<!-- END-INLINE-CONTENT(tooltip)[2] --></span><!-- END-INLINE(tooltip)[2] -->, Kazakhs, and Kyrgyz, who speak languages beside China’s predominant one, Mandarin. “This group has over 200 <!-- INLINE(tooltip)[3](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Muslim%20minorities%20who%20speak%20languages%20other%20than%20Mandarin%2C%20including%20Uyghurs%2C%20Kazakhs%2C%20and%20Kyrgyz.%22%7D) --><span data-tooltip="Muslim minorities who speak languages other than Mandarin, including Uyghurs, Kazakhs, and Kyrgyz." class="tooltip"><!-- INLINE-CONTENT(tooltip)[3] -->ethnic-language people<!-- END-INLINE-CONTENT(tooltip)[3] --></span><!-- END-INLINE(tooltip)[3] -->,” the order stated. “Many of them are relatives of incarcerated people. Recently, many intelligence reports revealed that there is a tendency for relatives of [extremist] people to gather. This situation needs major attention. After receiving this information, please investigate immediately. Find out the background of the people who organize ‘free travel,’ their motivation, and the inner details of their activities.”</p>
<p>Police in Ürümqi’s Xiheba Precinct, near the historic city center, received the order and summarized their work in a <a href="https://beta.documentcloud.org/documents/20466440-document-19">2018 report.</a> The one person rounded up as a result of the order, a Uyghur, had no previous criminal record, had never heard of the WeChat group, and never even traveled within China as a tourist. He “has good behavior and we do not have any suspicion,” police wrote. Still, his phone was confiscated and sent to a police “internet safety unit,” and the community was to “control and monitor” him, meaning the government would assign a trusted cadre member to regularly visit and watch over his household. A record about him was entered into the police automation system.</p>
<p>Based on their notes, police appear to have investigated the man and assigned the cadre members to “control and monitor” him entirely because of religious activities, which took place five months earlier, of his eldest sister. She and her husband invited another Uyghur couple in Ürümqi to join a religious discussion group on the messaging app <!-- INLINE(tooltip)[4](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Like%20WeChat%2C%20QQ%20is%20a%20messaging%20platform%20that%5Cu2019s%20ubiquitous%20in%20China%3B%20it%20even%20has%20the%20same%20owner.%20QQ%20is%20about%2010%20years%20older%20than%20WeChat%20and%20by%20most%20estimates%20has%20a%20smaller%20%28but%20comparable%29%20user%20base.%22%7D) --><span data-tooltip="Like WeChat, QQ is a messaging platform that’s ubiquitous in China; it even has the same owner. QQ is about 10 years older than WeChat and by most estimates has a smaller (but comparable) user base." class="tooltip"><!-- INLINE-CONTENT(tooltip)[4] -->Tencent QQ<!-- END-INLINE-CONTENT(tooltip)[4] --></span><!-- END-INLINE(tooltip)[4] -->, according to police records. The other couple bought a laptop and logged onto the group every day from 7 a.m. to 11:30 p.m.; the husband stopped smoking and drinking, and the wife began wearing longer clothes. They began listening to “religious extremism information” on their laptop, the report said. Between the two couples, police recovered 168 religious audio files deemed illegal, likely because they were connected to an Islamic movement, Tablighi Jamaat, that advocates practicing Islam as it was practiced when the Prophet Muhammad was alive.</p>

<p>The fate of the eldest sister and her husband is unknown; the report simply states they were transferred to a different police bureau. The other couple was sent to a re-education camp.</p>
<p>Details of the investigations are contained in a massive police database obtained by The Intercept: the product of a reporting tool developed by private defense company Landasoft and used by the Chinese government to facilitate police surveillance of citizens in Xinjiang.</p>
<p>The database, centered on Ürümqi, includes policing reports that confirm and provide additional detail about many elements of the persecution and large-scale internment of Muslims in the area. It sheds further light on a campaign of repression that has reportedly seen cameras installed in the homes of private citizens, the creation of mass detention camps, children forcibly separated from their families and placed in preschools with electric fences, the systematic destruction of Uyghur cemeteries, and a systematic campaign to suppress Uyghur births through forced abortion, sterilization, and birth control.</p>
<!-- BLOCK(photo)[6](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[6] -->
<img loading="lazy" decoding="async" width="1920" height="1080" class="aligncenter size-large wp-image-342930" src="https://theintercept.com/wp-content/uploads/2021/01/1-map-china-the-intercept-3.png" alt="The database obtained by The Intercept contains police reports from Ürümqi, the capital and largest city in China's Xinjiang Uyghur Autonomous Region." srcset="https://theintercept.com/wp-content/uploads/2021/01/1-map-china-the-intercept-3.png?w=1920 1920w, https://theintercept.com/wp-content/uploads/2021/01/1-map-china-the-intercept-3.png?w=300 300w, https://theintercept.com/wp-content/uploads/2021/01/1-map-china-the-intercept-3.png?w=768 768w, https://theintercept.com/wp-content/uploads/2021/01/1-map-china-the-intercept-3.png?w=1024 1024w, https://theintercept.com/wp-content/uploads/2021/01/1-map-china-the-intercept-3.png?w=1536 1536w, https://theintercept.com/wp-content/uploads/2021/01/1-map-china-the-intercept-3.png?w=540 540w, https://theintercept.com/wp-content/uploads/2021/01/1-map-china-the-intercept-3.png?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source">The database obtained by The Intercept contains police reports from Ürümqi, the capital and largest city in China&#8217;s Xinjiang Uyghur Autonomous Region.<br/>Map: Soohee Cho/The Intercept</figcaption><!-- END-CONTENT(photo)[6] --></figure><!-- END-BLOCK(photo)[6] -->
<p>It offers an inside view into police intelligence files and auxiliary community police meetings, as well as the operation of checkpoints that are pervasive in Ürümqi. It also details phone, online, and financial surveillance of marginalized groups, showing how granular surveillance purportedly on the watch for extremism is often simply looking at religious activity. Additionally, the database spells out how Chinese authorities are analyzing and refining the information they collect, including trying to weed out “filler” intelligence tips submitted by police and citizens to inflate their numbers and using automated policing software to help prompt investigations like the one into the WeChat travel group.</p>
<!-- BLOCK(acast)[7](%7B%22componentName%22%3A%22ACAST%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Afalse%7D)(%7B%22id%22%3A%22insidechina-spolicestatetacticsagainstmuslims%22%2C%22podcast%22%3A%22intercepted-with-jeremy-scahill%22%2C%22subscribe%22%3Atrue%7D) --><div class="acast-player">
  <iframe src="https://embed.acast.com/intercept-presents/insidechina-spolicestatetacticsagainstmuslims?accentColor=111111&#038;bgColor=f5f6f7&#038;logo=false" frameborder="0" scrolling="no" class="acast-player__embed"></iframe>
</div><!-- END-BLOCK(acast)[7] -->
<p>Among the revelations from the database is information on the extensive use of a tool that plugs into phones to download their contents, the “anti-terrorism sword,” deployed so frequently that Chinese authorities worried it was alienating the populace. It shows authorities tracking how their policies succeeded in driving down mosque attendance. It also offers evidence that the “Physicals for All” biometric collection program, which authorities insisted was solely a health initiative, is intended as part of the policing system. And it quantifies and provides details on the extensive electronic monitoring that goes on in Xinjiang, containing millions of text messages, phone call records, and contact lists alongside banking records, phone hardware and subscriber data, and references to WeChat monitoring as well as e-commerce and banking records.</p>
<p>The database also sheds light on the extent of policing and detention in Xinjiang. It details how former residents who went abroad and applied for political asylum were flagged as terrorists. In some cases, it appears as though fixed-term sentences were assigned to people in <!-- INLINE(tooltip)[8](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Officially%20known%20as%20%5Cu201ctransformation%20through%20education%2C%5Cu201d%20China%5Cu2019s%20re-education%20system%20practices%20what%20researcher%20Adrian%20Zenz%20calls%20%5Cu201chighly%20coercive%20brainwashing.%5Cu201d%22%7D) --><span data-tooltip="Officially known as “transformation through education,” China’s re-education system practices what researcher Adrian Zenz calls “highly coercive brainwashing.”" class="tooltip"><!-- INLINE-CONTENT(tooltip)[8] -->re-education<!-- END-INLINE-CONTENT(tooltip)[8] --></span><!-- END-INLINE(tooltip)[8] --> detention — undercutting the idea, promulgated by the government, that the lengths of such detentions are contingent on rehabilitation or <!-- INLINE(tooltip)[9](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Prison-like%20vocational%20training%20facilities%20purport%20to%20transmit%20skills%20but%20in%20actuality%20perform%20coercive%20re-education.%20They%20are%20the%20most%20lenient%20form%20of%20incarceration.%20Distinct%20from%20real%20vocational%20training%20centers%20in%20China%20that%20do%20not%20involve%20forced%20stays.%22%7D) --><span data-tooltip="Prison-like vocational training facilities purport to transmit skills but in actuality perform coercive re-education. They are the most lenient form of incarceration. Distinct from real vocational training centers in China that do not involve forced stays." class="tooltip"><!-- INLINE-CONTENT(tooltip)[9] -->vocational training<!-- END-INLINE-CONTENT(tooltip)[9] --></span><!-- END-INLINE(tooltip)[9] -->.</p>
<!-- BLOCK(photo)[10](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22xtra-large%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed xtra-large-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[10] -->
<img loading="lazy" decoding="async" width="2000" height="1334" class="aligncenter size-large wp-image-342808" src="https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544186-edit.jpg" alt="Surveillance cameras are mounted to the exterior of a mosque in the main bazaar in Urumqi, Xinjiang autonomous region, China, on Nov. 6, 2018." srcset="https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544186-edit.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544186-edit.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544186-edit.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544186-edit.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544186-edit.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544186-edit.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544186-edit.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source pullright">Surveillance cameras are mounted to the exterior of a mosque in the main bazaar in Ürümqi, Xinjiang, on Nov. 6, 2018.<br/>Photo: Bloomberg via Getty Images</figcaption><!-- END-CONTENT(photo)[10] --></figure><!-- END-BLOCK(photo)[10] -->

<div class="KeyTakeaways py-9 px-7 sm:px-10 -ml-5 w-[calc(100%_+_2.5rem)] sm:float-right mt-2 mb-10 sm:ml-10 xl:mr-[calc(-50%_+_65px)] sm:!max-w-[60%] xl:!max-w-[75%] xl:relative xl:z-[35]" style="background: #d0dae6">
      <div class="KeyTakeaways-title font-sans font-black text-body text-2xl mb-8">The Ürümqi Police Database Reveals:</div>
  
  <ul class="p-0 !m-0">
          <li class="mb-7 last:mb-0 ml-4 !list-square !list-outside text-xl font-sans text-body">
        <div>How Chinese authorities collect millions of text messages, phone contacts, and call records, as well as e-commerce and banking records, from Muslim minorities in Xinjiang.</div>
      </li>
          <li class="mb-7 last:mb-0 ml-4 !list-square !list-outside text-xl font-sans text-body">
        <div>Invasive surveillance techniques watch for signs of religious enthusiasm, which are generally equated with extremism.</div>
      </li>
          <li class="mb-7 last:mb-0 ml-4 !list-square !list-outside text-xl font-sans text-body">
        <div>Evidence that biometric data collected under the “Physicals for All” health program feeds into the police surveillance system.</div>
      </li>
          <li class="mb-7 last:mb-0 ml-4 !list-square !list-outside text-xl font-sans text-body">
        <div>Police use community informants to collect massive amounts of information on Uyghurs in Ürümqi.</div>
      </li>
          <li class="mb-7 last:mb-0 ml-4 !list-square !list-outside text-xl font-sans text-body">
        <div>Applying for asylum abroad can result in being classified as a terrorist, as part of an initiative to prevent the “backflow” of foreign ideas.</div>
      </li>
      </ul>
</div>

<p>Taken together, the materials provide a broad overview of how the extensive surveillance systems deployed in Xinjiang fit together to repress minority populations and how extensively they impact day-to-day life in the region.</p>
<p>“Overall, this testifies to an incredible police state, one that is quite likely to place suspicions on people who have not really done anything wrong,” said Adrian Zenz, an anthropologist and researcher who focuses on Xinjiang and Tibet.</p>
<p>The investigations stemming from the WeChat travelers group offer a concrete example of this intense policing, said Maya Wang, China senior researcher at Human Rights Watch. “You can see the muddled thinking in here, where people are being jailed for nothing, but also the process is so arbitrary.”</p>
<p>The revelations underscore how Xinjiang is an early look at the ways recent technology, like smartphones, cheap digital camera systems, and mass online storage of data, can be combined to monitor and repress large groups of people when civil liberties concerns are pushed aside.</p>
<p>“The mass surveillance in Xinjiang is a cautionary tale for all of us,” said Wang. “Xinjiang really shows how privacy is a gateway right, where if you have no privacy, that’s where you see that you have no freedoms as a human being at all. You don’t have the right to practice your religion, you don’t have the right to be who you are, you don’t even have the right to think your own thoughts because your thoughts are being parsed out by these incessant visits and incessantly monitored by surveillance systems, whether they’re human or artificial, and evaluated constantly for your level of loyalty to the government.”</p>
<p>Landasoft and China&#8217;s Ministry of Foreign Affairs did not respond to requests for comment.</p>
<h2>Central Storage for the Public Security Bureau in Ürümqi</h2>
<p>The database obtained by The Intercept appears to be maintained and used by the Ürümqi City Public Security Bureau and the broader Xinjiang Public Security Bureau. It also contains documents from units of the national Internet Safety and Protection Bureau.</p>
<p>Landasoft has branded the software that appears to be behind the database as “<a href="http://www.landasoft.com/html/class/sjy/itap/index.html">iTap</a>,” a big data system it markets publicly.</p>
<p>The database spans 52 gigabytes and contains close to 250 million rows of data. It is fed by and provides data back to various apps, roughly a dozen of which appear linked to the database. These include:</p>
<ul>
<li>Jingwang Weishi, an app for monitoring files on a mobile phone, which police in China have reportedly forced Uyghurs to download.</li>
<li>Baixing Anquan, which roughly translates to “people’s safety app” or “public safety app” and <a href="https://beta.documentcloud.org/documents/20466282-document-1">appears</a> to be used by both citizens and police, including to enable citizens to snitch on one another to the authorities.</li>
<li>Quzheng Shuju Guanli, or “Evidence Collection Management,” which collects “evidence” from apps like <!-- INLINE(tooltip)[12](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22A%20smartphone%20app%20that%20is%20ubiquitous%20in%20China%2C%20used%20not%20just%20for%20messaging%20but%20also%20to%20pay%20bills%20and%20to%20share%20photos%20and%20news.%20It%20is%20used%20extensively%20by%20Chinese%20authorities%2C%20including%20as%20an%20instrument%20of%20social%20control.%22%7D) --><span data-tooltip="A smartphone app that is ubiquitous in China, used not just for messaging but also to pay bills and to share photos and news. It is used extensively by Chinese authorities, including as an instrument of social control." class="tooltip"><!-- INLINE-CONTENT(tooltip)[12] -->WeChat<!-- END-INLINE-CONTENT(tooltip)[12] --></span><!-- END-INLINE(tooltip)[12] --> and Outlook.</li>
<li>ZhiPu, a graphic interface of people’s relationships and the extent to which authorities are interested in them (the database contains only sparse information on ZhiPu).</li>
</ul>
<!-- BLOCK(jw-gif)[13](%7B%22componentName%22%3A%22JW_GIF%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22aspectRatio%22%3A%22340%3A227%22%2C%22size%22%3A%22medium%22%2C%22sourceId%22%3A%22fV5EQ8IC%22%2C%22sourceName%22%3A%22jw%22%7D) --><div class="shortcode" data-shortcode="jw-gif" data-aspect-ratio="340%3A227" data-size="medium" data-video-key="fV5EQ8IC"><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/content.jwplatform.com/thumbs/fV5EQ8IC-720.jpg?w=1200&#038;ssl=1" /></div><!-- END-BLOCK(jw-gif)[13] -->
<!-- BLOCK(caption)[14](%7B%22componentName%22%3A%22CAPTION%22%2C%22entityType%22%3A%22SHORTCODE%22%7D)(%7B%7D) --><div class="shortcode shortcode-caption" data-shortcode="caption" data-caption="The%20database%20contains%20evidence%20of%20extensive%20monitoring%20by%20Chinese%20authorities.%20In%20some%20cases%2C%20like%20SMS%20text%20messages%2C%20it%20contains%20actual%20communication%20captured%20by%20authorities.%20In%20others%2C%20like%20WeChat%2C%20there%20are%20fields%2C%20reporting%20code%2C%20or%20references%20to%20monitoring%20in%20police%20files."><!-- CONTENT(caption)[14] -->The database contains evidence of extensive monitoring by Chinese authorities. In some cases, like SMS text messages, it contains actual communication captured by authorities. In others, like WeChat, there are fields, reporting code, or references to monitoring in police files.<!-- END-CONTENT(caption)[14] --></div><!-- END-BLOCK(caption)[14] -->
<p>One of the database’s major components is an extensive collection of minutes from “community stability” meetings, in which de facto police auxiliaries, or citizen-staffed neighborhood police, discuss what took place the week prior across their area. The database also contains various associated documents outlining policing and intelligence priorities and summaries of intelligence collected, local facilities checked, families of detainees visited, and updates on people of interest in the community. There are also weekly intelligence and detention reports, which include information on investigations of tips and on suspicious people.</p>
<!-- BLOCK(annotated-image)[15](%7B%22componentName%22%3A%22ANNOTATED_IMAGE%22%2C%22entityType%22%3A%22RESOURCE%22%2C%22resource%22%3A%7B%22__typename%22%3A%22Image%22%2C%22accessibleDescription%22%3A%22Some%20alt%20text%22%2C%22creditText%22%3A%22Screenshots%3A%20Obtained%20by%20The%20Intercept%22%2C%22description%22%3A%22Left%3A%20A%20police-issued%20smartphone.%20Right%3A%20Login%20screen%20for%20one%20of%20the%20apps%20on%20the%20smartphone%2C%20Public%20Safety%20App.%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2021%5C%2F01%5C%2F3-screenshot-2.jpg%22%7D%7D)(%7B%22items%22%3A%5B%7B%22id%22%3A%221%22%2C%22text%22%3A%22Public%20Safety%20App.%20Used%20to%20submit%20intelligence%20reports%20or%20tips%2C%20among%20other%20things.%22%7D%2C%7B%22id%22%3A%222%22%2C%22text%22%3A%22People%20Inspection%20App.%20Used%20for%20facial%20recognition.%22%7D%2C%7B%22id%22%3A%223%22%2C%22text%22%3A%22An%20app%20linking%20to%20a%20police%20automation%20system%2C%20the%20Integrated%20Joint%20Operations%20Platform%2C%20or%20IJOP.%22%7D%2C%7B%22id%22%3A%224%22%2C%22text%22%3A%22Registration%20screen%20for%20the%20Public%20Safety%20App%22%7D%2C%7B%22id%22%3A%225%22%2C%22text%22%3A%22Password%22%7D%2C%7B%22id%22%3A%226%22%2C%22text%22%3A%22Login%20button%22%7D%5D%7D) --><figure class="annotated-image"><img data-recalc-dims="1" decoding="async" alt="Some alt text" src="https://theintercept.com/wp-content/uploads/2021/01/3-screenshot-2.jpg?w=1200" /><figcaption><p class="caption">Left: A police-issued smartphone. Right: Login screen for one of the apps on the smartphone, Public Safety App.</p><p class="credit">Screenshots: Obtained by The Intercept</p><ol class="legend"><li>1: Public Safety App. Used to submit intelligence reports or tips, among other things.</li><li>2: People Inspection App. Used for facial recognition.</li><li>3: An app linking to a police automation system, the Integrated Joint Operations Platform, or IJOP.</li><li>4: Registration screen for the Public Safety App</li><li>5: Password</li><li>6: Login button</li></ol></figcaption></figure><!-- END-BLOCK(annotated-image)[15] -->
<p>The database provides information on numerous other tools used to analyze the digital surveillance it contains. For example, documents in the database reference a Chinese government system called the Integrated Joint Operations Platform. IJOP, which has been the subject of extensive interest and discussion by human rights groups, gathers together surveillance about the residents of Xinjiang, stores it centrally, and uses it to make automated policing decisions referred to in the database as “pushes,” or push notifications. IJOP was the platform police said issued the order to investigate the WeChat free travel group.</p>
<p>Other documents give information on the use of the label <!-- INLINE(tooltip)[16](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22People%20deemed%20to%20be%20extremists%20or%20terrorists%2C%20or%20with%20such%20tendencies.%20The%20%5Cu201ccategories%5Cu201d%20refer%20to%20detailed%20rankings%20based%20on%20the%20government%5Cu2019s%20perception%20of%20their%20mindset%20and%20potential%20to%20cause%20harm.%22%7D) --><span data-tooltip="People deemed to be extremists or terrorists, or with such tendencies. The “categories” refer to detailed rankings based on the government’s perception of their mindset and potential to cause harm." class="tooltip"><!-- INLINE-CONTENT(tooltip)[16] -->“three-category people,”<!-- END-INLINE-CONTENT(tooltip)[16] --></span><!-- END-INLINE(tooltip)[16] --> who are deemed terrorists or extremists, with three varying degrees of severity.</p>
<p>The database itself repeatedly uses a marker to query for Uyghur people, “iXvWZREN,” which groups them with terrorists and ex-convicts. There is no marker for Han Chinese, the majority ethnic group in China.</p>
<!-- BLOCK(photo)[17](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[17] -->
<img loading="lazy" decoding="async" width="2000" height="1334" class="aligncenter size-large wp-image-343004" src="https://theintercept.com/wp-content/uploads/2021/01/AP18193280618637-edit-grid.jpg" alt="A monitor of a computer at an inspection point shows many faces in Kashgarin the Xinjiang Uyghur Autonomous Region on June 28, 2018." srcset="https://theintercept.com/wp-content/uploads/2021/01/AP18193280618637-edit-grid.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2021/01/AP18193280618637-edit-grid.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2021/01/AP18193280618637-edit-grid.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2021/01/AP18193280618637-edit-grid.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2021/01/AP18193280618637-edit-grid.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2021/01/AP18193280618637-edit-grid.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2021/01/AP18193280618637-edit-grid.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source pullright">A computer monitor shows many faces at an inspection point in Kashgar, Xinjiang, on June 28, 2018.<br/>Photo: Yomiuri Shimbun via AP</figcaption><!-- END-CONTENT(photo)[17] --></figure><!-- END-BLOCK(photo)[17] -->
<h2>From Checkpoints to Chat Monitoring: Surveillance in Ürümqi</h2>
<p>The surveillance in Xinjiang was known to be extensive, creating one of the most watched regions in the world. What the database reveals is how this spying machine is used: what surveillance looks like on the ground (unrelenting) and what specific ends it is intended to serve (often to curb any unsanctioned influence, from the practice of Islam to ideas from foreign countries). People are watched up close and at a distance, with some information directly sucked out of their digital devices, other data collected from taps and sensors, and still more from relatives and informants in the community. The campaign against Uyghurs and their practice of Islam is laid out in stark and aggressive terms in police documents, and paranoia about outside or otherwise malign influence of many sorts manifest repeatedly.</p>
<p>Some of the most invasive data in the database comes from “anti-terrorism sword” phone inspection tools. Police at checkpoints, which pervade the city, make people plug their phones into these devices, which come from various manufacturers. They gather personal data from phones, including contacts and text messages, and also check pictures, videos, audio files, and documents against a list of prohibited items. They can display <!-- INLINE(tooltip)[18](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22A%20smartphone%20app%20that%20is%20ubiquitous%20in%20China%2C%20used%20not%20just%20for%20messaging%20but%20also%20to%20pay%20bills%20and%20to%20share%20photos%20and%20news.%20It%20is%20used%20extensively%20by%20Chinese%20authorities%2C%20including%20as%20an%20instrument%20of%20social%20control.%22%7D) --><span data-tooltip="A smartphone app that is ubiquitous in China, used not just for messaging but also to pay bills and to share photos and news. It is used extensively by Chinese authorities, including as an instrument of social control." class="tooltip"><!-- INLINE-CONTENT(tooltip)[18] -->WeChat<!-- END-INLINE-CONTENT(tooltip)[18] --></span><!-- END-INLINE(tooltip)[18] --> and SMS text messages. The data extracted is then integrated into <!-- INLINE(tooltip)[19](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Integrated%20Joint%20Operations%20Platform%2C%20a%20police%20automation%20platform%20that%2C%20according%20to%20Human%20Rights%20Watch%2C%20%5Cu201caggregates%20data%20about%20people%20and%20flags%20to%20officials%20those%20it%20deems%20potentially%20threatening.%5Cu201d%22%7D) --><span data-tooltip="Integrated Joint Operations Platform, a police automation platform that, according to Human Rights Watch, “aggregates data about people and flags to officials those it deems potentially threatening.”" class="tooltip"><!-- INLINE-CONTENT(tooltip)[19] -->IJOP<!-- END-INLINE-CONTENT(tooltip)[19] --></span><!-- END-INLINE(tooltip)[19] -->.</p>
<p>A <a href="https://beta.documentcloud.org/documents/20466322-document-14">2018 report</a> from a neighborhood just northeast of the center of Ürümqi mentions authorities conducting searches on 1,860 people with an anti-terrorism sword in just one week in March. In the same report, detailing a single week in April, 2,057 people in the area had their phones checked. Around 30,000 people live in the area, the <!-- INLINE(tooltip)[20](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22A%20neighborhood%20in%20%5Cu00dcr%5Cu00fcmqi%5Cu2019s%20Shuimogou%20district%20of%20in%20the%20central%20northeast%20of%20the%20city.%22%7D) --><span data-tooltip="A neighborhood in Ürümqi’s Shuimogou district of in the central northeast of the city." class="tooltip"><!-- INLINE-CONTENT(tooltip)[20] -->Qidaowan neighorhood<!-- END-INLINE-CONTENT(tooltip)[20] --></span><!-- END-INLINE(tooltip)[20] -->, according to government statistics.</p>
<p class="p1"><!-- BLOCK(pullquote)[21](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[21] -->People are watched up close and at a distance, with some information directly sucked out of their digital devices, other data collected from taps and sensors, and still more from relatives and informants in the community.<!-- END-CONTENT(pullquote)[21] --></blockquote><!-- END-BLOCK(pullquote)[21] --></p>
<p>This pattern of frequent police stops is seen in other parts of Ürümqi. <a href="https://beta.documentcloud.org/documents/20466399-document-27">Documents discuss</a> police checking people’s phones upwards of three or four times in one night, and how this makes it difficult to stay on the good side of the populace, which is clearly becoming annoyed.</p>
<p>For example, an August 2017 police report said that “due to overly frequent phone inspections conducted by certain checkpoints, which caused some people to be inspected over 3 times, people complain about this work.&#8221; An October 2017 “social opinion intelligence report” stated that “some people reflected that the current checkpoint is too overpowered. Often they would be checked 3 times during one night. It wastes their time when they are in an emergency.&#8221;</p>
<p>The documents discuss people who switched to older phones to prevent the inconvenience of these phone checks.</p>
<p>Rune Steenberg, an anthropologist in Denmark focusing on Xinjiang and Uyghurs, who spent time in Kashgar as a researcher as late as 2016, said he switched to using a simple phone rather than a smartphone in 2014 and that many Uyghurs did the same. “It’s not just about them discovering stuff on your phone,” he said. “They can place stuff on your phone in order to incriminate you. And there&#8217;s no way you can afterwards prove that that was placed on your phone and it wasn&#8217;t from you. So it became really dangerous, actually, to have a smartphone.”</p>
<p>And, Steenberg said, police would often scam people into giving up their smartphones, falsely stating the phone had religious content and asking people if it was theirs, knowing they would disown the device. “They would be like, ‘No, that’s not my phone, no, I didn’t bring my phone here,’” said Steenberg. Then, he said, the police would hold onto the phones and sell them afterward.</p>
<!-- BLOCK(photo)[22](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22xtra-large%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed xtra-large-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[22] -->
<img loading="lazy" decoding="async" width="2000" height="1333" class="aligncenter size-large wp-image-342811" src="https://theintercept.com/wp-content/uploads/2021/01/AP19049396516942-edit.jpg" alt="Residents pass by a security checkpoint and surveillance cameras mounted on a street in Kashgar in western China's Xinjiang region on Nov. 5, 2017." srcset="https://theintercept.com/wp-content/uploads/2021/01/AP19049396516942-edit.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2021/01/AP19049396516942-edit.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2021/01/AP19049396516942-edit.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2021/01/AP19049396516942-edit.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2021/01/AP19049396516942-edit.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2021/01/AP19049396516942-edit.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2021/01/AP19049396516942-edit.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source pullright">Residents pass by a security checkpoint and surveillance cameras mounted on a street in Kashgar, Xinjiang, on Nov. 5, 2017.<br/>Photo: Ng Han Guan/AP</figcaption><!-- END-CONTENT(photo)[22] --></figure><!-- END-BLOCK(photo)[22] -->
<p>The database also helps quantify how broadly phone surveillance was deployed around Ürümqi. For example, in the space of one year and 11 months, Chinese authorities collected close to 11 million SMS messages. In one year and 10 months, they gathered 11.8 million records on phone call duration and parties involved in the call. And in a one-year, 11-month period, they gathered seven million contacts and around 255,000 records on phone hardware, including the <a href="https://theintercept.com/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/">IMSI number</a> that identifies phones on cellular networks; phone model and manufacturer; a computer network identifier known as a MAC address; and another cellular network identifier, the IMEI number.</p>
<p>Phone call information that is tracked in the database includes people on the calls, name of the recipient, and the start and stop times of each conversation. Fields in the database indicate that online dating information, e-commerce purchases, and email contacts may also be extracted from phones.</p>
<p>“You cannot feel safe anywhere because of your cellphone,” said Abduweli Ayup, a linguist and poet who lived in Kashgar, Xinjiang. “You have to turn your cellphone on 24 hours, and you have to answer the phone at any time if police call you.” He said that with chat apps also monitored, Uyghurs can never experience privacy, even at home.</p>
<!-- BLOCK(photo)[23](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[23] -->
<img data-recalc-dims="1" height="1024" width="1024" decoding="async" class="aligncenter size-large wp-image-343093" src="https://theintercept.com/wp-content/uploads/2021/01/2-chart-the-intercept.png?fit=1024%2C1024" alt="The database contains phone surveillance records, helping to quantify police monitoring of communications in Xinjiang." />
<figcaption class="caption source">The database contains phone surveillance records, helping to quantify police monitoring of communications in Xinjiang.<br/>Chart: Soohee Cho/The Intercept</figcaption><!-- END-CONTENT(photo)[23] --></figure><!-- END-BLOCK(photo)[23] -->
<p>Beyond passively watching phones, the government worked to coerce people to participate in a biometrics program purported to be a health initiative. Under the “Physicals for All” program, citizens were required to go have their faces scanned and voice signatures analyzed, as well as give DNA. Documents describing the program indicate it is part of the policing system.</p>
<p>Darren Byler, an anthropologist and postdoctoral researcher at the Center for Asian Studies at the University of Colorado, Boulder, said that while the “Physicals for All” program has long been known about and suspected to be a form of surveillance, authorities have always denied it and said it was simply a public health initiative. “How clearly this is part of the policing system is made clear in the documents,” Byler said. “It’s very clear, it’s obvious that that’s a part of how they want to control the population.”</p>
<p>Reports in the database show “Physicals for All” work is routinely conducted through the police “convenience stations,” leading to complaints from citizens about sanitary conditions. (The convenience stations purportedly bring the community and police closer together, featuring amenities like public Wi-Fi and phone-charging, but are <a href="https://www.wsj.com/articles/chinas-hard-edge-the-leader-of-beijings-muslim-crackdown-gains-influence-11554655886">hubs for surveillance</a>.) They also discuss how citizens who fail to submit biometric and biographical information are reported to police, face fines, and are sometimes made to formally renounce their behavior. Some documents about the program focus on migrants or the <!-- INLINE(tooltip)[24](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Muslim%20minorities%20who%20speak%20languages%20other%20than%20Mandarin%2C%20including%20Uyghurs%2C%20Kazakhs%2C%20and%20Kyrgyz.%22%7D) --><span data-tooltip="Muslim minorities who speak languages other than Mandarin, including Uyghurs, Kazakhs, and Kyrgyz." class="tooltip"><!-- INLINE-CONTENT(tooltip)[24] -->“ethnic-language people.”<!-- END-INLINE-CONTENT(tooltip)[24] --></span><!-- END-INLINE(tooltip)[24] --> <a href="https://beta.documentcloud.org/documents/20466268-document-15">One indicates</a> that physical exams conducted on students are used for policing:</p>
<!-- BLOCK(text-snippet)[25](%7B%22componentName%22%3A%22TEXT_SNIPPET%22%2C%22entityType%22%3A%22SHORTCODE%22%7D)(%7B%22showTitle%22%3A%22true%22%2C%22link%22%3A%22https%3A%5C%2F%5C%2Fbeta.documentcloud.org%5C%2Fdocuments%5C%2F20466268-document-15%22%2C%22title%22%3A%22%2809-march-2018%29%20%28Qidaowan%20community%29%22%2C%22clickable%22%3A%22body%22%7D) --><blockquote data-shortcode-type="text-snippet"><!-- CONTENT(text-snippet)[25] --></p>
<p>(2) Houbo Institute, which is part of the second hospital of Xinjiang Medical University, is going to start a new semester soon. The list of names of returning students is not known to us.</p>
<p>&nbsp;</p>
<p>Method: After the semester begins, we will immediately conduct “physical checkup” work on the returning students using the IJOP platform. We will report to the national security team immediately if we find any suspicious labels.</p>
<p><!-- END-CONTENT(text-snippet)[25] --></blockquote><!-- END-BLOCK(text-snippet)[25] -->
<p>Documents in the database also show heightened surveillance of people as they move about in public through the growing use of facial recognition, directed by the <!-- INLINE(tooltip)[26](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Integrated%20Joint%20Operations%20Platform%2C%20a%20police%20automation%20platform%20that%2C%20according%20to%20Human%20Rights%20Watch%2C%20%5Cu201caggregates%20data%20about%20people%20and%20flags%20to%20officials%20those%20it%20deems%20potentially%20threatening.%5Cu201d%22%7D) --><span data-tooltip="Integrated Joint Operations Platform, a police automation platform that, according to Human Rights Watch, “aggregates data about people and flags to officials those it deems potentially threatening.”" class="tooltip"><!-- INLINE-CONTENT(tooltip)[26] -->IJOP<!-- END-INLINE-CONTENT(tooltip)[26] --></span><!-- END-INLINE(tooltip)[26] --> system. The police <a href="https://beta.documentcloud.org/documents/20466322-document-14">report</a> on use of the anti-terrorism sword also details the use of facial recognition, showing that over 900 people were checked using facial recognition across 40 police convenience stations in <!-- INLINE(tooltip)[27](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22A%20neighborhood%20in%20%5Cu00dcr%5Cu00fcmqi%5Cu2019s%20Shuimogou%20district%20of%20in%20the%20central%20northeast%20of%20the%20city.%22%7D) --><span data-tooltip="A neighborhood in Ürümqi’s Shuimogou district of in the central northeast of the city." class="tooltip"><!-- INLINE-CONTENT(tooltip)[27] -->Qidaowan Precinct<!-- END-INLINE-CONTENT(tooltip)[27] --></span><!-- END-INLINE(tooltip)[27] -->.</p>
<!-- BLOCK(text-snippet)[28](%7B%22componentName%22%3A%22TEXT_SNIPPET%22%2C%22entityType%22%3A%22SHORTCODE%22%7D)(%7B%22showTitle%22%3A%22true%22%2C%22link%22%3A%22https%3A%5C%2F%5C%2Fbeta.documentcloud.org%5C%2Fdocuments%5C%2F20466322-document-14%22%2C%22title%22%3A%22%2817-April-2018%29%22%2C%22clickable%22%3A%22body%22%7D) --><blockquote data-shortcode-type="text-snippet"><!-- CONTENT(text-snippet)[28] --></p>
<p>(FOUR) Convenience Police Station Operational Notes:</p>
<p>&nbsp;</p>
<p>There are 40 convenience stations in Qidaowan Precinct in total. &#8230; This week we searched 2,057 people with the anti-terrorism sword and did facial recognition on 935 people. No suspects. We sent 237 intelligence reports using the Intelligence Reporting System.</p>
<p><!-- END-CONTENT(text-snippet)[28] --></blockquote><!-- END-BLOCK(text-snippet)[28] -->
<p>It’s clear, Byler said after reviewing the numbers, that “face recognition has become an increasingly important aspect of the surveillance system.”</p>
<p>Some of the most intriguing evidence of personal data surveillance comes from computer programming code stored in the database and seemingly designed to generate reports. This reporting code references a good deal of material not included in the database obtained by The Intercept, making it impossible to confirm how much of it is actually collected by authorities or how it would be used.</p>
<p>Still, these so-called tactic or evidence collection reports give clues as to what information the database, on its own or as part of a broader collection, is intended to include. The report code contains references to data on online services like Facebook, QQ, Momo, Weibo, Taobao&#8217;s Aliwangwang, as well as actual phone call recordings, photos, GPS locations, and a list of “high-risk words.”</p>
<p>Documents in the database also confirm police access to information on people’s use of <!-- INLINE(tooltip)[29](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22A%20smartphone%20app%20that%20is%20ubiquitous%20in%20China%2C%20used%20not%20just%20for%20messaging%20but%20also%20to%20pay%20bills%20and%20to%20share%20photos%20and%20news.%20It%20is%20used%20extensively%20by%20Chinese%20authorities%2C%20including%20as%20an%20instrument%20of%20social%20control.%22%7D) --><span data-tooltip="A smartphone app that is ubiquitous in China, used not just for messaging but also to pay bills and to share photos and news. It is used extensively by Chinese authorities, including as an instrument of social control." class="tooltip"><!-- INLINE-CONTENT(tooltip)[29] -->WeChat<!-- END-INLINE-CONTENT(tooltip)[29] --></span><!-- END-INLINE(tooltip)[29] -->. Discussion of WeChat surveillance appears in records of auxiliary community police meetings and accounts of police investigations.</p>

<div class="KeyTakeaways py-9 px-7 sm:px-10 -ml-5 w-[calc(100%_+_2.5rem)] sm:float-right mt-2 mb-10 sm:ml-10 xl:mr-[calc(-50%_+_65px)] sm:!max-w-[60%] xl:!max-w-[75%] xl:relative xl:z-[35]" style="background: #d0dae6">
      <div class="KeyTakeaways-title font-sans font-black text-body text-2xl mb-8">Surveillance in Ürümqi:</div>
  
  <ul class="p-0 !m-0">
          <li class="mb-7 last:mb-0 ml-4 !list-square !list-outside text-xl font-sans text-body">
        <div>Police use a tool known as an “anti-terrorism sword” to download the contents of Ürümqi residents’ phones, sometimes three or four times a day.</div>
      </li>
          <li class="mb-7 last:mb-0 ml-4 !list-square !list-outside text-xl font-sans text-body">
        <div>Uyghurs who travel outside of China, as well as their relatives and friends, are monitored to stifle desire for greater freedom or autonomy. </div>
      </li>
          <li class="mb-7 last:mb-0 ml-4 !list-square !list-outside text-xl font-sans text-body">
        <div>Authorities keep tabs on who participates in weekly “flag-raising” ceremonies as a litmus test for loyalty to China. </div>
      </li>
          <li class="mb-7 last:mb-0 ml-4 !list-square !list-outside text-xl font-sans text-body">
        <div>Contact with areas outside Xinjiang, or with people in contact with those areas, is extensively monitored and is grounds for suspicion.</div>
      </li>
          <li class="mb-7 last:mb-0 ml-4 !list-square !list-outside text-xl font-sans text-body">
        <div>Practicing Islam is considered a red flag that has led to further investigation.</div>
      </li>
      </ul>
</div>

<p>In an example of how police document their WeChat capabilities, one <a href="https://beta.documentcloud.org/documents/20466264-document-20">document</a> — from the national Internet Safety Bureau — demonstrates a police search drill in which a police officer was marked as a suspect for the purpose of the exercise. He drove throughout the city while other police traced his vehicle using his WeChat history and location data. Authorities appeared to read the mock suspect’s WeChat texts, with one “WeChat Analysis” reading, “He said he&#8217;s having lunch at the petrol area.”</p>
<p>The aim of much of the surveillance is to curb any influence that could conceivably lead to a desire for greater freedom or autonomy among Uyghur and other minority groups in Xinjiang.</p>
<p>For example, the material corroborates reports that Uyghurs are monitored outside of China and that it’s not just people who travel abroad and then return who are surveilled, but also their relatives and friends.</p>
<p>Police in the <!-- INLINE(tooltip)[31](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22One%20of%20%5Cu00dcr%5Cu00fcmqi%5Cu2019s%20seven%20urban%20districts%2C%20in%20the%20central%20northeast%20of%20the%20city%2C%20containing%20the%20municipal%20seat.%20Not%20a%20majority-Uyghur%20district.%22%7D) --><span data-tooltip="One of Ürümqi’s seven urban districts, in the central northeast of the city, containing the municipal seat. Not a majority-Uyghur district." class="tooltip"><!-- INLINE-CONTENT(tooltip)[31] -->Shuimogou district<!-- END-INLINE-CONTENT(tooltip)[31] --></span><!-- END-INLINE(tooltip)[31] --> of Ürümqi investigated a young woman because her high school friend went to study at Stanford University and because the woman sometimes talked to her on WeChat. “According to the investigation, we did not find any violation of rules or laws while she resided and worked in our area,” read a <a href="https://beta.documentcloud.org/documents/20466266-document-18">2018 report</a> from the neighborhood of <!-- INLINE(tooltip)[32](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22A%20neighborhood%20in%20%5Cu00dcr%5Cu00fcmqi%5Cu2019s%20Shuimogou%20district%20in%20the%20central%20northeast%20of%20the%20city.%22%7D) --><span data-tooltip="A neighborhood in Ürümqi’s Shuimogou district in the central northeast of the city." class="tooltip"><!-- INLINE-CONTENT(tooltip)[32] -->Weihuliang<!-- END-INLINE-CONTENT(tooltip)[32] --></span><!-- END-INLINE(tooltip)[32] -->. “While she resided in the area she actively participated in community works and actively participated in other activities in the community, and actively participated in the raising of the <!-- INLINE(tooltip)[33](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22A%20community%20event%20in%20which%20participants%20proclaim%20their%20loyalty%20to%20the%20Chinese%20government%20and%20sometimes%20give%20a%20speech%20known%20as%20%5Cu201cvoice%20my%20opinion%2C%20raise%20my%20sword.%5Cu201d%20The%20fervor%20of%20participation%20is%20observed%20and%20sometimes%20noted%20to%20authorities.%22%7D) --><span data-tooltip="A community event in which participants proclaim their loyalty to the Chinese government and sometimes give a speech known as “voice my opinion, raise my sword.” The fervor of participation is observed and sometimes noted to authorities." class="tooltip"><!-- INLINE-CONTENT(tooltip)[33] -->flag ceremony<!-- END-INLINE-CONTENT(tooltip)[33] --></span><!-- END-INLINE(tooltip)[33] --> in the community. We do not see any abnormality and she is cleared from suspicion.” <!-- INLINE(tooltip)[34](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Anthropologist%20and%20researcher%20at%20the%20Center%20for%20Asian%20Studies%20at%20the%20University%20of%20Colorado%2C%20Boulder.%20Byler%5Cu2019s%20doctorate%20was%20in%20Uyghur%20technopolitics%20in%20China.%22%7D) --><span data-tooltip="Anthropologist and researcher at the Center for Asian Studies at the University of Colorado, Boulder. Byler’s doctorate was in Uyghur technopolitics in China." class="tooltip"><!-- INLINE-CONTENT(tooltip)[34] -->Byler<!-- END-INLINE-CONTENT(tooltip)[34] --></span><!-- END-INLINE(tooltip)[34] --> called the incident “important confirmation on the way people outside the country are being monitored by those in the country, and the way these connections produce ‘micro-clues’ of suspicion.”</p>
<p>In another example of how outside influence is grounds for suspicion, a <a href="https://beta.documentcloud.org/documents/20466397-document-9">document</a> from the community of Anping, also in Shuimogou, mentions that all phones and computers of workers who have visited family outside of the city should be inspected for unauthorized content.</p>
<!-- BLOCK(text-snippet)[35](%7B%22componentName%22%3A%22TEXT_SNIPPET%22%2C%22entityType%22%3A%22SHORTCODE%22%7D)(%7B%22showTitle%22%3A%22false%22%2C%22link%22%3A%22https%3A%5C%2F%5C%2Fbeta.documentcloud.org%5C%2Fdocuments%5C%2F20466397-document-9%22%2C%22clickable%22%3A%22body%22%7D) --><blockquote data-shortcode-type="text-snippet"><!-- CONTENT(text-snippet)[35] --></p>
<p>Clearing violent and terrorist audio and video has always been a very important part of stability work. Our community pays a lot of attention to this work. Because the Chinese New Year break is coming to an end, people will increasingly come back to work, therefore our community decided to conduct a large-scale computer and cellphone inspection for workers who are coming back. We inspect stored information on every household and every person&#8217;s cellphone and computer. To date, we did not discover violent and terrorist audio and video among the residents in the area. We will continue this work later and will record the results.</p>
<p><!-- END-CONTENT(text-snippet)[35] --></blockquote><!-- END-BLOCK(text-snippet)[35] -->
<p>Chinese authorities’ fear of outside influence on citizens of Xinjiang is connected to an initiative called “backflow prevention,” or <em>fanghuiliu</em>. The idea is to prevent the “backflow” of extremism or other malign ideas from abroad.</p>
<p>A possible example of this initiative is the 2018 imprisonment of Feng Siyu, a Chinese academic who came to Xinjiang University’s Folklore Research Center as a translator the previous February. Feng is part of China’s Han ethnic majority and is originally from Hangzhou in eastern China, far from Xinjiang. But she studied abroad — including at Amherst College, SOAS University of London, and Indiana University — and came under police attention in Ürümqi, according to an October 2017 police intelligence note in the database. The note recorded that Feng had “foreign obscure software” on her OnePlus smartphone. The note further stated that the software came with the smartphone and that Feng did not use it.</p>
<p>Feng is believed to have been sentenced to two years in prison in February 2018. Her imprisonment is tracked on <a href="https://shahit.biz/eng/">shahit.biz</a>, the Xinjiang Victim’s Database, a website that documents instances of incarceration in the region.</p>
<p>Steenberg, the anthropologist, said he believes Feng was under scrutiny because she traveled between the U.S. and Ürümqi and spoke good Uyghur, and because of her work at the folk research center and with its founder Rahile Dawut. A <a href="https://www.nytimes.com/2018/08/10/world/asia/china-xinjiang-rahile-dawut.html">celebrated academic</a>, Dawut collected ethnographic data, including folktales and oral literature in <!-- INLINE(tooltip)[36](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22The%20southern%20part%20of%20Xinjiang%20has%20a%20particularly%20high%20proportion%20of%20Uyghur%20residents.%22%7D) --><span data-tooltip="The southern part of Xinjiang has a particularly high proportion of Uyghur residents." class="tooltip"><!-- INLINE-CONTENT(tooltip)[36] -->southern Xinjiang<!-- END-INLINE-CONTENT(tooltip)[36] --></span><!-- END-INLINE(tooltip)[36] --> and information on Sufi Islamic practices. Dawut disappeared in December 2017 and is believed to be in detention.</p>
<p>The drive for “backflow prevention” is also reflected in the identification of those who leave China as security threats. One <a href="https://beta.documentcloud.org/documents/20466281-document-2">report</a> from Saimachang, a Uyghur stronghold in the historic center of Ürümqi, discusses former residents who have gone abroad and applied for political asylum as terrorists, corroborating reports that Uyghurs are monitored outside of China.</p>
<p>“It’s really clear evidence that charges of terrorism or extremism don’t meet international standards of terrorism or extremism,” said <!-- INLINE(tooltip)[37](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Anthropologist%20and%20researcher%20at%20the%20Center%20for%20Asian%20Studies%20at%20the%20University%20of%20Colorado%2C%20Boulder.%20Byler%5Cu2019s%20doctorate%20was%20in%20Uyghur%20technopolitics%20in%20China.%22%7D) --><span data-tooltip="Anthropologist and researcher at the Center for Asian Studies at the University of Colorado, Boulder. Byler’s doctorate was in Uyghur technopolitics in China." class="tooltip"><!-- INLINE-CONTENT(tooltip)[37] -->Byler<!-- END-INLINE-CONTENT(tooltip)[37] --></span><!-- END-INLINE(tooltip)[37] -->. “Applying for political asylum is not a sign of terrorism by most definitions, but in this context it is.” This also demonstrates the amount of detailed information Chinese authorities keep about Uyghurs abroad.</p>
<!-- BLOCK(photo)[38](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22xtra-large%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed xtra-large-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[38] -->
<img loading="lazy" decoding="async" width="2713" height="1808" class="aligncenter size-large wp-image-343042" src="https://theintercept.com/wp-content/uploads/2021/01/20210121_AbduweliAyup-017_Es-edit.jpg" alt="Abduweli Ayup, a Uyghur national, linguist and activist at his home in Bergen, Norway on January 21, 2021." srcset="https://theintercept.com/wp-content/uploads/2021/01/20210121_AbduweliAyup-017_Es-edit.jpg?w=2713 2713w, https://theintercept.com/wp-content/uploads/2021/01/20210121_AbduweliAyup-017_Es-edit.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2021/01/20210121_AbduweliAyup-017_Es-edit.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2021/01/20210121_AbduweliAyup-017_Es-edit.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2021/01/20210121_AbduweliAyup-017_Es-edit.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2021/01/20210121_AbduweliAyup-017_Es-edit.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2021/01/20210121_AbduweliAyup-017_Es-edit.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2021/01/20210121_AbduweliAyup-017_Es-edit.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2021/01/20210121_AbduweliAyup-017_Es-edit.jpg?w=2400 2400w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source pullright">Abduweli Ayup, a Uyghur, linguist and activist at his home in Bergen, Norway on January 21, 2021.<br/>Photo: Melanie Burford for The Intercept</figcaption><!-- END-CONTENT(photo)[38] --></figure><!-- END-BLOCK(photo)[38] -->
<p><!-- INLINE(tooltip)[39](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22A%20linguist%20and%20poet%20who%20lived%20in%20Kashgar%2C%20Xinjiang.%22%7D) --><span data-tooltip="A linguist and poet who lived in Kashgar, Xinjiang." class="tooltip"><!-- INLINE-CONTENT(tooltip)[39] -->Ayup<!-- END-INLINE-CONTENT(tooltip)[39] --></span><!-- END-INLINE(tooltip)[39] --> has experience with this sort of monitoring. While in Kashgar, Ayup operated a Uyghur-language kindergarten and promoted Uyghur-language education. He fled China after 15 months of detention, during which he said he was interrogated and tortured. After leaving, Ayup said at one point he joined a <!-- INLINE(tooltip)[40](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22A%20smartphone%20app%20that%20is%20ubiquitous%20in%20China%2C%20used%20not%20just%20for%20messaging%20but%20also%20to%20pay%20bills%20and%20to%20share%20photos%20and%20news.%20It%20is%20used%20extensively%20by%20Chinese%20authorities%2C%20including%20as%20an%20instrument%20of%20social%20control.%22%7D) --><span data-tooltip="A smartphone app that is ubiquitous in China, used not just for messaging but also to pay bills and to share photos and news. It is used extensively by Chinese authorities, including as an instrument of social control." class="tooltip"><!-- INLINE-CONTENT(tooltip)[40] -->WeChat<!-- END-INLINE-CONTENT(tooltip)[40] --></span><!-- END-INLINE(tooltip)[40] --> group for the Chinese embassy. “When I went to the Chinese embassy, they asked me to join their WeChat group, and when I joined, a Chinese spy in Ürümqi found me; he talked to me and he threatened me,” he said.</p>
<p>Even holding a passport is considered suspicious. Documents in the database indicate Uyghur passport holders are checked on by authorities more frequently than those without passports.</p>
<p>Indeed, any knowledge of life outside of Xinjiang can be flagged as suspicious. For example, police in <!-- INLINE(tooltip)[41](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22A%20neighborhood%20in%20%5Cu00dcr%5Cu00fcmqi%5Cu2019s%20Shuimogou%20district%20in%20the%20central%20northeast%20of%20the%20city.%22%7D) --><span data-tooltip="A neighborhood in Ürümqi’s Shuimogou district in the central northeast of the city." class="tooltip"><!-- INLINE-CONTENT(tooltip)[41] -->Weihuliang<!-- END-INLINE-CONTENT(tooltip)[41] --></span><!-- END-INLINE(tooltip)[41] --> took note in <a href="https://beta.documentcloud.org/documents/20466275-document-8">one weekly report</a>, among “people who need special attention,” of four people who had traveled to Beijing “to reflect local issues.” “The rest have never left the region, so they’re seen as safer,” Byler said.</p>
<p>Even phone calls or text chats involving outside countries invite scrutiny from authorities in Xinjiang. In Tianshan, the historic and majority-Uyghur center of Ürümqi, authorities <a href="https://beta.documentcloud.org/documents/20466441-document-17">reported</a> sending a professional driver to <!-- INLINE(tooltip)[42](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Officially%20known%20as%20%5Cu201ctransformation%20through%20education%2C%5Cu201d%20China%5Cu2019s%20re-education%20system%20practices%20what%20researcher%20Adrian%20Zenz%20calls%20%5Cu201chighly%20coercive%20brainwashing.%5Cu201d%22%7D) --><span data-tooltip="Officially known as “transformation through education,” China’s re-education system practices what researcher Adrian Zenz calls “highly coercive brainwashing.”" class="tooltip"><!-- INLINE-CONTENT(tooltip)[42] -->re-education<!-- END-INLINE-CONTENT(tooltip)[42] --></span><!-- END-INLINE(tooltip)[42] --> following an unusual phone call to a “key country.” <!-- INLINE(tooltip)[43](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Anthropologist%20and%20researcher%20who%20focuses%20on%20Xinjiang%20and%20Tibet.%22%7D) --><span data-tooltip="Anthropologist and researcher who focuses on Xinjiang and Tibet." class="tooltip"><!-- INLINE-CONTENT(tooltip)[43] -->Zenz<!-- END-INLINE-CONTENT(tooltip)[43] --></span><!-- END-INLINE(tooltip)[43] --> believes the “key country” is one in a group of 26 largely Muslim “focus” countries watched by authorities. Xinjiang authorities have targeted people with connections to these countries for interrogation, detention and even imprisonment, according to a <a href="https://www.hrw.org/report/2018/09/09/eradicating-ideological-viruses/chinas-campaign-repression-against-xinjiangs">report</a> by Human Rights Watch. The countries include Afghanistan, Algeria, Azerbaijan, Egypt, Indonesia, Iran, Iraq, Kazakhstan, Kenya, Kyrgyzstan, Libya, Malaysia, Nigeria, Pakistan, Russia, Saudi Arabia, Somalia, South Sudan, Syria, Tajikistan, Thailand, Turkey, Turkmenistan, United Arab Emirates, Uzbekistan, and Yemen.</p>
<!-- BLOCK(text-snippet)[44](%7B%22componentName%22%3A%22TEXT_SNIPPET%22%2C%22entityType%22%3A%22SHORTCODE%22%7D)(%7B%22showTitle%22%3A%22true%22%2C%22link%22%3A%22https%3A%5C%2F%5C%2Fbeta.documentcloud.org%5C%2Fdocuments%5C%2F20466441-document-17%22%2C%22title%22%3A%22Suzhoulu%20Community%20Stability%20Weekly%20Judgment%20Report%20%28Feb%2012%20-%20Feb%2014%29%22%2C%22clickable%22%3A%22body%22%7D) --><blockquote data-shortcode-type="text-snippet"><!-- CONTENT(text-snippet)[44] --></p>
<p>2. While doing home visits, a community worker learned that [name redacted], who lives in [address], national ID number [redacted], female, Uyghur, has no job and stays home to care for her young children. … Community police searched on the police net and found out that the person was arrested in [hometown] on September 21, 2017. The reason for arrest: Cellphone contains obscure chat program. &#8230;</p>
<p>&nbsp;</p>
<p>3. Social workers learned while doing home visits that [name redacted], who lives in [address redacted], Uyghur, national ID number [redacted] … his mother, [name redacted], female, Uyghur, national ID number [redacted], has been detained in Tianshan District on September 20, 2017. Reason for arrest: face covering. &#8230;</p>
<p>&nbsp;</p>
<p>4. Community workers learned during home visits that [name redacted], who lives in [address], male, Uyghur … driver &#8230; has strange phone call behaviors during the night, and communicates with key countries. He has been detained in his hometown and is currently educated and converted (Shule County). &#8230; Mother: [name redacted], female, Uyghur. &#8230; Currently the community is monitoring her husband and children according to the detainee relative conditions.<!-- END-CONTENT(text-snippet)[44] --></blockquote><!-- END-BLOCK(text-snippet)[44] -->
<p>The database also shows increased use of artificial intelligence, coupled with human intelligence, in directing surveillance in recent years. Documents from authorities in the Ürümqi districts of <!-- INLINE(tooltip)[45](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22One%20of%20%5Cu00dcr%5Cu00fcmqi%5Cu2019s%20seven%20urban%20districts%2C%20in%20the%20central%20southeast%20of%20the%20city.%20Historic%20and%20majority-Uyghur%20center%20of%20%5Cu00dcr%5Cu00fcmqi.%22%7D) --><span data-tooltip="One of Ürümqi’s seven urban districts, in the central southeast of the city. Historic and majority-Uyghur center of Ürümqi." class="tooltip"><!-- INLINE-CONTENT(tooltip)[45] -->Tianshan<!-- END-INLINE-CONTENT(tooltip)[45] --></span><!-- END-INLINE(tooltip)[45] --> and <!-- INLINE(tooltip)[46](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22One%20of%20%5Cu00dcr%5Cu00fcmqi%5Cu2019s%20seven%20urban%20districts%2C%20in%20the%20central%20northeast%20of%20the%20city%2C%20containing%20the%20municipal%20seat.%20Not%20a%20majority-Uyghur%20district.%22%7D) --><span data-tooltip="One of Ürümqi’s seven urban districts, in the central northeast of the city, containing the municipal seat. Not a majority-Uyghur district." class="tooltip"><!-- INLINE-CONTENT(tooltip)[46] -->Shuimogou<!-- END-INLINE-CONTENT(tooltip)[46] --></span><!-- END-INLINE(tooltip)[46] --> show <!-- INLINE(tooltip)[47](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Integrated%20Joint%20Operations%20Platform%2C%20a%20police%20automation%20platform%20that%2C%20according%20to%20Human%20Rights%20Watch%2C%20%5Cu201caggregates%20data%20about%20people%20and%20flags%20to%20officials%20those%20it%20deems%20potentially%20threatening.%5Cu201d%22%7D) --><span data-tooltip="Integrated Joint Operations Platform, a police automation platform that, according to Human Rights Watch, “aggregates data about people and flags to officials those it deems potentially threatening.”" class="tooltip"><!-- INLINE-CONTENT(tooltip)[47] -->IJOP<!-- END-INLINE-CONTENT(tooltip)[47] --></span><!-- END-INLINE(tooltip)[47] --> sending push notifications directing investigations by local police. In 2018, one police precinct alone received 40 such notifications, according to one <a href="https://beta.documentcloud.org/documents/20466271-document-12">document</a>.</p>
<p>While news reports in recent years have depicted Chinese police automation systems like IJOP as rudimentary, relying heavily on human intelligence, evidence in the database indicates use of machine-learning technology is growing, said Byler, who received his Ph.D. in Uyghur technopolitics in Chinese cities of Central Asia.</p>
<!-- BLOCK(annotated-image)[48](%7B%22componentName%22%3A%22ANNOTATED_IMAGE%22%2C%22entityType%22%3A%22RESOURCE%22%2C%22resource%22%3A%7B%22__typename%22%3A%22Image%22%2C%22accessibleDescription%22%3A%22Some%20alt%20text%22%2C%22creditText%22%3A%22Screenshots%3A%20Obtained%20by%20The%20Intercept%22%2C%22description%22%3A%22A%20police%20smartphone%20app%20used%20in%20%5Cu00dcr%5Cu00fcmqi%20during%20a%20police%20stop%20or%20at%20a%20checkpoint%20shows%20facial%20recognition%20results%2C%20along%20with%20information%20about%20the%20top%20matches%20from%20police%20records.%20On%20the%20left%2C%20five%20possible%20matches%20are%20shown%2C%20with%20the%20top%20match%20rated%2095.58%20percent%20likely%20correct.%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2021%5C%2F01%5C%2F1-screenshot-1.jpg%22%7D%7D)(%7B%22items%22%3A%5B%7B%22id%22%3A%221%22%2C%22text%22%3A%22Search%20result%22%7D%2C%7B%22id%22%3A%222%22%2C%22text%22%3A%22Name%22%7D%2C%7B%22id%22%3A%223%22%2C%22text%22%3A%22Sex%3A%20Male%22%7D%2C%7B%22id%22%3A%224%22%2C%22text%22%3A%22ID%20number%22%7D%2C%7B%22id%22%3A%225%22%2C%22text%22%3A%22Identity%20characteristics%22%7D%2C%7B%22id%22%3A%226%22%2C%22text%22%3A%22Process%20result%22%7D%2C%7B%22id%22%3A%227%22%2C%22text%22%3A%22Face%20database%3A%20Long-term%20residents%22%7D%2C%7B%22id%22%3A%228%22%2C%22text%22%3A%22Note%22%7D%2C%7B%22id%22%3A%229%22%2C%22text%22%3A%22Person%20details%22%7D%2C%7B%22id%22%3A%2210%22%2C%22text%22%3A%22Date%20of%20Birth%22%7D%2C%7B%22id%22%3A%2211%22%2C%22text%22%3A%22National%20ID%20number%22%7D%2C%7B%22id%22%3A%2212%22%2C%22text%22%3A%22Identity%3A%20Border%20control%20subject%20of%20%26%238220%3Bbackflow%20prevention.%26%238221%3B%20%28Indicates%20the%20person%20was%20flagged%20as%20part%20of%20an%20initiative%20to%20curb%20the%20influx%20of%20dangerous%20ideas%20from%20foreign%20countries.%29%22%7D%2C%7B%22id%22%3A%2213%22%2C%22text%22%3A%22Process%3A%20Arrest%20immediately%20if%20it%26%238217%3Bs%20the%20person%2C%20otherwise%20collect%20information.%22%7D%5D%7D) --><figure class="annotated-image"><img data-recalc-dims="1" decoding="async" alt="Some alt text" src="https://theintercept.com/wp-content/uploads/2021/01/1-screenshot-1.jpg?w=1200" /><figcaption><p class="caption">A police smartphone app used in Ürümqi during a police stop or at a checkpoint shows facial recognition results, along with information about the top matches from police records. On the left, five possible matches are shown, with the top match rated 95.58 percent likely correct.</p><p class="credit">Screenshots: Obtained by The Intercept</p><ol class="legend"><li>1: Search result</li><li>2: Name</li><li>3: Sex: Male</li><li>4: ID number</li><li>5: Identity characteristics</li><li>6: Process result</li><li>7: Face database: Long-term residents</li><li>8: Note</li><li>9: Person details</li><li>10: Date of Birth</li><li>11: National ID number</li><li>12: Identity: Border control subject of &#8220;backflow prevention.&#8221; (Indicates the person was flagged as part of an initiative to curb the influx of dangerous ideas from foreign countries.)</li><li>13: Process: Arrest immediately if it&#8217;s the person, otherwise collect information.</li></ol></figcaption></figure><!-- END-BLOCK(annotated-image)[48] -->
<p>“What your data shows is that it’s beginning to automate in some ways, especially around face surveillance,” <!-- INLINE(tooltip)[49](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Anthropologist%20and%20researcher%20at%20the%20Center%20for%20Asian%20Studies%20at%20the%20University%20of%20Colorado%2C%20Boulder.%20Byler%5Cu2019s%20doctorate%20was%20in%20Uyghur%20technopolitics%20in%20China.%22%7D) --><span data-tooltip="Anthropologist and researcher at the Center for Asian Studies at the University of Colorado, Boulder. Byler’s doctorate was in Uyghur technopolitics in China." class="tooltip"><!-- INLINE-CONTENT(tooltip)[49] -->Byler<!-- END-INLINE-CONTENT(tooltip)[49] --></span><!-- END-INLINE(tooltip)[49] --> said. “If they’re using 900 checkpoint [scans] around face surveillance, they are using AI to a significant extent now,” he added, referring to the 935 facial scans in one <a href="https://beta.documentcloud.org/documents/20466322-document-14">week</a> in <!-- INLINE(tooltip)[50](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22A%20neighborhood%20in%20%5Cu00dcr%5Cu00fcmqi%5Cu2019s%20Shuimogou%20district%20of%20in%20the%20central%20northeast%20of%20the%20city.%22%7D) --><span data-tooltip="A neighborhood in Ürümqi’s Shuimogou district of in the central northeast of the city." class="tooltip"><!-- INLINE-CONTENT(tooltip)[50] -->Qidaowan Precinct<!-- END-INLINE-CONTENT(tooltip)[50] --></span><!-- END-INLINE(tooltip)[50] -->.</p>
<p>Documents show police are also adding into <!-- INLINE(tooltip)[51](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Integrated%20Joint%20Operations%20Platform%2C%20a%20police%20automation%20platform%20that%2C%20according%20to%20Human%20Rights%20Watch%2C%20%5Cu201caggregates%20data%20about%20people%20and%20flags%20to%20officials%20those%20it%20deems%20potentially%20threatening.%5Cu201d%22%7D) --><span data-tooltip="Integrated Joint Operations Platform, a police automation platform that, according to Human Rights Watch, “aggregates data about people and flags to officials those it deems potentially threatening.”" class="tooltip"><!-- INLINE-CONTENT(tooltip)[51] -->IJOP<!-- END-INLINE-CONTENT(tooltip)[51] --></span><!-- END-INLINE(tooltip)[51] --> a significant amount of checkpoint data, including phone downloads from anti-terrorism swords. Documents from 2018 and 2019 show mounting push notifications from IJOP. “It’s clear that that system is beginning to alert them and direct their policing in new ways, and so it is starting to come online,” said Byler.</p>
<p>The <a href="https://beta.documentcloud.org/documents/20466396-document-7">documents</a> also make clear the extent to which authorities try to assess the psychology of people under suspicion, with a keen eye in particular toward loyalty and even fervor. This is exhibited at so-called flag-raising ceremonies: community events in which participants proclaim their loyalty to China and the ruling regime. Documents show that these events are extensively monitored by police and their proxies. Authorities watch not just former detainees but their relatives as well, to confirm they are participating and to determine how passionate they are about doing so.</p>
<!-- BLOCK(photo)[52](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22xtra-large%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed xtra-large-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[52] -->
<img loading="lazy" decoding="async" width="4000" height="2667" class="aligncenter size-large wp-image-343043" src="https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544178-ES-edit.jpg" alt="A security officer looks on as a woman passes through a checkpoint, equipped with a metal detector and facial recognition technology, to enter the main bazaar in Urumqi, Xinjiang autonomous region, China, on Tuesday, Nov. 6, 2018. Although it represents just 1.5 percent of China's population and 1.3 percent of its economy, Xinjiang sits at the geographic heart of Xi's signature Belt and Road Initiative. Source: Bloomberg" srcset="https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544178-ES-edit.jpg?w=4000 4000w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544178-ES-edit.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544178-ES-edit.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544178-ES-edit.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544178-ES-edit.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544178-ES-edit.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544178-ES-edit.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544178-ES-edit.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544178-ES-edit.jpg?w=2400 2400w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544178-ES-edit.jpg?w=3600 3600w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source pullright">A security officer looks on as a woman passes through a checkpoint, equipped with a metal detector and facial recognition technology, to enter the main bazaar in Ürümqi, Xinjiang, on Nov. 6, 2018.<br/>Photo: Bloomberg via Getty Images</figcaption><!-- END-CONTENT(photo)[52] --></figure><!-- END-BLOCK(photo)[52] -->
<p>Authorities used participation in these weekly ceremonies as a way to monitor three people, likely Uyghurs, on a community watchlist, according to <a href="https://beta.documentcloud.org/documents/20466275-document-8">one of the documents</a>. Participants are asked to perform a vow of loyalty involving the phrase “Voice your opinion, raise your sword” (or &#8220;Show your voice, show your sword&#8221;). If their participation is not wholehearted and patriotic, employers and others inform on them to police, Byler said. Also <a href="https://beta.documentcloud.org/documents/20466273-document-10">scrutinized</a> at the ceremonies are “surplus laborers,” people on a coercive labor track that blends work on community projects with re-education. The surplus labor program has ramped up sharply over the last four years.</p>
<!-- BLOCK(pullquote)[53](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[53] -->The documents make clear the extent to which authorities try to assess the psychology of people under suspicion, with a keen eye in particular toward loyalty and even fervor. <!-- END-CONTENT(pullquote)[53] --></blockquote><!-- END-BLOCK(pullquote)[53] -->
<p>Documents show that the police officers and neighbors doing this monitoring at flag-raising ceremonies are also making recommendations about who should be sent to <!-- INLINE(tooltip)[54](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Officially%20known%20as%20%5Cu201ctransformation%20through%20education%2C%5Cu201d%20China%5Cu2019s%20re-education%20system%20practices%20what%20researcher%20Adrian%20Zenz%20calls%20%5Cu201chighly%20coercive%20brainwashing.%5Cu201d%22%7D) --><span data-tooltip="Officially known as “transformation through education,” China’s re-education system practices what researcher Adrian Zenz calls “highly coercive brainwashing.”" class="tooltip"><!-- INLINE-CONTENT(tooltip)[54] -->re-education<!-- END-INLINE-CONTENT(tooltip)[54] --></span><!-- END-INLINE(tooltip)[54] --> camps.</p>
<p>Although China has insisted its policing in Xinjiang is directed at stopping terrorism and extremism rather than persecuting the practice of any religion, the database confirms and details how surveillance homes in on many common expressions of Islamic faith, and even on curiosity about the religion, leading in many cases to investigations. The government considers it a potential sign of religious extremism to grow a beard, have a prayer rug, own Uyghur books, or even quit smoking or drinking.</p>
<p>Surveillance <a href="https://beta.documentcloud.org/documents/20466261-document-24">directed</a> at Islamic practice in the region <a href="https://beta.documentcloud.org/documents/20466397-document-9">also</a> involves <a href="https://beta.documentcloud.org/documents/20466275-document-8">watching mosques</a>. Authorities surveil mosque attendance, tally which worshippers are migrants and which are residents, and monitor whether prayers are conducted in an orderly way, according to police reports in the database.</p>
<p><!-- INLINE(tooltip)[55](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22A%20linguist%20and%20poet%20who%20lived%20in%20Kashgar%2C%20Xinjiang.%22%7D) --><span data-tooltip="A linguist and poet who lived in Kashgar, Xinjiang." class="tooltip"><!-- INLINE-CONTENT(tooltip)[55] -->Ayup<!-- END-INLINE-CONTENT(tooltip)[55] --></span><!-- END-INLINE(tooltip)[55] --> said mosques have cameras inside too, and people are surveilled for the way in which they pray.</p>
<p>“If people use a different style of praying … the camera takes a picture,” he said, adding that a friend was arrested for this. Ayup said that some Uyghurs pray in very old styles, and some use new styles. “In the Chinese government’s eyes, the new style is threatening, is extremism,” he said.</p>
<p>Even the use of natural gas in a neighborhood mosque was monitored, according to a document from Quingcui, a community in the Liudaowan neighborhood in the district of <!-- INLINE(tooltip)[56](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22One%20of%20%5Cu00dcr%5Cu00fcmqi%5Cu2019s%20seven%20urban%20districts%2C%20in%20the%20central%20northeast%20of%20the%20city%2C%20containing%20the%20municipal%20seat.%20Not%20a%20majority-Uyghur%20district.%22%7D) --><span data-tooltip="One of Ürümqi’s seven urban districts, in the central northeast of the city, containing the municipal seat. Not a majority-Uyghur district." class="tooltip"><!-- INLINE-CONTENT(tooltip)[56] -->Shuimogou.<!-- END-INLINE-CONTENT(tooltip)[56] --></span><!-- END-INLINE(tooltip)[56] --></p>
<!-- BLOCK(photo)[57](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[57] -->
<img loading="lazy" decoding="async" width="2000" height="1334" class="aligncenter size-large wp-image-343005" src="https://theintercept.com/wp-content/uploads/2021/01/GettyImages-102603698-edit-grid.jpg" alt="Security cameras are seen (R) on a street in Urumqi, capital of China's Xinjiang region on July 2, 2010." srcset="https://theintercept.com/wp-content/uploads/2021/01/GettyImages-102603698-edit-grid.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-102603698-edit-grid.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-102603698-edit-grid.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-102603698-edit-grid.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-102603698-edit-grid.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-102603698-edit-grid.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-102603698-edit-grid.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source pullright">Security cameras are seen on a street in Ürümqi, the capital of western China&#8217;s Xinjiang region, on July 2, 2010.<br/>Photo: Peter Parks/AFP via Getty Images</figcaption><!-- END-CONTENT(photo)[57] --></figure><!-- END-BLOCK(photo)[57] -->
<h2>Citizens Integrated Into System of “Hyperpolicing”</h2>
<p>The relentless surveillance in Xinjiang has been the best understood component of the repressive environment in the region. More difficult to study and understand, particularly for human rights groups abroad, has been how and to what extent it drives enforcement. As it turns out, the intensity of policing in Xinjiang matches the hyperaggression of the surveillance: closely integrated and every bit as pervasive. The database obtained by The Intercept reveals evidence of a deeply invasive police state, concerned with people’s thoughts and enthusiasms, entering their homes, interfering with their daily movements, and even seeking out crimes in activities perfectly legal at the time they were undertaken. Authorities in the region direct investigations and other police work using an approach one expert, after examining portions of the database, described as “hyperpolicing,” cracking down on any aberrant behavior. The tactics used are all-encompassing, involving civilian brigades, home visits, and frequent checkpoints. As extensive as this work is, it is also conducted in a way that targets people according to perceived danger. Minorities of all sorts — be they linguistic, religious, or ethnic — are disproportionately patrolled.</p>
<p>Discrimination against so-called <!-- INLINE(tooltip)[58](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Muslim%20minorities%20who%20speak%20languages%20other%20than%20Mandarin%2C%20including%20Uyghurs%2C%20Kazakhs%2C%20and%20Kyrgyz.%22%7D) --><span data-tooltip="Muslim minorities who speak languages other than Mandarin, including Uyghurs, Kazakhs, and Kyrgyz." class="tooltip"><!-- INLINE-CONTENT(tooltip)[58] -->ethnic-language people<!-- END-INLINE-CONTENT(tooltip)[58] --></span><!-- END-INLINE(tooltip)[58] -->, or Muslim minorities with their own languages, is a key component of policing in Xinjiang.</p>

<div class="KeyTakeaways py-9 px-7 sm:px-10 -ml-5 w-[calc(100%_+_2.5rem)] sm:float-right mt-2 mb-10 sm:ml-10 xl:mr-[calc(-50%_+_65px)] sm:!max-w-[60%] xl:!max-w-[75%] xl:relative xl:z-[35]" style="background: #d0dae6">
      <div class="KeyTakeaways-title font-sans font-black text-body text-2xl mb-8">“Hyperpolicing” in Ürümqi:</div>
  
  <ul class="p-0 !m-0">
          <li class="mb-7 last:mb-0 ml-4 !list-square !list-outside text-xl font-sans text-body">
        <div>A wide range of activities and behaviors among Muslim minorities has been considered criminal, even if they were legal at the time of the incident.</div>
      </li>
          <li class="mb-7 last:mb-0 ml-4 !list-square !list-outside text-xl font-sans text-body">
        <div>Vigorous policing of mosques, including tight regulation of who can enter and observation of how congregants pray, with the goal of lowering attendance.</div>
      </li>
          <li class="mb-7 last:mb-0 ml-4 !list-square !list-outside text-xl font-sans text-body">
        <div>Other examples of hyperpolicing: watching people’s online behavior, requiring knives in restaurants to be kept on chains, regular home visits to inspect for religious items like prayer mats and books.</div>
      </li>
          <li class="mb-7 last:mb-0 ml-4 !list-square !list-outside text-xl font-sans text-body">
        <div>Community informants received extensive guidance on what kind of intelligence to feed to police.</div>
      </li>
      </ul>
</div>

<p>Many detainees and former detainees are referred to as “three-category people.” The label, applied very liberally, refers to purported extremists and terrorists of three levels of severity, <a href="https://undocs.org/CERD/C/CHN/FCO/14-17">ranked</a> according to the government’s perception of their mindset and potential to cause harm. Relatives of detainees and former detainees are also labeled, ranked, and tracked by police. Another system categorizes people as trustworthy, normal, or untrustworthy.</p>
<p>Police categories and rankings implicitly draw attention to minority groups, but in some contexts, this focus is made explicit. For example, minutes from the <!-- INLINE(tooltip)[60](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Discussions%20by%20neighborhood%20police%20auxiliaries%20of%20what%20happened%20in%20the%20area%20during%20the%20prior%20week.%22%7D) --><span data-tooltip="Discussions by neighborhood police auxiliaries of what happened in the area during the prior week." class="tooltip"><!-- INLINE-CONTENT(tooltip)[60] -->community stability meetings<!-- END-INLINE-CONTENT(tooltip)[60] --></span><!-- END-INLINE(tooltip)[60] --> <a href="https://beta.documentcloud.org/documents/20466441-document-17">show</a> that these meetings specifically put a focus on <!-- INLINE(tooltip)[61](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Muslim%20minorities%20who%20speak%20languages%20other%20than%20Mandarin%2C%20including%20Uyghurs%2C%20Kazakhs%2C%20and%20Kyrgyz.%22%7D) --><span data-tooltip="Muslim minorities who speak languages other than Mandarin, including Uyghurs, Kazakhs, and Kyrgyz." class="tooltip"><!-- INLINE-CONTENT(tooltip)[61] -->“ethnic-language people,”<!-- END-INLINE-CONTENT(tooltip)[61] --></span><!-- END-INLINE(tooltip)[61] --> who are under stronger surveillance than Chinese-speaking Hui Muslims. The meetings also focus on relatives of primarily Uyghur detainees.</p>
<p>Uyghurs are also policed in their practice of Islam. Documents show that police at times <a href="https://beta.documentcloud.org/documents/20466397-document-9">conduct</a> security checks on everyone attending a given mosque.</p>
<p>Indeed, the government tightly controls who is allowed into mosques. One police <a href="https://beta.documentcloud.org/documents/20466262-document-23">document</a> detailed an incident in which three students tried to go to a funeral for a friend’s father at a mosque. As <!-- INLINE(tooltip)[62](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Anthropologist%20and%20researcher%20at%20the%20Center%20for%20Asian%20Studies%20at%20the%20University%20of%20Colorado%2C%20Boulder.%20Byler%5Cu2019s%20doctorate%20was%20in%20Uyghur%20technopolitics%20in%20China.%22%7D) --><span data-tooltip="Anthropologist and researcher at the Center for Asian Studies at the University of Colorado, Boulder. Byler’s doctorate was in Uyghur technopolitics in China." class="tooltip"><!-- INLINE-CONTENT(tooltip)[62] -->Byler<!-- END-INLINE-CONTENT(tooltip)[62] --></span><!-- END-INLINE(tooltip)[62] --> described it, the three students “were just hanging around the entrance trying to find a way to walk in because they had to scan their ID cards to go inside, but they were worried that [the front gate checkpoint] would contact the police and they didn’t know what to do.” The police questioned the students, held them for hours, and put them on a watchlist at school, “even though they explained everything they were trying to do,” Byler said.</p>
<p>More recent reports indicate that authorities set a goal of lowering mosque attendance and met it. Many police documents mention that mosque attendance is lower, and some explicitly describe this as indicating success. One <a href="https://beta.documentcloud.org/documents/20466261-document-24">report</a> indicated that at one mosque, total visits in a four-month period declined by 80,000, compared to the same period in the prior year: more than a 96 percent decrease. This appears to be partly due to the departure of an imam and temporary closure of the mosque, but the report states that “there has been a drastic lowering of religious practitioners” over two years. It adds that this is partly because visitors left the city, were sent to camps, or were afraid to practice Islam.</p>
<!-- BLOCK(text-snippet)[63](%7B%22componentName%22%3A%22TEXT_SNIPPET%22%2C%22entityType%22%3A%22SHORTCODE%22%7D)(%7B%22showTitle%22%3A%22true%22%2C%22link%22%3A%22https%3A%5C%2F%5C%2Fbeta.documentcloud.org%5C%2Fdocuments%5C%2F20466261-document-24%22%2C%22title%22%3A%22%2812-November-2018%29%28xiheba%29%5Cu2026%22%2C%22clickable%22%3A%22body%22%7D) --><blockquote data-shortcode-type="text-snippet"><!-- CONTENT(text-snippet)[63] --></p>
<p>There are 167 religious practitioners in the jurisdiction. &#8230; In the past two years, there has been a drastic lowering of religious practitioners. &#8230; The remaining practitioners are by and large long-term residents of advanced age.</p>
<p>&nbsp;</p>
<p>Reasons for changes in believer numbers and composition: &#8230;</p>
<p>&nbsp;</p>
<p>The jurisdiction strictly followed the anti-extremism work ordered by the regional officer. …</p>
<p>&nbsp;</p>
<p>The mosque has a strict real-name policy and conducts religious activities following the law. People who work in the public sector and some young people no longer enter the premises. …</p>
<p>&nbsp;</p>
<p>Since the beginning of the 2017 Strike Down and Detain operation, the problematic people in the jurisdiction have either been detained or re-educated. The total population has decreased.</p>
<p><!-- END-CONTENT(text-snippet)[63] --></blockquote><!-- END-BLOCK(text-snippet)[63] -->
<p>Mosque activity that the Chinese government views as signs of extremism, said <!-- INLINE(tooltip)[64](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22A%20linguist%20and%20poet%20who%20lived%20in%20Kashgar%2C%20Xinjiang.%22%7D) --><span data-tooltip="A linguist and poet who lived in Kashgar, Xinjiang." class="tooltip"><!-- INLINE-CONTENT(tooltip)[64] -->Ayup<!-- END-INLINE-CONTENT(tooltip)[64] --></span><!-- END-INLINE(tooltip)[64] -->, can include praying without a Uyghur doppa, wearing perfume in the mosque, or even being relaxed while praying. Anybody who doesn’t praise the Chinese Communist Party after their prayer is also considered suspicious, he said.</p>
<!-- BLOCK(pullquote)[65](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22left%22%7D) --><blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><!-- CONTENT(pullquote)[65] -->One system categorizes people as trustworthy, normal, or untrustworthy.<!-- END-CONTENT(pullquote)[65] --></blockquote><!-- END-BLOCK(pullquote)[65] -->
<p>In police notes, Byler said, “it’s interesting that they’re describing citizens as enemies, and it makes it clear that they see this as a sort of counterinsurgency, when really they’re just trying to detect who practices Islam or not.”</p>
<p><a href="https://beta.documentcloud.org/documents/20466266-document-18">Notes from a police station</a> in <!-- INLINE(tooltip)[66](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22A%20neighborhood%20in%20%5Cu00dcr%5Cu00fcmqi%5Cu2019s%20Shuimogou%20district%20in%20the%20central%20northeast%20of%20the%20city.%22%7D) --><span data-tooltip="A neighborhood in Ürümqi’s Shuimogou district in the central northeast of the city." class="tooltip"><!-- INLINE-CONTENT(tooltip)[66] -->Weihuliang<!-- END-INLINE-CONTENT(tooltip)[66] --></span><!-- END-INLINE(tooltip)[66] --> describe a “large-scale investigation &#8230; focused on areas where migrant populations congregate,” concentrating on people from predominately Uyghur southern Xinjiang. The notes said that in one week, police had registered 605 people from southern Xinjiang, investigating 383 of them and people they lived with. In the same sweeps, authorities inspected 367 phones and nine computers.</p>
<p>Xinjiang authorities’ policing of Islam is particularly zealous in its hunt for “wild imams” or “illegal preaching.” The terms refer to Islamic preachers whose work is not sanctioned by the Chinese government; rights groups have said Chinese authorities draw this legal line arbitrarily, to serve political needs. These imams can be prosecuted for sermons delivered either online and in mosques.</p>
<p>The Weihuliang police station notes list 60 people involved in so-called illegal preaching, 50 of whom are in custody. The same document said that “illegal preaching” in the <!-- INLINE(tooltip)[67](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22A%20smartphone%20app%20that%20is%20ubiquitous%20in%20China%2C%20used%20not%20just%20for%20messaging%20but%20also%20to%20pay%20bills%20and%20to%20share%20photos%20and%20news.%20It%20is%20used%20extensively%20by%20Chinese%20authorities%2C%20including%20as%20an%20instrument%20of%20social%20control.%22%7D) --><span data-tooltip="A smartphone app that is ubiquitous in China, used not just for messaging but also to pay bills and to share photos and news. It is used extensively by Chinese authorities, including as an instrument of social control." class="tooltip"><!-- INLINE-CONTENT(tooltip)[67] -->WeChat<!-- END-INLINE-CONTENT(tooltip)[67] --></span><!-- END-INLINE(tooltip)[67] --> group “Group 1 teach (Qur&#8217;an ABCs)” led to the capture of a 41-year-old <!-- INLINE(tooltip)[68](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22A%20predominately%20Muslim%2C%20but%20also%20predominately%20Chinese-speaking%2C%20ethnic%20group%20in%20China.%22%7D) --><span data-tooltip="A predominately Muslim, but also predominately Chinese-speaking, ethnic group in China." class="tooltip"><!-- INLINE-CONTENT(tooltip)[68] -->Hui<!-- END-INLINE-CONTENT(tooltip)[68] --></span><!-- END-INLINE(tooltip)[68] --> woman and the administrative detention of a 62-year-old Hui man.</p>
<p>More recent documents, from 2017 through 2019, reflect mounting difficulty by the police in continuing to find violations to enforce and people to place in detention or <!-- INLINE(tooltip)[69](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Officially%20known%20as%20%5Cu201ctransformation%20through%20education%2C%5Cu201d%20China%5Cu2019s%20re-education%20system%20practices%20what%20researcher%20Adrian%20Zenz%20calls%20%5Cu201chighly%20coercive%20brainwashing.%5Cu201d%22%7D) --><span data-tooltip="Officially known as “transformation through education,” China’s re-education system practices what researcher Adrian Zenz calls “highly coercive brainwashing.”" class="tooltip"><!-- INLINE-CONTENT(tooltip)[69] -->re-education<!-- END-INLINE-CONTENT(tooltip)[69] --></span><!-- END-INLINE(tooltip)[69] --> camps. That’s because in 2017, the first wave of detentions swept Xinjiang, leading to the expulsion of a large portion of the population from Ürümqi. Xinjiang party leader Chen Quanguo <a href="https://www.nytimes.com/interactive/2019/11/16/world/asia/china-xinjiang-documents.html">told</a> officials to “round up everyone who should be rounded up,” extending a hard-line approach Chinese President Xi Jinping began organizing after a <a href="https://www.nytimes.com/2015/03/25/world/asia/china-executes-3-over-deadly-knife-attack-at-train-station-in-2014.html">mass stabbing at a train station</a> and an <a href="https://www.nytimes.com/2014/12/09/world/asia/8-sentenced-to-death-for-terrorist-attacks-in-western-china.html">attack</a> on an outdoor market with cars and explosives, both in 2014.</p>
<p>Police documents from this period, after the first wave of repression, reflect an intent to hunt down suspicious behavior of any kind.</p>
<p class="p1"><!-- BLOCK(pullquote)[70](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[70] -->“You’re being policed on a micro level, both by human policing and by the application of the technology to you and your life.”<!-- END-CONTENT(pullquote)[70] --></blockquote><!-- END-BLOCK(pullquote)[70] --></p>
<p>“The system is set up in a way that’s producing hyperpolicing,” <!-- INLINE(tooltip)[71](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Anthropologist%20and%20researcher%20at%20the%20Center%20for%20Asian%20Studies%20at%20the%20University%20of%20Colorado%2C%20Boulder.%20Byler%5Cu2019s%20doctorate%20was%20in%20Uyghur%20technopolitics%20in%20China.%22%7D) --><span data-tooltip="Anthropologist and researcher at the Center for Asian Studies at the University of Colorado, Boulder. Byler’s doctorate was in Uyghur technopolitics in China." class="tooltip"><!-- INLINE-CONTENT(tooltip)[71] -->Byler<!-- END-INLINE-CONTENT(tooltip)[71] --></span><!-- END-INLINE(tooltip)[71] --> said, “where any strange or any kind of aberrant behavior is reported, and if you’re a minority, you’re ‘ethnic,’ which is how they refer to Uyghurs and Kazakhs, then you’re very susceptible to this kind of stuff and you’re being policed on a micro level, both by human policing and by the application of the technology to you and your life.”</p>
<p>In some instances, people are being persecuted for violating laws before the laws were even instituted.</p>
<p>One police document describes how <!-- INLINE(tooltip)[72](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22A%20predominately%20Muslim%2C%20but%20also%20predominately%20Chinese-speaking%2C%20ethnic%20group%20in%20China.%22%7D) --><span data-tooltip="A predominately Muslim, but also predominately Chinese-speaking, ethnic group in China." class="tooltip"><!-- INLINE-CONTENT(tooltip)[72] -->Hui<!-- END-INLINE-CONTENT(tooltip)[72] --></span><!-- END-INLINE(tooltip)[72] --> women were detained because of evidence they had studied the Quran in an online group — which was legal at the time they did it but became illegal prior to their detention. They had been inactive in the group for at least a year before they were detained.</p>
<p>Such uncertainty about laws in Xinjiang, and when one might run afoul of police, echoes <!-- INLINE(tooltip)[73](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22A%20linguist%20and%20poet%20who%20lived%20in%20Kashgar%2C%20Xinjiang.%22%7D) --><span data-tooltip="A linguist and poet who lived in Kashgar, Xinjiang." class="tooltip"><!-- INLINE-CONTENT(tooltip)[73] -->Ayup<!-- END-INLINE-CONTENT(tooltip)[73] --></span><!-- END-INLINE(tooltip)[73] -->’s experience. “After people get arrested, then they will find out that ‘Oh, that [activity] is dangerous,’” he explained.</p>
<p><!-- INLINE(tooltip)[74](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22China%20senior%20researcher%20at%20Human%20Rights%20Watch.%22%7D) --><span data-tooltip="China senior researcher at Human Rights Watch." class="tooltip"><!-- INLINE-CONTENT(tooltip)[74] -->Wang<!-- END-INLINE-CONTENT(tooltip)[74] --></span><!-- END-INLINE(tooltip)[74] --> said the hyperpolicing has become more pervasive over time.</p>
<p>“It’s basically a crackdown of everything,” Wang said, spreading from repression of Islamic practices to drug abuse and mental illness. “They just want to make sure they have such control over that region, general overall control.”</p>
<!-- BLOCK(photo)[75](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22xtra-large%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed xtra-large-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[75] -->
<img loading="lazy" decoding="async" width="2000" height="1333" class="aligncenter size-large wp-image-342816" src="https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1253583511-edit.jpg" alt="People walk on the street of Xinjiang International Grand Bazaar on June 25, 2020, in Ürümqi." srcset="https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1253583511-edit.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1253583511-edit.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1253583511-edit.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1253583511-edit.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1253583511-edit.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1253583511-edit.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1253583511-edit.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source pullright">People walk on the street of Xinjiang International Grand Bazaar on June 25, 2020, in Ürümqi.<br/>Photo: David Liu/Getty Images</figcaption><!-- END-CONTENT(photo)[75] --></figure><!-- END-BLOCK(photo)[75] -->
<p>One illustration of how policing became increasingly aggressive and ubiquitous in Xinjiang is a police <a href="https://beta.documentcloud.org/documents/20466397-document-9">report</a> discussing how one knife at a dumpling shop was not chained to a secure post, as per regulation. The report said the violation needed to be rectified within a day. Laws in Xinjiang require not only the chaining of knives, the document indicated, but that knives also have QR codes identifying their owners. “It’s just a way of showing how tightly everything is controlled, that even knives that are used in cooking have to be thought of as potential weapons,” said Byler.</p>
<p>To maintain the maximal vigilance entailed in “hyperpolicing,” authorities in Xinjiang enlisted ordinary citizens to inform on one another — not unheard of in China but practiced in the region more extensively, particularly against Uyghurs and other ethnic minorities.</p>
<p>Helping to enable this, citizens are rewarded for reporting on one another. The documents in the database include some details on this previously reported fact. Informants are rewarded for passing along information, but people are also rewarded for more specific actions. <a href="https://beta.documentcloud.org/documents/20466263-document-22">Linking their WeChat account</a>, passing a verification, and posting an image can all result in a cash reward. All of this is tracked and reflected in the database.</p>
<!-- BLOCK(pullquote)[76](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22left%22%7D) --><blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><!-- CONTENT(pullquote)[76] -->This type of policing, bubbling up from the grassroots of the populace, “is about recruiting and considering ordinary people as part of these surveillance teams.”<!-- END-CONTENT(pullquote)[76] --></blockquote><!-- END-BLOCK(pullquote)[76] -->
<p>One <a href="https://beta.documentcloud.org/documents/20466323-document-13">document</a>, a public announcement from police, indicates that police and auxiliaries faced pressure to submit large quantities of intelligence to authorities. It chastised citizens in the <a href="http://www.chinadaily.com.cn/m/xinjiang/urumqi_hightech/abhouthightechzone.html">high-tech zone</a> within Ürümqi’s Xinshi district for sending in tips that are “filler created just to make report numbers seem large, and cannot be used, and occupy a large amount of manpower and time to process.” For example, “residents reported that there are often kids urinating in the elevator” of one building. Also: “A few citizens reported that they are scammed while buying crabs or mooncakes online. Quantities lost are generally not big.”</p>
<p>The announcement then went on to extensively detail 10 “categories of intelligence that are forbidden to report,” including tips having nothing to do with “policy about anti-terrorism, minority policy,” or with something called the “Xinjiang Management Agenda,” or with “policies that benefits citizens.”</p>
<p>Essentially, as <!-- INLINE(tooltip)[77](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Anthropologist%20and%20researcher%20at%20the%20Center%20for%20Asian%20Studies%20at%20the%20University%20of%20Colorado%2C%20Boulder.%20Byler%5Cu2019s%20doctorate%20was%20in%20Uyghur%20technopolitics%20in%20China.%22%7D) --><span data-tooltip="Anthropologist and researcher at the Center for Asian Studies at the University of Colorado, Boulder. Byler’s doctorate was in Uyghur technopolitics in China." class="tooltip"><!-- INLINE-CONTENT(tooltip)[77] -->Byler<!-- END-INLINE-CONTENT(tooltip)[77] --></span><!-- END-INLINE(tooltip)[77] --> put it, authorities “were like, ‘That’s not the intelligence we want, we want intelligence about the Muslims.’”</p>
<p>This type of policing, bubbling up from the grassroots of the populace, “is about recruiting and considering ordinary people as part of these surveillance teams,” <!-- INLINE(tooltip)[78](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22China%20senior%20researcher%20at%20Human%20Rights%20Watch.%22%7D) --><span data-tooltip="China senior researcher at Human Rights Watch." class="tooltip"><!-- INLINE-CONTENT(tooltip)[78] -->Wang<!-- END-INLINE-CONTENT(tooltip)[78] --></span><!-- END-INLINE(tooltip)[78] --> said. “And in that way, it spells out quite an interesting philosophy of surveillance and society and engineering that I don’t think a lot of people understand outside of China.”</p>
<p>When <!-- INLINE(tooltip)[79](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22A%20linguist%20and%20poet%20who%20lived%20in%20Kashgar%2C%20Xinjiang.%22%7D) --><span data-tooltip="A linguist and poet who lived in Kashgar, Xinjiang." class="tooltip"><!-- INLINE-CONTENT(tooltip)[79] -->Ayup<!-- END-INLINE-CONTENT(tooltip)[79] --></span><!-- END-INLINE(tooltip)[79] --> lived in Xinjiang, he said, groups of 10 families were required to report somebody once a week in a feedback box, which existed before the app. “The problem is, if you cannot find something to write, you have to make it up to avoid being sent to the camps and to the center, so it&#8217;s obligatory. That&#8217;s the problem, but you cannot blame someone who reports because it&#8217;s his or her obligation,” he said.</p>
<!-- BLOCK(photo)[80](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22982px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 982px;"><!-- CONTENT(photo)[80] -->
<img data-recalc-dims="1" height="1024" width="1024" decoding="async" class="aligncenter size-large wp-image-343094" src="https://theintercept.com/wp-content/uploads/2021/01/3-chart-the-intercept.png?fit=1024%2C1024" alt="The Public Safety App is one way authorities in Xinjiang draw ordinary citizens into the work of alerting, monitoring, and law enforcement." />
<figcaption class="caption source">The Public Safety App is one way authorities in Xinjiang draw ordinary citizens into the work of alerting, monitoring, and law enforcement.<br/>Chart: Soohee Cho/The Intercept</figcaption><!-- END-CONTENT(photo)[80] --></figure><!-- END-BLOCK(photo)[80] -->
<p>In addition to drafting ordinary citizens individually to report on neighbors, authorities in Xinjiang also organized them through more formal community groups known as “safety units” or “brigades.” These units are segmented into groups of 10, according to documents in the database. For example, 10 households or 10 businesses might be organized as a brigade, with one volunteer from each group responding to calls like an emergency medical technician and doing drills in opposition to “terrorism.”</p>
<!-- BLOCK(photo)[81](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221000px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1000px;"><!-- CONTENT(photo)[81] -->
<img data-recalc-dims="1" height="99999" width="1000" decoding="async" class="aligncenter size-article-large wp-image-342915" src="https://theintercept.com/wp-content/uploads/2021/01/button.jpg?fit=1000%2C99999" alt="button" />
<figcaption class="caption source">Each business in a community &#8220;safety unit&#8221; must install a &#8220;one-click police alert button,&#8221; according to documents in the database. Once triggered, the auxiliary police and other businesses in the &#8220;safety unit&#8221; are required to show up within two minutes.<br/>Photo: Obtained by The Intercept</figcaption><!-- END-CONTENT(photo)[81] --></figure><!-- END-BLOCK(photo)[81] -->
<p>The safety brigades hark back to a historical Chinese tradition known as the Baojia system, in which 10 households formed a bao (or later a jia, 10 of which in turn formed a bao). This fractal structure formed a social safety system and is heavily associated with policing and the militarization of the population.</p>
<p>In modern times, similar systems have been branded as “grid management.” Several years ago, the Chinese government <a href="https://www.ft.com/content/bf6a67c6-940e-11e5-bd82-c1fb87bef7af">rolled out grid management nationwide</a>; the density of citizen watch units in Xinjiang, however, has remained much higher than in other parts of the country, and safety units there are used for different purposes.</p>
<p align="left">The Xinjiang safety units have not been seen in previous government documents, <!-- INLINE(tooltip)[82](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Anthropologist%20and%20researcher%20at%20the%20Center%20for%20Asian%20Studies%20at%20the%20University%20of%20Colorado%2C%20Boulder.%20Byler%5Cu2019s%20doctorate%20was%20in%20Uyghur%20technopolitics%20in%20China.%22%7D) --><span data-tooltip="Anthropologist and researcher at the Center for Asian Studies at the University of Colorado, Boulder. Byler’s doctorate was in Uyghur technopolitics in China." class="tooltip"><!-- INLINE-CONTENT(tooltip)[82] -->Byler<!-- END-INLINE-CONTENT(tooltip)[82] --></span><!-- END-INLINE(tooltip)[82] --> said, but are pretty obvious if you’re in the region, where you’ll see drills, people marching in formation, and business owners wearing red armbands to show their affiliation.</p>
<p>“It’s the militarization of the population as a whole,” Byler said. “To this point we haven’t had a full description of what it’s supposed to do.”</p>
<p>Hyperpolicing also reaches into people’s homes through regular visits by authorities; those deemed at risk for extremist, terrorist, or separatist influence receive frequent visits. This typically means Uyghurs, dissidents, and those who have gone through <!-- INLINE(tooltip)[83](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Officially%20known%20as%20%5Cu201ctransformation%20through%20education%2C%5Cu201d%20China%5Cu2019s%20re-education%20system%20practices%20what%20researcher%20Adrian%20Zenz%20calls%20%5Cu201chighly%20coercive%20brainwashing.%5Cu201d%22%7D) --><span data-tooltip="Officially known as “transformation through education,” China’s re-education system practices what researcher Adrian Zenz calls “highly coercive brainwashing.”" class="tooltip"><!-- INLINE-CONTENT(tooltip)[83] -->re-education<!-- END-INLINE-CONTENT(tooltip)[83] --></span><!-- END-INLINE(tooltip)[83] --> camps, as well as anyone related to any of those people.</p>
<p>Minutes from <!-- INLINE(tooltip)[84](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Discussions%20by%20neighborhood%20police%20auxiliaries%20of%20what%20happened%20in%20the%20area%20during%20the%20prior%20week.%22%7D) --><span data-tooltip="Discussions by neighborhood police auxiliaries of what happened in the area during the prior week." class="tooltip"><!-- INLINE-CONTENT(tooltip)[84] -->community stability meetings<!-- END-INLINE-CONTENT(tooltip)[84] --></span><!-- END-INLINE(tooltip)[84] --> give a granular look at the type of information recorded in these home visits. They include professions, place of employment, former jobs, relatives (and relatives’ national ID numbers), travel, location of children, schools the children are attending, and what the community is still monitoring.</p>
<p>Some residents are discussed as being monitored or controlled by the community; that means a neighborhood watch unit is assigned to monitor them. This can include visits as often as every day, or once or twice a week, from one or more cadre members living in close proximity.</p>
<p>Some <a href="https://beta.documentcloud.org/documents/20466277-document-6">relatives</a> of detainees are visited daily by local police. Even those considered trustworthy are visited, “to show them warmth and pull them into the Chinese patriotic fold,” as Byler put it. “It’s like winning hearts and minds.”</p>
<p>In one account from a police document, an older woman whose son was held by authorities befriended a police officer who visited her. Police claimed that the woman had become like a mother to the officer. She treated him like her son and opened up about all of her actual son’s activities. She was the ideal type of person who has been re-educated through the system, the document indicated.</p>
<p>Some home visits are for inspection purposes, to find religious items. Documents show police searching for religious books and removing prayer mats and even, as mentioned in a July 2018 police document, a picture of the hajj, the Muslim pilgrimage to Mecca, Saudi Arabia. The <a href="https://beta.documentcloud.org/documents/20466260-document-25">documents</a> indicate this effort originates from 2018 and is connected to a government initiative known as the “three cleanups” to encourage people to purge material considered extremist from their homes. “This is one of the first times I’ve seen that mentioned explicitly, that they’re going through people’s homes,” Byler said.</p>
<p>A document from October 2018 described how these home inspections unfold:</p>
<!-- BLOCK(text-snippet)[85](%7B%22componentName%22%3A%22TEXT_SNIPPET%22%2C%22entityType%22%3A%22SHORTCODE%22%7D)(%7B%22showTitle%22%3A%22false%22%2C%22link%22%3A%22%23%22%2C%22clickable%22%3A%22title%22%7D) --><blockquote data-shortcode-type="text-snippet"><!-- CONTENT(text-snippet)[85] -->First, the personnel from the police station should gather all the people in the house into the living room in order to verify their identities one by one. Second, the cadres responsible for the household and members of the patrol team will conduct a careful inspection of all rooms of the house, especially under the carpet, in the bathroom, in the kitchen, and under the bed. Suspicious areas such as corners of the sofas, etc., are to be inspected one by one using a “turning over the boxes, emptying out the cabinets” approach, and the house number where the suspicious objects were found and photo of the owner of the objects are to be taken as evidence.<br />
<!-- END-CONTENT(text-snippet)[85] --></blockquote><!-- END-BLOCK(text-snippet)[85] -->
<p>The authorities also <a href="https://beta.documentcloud.org/documents/20466279-document-4">monitor</a> phone calls between detainees and their family members back home. One <a href="https://beta.documentcloud.org/documents/20466278-document-5">document</a> detailed such a call that lasted four minutes and 20 seconds, describing the contents of the conversation and how grateful the relatives were that the government allowed it. “It’s an inflection point documenting how people are receiving the <!-- INLINE(tooltip)[86](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Officially%20known%20as%20%5Cu201ctransformation%20through%20education%2C%5Cu201d%20China%5Cu2019s%20re-education%20system%20practices%20what%20researcher%20Adrian%20Zenz%20calls%20%5Cu201chighly%20coercive%20brainwashing.%5Cu201d%22%7D) --><span data-tooltip="Officially known as “transformation through education,” China’s re-education system practices what researcher Adrian Zenz calls “highly coercive brainwashing.”" class="tooltip"><!-- INLINE-CONTENT(tooltip)[86] -->re-education<!-- END-INLINE-CONTENT(tooltip)[86] --></span><!-- END-INLINE(tooltip)[86] -->,” Byler explained. “If they cry or act angry that their relative can’t be released, that’s a sign that the re-education hasn’t been received.”</p>
<p>In many cases, relatives were <a href="https://beta.documentcloud.org/documents/20466280-document-3">asked</a> to record their call and share it with the police, or they were interviewed immediately after to see how they were doing after the call.</p>
<p>Citizens in Xinjiang are also routinely stopped outside their homes by authorities. The database contains records from more than two million checkpoint stops in Ürümqi (population 3.5 million) and the surrounding area in a two-year period. It includes a list of nearly three dozen categories of people to stop, such as “intelligence national security important person.” When a person is stopped at a checkpoint, they go through an ID check, typically including processing via facial recognition. Facial recognition is sometimes performed through automatic scanning by a fixed surveillance camera. It can also be performed through a manual scan using a smartphone camera; these are often used on people deemed to need the extra scrutiny of an up-close facial scan, for example, because they lack ID. If a person’s face is displayed with a yellow, orange, or red indicator on a computer, showing the system has deemed them suspicious or criminal, they are questioned and may be arrested.</p>
<!-- BLOCK(annotated-image)[87](%7B%22componentName%22%3A%22ANNOTATED_IMAGE%22%2C%22entityType%22%3A%22RESOURCE%22%2C%22resource%22%3A%7B%22__typename%22%3A%22Image%22%2C%22accessibleDescription%22%3A%22Some%20alt%20text%22%2C%22creditText%22%3A%22Screenshots%3A%20Obtained%20by%20The%20Intercept%22%2C%22description%22%3A%22Four%20people%20flagged%20with%20various%20colored%20%5Cu201cinspection%20levels%5Cu201d%20based%20on%20authorities%5Cu2019%20perception%20of%20how%20dangerous%20they%20are.%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2021%5C%2F01%5C%2F2-screenshot-2.jpg%22%7D%7D)(%7B%22items%22%3A%5B%7B%22id%22%3A%221%22%2C%22text%22%3A%22ID%22%7D%2C%7B%22id%22%3A%222%22%2C%22text%22%3A%22Type%3A%20People%20inspection%22%7D%2C%7B%22id%22%3A%223%22%2C%22text%22%3A%22Level%3A%20Released%22%7D%2C%7B%22id%22%3A%224%22%2C%22text%22%3A%22Result%3A%20All%20seems%20normal%22%7D%2C%7B%22id%22%3A%225%22%2C%22text%22%3A%22Type%3A%20Verify%20national%20ID%22%7D%2C%7B%22id%22%3A%226%22%2C%22text%22%3A%22Level%22%7D%2C%7B%22id%22%3A%227%22%2C%22text%22%3A%22Inspection%20result%3A%20Drug-related%20person%20nationwide.%20Process%20method%3A%20Special%20inspection%2C%20collect%20information.%22%7D%2C%7B%22id%22%3A%228%22%2C%22text%22%3A%22Inspection%20type%3A%20Stability-related%20inspection%22%7D%2C%7B%22id%22%3A%229%22%2C%22text%22%3A%22Inspection%20level%3A%20Released%22%7D%2C%7B%22id%22%3A%2210%22%2C%22text%22%3A%22Inspection%20result%3A%20Subject%20to%20stability-related%20investigation.%20Work%20process%3A%20Collect%20information%2C%20check%20suspicion%2C%20report%20to%20precinct%20of%20original%20residency%20%5Btheir%20Hukou%5D.%22%7D%2C%7B%22id%22%3A%2211%22%2C%22text%22%3A%22Result%3A%20Person%20incarcerated%20for%20July%205%20riot%20%5Breference%20to%5Cu00a02009%20Uyghur-Han%20civil%20unrest%5D.%20Process%3A%20Transfer%20to%20the%20sub-bureau%20of%20inspection%20location%20and%20detain.%22%7D%5D%7D) --><figure class="annotated-image"><img data-recalc-dims="1" decoding="async" alt="Some alt text" src="https://theintercept.com/wp-content/uploads/2021/01/2-screenshot-2.jpg?w=1200" /><figcaption><p class="caption">Four people flagged with various colored “inspection levels” based on authorities’ perception of how dangerous they are.</p><p class="credit">Screenshots: Obtained by The Intercept</p><ol class="legend"><li>1: ID</li><li>2: Type: People inspection</li><li>3: Level: Released</li><li>4: Result: All seems normal</li><li>5: Type: Verify national ID</li><li>6: Level</li><li>7: Inspection result: Drug-related person nationwide. Process method: Special inspection, collect information.</li><li>8: Inspection type: Stability-related inspection</li><li>9: Inspection level: Released</li><li>10: Inspection result: Subject to stability-related investigation. Work process: Collect information, check suspicion, report to precinct of original residency [their Hukou].</li><li>11: Result: Person incarcerated for July 5 riot [reference to 2009 Uyghur-Han civil unrest]. Process: Transfer to the sub-bureau of inspection location and detain.</li></ol></figcaption></figure><!-- END-BLOCK(annotated-image)[87] -->
<p>Categories of people often stopped at checkpoints include relatives of offenders and relatives of detainees.</p>
<p>Data retained from these stops include photos of those stopped, the latitude and longitude of the stop, the name of the collection point, vehicle and license plate if applicable, the search time, the search level, whether the person was released, and the result of the search. Those who were stopped are categorized in the database as people who were immediately arrested, those who were returned to their original residence, psychiatric patients, relatives of detainees, relatives of offenders, and individuals who were listed as participants of the July 2009 Ürümqi riots, in which <!-- INLINE(tooltip)[88](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Historically%20the%20largest%20ethnic%20group%20in%20Xinjiang%2C%20Uyghurs%20are%20predominately%20Muslim%2C%20speak%20their%20own%20Turkic%20language%2C%20and%20have%20long%20faced%20discrimination%20under%20Chinese%20rule.%20Upwards%20of%20one%20million%20Uyghurs%20have%20been%20detained%20in%20camps%2C%20according%20to%20some%20estimates.%22%7D) --><span data-tooltip="Historically the largest ethnic group in Xinjiang, Uyghurs are predominately Muslim, speak their own Turkic language, and have long faced discrimination under Chinese rule. Upwards of one million Uyghurs have been detained in camps, according to some estimates." class="tooltip"><!-- INLINE-CONTENT(tooltip)[88] -->Uyghur<!-- END-INLINE-CONTENT(tooltip)[88] --></span><!-- END-INLINE(tooltip)[88] -->&#8211;<!-- INLINE(tooltip)[89](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22The%20largest%20ethnic%20group%20in%20China%20and%20the%20world%2C%20Han%20Chinese%20originate%20in%20East%20Asia%20but%20have%20increased%20their%20presence%20in%20Xinjiang.%22%7D) --><span data-tooltip="The largest ethnic group in China and the world, Han Chinese originate in East Asia but have increased their presence in Xinjiang." class="tooltip"><!-- INLINE-CONTENT(tooltip)[89] -->Han<!-- END-INLINE-CONTENT(tooltip)[89] --></span><!-- END-INLINE(tooltip)[89] --> violence at a toy factory in southeast China led to a broader outbreak of civil unrest involving attacks against largely ethnically Han residents.</p>
<!-- BLOCK(photo)[90](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[90] -->
<img loading="lazy" decoding="async" width="2000" height="1333" class="aligncenter size-large wp-image-343006" src="https://theintercept.com/wp-content/uploads/2021/01/RTS282WH0edit-grid.jpg" alt="Security cameras are installed above the perimeter fence of what is officially known as a vocational skills education centre in Dabancheng, in Xinjiang Uighur Autonomous Region, China September 4, 2018. This centre, situated between regional capital Urumqi and tourist spot Turpan, is among the largest known ones." srcset="https://theintercept.com/wp-content/uploads/2021/01/RTS282WH0edit-grid.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2021/01/RTS282WH0edit-grid.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2021/01/RTS282WH0edit-grid.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2021/01/RTS282WH0edit-grid.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2021/01/RTS282WH0edit-grid.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2021/01/RTS282WH0edit-grid.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2021/01/RTS282WH0edit-grid.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source pullright">Security cameras are installed above the perimeter fence of what is officially known as a “vocational skills education center” in Dabancheng, Xinjiang, on Sept. 4, 2018. This center, situated between the region&#8217;s capital Ürümqi and tourist spot Turpan, is among the largest known ones.<br/>Photo: Thomas Peter/Reuters</figcaption><!-- END-CONTENT(photo)[90] --></figure><!-- END-BLOCK(photo)[90] -->
<h2>A Detention System Built on Uncertainty and Inconsistencies</h2>
<p>Beyond surveillance and policing, the database provides a close-up look at how various forms of incarceration are used to control the population, particularly minority groups and perceived dissidents in Xinjiang. It reveals a system moving to adapt its rhetoric and policies to a reality in which the length of incarceration, even under the guise of “training” or “re-education,” is often so uncertain that relatives of the imprisoned are grateful when detainees are granted fixed-term sentences.</p>
<p>Documents illustrate Xinjiang’s complex system of prison-like facilities, which roughly speaking break down into four categories: those for temporary detention; “re-education”; a more lenient form of re-education referred to as “vocational training”; and long-term prison.</p>

<div class="KeyTakeaways py-9 px-7 sm:px-10 -ml-5 w-[calc(100%_+_2.5rem)] sm:float-right mt-2 mb-10 sm:ml-10 xl:mr-[calc(-50%_+_65px)] sm:!max-w-[60%] xl:!max-w-[75%] xl:relative xl:z-[35]" style="background: #d0dae6">
      <div class="KeyTakeaways-title font-sans font-black text-body text-2xl mb-8">Detention in Ürümqi:</div>
  
  <ul class="p-0 !m-0">
          <li class="mb-7 last:mb-0 ml-4 !list-square !list-outside text-xl font-sans text-body">
        <div>Complex incarceration system in Xinjiang of temporary detention, re-education camps, “vocational training,” and long-term imprisonment.</div>
      </li>
          <li class="mb-7 last:mb-0 ml-4 !list-square !list-outside text-xl font-sans text-body">
        <div>Some evidence indicates that rates of detention are higher by a “shocking” degree than previously known, compared to less harsh forms of incarceration like re-education.</div>
      </li>
      </ul>
</div>

<p>Detention centers, which are said to have the harshest conditions and worst crowding, are essentially interrogation and holding facilities. People are kept there while waiting for an investigation to be completed. Re-education facilities are officially known as “transformation through education” camps. They practice “highly coercive brainwashing” in the words of <!-- INLINE(tooltip)[92](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Anthropologist%20and%20researcher%20who%20focuses%20on%20Xinjiang%20and%20Tibet.%22%7D) --><span data-tooltip="Anthropologist and researcher who focuses on Xinjiang and Tibet." class="tooltip"><!-- INLINE-CONTENT(tooltip)[92] -->Zenz<!-- END-INLINE-CONTENT(tooltip)[92] --></span><!-- END-INLINE(tooltip)[92] -->, who has <a href="https://www.jpolrisk.com/wash-brains-cleanse-hearts/">investigated</a> the camps using government documents. The training centers are purportedly intended to transmit vocational and other skills but are clearly prison-like, with barbed wire, high walls, watchtowers, and internal camera systems.</p>
<p>It is common for a given citizen to travel through multiple types of incarceration in a sort of pipeline fashion. One police document from the <!-- INLINE(tooltip)[93](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22One%20of%20%5Cu00dcr%5Cu00fcmqi%5Cu2019s%20seven%20urban%20districts%2C%20in%20the%20central%20southeast%20of%20the%20city.%20Historic%20and%20majority-Uyghur%20center%20of%20%5Cu00dcr%5Cu00fcmqi.%22%7D) --><span data-tooltip="One of Ürümqi’s seven urban districts, in the central southeast of the city. Historic and majority-Uyghur center of Ürümqi." class="tooltip"><!-- INLINE-CONTENT(tooltip)[93] -->Tianshan<!-- END-INLINE-CONTENT(tooltip)[93] --></span><!-- END-INLINE(tooltip)[93] --> district of Ürümqi describes a mother involved in a “national security incident” who was put into re-education, then a vocational training school.</p>
<p>The re-education was conducted through the public security bureau’s internal security division, a domestic security force that investigates transnational crime. It is “a very tough unit,” often used against dissidents, said Zenz. “I totally expect that to be a place where torture is practiced, without knowing it for sure,” he added.</p>
<p>Authorities then sent the mother to a vocational training center, which would have been “still plenty unpleasant and coercive,” said Zenz, but “the most lenient” and eventually leading to release into forced labor. “In the police state, it’s the most desirable place to be because you’ll eventually get out,” he said. (These types of so-called vocational training centers are distinct from real vocational training centers existing in China that do not involve forced stays where people are removed from their families and subject to indoctrination.)</p>
<!-- BLOCK(photo)[94](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22xtra-large%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed xtra-large-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[94] -->
<img loading="lazy" decoding="async" width="4000" height="2667" class="aligncenter size-large wp-image-342818" src="https://theintercept.com/wp-content/uploads/2021/01/L1001285-toned.jpg" alt="Nejmiddin Qarluq, an ethnic Uyghur, and political activist who fled china and was given asylum in Belgium is pictured at his new home in Bruxelles on Jan. 21, 2021." srcset="https://theintercept.com/wp-content/uploads/2021/01/L1001285-toned.jpg?w=4000 4000w, https://theintercept.com/wp-content/uploads/2021/01/L1001285-toned.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2021/01/L1001285-toned.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2021/01/L1001285-toned.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2021/01/L1001285-toned.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2021/01/L1001285-toned.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2021/01/L1001285-toned.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2021/01/L1001285-toned.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2021/01/L1001285-toned.jpg?w=2400 2400w, https://theintercept.com/wp-content/uploads/2021/01/L1001285-toned.jpg?w=3600 3600w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source pullright">Nejmiddin Qarluq, an ethnic Uyghur and political activist who fled China and was given asylum in Belgium, pictured at his new home in Brussels on Jan. 21, 2021.<br/>Photo: Johanna de Tessieres for The Intercept</figcaption><!-- END-CONTENT(photo)[94] --></figure><!-- END-BLOCK(photo)[94] -->
<p>Nejmiddin Qarluq, a Uyghur who obtained asylum in Belgium in 2017, said the reason for detention isn’t always clear, since people are often arrested casually and have their property confiscated. When Qarluq was 6 years old, his father was released from prison. He himself was sentenced to three years in prison, then served another five-and-a-half-year term. One of his brothers was sentenced to life imprisonment in 1996, he said, and another brother was sentenced to six and a half years and is still in prison. His brother, ex-wife, and sister were locked up in an education camp in 2018.</p>
<p>Because Qarluq was sentenced when he was 14, he said his entire life after he was released was under Chinese Communist Party police supervision, and he wasn’t ever able to feel safe at all. And, he said, there is no freedom or privacy — even privacy of thought — beyond the country’s control. “I am the lucky one who got the chance to flee the country,” he said.</p>
<p>The database contains evidence that rates of detention, compared to re-education, may be significantly higher than outside observers believed. That would mean Uyghurs and others in the system were enduring significantly harsher conditions while incarcerated.</p>
<p>A police <a href="https://beta.documentcloud.org/documents/20466266-document-18">report</a> from <!-- INLINE(tooltip)[95](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22A%20neighborhood%20in%20%5Cu00dcr%5Cu00fcmqi%5Cu2019s%20Shuimogou%20district%20in%20the%20central%20northeast%20of%20the%20city.%22%7D) --><span data-tooltip="A neighborhood in Ürümqi’s Shuimogou district in the central northeast of the city." class="tooltip"><!-- INLINE-CONTENT(tooltip)[95] -->Weihuliang Precinct<!-- END-INLINE-CONTENT(tooltip)[95] --></span><!-- END-INLINE(tooltip)[95] --> provides information on the number of people held throughout <!-- INLINE(tooltip)[96](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22One%20of%20%5Cu00dcr%5Cu00fcmqi%5Cu2019s%20seven%20urban%20districts%2C%20in%20the%20central%20northeast%20of%20the%20city%2C%20containing%20the%20municipal%20seat.%20Not%20a%20majority-Uyghur%20district.%22%7D) --><span data-tooltip="One of Ürümqi’s seven urban districts, in the central northeast of the city, containing the municipal seat. Not a majority-Uyghur district." class="tooltip"><!-- INLINE-CONTENT(tooltip)[96] -->Shuimogou<!-- END-INLINE-CONTENT(tooltip)[96] --></span><!-- END-INLINE(tooltip)[96] -->, one of seven districts in Ürümqi, in detention and re-education. At the time, in February 2018, the district had 803 people in re-education and almost as many, around 787, in detention. In Weihuliang specifically, the ratio of people in detention was even higher: 348 detained versus 184 in re-education.</p>
<p>Byler called this “a really shocking proportion, if we take this to be normative across the region.”</p>
<p>“That’s showing us that almost half of the people detained are not even in the re-education camp system yet, they’re just being processed,” Byler added. “Conditions in these spaces are really bad. If what these reports are telling us are true, that these larger numbers are being held in these spaces, it is really concerning.”</p>
<p>Byler described detention as often “very crowded, from what we’ve heard from people, and the conditions in them are really bad, because of the overcrowding. … People sometimes, because of the crowding, aren’t able to sleep at the same time because they can’t all fit on the bed (actually a platform with a wooden top called a ‘kang’) at the same time.” Cameras in the cell watch constantly, and lights remain on all night.</p>
<p>Re-education, in comparison, offers somewhat better conditions, including larger inner courtyards for marching or teaching, and more importantly, the hope of potentially quick release — whenever “transformative” education is complete. But documents from the database indicate this may be, at least in some cases, a false idea. In over 100 cases, they <a href="https://beta.documentcloud.org/documents/20466272-document-11">discuss</a> fixed-length sentences for re-education, such as two-year or three-year terms.</p>
<!-- BLOCK(text-snippet)[97](%7B%22componentName%22%3A%22TEXT_SNIPPET%22%2C%22entityType%22%3A%22SHORTCODE%22%7D)(%7B%22showTitle%22%3A%22true%22%2C%22link%22%3A%22https%3A%5C%2F%5C%2Fbeta.documentcloud.org%5C%2Fdocuments%5C%2F20466272-document-11%22%2C%22title%22%3A%22%28Wenxi%20community%29%22%2C%22clickable%22%3A%22body%22%7D) --><blockquote data-shortcode-type="text-snippet"><!-- CONTENT(text-snippet)[97] --><br />
On November 5, 2018, police officers and household-assigned cadres accompanied [name redacted] (female, Uyghur &#8230;), wife of re-educated individual [name redacted] (male, Uyghur &#8230;), to Daban City re-education node to have a face-to-face with [her husband]. At the same time, they received the announcement from the re-education center and the procuratorate [prosecutor&#8217;s office] that her husband was sentenced to three years in re-education. The vocational training center told [the wife] that her husband could potentially be released early if he has good behavior inside the center. [The wife] told the cadre that she can accept the fact that her husband was to be re-educated for three years, although her mood is very down, but at least she and her husband have some hope. She also hoped that her husband could have good behavior inside the re-education center and hopefully reunite with the family early. Police and cadre comforted [the wife] that she shouldn&#8217;t worry too much, take care of herself and take care of the two children, and that the community would help her to solve any problems she would face.<br />
<!-- END-CONTENT(text-snippet)[97] --></blockquote><!-- END-BLOCK(text-snippet)[97] -->
<p>The sentences appear to be assigned to people in the <!-- INLINE(tooltip)[98](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Prison-like%20vocational%20training%20facilities%20purport%20to%20transmit%20skills%20but%20in%20actuality%20perform%20coercive%20re-education.%20They%20are%20the%20most%20lenient%20form%20of%20incarceration.%20Distinct%20from%20real%20vocational%20training%20centers%20in%20China%20that%20do%20not%20involve%20forced%20stays.%22%7D) --><span data-tooltip="Prison-like vocational training facilities purport to transmit skills but in actuality perform coercive re-education. They are the most lenient form of incarceration. Distinct from real vocational training centers in China that do not involve forced stays." class="tooltip"><!-- INLINE-CONTENT(tooltip)[98] -->vocational form of re-education<!-- END-INLINE-CONTENT(tooltip)[98] --></span><!-- END-INLINE(tooltip)[98] -->, often after they have been in incarcerated for an extended period of time. They come, documents show, through a program called “Two Inform, One Advocate,” with “inform” apparently referring to information about extremism (as provided in re-education) and “advocate” referring to advocacy of a policy to provide sentences.</p>
<p>Under this system, relatives and cadre members typically meet the person in re-education and a judge issues a “pre-judgment” and “pre-sentence,” usually of two to four years in documents from the database. Sometimes, certain requirements come along with the sentence, such as acquiring Chinese language skills. An October 2018 report stated that “some relatives of <!-- INLINE(tooltip)[99](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22People%20deemed%20to%20be%20extremists%20or%20terrorists%2C%20or%20with%20such%20tendencies.%20The%20%5Cu201ccategories%5Cu201d%20refer%20to%20detailed%20rankings%20based%20on%20the%20government%5Cu2019s%20perception%20of%20their%20mindset%20and%20potential%20to%20cause%20harm.%22%7D) --><span data-tooltip="People deemed to be extremists or terrorists, or with such tendencies. The “categories” refer to detailed rankings based on the government’s perception of their mindset and potential to cause harm." class="tooltip"><!-- INLINE-CONTENT(tooltip)[99] -->three-category people<!-- END-INLINE-CONTENT(tooltip)[99] --></span><!-- END-INLINE(tooltip)[99] --> are very happy after they learned about ‘Two Inform, One Advocate’ work; because of this, at least they know how long it would take for their relatives to come out, and they can arrange many business-related things beforehand.”</p>
<p>In one of many examples of this policy in the database, from a November 2018 <a href="https://beta.documentcloud.org/documents/20466400-document-26">report</a>, a Uyghur woman traveled to Daban City Vocational Center to receive a verdict with her brother:</p>
<!-- BLOCK(text-snippet)[100](%7B%22componentName%22%3A%22TEXT_SNIPPET%22%2C%22entityType%22%3A%22SHORTCODE%22%7D)(%7B%22showTitle%22%3A%22false%22%2C%22link%22%3A%22https%3A%5C%2F%5C%2Fbeta.documentcloud.org%5C%2Fdocuments%5C%2F20466400-document-26%22%2C%22clickable%22%3A%22body%22%7D) --><blockquote data-shortcode-type="text-snippet"><!-- CONTENT(text-snippet)[100] -->Her younger brother [name redacted] Uyghur, male &#8230; on September 27, 2017, due to living and traveling with a convicted person, was taken by Badaowan Precinct for re-education. Yesterday at the “Two Inform, One Advocate” activity at the center, the verdict was sheltering criminals, and the sentence was to study for three years at the vocational school. The relatives did not dissent from the verdict and thanked the care and love of the party and the government for her and their help to her [brother].<br />
<!-- END-CONTENT(text-snippet)[100] --></blockquote><!-- END-BLOCK(text-snippet)[100] -->
<p>“We’ve never heard of people getting sentences for re-education,” said <!-- INLINE(tooltip)[101](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Anthropologist%20and%20researcher%20at%20the%20Center%20for%20Asian%20Studies%20at%20the%20University%20of%20Colorado%2C%20Boulder.%20Byler%5Cu2019s%20doctorate%20was%20in%20Uyghur%20technopolitics%20in%20China.%22%7D) --><span data-tooltip="Anthropologist and researcher at the Center for Asian Studies at the University of Colorado, Boulder. Byler’s doctorate was in Uyghur technopolitics in China." class="tooltip"><!-- INLINE-CONTENT(tooltip)[101] -->Byler<!-- END-INLINE-CONTENT(tooltip)[101] --></span><!-- END-INLINE(tooltip)[101] -->. “They tell you that you have to earn points to be released, and so you’re supposed to try really hard to get re-educated, but now they’re saying actually that these people have been given a sentence, their course of re-education will take three years or what have you. So it’s actually like a prison term. That’s one of the tyrannies of the system, is that once you’re in the camps, you’ll never know when you’ll be released.”</p>
<p>Re-education also seems to be closed off as an option for some of the most heavily persecuted activities. The <!-- INLINE(tooltip)[102](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22A%20neighborhood%20in%20%5Cu00dcr%5Cu00fcmqi%5Cu2019s%20Shuimogou%20district%20in%20the%20central%20northeast%20of%20the%20city.%22%7D) --><span data-tooltip="A neighborhood in Ürümqi’s Shuimogou district in the central northeast of the city." class="tooltip"><!-- INLINE-CONTENT(tooltip)[102] -->Weihuliang<!-- END-INLINE-CONTENT(tooltip)[102] --></span><!-- END-INLINE(tooltip)[102] --> <a href="https://beta.documentcloud.org/documents/20466266-document-18">police station notes</a> that homed in on <!-- INLINE(tooltip)[103](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22People%20deemed%20to%20have%20delivered%20illegal%20Islamic%20sermons.%20Rights%20groups%20say%20the%20line%20between%20legal%20and%20illegal%20teaching%20of%20Islam%20is%20defined%20arbitrarily%20to%20serve%20political%20goals.%22%7D) --><span data-tooltip="People deemed to have delivered illegal Islamic sermons. Rights groups say the line between legal and illegal teaching of Islam is defined arbitrarily to serve political goals." class="tooltip"><!-- INLINE-CONTENT(tooltip)[103] -->&#8220;illegal preachers,&#8221;<!-- END-INLINE-CONTENT(tooltip)[103] --></span><!-- END-INLINE(tooltip)[103] --> listing 50 in detention, said only two were in re-education.</p>
<p>Much of <!-- INLINE(tooltip)[104](%7B%22componentName%22%3A%22TOOLTIP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22optional%22%3Atrue%7D)(%7B%22className%22%3Anull%2C%22text%22%3A%22Anthropologist%20and%20researcher%20who%20focuses%20on%20Xinjiang%20and%20Tibet.%22%7D) --><span data-tooltip="Anthropologist and researcher who focuses on Xinjiang and Tibet." class="tooltip"><!-- INLINE-CONTENT(tooltip)[104] -->Zenz<!-- END-INLINE-CONTENT(tooltip)[104] --></span><!-- END-INLINE(tooltip)[104] -->’s work has focused specifically on internment camps officially portrayed as “vocational skills education training centers” (<em>zhiye jineng jiaoyu peixun zhongxin</em>). The government positions them as a more benign alternative to prosecution for those who have committed minor offenses, but they are often cover for detention on minor grounds. Despite the emphasis on the word “training,” the facilities can practice coercive indoctrination just as re-education centers do.</p>
<p>Government documents previously obtained by Zenz had described the re-education as using, in Zenz’s recounting, “assault-style transformation through education” (<em>jiaoyu zhuanhua gongjian</em>) to “ensure that results are achieved” on those who have “a vague understanding, negative attitudes, or even show resistance.”</p>
<p>The impact of widespread detention is not limited to those who are in prison. One document <a href="https://beta.documentcloud.org/documents/20466266-document-18">indicates</a> 326 children in one of the seven districts in Ürümqi have one or both parents in detention. The population of the district was around 43,730, according to 2010 government figures, but only around 12 percent of the population in Ürümqi are Uyghur. “If you take the adult population of that [ethnic group] and note that 326 students have one or two parents in detention, that appears to be quite substantial,” said Zenz.</p>
<p><strong>Documents:</strong> The documents published with the story are <a href="https://beta.documentcloud.org/app?q=project%3Armqi-china-police-data-201624%20">available here</a>.</p>
<p>The post <a href="https://theintercept.com/2021/01/29/china-uyghur-muslim-surveillance-police/">Millions of Leaked Police Files Detail Suffocating Surveillance of China&#8217;s Uyghur Minority</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2021/01/29/china-uyghur-muslim-surveillance-police/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2021/01/china-feature-3.jpg?fit=2000%2C999' width='2000' height='999' /><post-id xmlns="com-wordpress:feed-additions:1">342556</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/01/1-map-china-the-intercept-3.png?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2021/01/1-map-china-the-intercept-3.png?fit=1920%2C1080" medium="image">
			<media:title type="html">1-map-china-the-intercept-3</media:title>
			<media:description type="html">The database obtained by The Intercept contains police reports from Urumqi, the capital and largest city in China&#039;s Xinjiang Uyghur Autonomous Region.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/01/1-map-china-the-intercept-3.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544186-edit.jpg?fit=2000%2C1334" medium="image">
			<media:title type="html">Inside the Vast Police State at the Heart of China&#8217;s Belt and Road</media:title>
			<media:description type="html">Surveillance cameras are mounted to the exterior of a mosque in the main bazaar in Urumqi, Xinjiang autonomous region, China, on Nov. 6, 2018.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544186-edit.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/i0.wp.com/content.jwplatform.com/thumbs/fV5EQ8IC-720.jpg?w=1200&#038;ssl=1" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2021/01/3-screenshot-2.jpg?w=1200" medium="image">
			<media:title type="html">Some alt text</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2021/01/AP18193280618637-edit-grid.jpg?fit=2000%2C1334" medium="image">
			<media:title type="html">9 years since Ürümqi riots</media:title>
			<media:description type="html">A monitor of a computer at an inspection point shows many faces in Kashgarin the Xinjiang Uyghur Autonomous Region on June 28, 2018.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/01/AP18193280618637-edit-grid.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2021/01/AP19049396516942-edit.jpg?fit=2000%2C1333" medium="image">
			<media:title type="html">China Tracking Faces</media:title>
			<media:description type="html">Residents pass by a security checkpoint and surveillance cameras mounted on a street in Kashgar in western China&#039;s Xinjiang region on Nov. 5, 2017.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/01/AP19049396516942-edit.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2021/01/2-chart-the-intercept.png?fit=3125%2C1646" medium="image">
			<media:title type="html">2-chart-the-intercept</media:title>
			<media:description type="html">The database contains phone surveillance records, helping to quantify police monitoring of communications in Xinjiang.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/01/2-chart-the-intercept.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2021/01/20210121_AbduweliAyup-017_Es-edit.jpg?fit=2713%2C1808" medium="image">
			<media:title type="html">Photographer</media:title>
			<media:description type="html">Abduweli Ayup, a Uyghur national, linguist and activist at his home in Bergen, Norway on January 21, 2021.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/01/20210121_AbduweliAyup-017_Es-edit.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2021/01/1-screenshot-1.jpg?w=1200" medium="image">
			<media:title type="html">Some alt text</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544178-ES-edit.jpg?fit=4000%2C2667" medium="image">
			<media:title type="html">Inside the Vast Police State at the Heart of China&#8217;s Belt and Road</media:title>
			<media:description type="html">A security officer looks on as a woman passes through a checkpoint, equipped with a metal detector and facial recognition technology, to enter the main bazaar in Urumqi, Xinjiang autonomous region, China, on Nov. 6, 2018.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1090544178-ES-edit.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2021/01/GettyImages-102603698-edit-grid.jpg?fit=2000%2C1334" medium="image">
			<media:title type="html">Security cameras are seen (R) on a stree</media:title>
			<media:description type="html">Security cameras are seen (R) on a street in Urumqi, capital of China&#039;s Xinjiang region on July 2, 2010.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/01/GettyImages-102603698-edit-grid.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1253583511-edit.jpg?fit=2000%2C1333" medium="image">
			<media:title type="html">Daily Life In Xinjiang During COVID-19</media:title>
			<media:description type="html">People are walking on the street of Xinjiang International Grand Bazaar on June 25, 2020 in Urumqi, China.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/01/GettyImages-1253583511-edit.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2021/01/3-chart-the-intercept.png?fit=3125%2C3257" medium="image">
			<media:title type="html">3-chart-the-intercept</media:title>
			<media:description type="html">The Public Safety App is one way authorities in Xinjiang draw ordinary citizens into the work of alerting, monitoring, and law enforcement.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/01/3-chart-the-intercept.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2021/01/button.jpg?fit=1000%2C564" medium="image">
			<media:title type="html">button</media:title>
			<media:description type="html">Placeholder caption tk.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/01/button.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2021/01/2-screenshot-2.jpg?w=1200" medium="image">
			<media:title type="html">Some alt text</media:title>
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2021/01/RTS282WH0edit-grid.jpg?fit=2000%2C1333" medium="image">
			<media:title type="html">Security cameras are installed above the perimeter fence of what is officially known as a vocational skills education centre in Dabancheng</media:title>
			<media:description type="html">Security cameras are installed above the perimeter fence of what is officially known as a vocational skills education centre in Dabancheng, in Xinjiang Uighur Autonomous Region, China September 4, 2018. This centre, situated between regional capital Urumqi and tourist spot Turpan, is among the largest known ones.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/01/RTS282WH0edit-grid.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2021/01/L1001285-toned.jpg?fit=4000%2C2667" medium="image">
			<media:title type="html">Nejmiddin Qarluq</media:title>
			<media:description type="html">Nejmiddin Qarluq, an ethnic Uyghur, and political activist  who fled china and was given asylum in Belgium is pictured at his new home in Bruxelles on Jan. 21, 2021.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2021/01/L1001285-toned.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[Powerful Mobile Phone Surveillance Tool Operates in Obscurity Across the Country]]></title>
                <link>https://theintercept.com/2020/12/23/police-phone-surveillance-dragnet-cellhawk/</link>
                <comments>https://theintercept.com/2020/12/23/police-phone-surveillance-dragnet-cellhawk/#respond</comments>
                <pubDate>Wed, 23 Dec 2020 14:31:18 +0000</pubDate>
                                    <dc:creator><![CDATA[Sam Richards]]></dc:creator>
                                		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false"></guid>
                                    <description><![CDATA[<p>CellHawk helps law enforcement visualize large quantities of information collected by cellular towers and providers.</p>
<p>The post <a href="https://theintercept.com/2020/12/23/police-phone-surveillance-dragnet-cellhawk/">Powerful Mobile Phone Surveillance Tool Operates in Obscurity Across the Country</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>Until now,</u> the Bartonville, Texas, company Hawk Analytics and its product CellHawk have largely escaped public scrutiny. CellHawk has been in wide use by law enforcement, helping police departments, the FBI, and private investigators around the United States convert information collected by cellular providers into maps of people’s locations, movements, and relationships. Police records obtained by The Intercept reveal a troublingly powerful surveillance tool operated in obscurity, with scant oversight.</p>
<p>CellHawk’s maker says it can process a year&#8217;s worth of cellphone records in 20 minutes, automating a process that used to require painstaking work by investigators, including hand-drawn paper plots. The web-based product can ingest call detail records, or CDRs, which track cellular contact between devices on behalf of mobile service providers, showing who is talking to whom. It can also handle cellular location records, created when phones connect to various towers as their owners move around.</p>
<p>Such data can include “tower dumps,” which list all the phones that connected to a given tower — a form of dragnet surveillance. The FBI obtained over 150,000 phone numbers from a single tower dump undertaken in 2010 to try and collect evidence against a bank robbery suspect, according to a <a href="https://www.brennancenter.org/our-work/research-reports/cellphones-law-enforcement-and-right-privacy">report</a> from the Brennan Center for Justice at NYU.</p>
<p class="p1"></p>
<p>Police use CellHawk to process datasets they routinely receive from cell carriers like AT&amp;T and Verizon, typically in vast spreadsheets and often without a warrant. This is in sharp contrast to a better known phone surveillance technology, the stingray: a mobile device that spies on cellular devices by <a href="https://theintercept.com/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/">impersonating carriers’ towers</a>, tricking phones into connecting, and then intercepting their communications. Unlike the stingray, CellHawk does not require such subterfuge or for police to position a device near people of interest. Instead, it helps them exploit information already collected by private telecommunications providers and other third parties.</p>

<p>CellHawk’s surveillance capabilities go beyond analyzing metadata from cellphone towers. Hawk Analytics claims it can churn out incredibly revealing intelligence from large datasets like ride-hailing records and GPS — information commonly generated by the average American. According to the company’s website, CellHawk uses GPS records in its “unique animation analysis tool,” which, according to company promotional materials, plots a target’s calls and locations over time. “Watch data come to life as it moves around town or the entire county,” the site states.</p>
<p>The tool can also help map interpersonal connections, with an ability to animate more than 20 phones at once and &#8220;see how they move relative to each other,&#8221; according to a promotional brochure.</p>
<!-- BLOCK(pullquote)[2](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[2] -->CellHawk helps police exploit information already collected by private telecommunications providers.<!-- END-CONTENT(pullquote)[2] --></blockquote><!-- END-BLOCK(pullquote)[2] -->
<p>The company has touted features that make CellHawk sound more like a tool for automated, continuous surveillance than for just processing the occasional spreadsheet from a cellular company. CellHawk’s website touts the ability to send email and text alerts “to surveillance teams” when a target moves, or enters or exits a particular “location or Geozone (e.g. your entire county border).”</p>
<p>On its website, Hawk Analytics claims this capability can help investigators “view plots &amp; maps of the cell towers used most frequently at the beginning and end of each day.” But in brochures sent to potential clients, it was much more blunt, claiming that CellHawk can help “find out where your suspect sleeps at night.”</p>
<!-- BLOCK(photo)[3](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221000px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1000px;"><!-- CONTENT(photo)[3] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-337213 size-large" src="https://theintercept.com/wp-content/uploads/2020/12/cellhawk-1.jpg?w=1000" alt="" width="1000" height="624" srcset="https://theintercept.com/wp-content/uploads/2020/12/cellhawk-1.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2020/12/cellhawk-1.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2020/12/cellhawk-1.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2020/12/cellhawk-1.jpg?w=540 540w" sizes="auto, (max-width: 1000px) 100vw, 1000px" />
<figcaption class="caption source">A screenshot showing the previously more honest version of their marketing.<br/>Screenshot: Sam Richards</figcaption><!-- END-CONTENT(photo)[3] --></figure><!-- END-BLOCK(photo)[3] -->
<h3>Data Sharing and Loose Regulation in Minnesota</h3>
<p>The sheriff’s office in Hennepin County, Minnesota, which includes Minneapolis, certainly seemed impressed after it <a href="https://www.documentcloud.org/search/projectid:31064-Hennepin-Co-Sheriff-CellHawk">started using the software in early 2015</a>. One criminal intelligence analyst lauded CellHawk’s ease of use in a February 2016 <a href="https://beta.documentcloud.org/documents/3254127-IMG-20170104-134950600-HDR">email</a> comparing the subscription software to a competing tool. “CellHawk is pretty new and a lot cheaper! The great thing about cellhawk is that it is ‘hands off’ by the user, as the software does everything for you. It is drag and drop. The software can download calls from all major phone companies. The biggest selling point is of course the mapping. it also has animation, which is cool!”</p>
<p>Hennepin County Sheriff’s Office uses CellHawk as part of an effort to share intelligence through a Minnesota fusion center known as the Metro Regional Information Center, which brings together the FBI and eight counties serving up to 4 million people, <a href="https://www.sctimes.com/story/news/local/2017/01/21/partners-solving-crime/96550194/">according</a> to the St. Cloud Times. In February 2018, the latest year for which The Intercept obtained HCSO invoices, the sheriff&#8217;s office renewed its annual subscription, providing the capability to store 250,000 CDRs.</p>
<p>A spokesperson for the sheriff’s office, Andrew Skoogman, said the office used certain CellHawk features infrequently. For example, it is “extremely rare” for HCSO to analyze tower dumps, he said, and “fairly rare” for it to use CellHawk’s automated location alerting service, which is used “based in the analytical needs of the investigator.”</p>
<p>The telecommunications data at the heart of CellHawk is shared extensively by providers. For example, Verizon in 2019 <a href="https://www.verizon.com/about/portal/transparency-report/wp-content/uploads/2020/03/US-Transparency-Report-1H-2019.pdf">received</a> more <a href="https://www.verizon.com/about/portal/transparency-report/wp-content/uploads/2016/01/2019-2H-US-Transparenc-Report.pdf">than</a> 260,000 subpoenas, orders, warrants, and emergency requests from various U.S. law enforcement entities, including more than 24,000 for location information. But the legal requirements for obtaining that information are sometimes unclear. The American Civil Liberties Union in 2014 called the legal standards related to tower dumps “<a href="https://www.aclu.org/blog/national-security/privacy-and-surveillance/cell-tower-dumps-another-surveillance-technique">extremely murky</a>.” A 2018 Brennan Center <a href="https://www.brennancenter.org/sites/default/files/2019-08/Report_Cell_Surveillance_Privacy.pdf">report</a> stated that the courts were “split” on the handling of such dumps, with some lower courts allowing access to the data using a court order, which under the Stored Communications Act is obtained using a lower evidentiary standard than a warrant, requiring only “reasonable grounds to believe” the records are relevant to an ongoing investigation. Location records particular to a given subscriber, meanwhile, can be obtained with just a court order — unless they span seven days or more, in which case police need to get a full warrant, according to a 2018 Supreme Court ruling. Courts have also been divided on whether police need a court order or warrant to obtain “real-time” cellular location data.</p>
<!-- BLOCK(pullquote)[4](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22left%22%7D) --><blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><!-- CONTENT(pullquote)[4] -->Hennepin County defined its own legal standards to rely upon in deploying technology like CellHawk.<!-- END-CONTENT(pullquote)[4] --></blockquote><!-- END-BLOCK(pullquote)[4] -->
<p>Hennepin County defined its own legal standards to rely upon in deploying technology like CellHawk. These were articulated in a sheriff’s office policy document dated August 2015 — months after CellHawk was already in use. The document, titled “Criminal Information Sharing and Analysis,” was released following a data request that was initiated in 2018 and fulfilled several years later following the election of a new sheriff. It stated that the office needed “[r]easonable suspicion,” which was deemed “present when sufficient facts are established to give … a basis to believe that there is, or has been, a reasonable possibility that an individual or organization is involved in a definable criminal activity or enterprise.”</p>
<p>The policy does not say that investigators must receive approval from a judge to retain information. Skoogman did not respond to The Intercept&#8217;s question about what legal standard is applied to the collection of CDRs.</p>
<p>Chad Marlow, senior advocacy and policy counsel for the ACLU, when asked to review Hennepin County’s CellHawk policy, said the CellHawk technology was “not inherently problematic” but that the county set a low standard for how it handles the collection of CellHawk data. Requiring &#8220;reasonable suspicion&#8221; is a typical threshold for traffic stops, not for intrusive searches, which require probable cause. CellHawk&#8217;s capabilities — combing through data from calls, texts, ride-hailing applications, etc. — are patently more intrusive than a traffic stop. Beyond that, Marlow said, the county&#8217;s “definition of reasonable suspicion is bizarrely convoluted” and should require that investigators “have to have a reasonable basis for a crime being committed not MAY BE being committed.”</p>
<p>Hennepin County’s policy continued:</p>
<blockquote><p>Criminal intelligence information shall be retained for up to five years from the date of collection of use, whichever is later. After that time, this information shall be deleted unless new information revalidates ongoing criminal activities of that individual and/or organization. When updated criminal intelligence information is added into the file on a suspect individual or organization, such entries revalidate the reasonable suspicion and reset the five year standard for retention of that file.</p></blockquote>
<p>The policy empowers HCSO investigators to scoop up this data and retain it for five years based on a fairly low legal standard.</p>
<p>And while this policy says the sheriff may not retain information based &#8220;solely&#8221; on support for &#8220;unpopular causes&#8221; or an individual&#8217;s &#8220;race, gender, age or ethnic background&#8221; and &#8220;personal habits and/or predilections that do not break any laws or threaten the safety of others&#8221; — mentioning activities covered by the First Amendment — if a crime were to occur during a protest, as is routine, that data is considered fair game by law enforcement. Under such low standards and with such a powerful surveillance utility, it wouldn’t take long to map out the social network of an entire protest movement.</p>
<p class="p1"><!-- BLOCK(pullquote)[5](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[5] -->Under such low standards and with such a powerful surveillance utility, it wouldn’t take long to map out the social network of an entire protest movement.<!-- END-CONTENT(pullquote)[5] --></blockquote><!-- END-BLOCK(pullquote)[5] --></p>
<p>For instance, during a protest <a href="https://minnesota.cbslocal.com/2020/08/24/protesters-take-to-downtown-minneapolis-after-jacob-blake-shooting/">outside a detention center</a> in downtown Minneapolis to show solidarity with demonstrations in <a href="https://www.startribune.com/local-activists-head-to-kenosha-with-lessons-to-share/572208372/">neighboring Wisconsin</a> following the <a href="https://www.democracynow.org/2020/8/27/the_police_shooting_of_jacob_blake">shooting</a> of an unarmed Black man by the Kenosha Police Department, Dave Hutchinson, the Hennepin County sheriff, said, “11 individuals were arrested and are being held on probable cause riot, damage to property and unlawful assembly,” according to an HCSO press release. Should the criminal intelligence investigators at the fusion center run those individuals’ information through CellHawk, it is not at all a stretch to say that the police would then possess a map of those individuals’ associations based on calls, texts, and other records. That map of social interactions could include thousands of activists who were not at all party to the crimes of which those 11 individuals are accused. Hawk Analytics markets such social network analysis as a primary feature.</p>
<p>When asked whether the use of CellHawk undermined the presumption of innocence — essentially reversing the investigative process, so that evidence comes first and suspicion of a specific crime after — Skoogman replied, essentially, that innocent people had nothing to fear. “People come under suspicion of having committed a crime based on information developed by investigators,” he wrote. “Based on evidence developed by those investigations, a suspect’s cell phone records may be obtained and analyzed. On occasion, that analysis has developed information suggesting that the suspect did not commit the crime under investigation. This is the investigative process. It is exactly why data is analyzed. To determine whether the data available supports continued focus on an individual as a suspect or perhaps rules them out.”</p>
<!-- BLOCK(photo)[6](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221000px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1000px;"><!-- CONTENT(photo)[6] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-337214 size-article-large" src="https://theintercept.com/wp-content/uploads/2020/12/cellhawk-2.jpg?w=1000" alt="cellhawk-2" width="1000" height="786" srcset="https://theintercept.com/wp-content/uploads/2020/12/cellhawk-2.jpg?w=2252 2252w, https://theintercept.com/wp-content/uploads/2020/12/cellhawk-2.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2020/12/cellhawk-2.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2020/12/cellhawk-2.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2020/12/cellhawk-2.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2020/12/cellhawk-2.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2020/12/cellhawk-2.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2020/12/cellhawk-2.jpg?w=1000 1000w" sizes="auto, (max-width: 1000px) 100vw, 1000px" />
<p class="caption">Screenshot from a Hawk Analytics promotional video displaying “link analysis,” which
reveals a large network of “co-conspirators and associates” in a matter of seconds.
The more data points, in this case cellphone numbers, run through CellHawk likely
exponentially expands the number of other individuals roped into an investigation.</p>
<figcaption class="caption source">Screenshot: The Intercept</figcaption><!-- END-CONTENT(photo)[6] --></figure><!-- END-BLOCK(photo)[6] -->
<h3>Deployed — and Promoted — Across the Country</h3>
<p>Hawk Analytics CEO Mike Melson, whose bio on the company website describes him as a former NASA engineer, offers free trials to law enforcement organizations to which he hopes to sell his product. Additionally, Melson has worked as an expert witness, ready to testify on behalf of prosecutors. His testimony sometimes appears in local news outlets without mention of the fact that he is the CEO of the company that could stand to financially benefit, albeit indirectly, from a conviction. Hawk Analytics failed to comment on the record after multiple attempts were made over the phone and by email.</p>
<!-- BLOCK(pullquote)[7](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[7] -->&#8220;This highlights how the rapid development of surveillance tech outstrips existing laws.&#8221;<!-- END-CONTENT(pullquote)[7] --></blockquote><!-- END-BLOCK(pullquote)[7] -->
<p>In December 2013, Heather Elvis went missing from her South Carolina home after becoming embroiled in a lovers’ quarrel. Several years later, an 11-day trial resulted in two 30-year sentences for one Tammy Moorer. During the second day of that trial, Melson made an appearance as “an expert witness when it comes to analyzing cell phone data,” <a href="https://www.wbtw.com/news/grand-strand/day-2-of-testimony-in-tammy-moorer-kidnapping-trial/">according </a>to WBTW News 13. The station did not include that Melson was intimately involved in the creation of software that helped connect the dots in this case.</p>
<p>Additionally, according to <a href="https://www.fauquiernow.com/fauquier_news/article/fauquier-judge-approves-expert-fees-in-murder-trial-2019">reports</a> from Northern Virginia, Hawk Analytics was reimbursed for their expert services which led to “the prosecution of a man convicted of first-degree murder in the 2017 shooting death of a … CVS store manager.” For their “cellular data analysis and two days of expert testimony,” Hawk Analytics was paid $8,175. That certainly isn’t a windfall, but it rivals the amount made from the sale of a small number of CellHawk subscriptions, and it effectively compounds revenue streams from multiple sides of the criminal justice system.</p>
<p class="p1"></p>
<p>CellHawk is not the only technology that investigators in the Twin Cities use to process intelligence about suspects and others. Hennepin County and their law enforcement partners use automated license plate readers; stingrays and competing, similar devices; aerial surveillance; and <a href="https://theintercept.com/2020/07/09/twitter-dataminr-police-spy-surveillance-black-lives-matter-protests/">social media intelligence</a>, among other spy tech. CellHawk alone is powerful — but added to the area police’s already expansive arsenal, it tips local law enforcement toward becoming more like intelligence agencies than municipal cops.</p>
<p>Lengthy data retention policies and the power of these surveillance tools create a litany of frightening possibilities for overreach and abuse. While HCSO has acknowledged its use of some of these tools, it has not released any public reports on its use of CellHawk. Rachel Levinson-Waldman, deputy director of the Brennan Center’s liberty and national security program, who reviewed Hennepin County’s policy said, “The reference to use is concerning, since that could significantly expand the time for retention.”</p>
<p>Minnesota state law requires an individual whose electronic device was subject to a tracking warrant be notified within 90 days if that evidence did not end up in court. This “tracking warrant” law has been on the books since 2014 and yet, judging from press reports in recent years, it’s not clear any one in the state has ever received such a notice or if a tracking warrant has ever been unsealed by the courts. The law seems to have been thwarted in part by police avoiding warrants and obtaining instead court orders under the much lower “reasonable suspicion” standard. This, despite the fact that Minnesota law clearly states, under a subdivision titled “Tracking warrant required for location information,” that “a warrant granting access to location information must be issued only if the government entity shows that there is probable cause the person who possesses an electronic device or is using a unique identifier is committing, has committed, or is about to commit a crime.”</p>
<p>Julia Decker, policy director for the ACLU of Minnesota, said that “there doesn’t seem to be oversight” for the use of CellHawk in the state, even though surveillance should get oversight of “the highest standard possible.” She also said that Hennepin’s policy to retain CellHawk and similar data for five years raises the potential for harm to civil liberties.</p>
<p>“I think this highlights how the rapid development of surveillance tech outstrips existing laws, and how that can be really problematic,” said Decker. “Without oversight/regulation, powerful surveillance technology is integrated into already-existing investigatory frameworks, instead of being examined and considered beforehand for its potential to actually expand or push the limits/bounds of those frameworks and encroach on civil liberties. … In this moment of talking about police reform, use of surveillance tech needs to be part of the discussion.”</p>
<p>Hawk Analytics has many clients around the United States. This reporter conducted a survey using the Freedom of Information Act to collect invoices for CellHawk subscriptions from agencies referenced on CellHawk’s website, referred to in CellHawk’s training sessions, or mentioned in local news reports. He found numerous agencies fielding the technology: <a href="https://www.muckrock.com/foi/atlanta-325/cellhawk-hawk-analytics-atlanta-police-department-62133/#file-758856">Atlanta</a> and <a href="https://www.muckrock.com/foi/fayette-county-4889/cellhawk-62758/#file-225097">Fayette County, Ga.</a>; <a href="https://www.muckrock.com/foi/kansas-city-285/cellhawk-62201/#file-228653">Kansas City, Kan.</a>; <a href="https://www.muckrock.com/foi/franklin-county-983/cellhawk-62141/#file-226178">Franklin County, Va.</a>; <a href="https://www.muckrock.com/foi/utah-234/cellhawk-62139/#file-225338">Utah County, Utah</a>,; <a href="https://www.muckrock.com/foi/fort-collins-5829/cellhawk-62209/">Fort Collins, Colo</a>.; <a href="https://www.muckrock.com/foi/hidalgo-county-2644/cellhawk-62203/#file-773383">Hidalgo County, Texas</a>; <a href="https://www.muckrock.com/foi/orange-county-394/cellhawk-orange-county-district-attorney-62206/#file-224803">Orange</a> County, <a href="https://www.muckrock.com/foi/orange-county-394/cellhawk-orange-county-sheriffs-office-62205/">Calif.</a>; and, of course, the <a href="https://www.muckrock.com/foi/united-states-of-america-10/cellhawk-62138/#file-809821">FBI</a> all have paid for CellHawk in the last several years. The Madison, Wisconsin, police department <a href="https://www.muckrock.com/foi/madison-721/cellhawk-62210">appears</a> to have thousands of potential CellHawk records from 2018 alone but has demanded close to $700 to examine and provide them.</p>
<p>The post <a href="https://theintercept.com/2020/12/23/police-phone-surveillance-dragnet-cellhawk/">Powerful Mobile Phone Surveillance Tool Operates in Obscurity Across the Country</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2020/12/23/police-phone-surveillance-dragnet-cellhawk/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2020/11/glennharvey_2020_11_18_theintercept_1200.gif?fit=1200%2C600' width='1200' height='600' /><post-id xmlns="com-wordpress:feed-additions:1">334431</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2020/09/sim-cloning-theintercept.jpg?w=440&#038;h=440&#038;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2020/09/sim-cloning-theintercept.jpg?w=440&#038;h=440&#038;crop=1" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2020/12/cellhawk-1.jpg?fit=1000%2C624" medium="image">
			<media:title type="html">cellhawk-1</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2020/12/cellhawk-1.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2020/12/cellhawk-2.jpg?fit=2252%2C1769" medium="image">
			<media:title type="html">cellhawk-2</media:title>
			<media:description type="html">Screenshot from a Hawk Analytics promotional video displaying “link analysis” which
reveals a large network of “co-conspirators and associates” in a matter of seconds.
The more data points, in this case cellphone numbers, run through CellHawk likely
exponentially expands the number of other individuals roped into an investigation. The
civil liberties implications of this software are arguably much more dangerous than
even IMSI-Catchers such as StingRay which have come under a great deal of scrutiny in
recent years. The policy in place to govern the fusion center’s use of this technology
would allow the protesters arrested to be subject to a “link analysis” search like the
one pictured above as they were all booked on probable cause riot charges.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2020/12/cellhawk-2.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2020/06/singray-theintercept-SH-25.jpg?w=440&#038;h=440&#038;crop=1" medium="image" />
            </item>
        
            <item>
                <title><![CDATA[The Microsoft Police State: Mass Surveillance, Facial Recognition, and the Azure Cloud]]></title>
                <link>https://theintercept.com/2020/07/14/microsoft-police-state-mass-surveillance-facial-recognition/</link>
                <comments>https://theintercept.com/2020/07/14/microsoft-police-state-mass-surveillance-facial-recognition/#respond</comments>
                <pubDate>Tue, 14 Jul 2020 19:42:17 +0000</pubDate>
                                    <dc:creator><![CDATA[Michael Kwet]]></dc:creator>
                                		<category><![CDATA[Justice]]></category>
		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=315030</guid>
                                    <description><![CDATA[<p>Microsoft helps police surveil and patrol communities through its own offerings and a network of partnerships — while its PR efforts obscure this.</p>
<p>The post <a href="https://theintercept.com/2020/07/14/microsoft-police-state-mass-surveillance-facial-recognition/">The Microsoft Police State: Mass Surveillance, Facial Recognition, and the Azure Cloud</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>Nationwide protests against</u> racist policing have brought new scrutiny onto big tech companies like Facebook, which is under boycott by advertisers over hate speech directed at people of color, and Amazon, called out for <a href="https://theintercept.com/2020/06/03/amazon-police-racism-tech-black-lives-matter/">aiding police surveillance</a>. But Microsoft, which has largely escaped criticism, is knee-deep in services for law enforcement, fostering an ecosystem of companies that provide police with software using Microsoft’s cloud and other platforms. The full story of these ties highlights how the tech sector is increasingly entangled in <a href="https://theintercept.com/2020/07/09/twitter-dataminr-police-spy-surveillance-black-lives-matter-protests/">intimate</a>, ongoing <a href="https://theintercept.com/2020/06/24/fbi-surveillance-social-media-cellphone-dataminr-venntel/">relationships</a> with police departments.</p>
<p>Microsoft’s links to law enforcement agencies have been obscured by the company, whose public response to the outrage that followed the murder of George Floyd has focused on facial recognition software. This misdirects attention away from Microsoft’s own mass surveillance platform for cops, the Domain Awareness System, built for the New York Police Department and later expanded to Atlanta, Brazil, and Singapore. It also obscures that Microsoft has partnered with scores of police surveillance vendors who run their products on a “Government Cloud” supplied by the company’s Azure division and that it is pushing platforms to wire police field operations, including drones, robots, and other devices.</p>
<p class="p1"></p>
<p>With partnership, support, and critical infrastructure provided by Microsoft, a shadow industry of smaller corporations provide mass surveillance to law enforcement agencies. Genetec offers cloud-based CCTV and big data analytics for mass surveillance in major U.S. cities. Veritone provides facial recognition services to law enforcement agencies. And a wide range of partners provide high-tech policing equipment for the Microsoft Advanced Patrol Platform, which turns cop cars into all-seeing surveillance patrols. All of this is conducted together with Microsoft and hosted on the Azure Government Cloud.</p>
<p>Last month, hundreds of Microsoft employees <a href="https://onezero.medium.com/250-microsoft-employees-call-on-ceo-to-cancel-police-contracts-and-support-defunding-seattle-pd-e89fa5d9e843">petitioned their CEO</a>, Satya Nadella, to cancel contracts with law enforcement agencies, support Black Lives Matter, and endorse defunding the police. In response, Microsoft ignored the complaint and instead banned sales of <i>its own</i> facial recognition software to police in the United States, directing eyes away from Microsoft’s other contributions to police surveillance. The strategy worked: The press and activists alike praised the move, reinforcing Microsoft’s said position as a <a href="https://www.nytimes.com/2018/05/07/technology/microsoft-moral-leader.html">moral leader</a> in tech.</p>
<p>Yet it’s not clear how long Microsoft will <a href="https://www.axios.com/microsoft-is-winning-the-techlash-4d16b1ba-2da5-4f9b-8fd2-d591b0a3b2ea.html">escape</a> major scrutiny. Policing is increasingly done with active cooperation from tech companies, and Microsoft, along with Amazon and other cloud providers, is one of the major players in this space.</p>
<p>Because partnerships and services hosting third party vendors on the Azure cloud do not have to be announced to the public, it is impossible to know full extent of Microsoft&#8217;s involvement in the policing domain, or the status of publicly announced third party services, potentially including some of the previously announced relationships mentioned below.</p>
<p>Microsoft declined to comment.</p>
<h3>Microsoft: From Police Intelligence to the Azure Cloud</h3>
<p>In the wake of 9/11, Microsoft made major contributions to centralized intelligence centers for law enforcement agencies. Around 2009, it <a href="http://www.nyc.gov/html/nypd/html/home/POA/pdf/Technology.pdf">began working on</a> a surveillance platform for the NYPD called the Domain Awareness System, or DAS, which was unveiled to the public in 2012. The system was built with leadership from Microsoft along with NYPD officers.</p>
<p>While some details about the DAS have been disclosed to the public, many are still missing. The most comprehensive account to date appeared in a <a href="https://pubsonline.informs.org/doi/10.1287/inte.2016.0860">2017</a><a href="https://pubsonline.informs.org/doi/10.1287/inte.2016.0860"> paper</a> by NYPD officers.</p>
<p>The DAS integrates disparate sources of information to perform three core functions: real-time alerting, investigations, and police analytics.</p>
<p>Through the DAS, the NYPD watches the personal movements of the entire city. In its early days, the system ingested information from closed-circuit TV cameras, environmental sensors (to detect radiation and dangerous chemicals), and automatic license plate readers, or ALPRs. By 2010, it began adding geocoded NYPD records of complaints, arrests, 911 calls, and warrants “to give context to the sensor data.” Thereafter, it added video analytics, automatic pattern recognition, predictive policing, and a mobile app for cops.</p>
<p>By 2016, the system had ingested 2 billion license plate images from ALPR cameras (3 million reads per day, archived for five years), 15 million complaints, more than 33 billion public records, over 9,000 NYPD and privately operated camera feeds, videos from 20,000-plus body cameras, and more. To make sense of it all, analytics algorithms pick out relevant data, including for predictive policing.</p>
<!-- BLOCK(photo)[1](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[1] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-315466 size-large" src="https://theintercept.com/wp-content/uploads/2020/07/01-Microsoft-Aware-3.png?w=1024" alt="" width="1024" height="576" srcset="https://theintercept.com/wp-content/uploads/2020/07/01-Microsoft-Aware-3.png?w=1920 1920w, https://theintercept.com/wp-content/uploads/2020/07/01-Microsoft-Aware-3.png?w=300 300w, https://theintercept.com/wp-content/uploads/2020/07/01-Microsoft-Aware-3.png?w=768 768w, https://theintercept.com/wp-content/uploads/2020/07/01-Microsoft-Aware-3.png?w=1024 1024w, https://theintercept.com/wp-content/uploads/2020/07/01-Microsoft-Aware-3.png?w=1536 1536w, https://theintercept.com/wp-content/uploads/2020/07/01-Microsoft-Aware-3.png?w=540 540w, https://theintercept.com/wp-content/uploads/2020/07/01-Microsoft-Aware-3.png?w=1000 1000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />
<figcaption class="caption source">A snapshot of the Microsoft Domain Awareness System — also called Microsoft Aware — desktop interface. Photo taken from Microsoft presentation titled “Always Aware,” by John Manning and Kirk Arthur.<br/>Image: Microsoft presentation</figcaption><!-- END-CONTENT(photo)[1] --></figure><!-- END-BLOCK(photo)[1] -->
<p>The NYPD has a history of police abuse, and civil rights and liberties advocates like Urban Justice Center’s Surveillance Technology Oversight Project have <a href="https://www.stopspying.org/latest-news/2019/9/26/domain-awareness-system">protested the system</a> out of constitutional concerns, with little success to date.</p>
<p>While the DAS has received some attention from the press — and is fairly well-known among activists — there is more to the story of Microsoft policing services.</p>
<p>Over the years, Microsoft has grown its business through the expansion of its cloud services, in which storage capacity, servers, and software running on servers are rented out on a metered basis. One of its offerings, Azure Government, provides dedicated data hosting in exclusively domestic cloud centers so that the data never physically leaves the host country. In the U.S., Microsoft has built several Azure Government cloud centers for use by local, state, and federal organizations.</p>
<p>Unbeknownst to most people, Microsoft has a “Public Safety and Justice” division with staff who formerly worked in law enforcement. This is the true heart of the company’s policing services, though it has operated for years away from public view.</p>
<p>Microsoft’s police surveillance services are often opaque because the company sells little in the way of its own policing products. It instead offers an array of “general purpose” Azure cloud services, such as machine learning and predictive analytics tools like Power BI (business intelligence) and Cognitive Services, which can be used by law enforcement agencies and surveillance vendors to build their own software or solutions.</p>
<h3>Microsoft’s Surveillance-Based IoT Patrol Car</h3>
<p>A rich array of Microsoft’s cloud-based offerings is on full display with a concept called “The Connected Officer.” Microsoft situates this concept as part of the Internet of Things, or IoT, in which gadgets are connected to online servers and thus made more useful. “The Connected Officer,” Microsoft has written, will “bring IoT to policing.”</p>
<p>With the Internet of Things, physical objects are assigned unique identifiers and transfer data over networks in an automated fashion. If a police officer draws a gun from its holster, for example, a notification can be sent over the network to alert other officers there may be danger. Real Time Crime Centers could then locate the officer on a map and monitor the situation from a command and control center.</p>
<!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[2] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-315467 size-large" src="https://theintercept.com/wp-content/uploads/2020/07/02-Connected-Officer-IoT.png?w=1024" alt="" width="1024" height="576" srcset="https://theintercept.com/wp-content/uploads/2020/07/02-Connected-Officer-IoT.png?w=1920 1920w, https://theintercept.com/wp-content/uploads/2020/07/02-Connected-Officer-IoT.png?w=300 300w, https://theintercept.com/wp-content/uploads/2020/07/02-Connected-Officer-IoT.png?w=768 768w, https://theintercept.com/wp-content/uploads/2020/07/02-Connected-Officer-IoT.png?w=1024 1024w, https://theintercept.com/wp-content/uploads/2020/07/02-Connected-Officer-IoT.png?w=1536 1536w, https://theintercept.com/wp-content/uploads/2020/07/02-Connected-Officer-IoT.png?w=540 540w, https://theintercept.com/wp-content/uploads/2020/07/02-Connected-Officer-IoT.png?w=1000 1000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />
<figcaption class="caption source">Microsoft’s Connected Officer simulation demo for IoT surveillance and data integration for real-time situational awareness and centralized police analytics. Photo taken from Microsoft presentation, “The Connected Officer: Bringing IoT to Policing,” by Jeff King and Brandon Rohrer.<br/>Image: Microsoft presentation</figcaption><!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] -->
<p>According to this concept, a multitude of surveillance and IoT sensor data is sent onto a “hot path” for fast use in command centers and onto a “cold path” to be used later by intelligence analysts looking for patterns. The data is streamed along through Microsoft’s Azure Stream Analytics product, stored on the Azure cloud, and enhanced by Microsoft analytics solutions like Power BI — providing a number of points at which Microsoft can make money.</p>
<p>While the “Connected Officer” was a conceptual exercise, the company’s real-world patrol solution is the Microsoft Advanced Patrol Platform, or MAPP. MAPP is an IoT platform for police patrol vehicles that integrates surveillance sensors and database records on the Azure cloud, <a href="https://www.unmannedsystemstechnology.com/2015/10/aeryon-skyranger-to-be-included-in-microsoft-advanced-patrol-platform-vehicle/">includ</a><a href="https://www.unmannedsystemstechnology.com/2015/10/aeryon-skyranger-to-be-included-in-microsoft-advanced-patrol-platform-vehicle/">ing</a> “dispatch information, driving directions, suspect history, a voice-activated license plate reader, a missing persons list, location-based crime bulletins, shift reports, and more.”</p>
<!-- BLOCK(photo)[3](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[3] -->
<img loading="lazy" decoding="async" width="1068" height="801" class="aligncenter size-large wp-image-315468" src="https://theintercept.com/wp-content/uploads/2020/07/03-MAPP-car-MS-blog.jpg" alt="03-MAPP-car-MS-blog" srcset="https://theintercept.com/wp-content/uploads/2020/07/03-MAPP-car-MS-blog.jpg?w=1068 1068w, https://theintercept.com/wp-content/uploads/2020/07/03-MAPP-car-MS-blog.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2020/07/03-MAPP-car-MS-blog.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2020/07/03-MAPP-car-MS-blog.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2020/07/03-MAPP-car-MS-blog.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2020/07/03-MAPP-car-MS-blog.jpg?w=1000 1000w" sizes="auto, (max-width: 1068px) 100vw, 1068px" />
<figcaption class="caption source">A demo of the Microsoft Advanced Patrol Platform, or MAPP, IoT surveillance vehicle for police. An Aeryon Labs SkyRanger is perched on top. Photo taken from Microsoft Azure blog, “Microsoft hosts Justice &amp; Public Safety leaders at the 2nd annual CJIS Summit,” by Rochelle Eichner.<br/>Photo: Microsoft Azure blog</figcaption><!-- END-CONTENT(photo)[3] --></figure><!-- END-BLOCK(photo)[3] -->
<p>The MAPP vehicle is outfitted with gear from third-party vendors that stream surveillance data into the Azure cloud for law enforcement agencies. Mounted to the roof, a 360-degree high-resolution camera streams live video to Azure and the laptop inside the vehicle, with access also available on a mobile phone or remote computer. The vehicle also sports an automatic license plate reader that can read 5,000 plates per minute — whether the car is <a href="https://www.policemag.com/342120/the-cloud-beyond-data-storage">stationary or on the move</a> — and cross-check them against a database in Azure and run by <a href="https://www.policemag.com/342120/the-cloud-beyond-data-storage">Genetec’s license plate reader solution</a>, AutoVu. A <a href="https://azure.microsoft.com/en-us/resources/videos/microsoft-advanced-patrol-platform/">proximity camera</a> on the vehicle is designed to alert the officers when their vehicle is being approached.</p>
<p>Patrolling the skies is a drone provided by <a href="http://geospatial-solutions.com/aeryon-named-uav-partner-for-microsoft-video-platform-for-police-agencies/">Microsoft partner</a> Aeryon Labs, the <a href="https://web.archive.org/web/20150507181741/https://www.aeryon.com/aeryon-skyranger">SkyRanger</a>, to provide real-time streaming video. (Aeryon Labs is now part of surveillance giant FLIR Systems.) According to Nathan Beckham of Microsoft Public Safety and Justice, the vehicle’s drones “<a href="https://www.youtube.com/watch?v=4xjHY3K98yM">follow it around</a> and see a bigger view of it.” The drones, writes DroneLife, can “<a href="https://dronelife.com/2015/10/28/microsofts-police-platform-to-include-drones/">provide aerial views</a> to the integrated data platform, allowing officers to assess ongoing situations in real time, or to gather forensic evidence from a crime scene.”</p>
<p>Police robots are also part of the MAPP platform. Products from ReconRobotics, for example, “integrat[ed] with Microsoft’s Patrol Car of the Future Program” in 2016. Microsoft <a href="https://news.microsoft.com/2016/10/17/microsoft-and-partners-showcase-cloud-enabled-solutions-for-law-enforcement-at-iacp-2016/">says</a> ReconRobotics provides their MAPP vehicle with a “small, lightweight but powerful robot” that “can be easily deployed and remotely controlled by patrol officers to provide real-time information to decision-makers.”</p>
<p>Another <a href="https://sdrobots.com/superdroid-robots-partners-microsoft/">Microsoft partner</a>, SuperDroid Robots, has also announced they will provide the Microsoft MAPP vehicle with two compact remote-controlled surveillance robots, the MLT “<a href="http://www.sdrtactical.com/MLT-Jack-Russell/">Jack Russell</a>” and the LT2-F “<a href="http://www.sdrtactical.com/LT2-Bloodhound/">Bloodhound</a>,” the latter of which can climb stairs and obstacles.</p>
<p>Although it sports a Microsoft insignia on the hood and door, the physical vehicle the company uses to promote MAPP isn’t for sale by Microsoft, and you probably won’t see Microsoft-labeled cars driving around. Rather, Microsoft provides MAPP as a platform through which to transform existing cop cars into IoT surveillance vehicles: “It’s really about being able to take all this data and put it up in the cloud, being able to source that data with their data, and start making relevant information out of it,” said Beckham.</p>
<p>Indeed, Microsoft <a href="https://azure.microsoft.com/en-us/resources/videos/microsoft-advanced-patrol-platform/">says</a> “the car is becoming the nerve center for law enforcement.” According to Beckham, the information <a href="https://www.youtube.com/watch?v=4xjHY3K98yM">collected and stored</a> in the Azure cloud will help officers “identify bad actors” and “let the officers be aware of the environment that is going on around them.” As an example, he said, “We’re hoping with machine learning and AI in the future, we can start pattern matching” with MAPP vehicles providing data to help find “bad actors.”</p>
<!-- BLOCK(photo)[4](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221000px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1000px;"><!-- CONTENT(photo)[4] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-315469 size-large" src="https://theintercept.com/wp-content/uploads/2020/07/04-option2-MAPP-car-SuperDroid-robots-2.1-1000.jpg?w=1000" alt="" width="1000" height="857" srcset="https://theintercept.com/wp-content/uploads/2020/07/04-option2-MAPP-car-SuperDroid-robots-2.1-1000.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2020/07/04-option2-MAPP-car-SuperDroid-robots-2.1-1000.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2020/07/04-option2-MAPP-car-SuperDroid-robots-2.1-1000.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2020/07/04-option2-MAPP-car-SuperDroid-robots-2.1-1000.jpg?w=540 540w" sizes="auto, (max-width: 1000px) 100vw, 1000px" />
<figcaption class="caption source">The MLT “Jack Russell” and the LT2-F “Bloodhound” on display at an event showcasing the Microsoft MAPP police vehicle solution during the FBI National Academy Associates’ 2015 Annual Training Conference in Seattle. Photo taken from SuperDroid Robots blog post, “SuperDroid Robots Partners with Microsoft.”<br/>Photo: <a href="https://www.superdroidrobots.com/">SuperDroid Robots</a></figcaption><!-- END-CONTENT(photo)[4] --></figure><!-- END-BLOCK(photo)[4] -->
<p>Last October, South African police <a href="https://www.itweb.co.za/content/kYbe9MXxPNyMAWpG">announced</a> Microsoft partnered with the city of Durban for “21st century” smart policing. Durban’s version of the the MAPP solution includes a <a href="https://www.policemag.com/342120/the-cloud-beyond-data-storage">360-</a><a href="https://www.policemag.com/342120/the-cloud-beyond-data-storage">degree ALPR</a> to scan license plates and a facial recognition camera from Chinese video surveillance firm Hikvision for use when the vehicle is stationary (e.g., parked at an event).</p>
<p>According to South African news outlet ITWeb, the metro police will use the MAPP solution “to deter criminal activities based on data analysis through predictive modeling and machine learning algorithms.” The vehicle has <a href="https://www.itweb.co.za/content/kYbe9MXxPNyMAWpG">already been rolled out</a> in Cape Town, where Microsoft recently opened a new Azure data center — an extension of the <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3232297">digital colonialis</a><a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3232297">m</a> I wrote about in 2018.</p>

<div class="photo-grid photo-grid--2-col photo-grid--xtra-large">
  <div class="photo-grid__row">
          <div class="photo-grid__item photo-grid__item--1">
        <img data-recalc-dims="1" decoding="async"
          class="photo-grid__photo"
          src="https://theintercept.com/wp-content/uploads/2020/07/05-MAPP-facial-rec-1-2.jpg?w=1200"
          alt=""
          loading="lazy" >
      </div>
          <div class="photo-grid__item photo-grid__item--2">
        <img data-recalc-dims="1" decoding="async"
          class="photo-grid__photo"
          src="https://theintercept.com/wp-content/uploads/2020/07/06-MAPP-facial-rec-2.png?w=1200"
          alt=""
          loading="lazy" >
      </div>
      </div>

  <p class="photo-grid__description">
    <span class="photo-grid__caption">Microsoft’s MAPP patrol vehicle in Durban sports a facial recognition camera from China-based Hikvision. Photos taken from Multimedia Live presentation, ‘Metro police go high-tech for festive season.’</span>
    <span class="photo-grid__credit">Images: Multimedia Live presentation</span>
  </p>
</div>
<p>Much like the U.S. (albiet with some <a href="https://africasacountry.com/2020/06/the-class-character-of-police-violence">different dynamics</a>), South Africa faces the scourge of police brutality that disproportionately impacts people of color. The country had its own <a href="https://www.dailymaverick.co.za/opinionista/2020-06-03-from-collins-khosa-to-george-floyd-policing-in-crisis-in-south-africa-and-the-us/#gsc.tab=0">George Floyd moment</a> during the recent Covid-19 lockdown when the military and police brutally beat 40-year-old Collins Khosa in the poor Alexandra township, leading to his death — over a cup of beer. (A military inquiry found that Khosa’s death was not linked to his injuries at the hands of authorities; Khosa’s family and many others in South Africa have <a href="https://allafrica.com/stories/202005290258.html">rejected</a> the review as a whitewash.)</p>
<p>The MAPP solution will be used for “zero tolerance” policing. For example, Durban Metro Police spokesperson Parboo Sewpersad said the rollout aims to punish “littering, drinking and driving, and drinking and walking” during summer festivities.</p>
<p>It is difficult to determine where else the MAPP vehicle may be deployed. The rollout in South Africa suggests Microsoft sees Africa as a place to experiment with its police surveillance technologies.</p>
<h3>Microsoft: Powering CCTV and Police Intelligence in the City</h3>
<p>Beyond wiring police vehicles, video surveillance provides another lucrative source of profits for Microsoft, as it is loaded with data packets to transmit, store, and process — earning fees each step of the way.</p>
<p>When building a CCTV network packed with cameras, cities and businesses<a href="https://theintercept.com/2020/01/27/surveillance-cctv-smart-camera-networks/"> typically use </a>a video management system, or VMS, to do things like display multiple camera feeds on a video wall or offer the option to search through footage. A leading VMS provider, Genetec, offers the core VMS integrated into Microsoft’s Domain Awareness System. A <a href="https://resources.genetec.com/stratocast-cloud-based-video-monitoring/microsoft-gold-certification">close partner</a> of Microsoft for over 20 years, the two companies <a href="https://microsoft.github.io/techcasestudies/devops/2016/06/21/genetec.html">work together</a> on integrating surveillance services on the Azure cloud.</p>
<p class="p1"><!-- BLOCK(promote-post)[8](%7B%22componentName%22%3A%22PROMOTE_POST%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22slug%22%3A%22protests-for-black-lives%22%2C%22crop%22%3A%22promo%22%7D) --><aside class="promote-banner">
    <a class="promote-banner__link" href="/collections/protests-for-black-lives/">
              <span class="promote-banner__image">
          <img loading="lazy" decoding="async" width="300" height="150" src="https://theintercept.com/wp-content/uploads/2020/07/GettyImages-1218280802-crop.jpg?fit=300%2C150" class="attachment-medium size-medium" alt="" srcset="https://theintercept.com/wp-content/uploads/2020/07/GettyImages-1218280802-crop.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2020/07/GettyImages-1218280802-crop.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2020/07/GettyImages-1218280802-crop.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2020/07/GettyImages-1218280802-crop.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2020/07/GettyImages-1218280802-crop.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2020/07/GettyImages-1218280802-crop.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2020/07/GettyImages-1218280802-crop.jpg?w=1000 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" />        </span>
            <div class="promote-banner__text">
                  <p class="promote-banner__eyebrow">
            Read Our Complete Coverage          </p>
        
        <h2 class="promote-banner__title">Protests for Black Lives</h2>
      </div>
    </a>
  </aside><!-- END-BLOCK(promote-post)[8] --></p>
<p>Some of the most high-profile city police forces are using Genetec and Microsoft for video surveillance and analytics.</p>
<p>Through a public-private partnership called <a href="https://atlantapolicefoundation.org/wp-content/uploads/2017/05/VISION-SAFE-ATLANTA_technology-and-innovation.pdf">Operation Shield</a>, Atlanta’s camera network has grown from 17 downtown cameras to a wide net of 10,600 cameras that officials hope will soon cover all city quadrants. Genetec and Microsoft Azure power the CCTV network.</p>
<p>On June 14, Atlanta’s Chief of Police, Erika Shields, <a href="https://www.washingtonpost.com/nation/2020/06/13/atlanta-shooting-police/">resigned</a> after APD cops shot and killed a 27-year-old Black man, Rayshard Brooks. Last month, <a href="https://www.cnn.com/2020/06/02/us/atlanta-police-charged-protest/index.html">six Atlanta police officers</a> were charged for using excessive force against protesters of police violence.</p>
<p>In 2019, Atlanta Police Foundation COO Marshall Freeman told me the foundation had just completed a “department-wide rollout” for Microsoft Aware (Domain Awareness System). Freeman said the Atlanta Police Department uses Microsoft machine learning to correlate data, and plans to add Microsoft’s video analytics. “We can always continue to go back to Microsoft and have the builders expand on the technology and continue to build out the platform,” he added.</p>
<p>In Chicago, 35,000 cameras cover the city with a plug-in surveillance network. The back-end currently uses Genetec Stratocast and Genetec’s Federation service, which manages access to cameras across a federated network of CCTV cameras — a network of camera networks, so to speak.</p>
<!-- BLOCK(photo)[9](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[9] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-315476 size-large" src="https://theintercept.com/wp-content/uploads/2020/07/07-Citigraf-1.png?w=1024" alt="" width="1024" height="576" srcset="https://theintercept.com/wp-content/uploads/2020/07/07-Citigraf-1.png?w=1920 1920w, https://theintercept.com/wp-content/uploads/2020/07/07-Citigraf-1.png?w=300 300w, https://theintercept.com/wp-content/uploads/2020/07/07-Citigraf-1.png?w=768 768w, https://theintercept.com/wp-content/uploads/2020/07/07-Citigraf-1.png?w=1024 1024w, https://theintercept.com/wp-content/uploads/2020/07/07-Citigraf-1.png?w=1536 1536w, https://theintercept.com/wp-content/uploads/2020/07/07-Citigraf-1.png?w=540 540w, https://theintercept.com/wp-content/uploads/2020/07/07-Citigraf-1.png?w=1000 1000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />
<figcaption class="caption source">Genetec Citigraf on Microsoft Azure. Data ingested for correlations, monitoring, and alerts includes Computer Aided Dispatch data, gunshot detection from ShotSpotter, automatic license plate reader cameras, American Community Survey (census) data, CCTVs on Genetec’s VMS, various communications and intrusion alerts, Geographic Information Systems data, and database components like incidents and arrests. Photo taken from webinar, “How Chicago Integrated Data and Reduced Crime by 24%,” presented by Otto Doll (Center for Digital Government), Jonathan Lewin (Chicago Police Department), and Bob Carter (Genetec).<br/>Image: Government Technology/Center for Digital Government webinar</figcaption><!-- END-CONTENT(photo)[9] --></figure><!-- END-BLOCK(photo)[9] -->
<p>In 2017, Genetec custom-built their <a href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE36LiH">Citigraf platform</a> for the Chicago Police Department — the second-largest police force in the country — as a way to make sense of the department’s vast array of data. Powered by Microsoft Azure, Citigraf ingests information from surveillance sensors and database records. Using real-time and historical data, it performs calculations, visualizations, alerts, and other tasks to create “deep situational awareness” for the CPD. Microsoft is partnering with Genetec to build a “correlation engine” to make sense of the surveillance data.</p>
<p align="left">Chicago’s police force has a brutal <a href="https://theintercept.com/series/the-chicago-police-files/">history</a> of racism, corruption, and even <a href="https://www.theatlantic.com/politics/archive/2016/10/10000-files-on-chicago-police-torture-decades-now-online/504233/">two decades’ worth</a> of <a href="https://theintercept.com/2018/09/25/jon-burge-chicago-police-torture/">torturing suspects</a>. During police violence protests following Floyd’s murder, the CPD <a href="https://theintercept.com/2020/06/14/chicago-police-black-lives-matter-protesters/">attacked and beat</a> protesters, including five Black protesters to the point of hospitalization.</p>
<p>The city of Detroit uses Genetec Stratocast and Microsoft Azure to power their controversial Project Green Light. Launched in 2016 in tandem with a new Real Time Crime Center, the project allows local businesses — or other participating entities, such as churches and public housing — to install video cameras on their premises and stream surveillance feeds to the Detroit Police Department. Participants can place a “green light” next to the cameras to warn the public — which is 80 percent Black — that “you are being watched by the police.”</p>
<p>In 2015, the DPD <a href="https://drive.google.com/file/d/1Pam-okNwmayEuBjvZj8EVu4ytok1qB2R/view?usp=sharing">stated</a>, “the day is coming where police will have access to cameras everywhere allowing the police to virtually patrol nearly any area of the city without ever stepping foot.”</p>
<p>DPD Assistant Chief David LeValley explained to me that prior to creating the new command center, the department sent a team of people to several other U.S. cities, including New York, Chicago, Atlanta, Boston, and the Drug Enforcement Administration center in El Paso, Texas, to scope out their intel centers. “Our Real Time Crime Center is an all-encompassing intelligence center, it’s not just Project Green Light,” he explained.</p>
<p>The expansion of police surveillance in Detroit has been swift. Today, Project Green Light has around 2,800 cameras installed across over 700 locations, and two smaller Real Time Crime Centers are being added, a development trending in cities like Chicago. LeValley told me those RTTCs will do things like “pattern recognition” and “reports for critical incidents.”</p>
<p>In the wake of George Floyd’s murder, activists in Detroit have <a href="https://www.freep.com/story/news/local/michigan/detroit/2020/06/15/facial-recognition-deal-off-agenda-protesters-target-councilmembers/3191887001/">re</a><a href="https://www.freep.com/story/news/local/michigan/detroit/2020/06/15/facial-recognition-deal-off-agenda-protesters-target-councilmembers/3191887001/">charged their efforts</a> to abolish Project Green Light in the fight against police surveillance, which local community advocates like Tawana Petty and Eric Williams deem racist. This year, two Black men, Robert Julian-Borchak Williams and Michael Oliver, were wrongfully arrested after being misidentified by the DPD’s facial recognition technology.</p>
<p>Nakia Wallace, a co-organizer of <a href="https://detroitwillbreathe.info/">Detroit Will Breathe</a>, told me Project Green Light “pre-criminalizes” people and “gives the police the right to keep tabs on you if they think you are guilty” and “harass Black and brown communities.” “Linking together cameras” across wide areas is “hyper-surveillance” and “has to be stopped,” she added.</p>
<p>The “function that the [DPD] serve,” Wallace said, is &#8220;the protection of property and white supremacy.&#8221; “They’re hyper-militarized, and even in the wake of that, people are still dying in the city” because “they have no interest in the livelihood of Detroit citizens.” Instead of militarizing, we need to “stop pretending like poor Black people are inherently criminals, and start looking at social services and things that prevent people from going into a life of crime.”</p>
<p>In a 2017 <a href="https://cloudblogs.microsoft.com/industry-blog/government/2017/10/18/a-connected-city-is-a-safer-city-see-how-at-smart-city-expo/">blog post</a>, Microsoft boasted about the partnership with Genetec for the DPD, stating that Project Green Light is “a great example of how cities can improve public safety, citizens’ quality of life, and economic growth with today’s technologies.”</p>
<h3>Microsoft Actually Does Supply Facial Recognition Technology</h3>
<p>While Microsoft has been powering intelligence centers and CCTV networks in the shadows, the company has publicly focused on facial recognition regulations. On June 11, Microsoft <a href="https://www.washingtonpost.com/technology/2020/06/11/microsoft-facial-recognition">joined Amazon and IBM</a> in saying it will not sell its facial recognition technology to police until there are regulations in place.</p>
<p>This is a PR stunt that confused how Microsoft’s relationship to policing works technically and ethically, in a number of ways.</p>
<p>First, while the press occasionally criticizes Microsoft’s Domain Awareness System, most attention to Microsoft policing focuses on facial recognition. This is mistaken: Microsoft is providing software to power a variety of policing technologies that undermine civil rights and liberties — even without facial recognition.</p>
<p>Second, facial recognition is a notable feature of many video surveillance systems and Real Time Crime Centers that Microsoft powers. The cities of New York, Atlanta, Chicago, and Detroit are among those utilizing Microsoft services to collect, store, and process the visual surveillance data used for facial recognition. Microsoft services are <i>part and parcel</i> of many police facial recognition surveillance systems.</p>
<p>Third, at least one facial recognition company, Veritone, has been left out of the conversation. A <a href="https://www.veritone.com/blog/veritone-launches-aiware-on-microsoft-azure-government-to-further-ai-adoption-by-government-agencies/?ajax_load_blog">Microsoft partner</a>, the Southern California artificial intelligence outfit offers cloud-based software called IDentify, which runs on Microsoft’s cloud and helps law enforcement agencies flag the faces of potential suspects.</p>
<!-- BLOCK(photo)[10](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[10] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-315477 size-large" src="https://theintercept.com/wp-content/uploads/2020/07/08-Azure-plus-Veritone.png?w=1024" alt="" width="1024" height="576" srcset="https://theintercept.com/wp-content/uploads/2020/07/08-Azure-plus-Veritone.png?w=1920 1920w, https://theintercept.com/wp-content/uploads/2020/07/08-Azure-plus-Veritone.png?w=300 300w, https://theintercept.com/wp-content/uploads/2020/07/08-Azure-plus-Veritone.png?w=768 768w, https://theintercept.com/wp-content/uploads/2020/07/08-Azure-plus-Veritone.png?w=1024 1024w, https://theintercept.com/wp-content/uploads/2020/07/08-Azure-plus-Veritone.png?w=1536 1536w, https://theintercept.com/wp-content/uploads/2020/07/08-Azure-plus-Veritone.png?w=540 540w, https://theintercept.com/wp-content/uploads/2020/07/08-Azure-plus-Veritone.png?w=1000 1000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />
<figcaption class="caption source">Veritone’s aiWARE solution on the Microsoft Azure cloud; Veritone is also on Amazon’s AWS GovCloud. Photo taken from Veritone webinar, “Artificial Intelligence: Machine Learning and Mission,” presented by Chad Steelberg (Veritone), Richard Zak (Microsoft), Ryan Jannise (Oracle), and Patrick McCollah (Deloitte).<br/>Image: Veritone webinar</figcaption><!-- END-CONTENT(photo)[10] --></figure><!-- END-BLOCK(photo)[10] -->
<p>In a 2020 <a href="https://www.veritone.com/blog/video-veritone-ceo-chad-steelbergs-ces-government-2020-keynote-artificial-intelligence-machine-learning-and-mission">keynote</a> at the Consumer Electronics Show, speaking alongside executives from Microsoft, Deloitte, and Oracle, Veritone CEO Chad Steelberg claimed that thanks to Veritone’s <a href="https://www.veritone.com/applications/identify/intelligent-rapid-suspect-identification-for-law-enforcement/">IDentify software</a> on Azure, cops have helped catch “hundreds and hundreds of suspects and violent offenders.” Veritone’s Redact product expedites prosecutions, and Illuminate allows investigators to “cull down evidence” and obtain anomaly “detection insights.”</p>
<p>In a recent <a href="https://www.youtube.com/watch?v=uj5U_MUPiNU">webinar</a>, Veritone explained how IDentify leverages data police already have, such as arrest records. If a person is detected and has no known match, the IDentify software can profile suspects by creating a “person of interest database” that “will allow you to simply save unknown faces to this database and continuously monitor for those faces over time.”</p>
<p>Veritone claims to deploy services in “about 150 locations,” but does not name which ones use IDentify. It launched a pilot test with the Anaheim Police Department in 2019.</p>
<p>Microsoft <a href="https://appsource.microsoft.com/en-us/product/web-apps/veritoneinc.veritone_identify?tab=Overview">lists Veritone </a><a href="https://appsource.microsoft.com/en-us/product/web-apps/veritoneinc.veritone_identify?tab=Overview">IDentify</a> as a facial recognition law enforcement product offering in its app repository online. The promotional video on the Microsoft website advertises IDentify’s ability to:</p>
<blockquote><p>… compare your known offender and person of interest databases with video evidence to quickly and automatically identify suspects for investigation. Simply upload evidence from surveillance systems, body cameras, and more. &#8230; But best of all, you’re not chained to your desk! Snap a picture and identify suspects while out on patrol, to verify statements, and preserve ongoing investigations.</p></blockquote>
<p>Veritone has been a <a href="https://www.veritone.com/blog/with-proper-use-facial-recognition-benefits-all/">staunch</a> <a href="https://www.zdnet.com/article/amidst-furor-over-face-recognition-veritone-promotes-softwares-use-in-law-enforcement/">defender</a> of its facial recognition technology. In May 2019, the company tweeted:</p>
<p><!-- BLOCK(oembed)[12](%7B%22componentName%22%3A%22OEMBED%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22embedHtml%22%3A%22%3Cblockquote%20class%3D%5C%22twitter-tweet%5C%22%20data-width%3D%5C%22550%5C%22%20data-dnt%3D%5C%22true%5C%22%3E%3Cp%20lang%3D%5C%22en%5C%22%20dir%3D%5C%22ltr%5C%22%3EAmazon%5Cu2019s%20facial-recognition%20technology%20is%20supercharging%20local%20policing%20in%20Oregon.%20%20Did%20you%20know%20Veritone%20IDentify%20can%20kick%20it%20up%20a%20notch%20by%20harnessing%20the%20power%20of%20state%20booking%20databases%20to%20uncover%20their%20suspect%20leads%20faster%3F%20%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fhashtag%5C%2FIDentify%3Fsrc%3Dhash%26amp%3Bref_src%3Dtwsrc%255Etfw%5C%22%3E%23IDentify%3C%5C%2Fa%3E%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ft.co%5C%2FLMmqBkrP6I%5C%22%3Ehttps%3A%5C%2F%5C%2Ft.co%5C%2FLMmqBkrP6I%3C%5C%2Fa%3E%3C%5C%2Fp%3E%26mdash%3B%20Veritone%20%28%40veritoneinc%29%20%3Ca%20href%3D%5C%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fveritoneinc%5C%2Fstatus%5C%2F1134165277992730625%3Fref_src%3Dtwsrc%255Etfw%5C%22%3EMay%2030%2C%202019%3C%5C%2Fa%3E%3C%5C%2Fblockquote%3E%3Cscript%20async%20src%3D%5C%22https%3A%5C%2F%5C%2Fplatform.twitter.com%5C%2Fwidgets.js%5C%22%20charset%3D%5C%22utf-8%5C%22%3E%3C%5C%2Fscript%3E%22%2C%22endpoint%22%3A%22https%3A%5C%2F%5C%2Fpublish.twitter.com%5C%2Foembed%22%2C%22type%22%3A%22unknown%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftwitter.com%5C%2Fveritoneinc%5C%2Fstatus%5C%2F1134165277992730625%22%7D) --></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">Amazon’s facial-recognition technology is supercharging local policing in Oregon.  Did you know Veritone IDentify can kick it up a notch by harnessing the power of state booking databases to uncover their suspect leads faster?  <a href="https://twitter.com/hashtag/IDentify?src=hash&amp;ref_src=twsrc%5Etfw">#IDentify</a><a href="https://t.co/LMmqBkrP6I">https://t.co/LMmqBkrP6I</a></p>
<p>&mdash; Veritone (@veritoneinc) <a href="https://twitter.com/veritoneinc/status/1134165277992730625?ref_src=twsrc%5Etfw">May 30, 2019</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><!-- END-BLOCK(oembed)[12] --></p>
<p>In a <a href="https://www.youtube.com/watch?v=Xvbl1M-9Dio">promotional </a>video featuring Microsoft, Veritone’s Jon Gacek said, “You can see why at Veritone we’re excited to be tightly partnered with Microsoft Azure team. Their vision and our vision is very common.”</p>
<h3>Smoke, Mirrors, and Misdirection</h3>
<p>Despite claims to the contrary, Microsoft is providing facial recognition services to law enforcement through partnerships and services to companies like Veritone and Genetec, and through its Domain Awareness System.</p>
<p>Microsoft’s public relations strategy is designed to mislead the public by veering attention away from its wide-ranging services to police. Instead, Microsoft president and chief legal officer Brad Smith <a href="https://blogs.microsoft.com/on-the-issues/2018/12/06/facial-recognition-its-time-for-action">urge</a><a href="https://blogs.microsoft.com/on-the-issues/2018/12/06/facial-recognition-its-time-for-action">s</a><a href="https://blogs.microsoft.com/on-the-issues/2018/12/06/facial-recognition-its-time-for-action"> the public</a> to focus on facial recognition <i>regulation</i> and the issue of Microsoft’s <a href="https://www.washingtonpost.com/technology/2020/06/11/microsoft-facial-recognition"><i>own</i></a> facial recognition software, as if their other software and service offerings, partnerships, concepts, and marketing are not integral to a whole ecosystem of facial recognition and mass surveillance systems offered by smaller companies.</p>
<p>Esteemed Microsoft scholars, such as Kate Crawford, co-founder of the Microsoft-funded think tank, <a href="https://theintercept.com/2019/12/20/mit-ethical-ai-artificial-intelligence/">AI Now Institute</a>, have followed this playbook. Crawford recently praised Microsoft’s facial recognition PR and criticized companies like Clearview AI and Palantir, while ignoring the Microsoft Domain Awareness System, Microsoft’s surveillance partnerships, and Microsoft’s role as a cloud provider for facial recognition services.</p>
<p>https://twitter.com/katecrawford/status/1271133485747625984</p>
<p>Crawford and AI Now co-founder Meredith Whittaker have <a href="https://medium.com/@CoalitionForCriticalTechnology/abolish-the-techtoprisonpipeline-9b5b14366b16">condemned predictive policing</a> but haven’t explained the fact that Microsoft plays a central role in predictive policing for police. Crawford did not respond to a request for comment.</p>
<p class="p1"><!-- BLOCK(pullquote)[11](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[11] -->If these Microsoft clients were offering sex trafficking services on the Azure cloud, Microsoft would surely close their accounts.<!-- END-CONTENT(pullquote)[11] --></blockquote><!-- END-BLOCK(pullquote)[11] --></p>
<p>Microsoft and its advocates may claim that it is a “neutral” cloud provider and it’s up to other companies and police departments to decide how they use Microsoft software. Yet these companies are partnering with Microsoft, and Microsoft is getting paid to run their mass surveillance and facial recognition services on the Azure cloud — services that disproportionately affect people of color.</p>
<p>If these Microsoft clients were offering sex trafficking services on the Azure cloud, Microsoft would surely <a href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE1JskG">close their accounts</a>. And because law enforcement agencies purchase surveillance technologies using taxpayer dollars, the public is actually paying Microsoft for its own police surveillance.</p>
<p>If activists force corporations like Microsoft, Amazon, Google, IBM, and Oracle to terminate partnerships and infrastructure services for third parties conducting police surveillance, then cloud providers would have to acknowledge they are accountable for what is done on their clouds. Moving forward, activists could press to replace corporate ownership of digital infrastructure and data with community ownership at the local level.</p>
<p>There is a lot at stake in this moment.</p>
<p>The post <a href="https://theintercept.com/2020/07/14/microsoft-police-state-mass-surveillance-facial-recognition/">The Microsoft Police State: Mass Surveillance, Facial Recognition, and the Azure Cloud</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2020/07/14/microsoft-police-state-mass-surveillance-facial-recognition/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2020/07/ms-police-state-final-theintercept.jpg?fit=2400%2C1200' width='2400' height='1200' /><post-id xmlns="com-wordpress:feed-additions:1">315030</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2020/07/01-Microsoft-Aware-3.png?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2020/07/01-Microsoft-Aware-3.png?fit=1920%2C1080" medium="image">
			<media:title type="html">01-Microsoft-Aware-3</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2020/07/01-Microsoft-Aware-3.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2020/07/02-Connected-Officer-IoT.png?fit=1920%2C1080" medium="image">
			<media:title type="html">02-Connected-Officer-IoT</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2020/07/02-Connected-Officer-IoT.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2020/07/03-MAPP-car-MS-blog.jpg?fit=1068%2C801" medium="image">
			<media:title type="html">03-MAPP-car-MS-blog</media:title>
			<media:description type="html">A demo of the Microsoft Advanced Patrol Platform (MAPP) IoT surveillance vehicle for police. The Aeryon Labs SkyRanger is perched on top. Photo taken from Microsoft Azure blog, Microsoft hosts Justice &#38; Public Safety leaders at the 2nd annual CJIS Summit, by Rochelle Eichner.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2020/07/03-MAPP-car-MS-blog.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2020/07/04-option2-MAPP-car-SuperDroid-robots-2.1-1000.jpg?fit=1000%2C857" medium="image">
			<media:title type="html">04-option2-MAPP-car-SuperDroid-robots-2.1-1000</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2020/07/04-option2-MAPP-car-SuperDroid-robots-2.1-1000.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2020/07/05-MAPP-facial-rec-1-2.jpg?w=1200" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2020/07/06-MAPP-facial-rec-2.png?w=1200" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2020/07/GettyImages-1218280802-crop.jpg?fit=300%2C150" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2020/07/07-Citigraf-1.png?fit=1920%2C1080" medium="image">
			<media:title type="html">07-Citigraf-1</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2020/07/07-Citigraf-1.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2020/07/08-Azure-plus-Veritone.png?fit=1920%2C1080" medium="image">
			<media:title type="html">08-Azure-plus-Veritone</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2020/07/08-Azure-plus-Veritone.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[The Rise of Smart Camera Networks, and Why We Should Ban Them]]></title>
                <link>https://theintercept.com/2020/01/27/surveillance-cctv-smart-camera-networks/</link>
                <comments>https://theintercept.com/2020/01/27/surveillance-cctv-smart-camera-networks/#respond</comments>
                <pubDate>Mon, 27 Jan 2020 17:53:01 +0000</pubDate>
                                    <dc:creator><![CDATA[Michael Kwet]]></dc:creator>
                                		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=287258</guid>
                                    <description><![CDATA[<p>Police are using cameras at private businesses and homes, along with AI, to expand their video surveillance — raising privacy concerns.</p>
<p>The post <a href="https://theintercept.com/2020/01/27/surveillance-cctv-smart-camera-networks/">The Rise of Smart Camera Networks, and Why We Should Ban Them</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>There’s widespread concern</u> that video cameras will use facial recognition software to track our every public move. Far less remarked upon — but every bit as alarming — is the exponential expansion of “smart” video surveillance networks.</p>
<p>Private businesses and homes are starting to plug their cameras into police networks, and rapid advances in artificial intelligence are investing closed-circuit television, or CCTV, networks with the power for total public surveillance. In the not-so-distant future, police forces, stores, and city administrators hope to film your every move — and interpret it using video analytics.</p>
<p>The rise of all-seeing smart camera networks is an alarming development that threatens civil rights and liberties throughout the world. Law enforcement agencies have a long history of using surveillance against marginalized communities, and studies show surveillance chills freedom of expression — ill effects that could spread as camera networks grow larger and more sophisticated.</p>
<p>To understand the situation we’re facing, we have to understand the rise of the video surveillance industrial complex — its history, its power players, and its future trajectory. It begins with the proliferation of cameras for police and security, and ends with a powerful new industry imperative: complete visual surveillance of public space.</p>
<h3>Video Management Systems and Plug-in Surveillance Networks</h3>
<p>In their first decades of existence, CCTV cameras were low-resolution analog devices that recorded onto tapes. Businesses or city authorities deployed them to film a small area of interest. Few cameras were placed in public, and the power to track people was limited: If police wanted to pursue a person of interest, they had to spend hours collecting footage by foot from nearby locations.</p>
<p>In the late 1990s, video surveillance became more advanced. A company called Axis Communications invented the first <a href="https://www.axis.com/newsroom/article/first-network-camera">internet-enabled surveillance camera</a>, which converted moving images to digital data. New businesses like Milestone Systems built Video Management Systems, or VMS, to organize video information into databases. VMS providers created new features like motion sensor technology that alerted guards when a person was caught on camera in a restricted area.</p>
<p>As time marched on, video surveillance spread. On <a href="https://www.amazon.com/Business-Magnetism-Mr-Lars-Thinggaard/dp/0615892140">one account</a>, about 50 years ago, the United Kingdom had somewhere north of 60 permanent CCTV cameras installed nationwide. Today, the U.K. has over <a href="https://www.bbc.com/news/uk-30978995">6 million</a> such devices, while the U.S. has <a href="https://technology.ihs.com/583114/north-american-security-camera-installed-base-to-reach-62-million-in-2016">tens of millions</a>. According to marketing firm IHS Markit, <a href="https://www.wsj.com/articles/a-billion-surveillance-cameras-forecast-to-be-watching-within-two-years-11575565402">1 billion cameras</a> will be watching the world by the end of 2021, with the United States rivaling China’s <a href="https://technology.ihs.com/619515/the-us-has-a-security-camera-penetration-rate-rivalling-chinas">per person camera penetration rate</a>. Police can now track people across multiple cameras from a command-and-control center, desktop, or smartphone.</p>
<p>While it is possible to link thousands of cameras in a VMS, it is also expensive. To increase the amount of CCTVs available, cities recently came up with a clever hack: encouraging businesses and residents to place privately owned cameras on their police network — what I call &#8220;plug-in surveillance networks.&#8221;</p>
<p><!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[0] -->
<img loading="lazy" decoding="async" width="2000" height="1333" class="aligncenter size-large wp-image-287280" src="https://theintercept.com/wp-content/uploads/2020/01/h_15235476-edit-1579897222.jpg" alt="Video from surveillance cameras around the city is displayed at the Real Time Crime Center the viewing space for Project Green Light, at the Police Department's headquarters in downtown Detroit, June 14, 2019. In recent weeks, a public outcry has erupted over the facial recognition program employed in conjunction with the network of cameras. (Brittany Greeson/The New York Times)" srcset="https://theintercept.com/wp-content/uploads/2020/01/h_15235476-edit-1579897222.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2020/01/h_15235476-edit-1579897222.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2020/01/h_15235476-edit-1579897222.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2020/01/h_15235476-edit-1579897222.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2020/01/h_15235476-edit-1579897222.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2020/01/h_15235476-edit-1579897222.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2020/01/h_15235476-edit-1579897222.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source">Video from surveillance cameras around the city is displayed at the Real-Time Crime Center, the viewing space for Project Green Light, at the police department headquarters in Detroit on June 14, 2019.<br/>Photo: Brittany Greeson/The New York Times via Redux</figcaption><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] -->By pooling city-owned cameras with privately owned cameras, policing experts say an agency in a typical large city may amass <a href="https://www.rand.org/pubs/research_reports/RR2619.html">hundreds of thousands</a> of video feeds in just a few years.</p>
<p>Detroit has popularized plug-in surveillance networks through its controversial Project Green Light program. With Project Green Light, businesses can purchase CCTV cameras and connect them to police headquarters. They can also place a bright green light next to the cameras to indicate they are part of the police network. The project claims to deter crime by signaling to residents: The police are watching you.</p>
<p>Detroit is not alone. <a href="https://www.chicago.gov/city/en/depts/oem/provdrs/tech.html">Chicago</a>, <a href="https://www.safecamnola.com/">New Orleans</a>, <a href="https://www.cityandstateny.com/articles/policy/technology/how-new-york-city-is-watching-you.html">New York</a>, and <a href="https://atlantapolicefoundation.org/programs/operation-shield/">Atlanta</a> have also deployed plug-in surveillance networks. In these cities, private businesses and/or homes provide feeds that are integrated into crime centers so that police can access live streams and recorded footage. The police department in New Haven, Connecticut, told me they are looking into plug-in surveillance, and others are likely considering it.</p>
<p>The number of cameras on police networks now range from tens of thousands (Chicago) to several hundred (New Orleans). With so many cameras in place, and only a small team of officers to watch them, law enforcement agencies face a new challenge: How do you make sense of all that footage?</p>
<p>The answer is video analytics.</p>
<h3>Video Analytics Takes Off</h3>
<p>Around 2006, a young Israeli woman was recording family videos every weekend, but as a student and parent, she didn’t have time to watch them. A computer scientist at her university, Professor Shmuel Peleg, told me he tried to create a solution for her: He would take a long video and condense the interesting activity into a short video clip.</p>
<p>His solution failed: It only worked on stationary cameras, and the student’s video camera was moving when she filmed her family.</p>
<p>Peleg soon found another use case in the surveillance industry, which relies on stationary cameras. His solution became BriefCam, a video analytics firm that can summarize video footage from a scene across time so that investigators can view all relevant footage in a short space of time.</p>
<!-- BLOCK(youtube)[1](%7B%22componentName%22%3A%22YOUTUBE%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22sourceId%22%3A%22IOnZ_E71sY4%22%2C%22sourceName%22%3A%22youtube%22%2C%22start%22%3A%22%22%7D) --><iframe loading='lazy' class='social-iframe social-iframe--youtube' width='100%' src='//www.youtube.com/embed/IOnZ_E71sY4?enablejsapi=1' frameborder='0' allowfullscreen></iframe><!-- END-BLOCK(youtube)[1] -->
<h3></h3>
<p>Using a feature called Video Synopsis, BriefCam overlays footage of events happening at different times<a href="https://www.youtube.com/watch?v=fISfDd35sXU"> as if they are appearing simultaneously. </a>For example, if several people walked past a camera at 12:30 p.m., 12:40 p.m., and 12:50 p.m., BriefCam will aggregate their images into a single scene. Investigators can view all footage of interest from a given day in minutes instead of hours.</p>
<p>Thanks to rapid advances in artificial intelligence, summarization is just one feature in BriefCam’s product line and the rapidly expanding <a href="https://www.aclu.org/report/dawn-robot-surveillance">video analytics industry</a>.</p>
<p>Behavior recognition includes video analytics capabilities like <a href="https://www.youtube.com/watch?v=QcCjmWwEUgg">fight detection</a>, emotion recognition, fall detection, loitering, dog walking, jaywalking, toll fare evasion, and even <a href="https://www.securitysales.com/news/milestone-disruption-innovation-mips/slideshow/2/">lie detection</a>.</p>
<p>Object recognition can recognize faces, animals, cars, weapons, fires, and other things, as well as human characteristics like gender, age, and hair color.</p>
<p>Anomalous or unusual behavior detection works by recording a fixed area for a period of time — say, 30 days — and determining “normal” behavior for that scene. If the camera sees something unusual — say, a person running down a street at 3:00 a.m. — it will flag the incident for attention.</p>
<p>Video analytics systems can analyze and search across real-time streams or recorded footage. They can also isolate individuals or objects as they traverse a smart camera network.</p>
<p>Chicago; New Orleans; Detroit; Springfield, Massachusetts; and Hartford, Connecticut, are some of the cities currently using BriefCam for policing.</p>
<h3>To Search and Surveil</h3>
<p>With city spaces blanketed in cameras, and video analytics to make sense of them, law enforcement agencies gain the capacity to record and analyze everything, all the time. This provides authorities the power to index and search a vast database of objects, behaviors, and anomalous activity.</p>
<p>In Connecticut, police have used video analytics to identify or monitor known or suspected drug dealers. Sergeant Johnmichael O’Hare, former Director of the Hartford Real-Time Crime Center, recently <a href="https://www.youtube.com/watch?v=lDC3EVAMvYI">demonstrated</a> how BriefCam helped Hartford police reveal “where people go the most” in the space of 24 hours by viewing footage condensed and summarized in just nine minutes. Using a feature called “pathways,” he discovered hundreds of people visiting just two houses on the street and secured a search warrant to verify that they were drug houses.</p>
<p>Video analytics startup Voxel51 is also adding more sophisticated searching to the mix. Co-founded by Jason Corso, a professor of electrical engineering and computer science at the University of Michigan, the company offers a platform for video processing and understanding.</p>
<p>Corso told me his company hopes to offer the first system where people can “search based on semantic content about their data, such as, ‘I want to find all the video clips that have more than 3-way intersections … with at least 20 vehicles during daylight.’” Voxel51 “tries to make that possible” by taking video footage and “turning it into structured searchable data across different types of platforms.”</p>
<p>Unlike BriefCam, which analyzes video using nothing but its own software, Voxel51 offers an open platform which allows third parties to add their own analytics models. If the platform succeeds, it will supercharge the ability to search and surveil public spaces.</p>
<p>Corso told me his company is working on a <a href="https://techcrunch.com/2019/08/08/voxel51-raises-2-million-for-its-video-native-identification-of-people-cars-and-more/">pilot project</a> with the Baltimore police for their CitiWatch surveillance program and plans to trial the software with the Houston Police Department.</p>
<p>As cities start deploying a wide range of monitoring devices from the so-called internet of things, researchers are also developing a technique known as <a href="https://www.rand.org/pubs/research_reports/RR2619.html">v</a><a href="https://www.rand.org/pubs/research_reports/RR2619.html">ideo </a><a href="https://www.rand.org/pubs/research_reports/RR2619.html">a</a><a href="https://www.rand.org/pubs/research_reports/RR2619.html">nalytics and </a><a href="https://www.rand.org/pubs/research_reports/RR2619.html">s</a><a href="https://www.rand.org/pubs/research_reports/RR2619.html">ensor </a><a href="https://www.rand.org/pubs/research_reports/RR2619.html">f</a><a href="https://www.rand.org/pubs/research_reports/RR2619.html">usion</a>, or VA/SF, for police intelligence. With VA/SF, multiple streams from sensors are combined with video analytics to reduce uncertainties and make inferences about complex situations. As one example, Peleg told me BriefCam is developing in-camera audio analytics that uses microphones to discern actions that may confuse AI systems, such as whether people are fighting or dancing.</p>
<p>VMSs also offer smart integration across technologies. Former New Haven Chief of Police Anthony Campbell told me how <a href="https://www.youtube.com/watch?time_continue=7&amp;v=JJSNQoIvvkY">ShotSpotters</a>, controversial devices that listen for gunshots, integrate with specialized software so when a gun is fired, nearby swivel cameras instantly <a href="https://sixtechsys.com/the-hawkeye-effect-recognized-again-for-its-innovative-software">alter their direction</a> to the location of the weapons discharge.</p>
<p>Officers can also use software to lock building doors from a control center, and companies are developing analytics to alert security if <a href="https://www.eblockwatch.co.za/posts/watch-the-future">one car is being followed by another</a>.</p>
<h3>Toward a “Minority Report” World</h3>
<p>Video analytics captures a wide variety of data about the areas covered by smart camera networks. Not surprisingly, the information captured is now being proposed for predictive policing: the use of data to predict and police crime before it happens.</p>
<p>In 2002, the dystopian film “Minority Report<i>”</i> depicted a society using “pre-crime” analytics for police to intervene in lawbreaking before it occurs. In the end, the officers in charge tried to manipulate the system for their own interests.</p>
<p>A real-world version of &#8220;Minority Report&#8221; is <a href="https://www.vice.com/en_us/article/7xmmvy/why-does-hartford-have-so-many-cameras-precrime">emerging</a> through real-time crime centers used to analyze crime patterns for police. In these centers, law enforcement agencies ingest information from sources like social media networks, data brokers, public databases, criminal records, and ShotSpotters. Weather data is even included for its impact on crime (because “bad guys don’t like to get wet”).</p>
<p>In a <a href="https://www.accenture.com/_acnmedia/pdf-94/accenture-value-data-seeing-what-matters.pdf">2018 document</a>, the data storage firm Western Digital and the consultancy Accenture predicted mass smart camera networks would be deployed “across three tiers of maturity.” This multi-stage adoption, they contended, would “allow society” to gradually abandon “concerns about privacy” and instead “accept and advocate” for mass police and government surveillance in the interest of “public safety.”</p>
<p>Tier 1 encompasses the present where police use CCTV networks to investigate crimes after-the-fact.</p>
<p>By 2025, society will reach Tier 2 as municipalities transform into “smart” cities, the document said. Businesses and public institutions, like schools and hospitals, will plug camera feeds into government and law enforcement agencies to inform centralized, AI-enabled analytics systems.</p>
<p>Tier 3, the most predictive-oriented surveillance system, will arrive by 2035. Some residents will voluntarily donate their camera feeds, while others will be “encouraged to do so by tax-break incentives or nominal compensation.” A “public safety ecosystem” will centralize data “pulled from disparate databases such as social media, driver’s licenses, police databases, and dark data.” An AI-enabled analytics unit will let police assess “anomalies in real time and interrupt a crime before it is committed.”</p>
<p>That is to say, to catch pre-crime.</p>
<h3>Rise of the Video Surveillance Industrial Complex</h3>
<p>While CCTV surveillance began as a simple tool for criminal justice, it has grown into a multibillion-dollar industry that covers multiple industry verticals. From policing and smart cities to schools, health care facilities, and retail, society is moving toward near-complete visual surveillance of commercial and urban spaces.</p>
<p>Denmark-based Milestone Systems, a top VMS provider with half its revenues in the U.S., had less than 10 employees in 1999. Today they are a major corporation that claims offices in over 20 countries.</p>
<p>Axis Communications used to be a network printer outfit. They have since become a leading camera provider pushing over $1 billion in sales per year.</p>
<p>BriefCam began as a university project. Now it is among the world’s top video analytics providers, with clients, it says, spanning <a href="https://www.briefcam.com/company/press-releases/briefcam-achieves-exponential-growth-demand-surges-award-winning-video-synopsis-deep-learning-technology/">over 40 countries</a>.</p>
<p>Over the past six years, Canon purchased all three, giving the imaging conglomerate ownership of industry giants in video management software, CCTV cameras, and video analytics. Motorola recently acquired a top VMS provider, Avigilon, for $1 billion. In turn, Avigilon and other large firms have purchased their own companies.</p>
<!-- BLOCK(pullquote)[2](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[2] -->The public is paying for their own high-tech surveillance three times over.<!-- END-CONTENT(pullquote)[2] --></blockquote><!-- END-BLOCK(pullquote)[2] -->
<p>Familiar big tech giants are also in on the action. Lieutenant Patrick O’Donnell of the Chicago police force told me his department is working on a non-disclosure agreement with Google for a video analytics pilot project to detect people reacting to gunfire, and if they are in the prone position, so the police can receive real-time alerts. (Google did not respond to a request for comment.)</p>
<p>Video monitoring networks inevitably entangle and implicate a whole ecosystem of vendors, some of whom have offered, or may yet offer, services specifically targeted at such systems. Microsoft, Amazon, IBM, Comcast, Verizon, and Cisco are among those enabling the networks with technologies like cloud services, broadband connectivity, or video surveillance software.</p>
<p>In the public sector, the National Institute of Standards and Technology is <a href="https://www.nist.gov/news-events/news/2017/06/nist-awards-385-million-accelerate-public-safety-communications">funding</a> “public analytics” and communications networks like the First Responder Network Authority, or <a href="https://theintercept.com/2018/07/29/firstnet-att-surveillance/">FirstNet,</a> for real-time video and other surveillance technologies. FirstNet will cost $46.5 billion, and is being built by AT&amp;T.</p>
<p>Voxel51 is another NIST-backed venture. The public is thus paying for their own high-tech surveillance three times over: first, through taxes for university research; second, through grant money for the formation of a for-profit startup (Voxel51); and third, through the purchase of Voxel51’s services by city police departments using public funds.</p>
<p>With the private and public sector looking to expand the presence of cameras, video surveillance has become a new cash cow. As Corso put it, “there will be something like 45 billion cameras in the world within a few decades. That’s a lot of (video) pixels. For the most part, most of those pixels go unused.” Corso&#8217;s estimate mirrors a <a href="https://www.fastcompany.com/40450867/in-less-than-five-years-45-billion-cameras-will-be-watching-us">2017 forecast</a> from New York venture capital firm LDV, which believes smartphones will evolve to have even more cameras than they do today, contributing to the growth.</p>
<p>Companies that began with markets for police and security are now diversifying their offerings to the commercial sector. BriefCam, Milestone, and Axis advertise the use of video analytics for retailers, where they can monitor foot traffic, queue length, shopping patterns, floor layouts, and conduct <a href="https://www.briefcam.com/solutions/consumer-behavior-and-experience/">A/B testing</a>. Voxel51 has an option built for the fashion industry and plans to expand across industry verticals. <a href="https://motionloft.com/">Motionloft</a> offers analytics for smart cities, retailers, commercial real estate, and entertainment venues. Other examples abound.</p>
<p>Public and private sector actors are pressing for a world full of smart video surveillance. Peleg, for example, told me of a use case for smart cities: If you drive into the city, you could “just park and go home” without using a parking meter. The city would send a bill to your house at the end of the month. “Of course, you lose your privacy,” he added. “The question is, do you really care about Big Brother knows where you are, what you do, etc.? Some people may not like it.”</p>
<h3>How to Rein in Smart Surveillance</h3>
<p>Those who do not like new forms of Big Brother surveillance are presently fixated on facial recognition. Yet they have largely ignored the shift to smart camera networks — and the industrial complex driving it.</p>
<p>Thousands of cameras are now set to scrutinize our every move, informing city authorities whether we are walking, running, riding a bike, or doing anything “suspicious.” With video analytics, artificial intelligence is used to identify our  sex, age, and type of clothes, and could potentially be used to categorize us by race or religious attire.</p>
<p>Such surveillance could have a severe chilling effect on our freedom of expression and association. Is this the world we want to live in?</p>
<p>The capacity to track individuals across smart CCTV networks can be used to target marginalized communities. The detection of “loitering” or “shoplifting” by cameras concentrated in poor neighborhoods may deepen racial bias in policing practices.</p>
<p>This kind of racial discrimination is <a href="https://www.vice.com/en_us/article/pa7nek/smart-cctv-networks-are-driving-an-ai-powered-apartheid-in-south-africa">already happening</a> in South Africa, where “unusual behavior detection” has been deployed by smart camera networks for several years.</p>
<p>In the United States, smart camera networks are just emerging, and there is little information or transparency about their use. Nevertheless, we know surveillance has been used throughout history to target oppressed groups. In recent years, the New York Police Department secretly spied on Muslims, the FBI used surveillance aircraft to monitor Black Lives Matter protesters, and the U.S. Customs and Border Protection began building a high-tech video surveillance “<a href="https://theintercept.com/2019/08/25/border-patrol-israel-elbit-surveillance">smart border</a>” across the Tohono O’odham reservation in Arizona.</p>
<p>Law enforcement agencies claim smart camera networks will reduce crime, but at what cost? If a camera could be put in every room in every house, domestic violence might go down. We could add automated “filters” that only record when a loud noise is detected, or when someone grabs a knife. Should police put smart cameras inside every living room?</p>
<p>The commercial sector is likewise rationalizing the advance of surveillance capitalism into the physical domain. Retailers, employers, and investors want to put us all under smart video surveillance so they can manage us with visual “intelligence.”</p>
<p>When asked about privacy, several major police departments told me they have the right to see and record everything you do as soon as you leave your home. Retailers, in turn, won’t even approach public disclosure: They are keeping their video analytics practices <a href="https://www.aclu.org/blog/privacy-technology/surveillance-technologies/are-stores-you-shop-secretly-using-face">secret</a>.</p>
<p>In the United States, there is generally no “reasonable expectation” of privacy in public. The Fourth Amendment encompasses the home and a few public areas we “reasonably” expect to be private, such as a phone booth. Almost everything else — our streets, our stores, our schools — is fair game.</p>
<p>Even if rules are updated to restrict the <em>use</em> of video surveillance, we cannot guarantee those rules will remain in place. With thousands of high-res cameras networked together, a dystopian surveillance state is a mouse click away. By installing cameras everywhere, we are opening a Pandora’s box.</p>
<p>To address the privacy threats of smart camera networks, legislators should ban plug-in surveillance networks and restrict the scope of networked CCTVs beyond the premise of a single site. They should also limit the density of camera and sensor coverage in public. These measures would block the capacity to track people across wide areas and prevent the phenomenon of constantly being watched.</p>
<p>The government should also ban video surveillance analytics in publicly accessible spaces, perhaps with exceptions for rare cases such as the detection of bodies on train tracks. Such a ban would disincentivize mass camera deployments because video analytics is needed to analyze large volumes of footage. Courts should urgently <a href="https://digitalcommons.wcl.american.edu/cgi/viewcontent.cgi?referer=&amp;httpsredir=1&amp;article=1899&amp;context=aulr">reconsider</a> the scope of the Fourth Amendment and expand our <a href="http://law.emory.edu/elj/_documents/volumes/66/3/levinson-waldman.pdf">right to privacy in public</a><a href="http://law.emory.edu/elj/_documents/volumes/66/3/levinson-waldman.pdf">.</a></p>
<p>Police departments, vendors, and researchers need to disclose and publicize their projects, and engage with academics, journalists, and civil society.</p>
<p>It is clear we have a crisis in the works. We need to move beyond the limited conversation of facial recognition and address the broader world of video surveillance, before it is too late.</p>
<p>The post <a href="https://theintercept.com/2020/01/27/surveillance-cctv-smart-camera-networks/">The Rise of Smart Camera Networks, and Why We Should Ban Them</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2020/01/27/surveillance-cctv-smart-camera-networks/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2020/01/3atkinson70a-1579897004.gif?fit=1000%2C500' width='1000' height='500' /><post-id xmlns="com-wordpress:feed-additions:1">287258</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2020/01/h_15235476-edit-1579897222.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2020/01/h_15235476-edit-1579897222.jpg?fit=2000%2C1333" medium="image">
			<media:title type="html">Video from surveillance cameras around the city is displayed at the Real Time Crime Center the viewing space for Project Green Light, at the Police Department&#8217;s headquarters in downtown Detroit.</media:title>
			<media:description type="html">Video from surveillance cameras around the city is displayed at the Real Time Crime Center the viewing space for Project Green Light, at the Police Department&#039;s headquarters in downtown Detroit, June 14, 2019.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2020/01/h_15235476-edit-1579897222.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[How Big Tech Manipulates Academia to Avoid Regulation]]></title>
                <link>https://theintercept.com/2019/12/20/mit-ethical-ai-artificial-intelligence/</link>
                <comments>https://theintercept.com/2019/12/20/mit-ethical-ai-artificial-intelligence/#respond</comments>
                <pubDate>Fri, 20 Dec 2019 18:19:05 +0000</pubDate>
                                    <dc:creator><![CDATA[Rodrigo Ochigame]]></dc:creator>
                                		<category><![CDATA[Technology]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=283316</guid>
                                    <description><![CDATA[<p>A Silicon Valley lobby enrolled elite academia to avoid legal restrictions on artificial intelligence.</p>
<p>The post <a href="https://theintercept.com/2019/12/20/mit-ethical-ai-artificial-intelligence/">How Big Tech Manipulates Academia to Avoid Regulation</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><!-- INLINE(dropcap)[0](%7B%22componentName%22%3A%22DROPCAP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22resource%22%3Anull%7D)(%7B%22text%22%3A%22T%22%7D) --><span data-shortcode-type='dropcap' class='dropcap'><!-- INLINE-CONTENT(dropcap)[0] -->T<!-- END-INLINE-CONTENT(dropcap)[0] --></span><!-- END-INLINE(dropcap)[0] --><u>he irony of</u> the ethical scandal enveloping Joichi Ito, the former director of the MIT Media Lab, is that he used to lead academic initiatives on ethics. After the revelation of his financial ties to Jeffrey Epstein, the financier charged with sex trafficking underage girls as young as 14, Ito resigned from multiple roles at MIT, a visiting professorship at Harvard Law School, and the boards of the John D. and Catherine T. MacArthur Foundation, the John S. and James L. Knight Foundation, and the New York Times Company.</p>
<p>Many spectators are puzzled by Ito’s influential role as an ethicist of artificial intelligence. Indeed, his initiatives were crucial in establishing the discourse of “ethical AI” that is now ubiquitous in academia and in the mainstream press. In 2016, then-President Barack Obama <a href="https://www.wired.com/2016/10/president-obama-mit-joi-ito-interview/">described him</a> as an “<a href="http://news.mit.edu/2016/president-obama-discusses-artificial-intelligence-media-lab-joi-ito-1014">expert</a>” on AI and ethics. Since 2017, Ito financed many projects through the $27 million <a href="https://knightfoundation.org/aifund-faq/">Ethics and Governance of AI Fund</a>, an initiative anchored by the MIT Media Lab and the Berkman Klein Center for Internet and Society at Harvard University. What was all the talk of “ethics” really about?</p>
<p>For 14 months, I worked as a graduate student researcher in Ito’s group on AI ethics at the Media Lab. I stopped on August 15, immediately after Ito <a href="https://www.media.mit.edu/posts/my-apology-regarding-jeffrey-epstein/">published</a> his initial “apology” regarding his ties to Epstein, in which he acknowledged accepting money from the financier both for the Media Lab and for Ito’s outside venture funds. Ito did not disclose that Epstein had, at the time this money changed hands, already pleaded guilty to a child prostitution charge in Florida, or that Ito took numerous steps to hide Epstein’s name from official records, as The New Yorker <a href="https://www.newyorker.com/news/news-desk/how-an-elite-university-research-center-concealed-its-relationship-with-jeffrey-epstein">later revealed</a>.</p>
<!-- BLOCK(pullquote)[1](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[1] -->The discourse of “ethical AI” was aligned strategically with a Silicon Valley effort seeking to avoid legally enforceable restrictions of controversial technologies.<!-- END-CONTENT(pullquote)[1] --></blockquote><!-- END-BLOCK(pullquote)[1] -->
<p>Inspired by whistleblower Signe Swenson and others who have spoken out, I have decided to report what I came to learn regarding Ito’s role in shaping the field of AI ethics, since this is a matter of public concern. The emergence of this field is a recent phenomenon, as past AI researchers had been largely uninterested in the study of ethics. A former Media Lab colleague recalls that Marvin Minsky, the deceased AI pioneer at MIT, used to say that “an ethicist is someone who has a problem with whatever you have in your mind.” (In recently unsealed court filings, victim Virginia Roberts Giuffre testified that Epstein directed her to have sex with Minsky.) Why, then, did AI researchers suddenly start talking about ethics?</p>
<p>At the Media Lab, I learned that the discourse of “ethical AI,” championed substantially by Ito, was aligned strategically with a Silicon Valley effort seeking to avoid legally enforceable restrictions of controversial technologies. A key group behind this effort, with the lab as a member, made policy recommendations in California that contradicted the conclusions of research I conducted with several lab colleagues, research that led us to oppose the use of computer algorithms in deciding whether to jail people pending trial. Ito himself would eventually complain, in private meetings with financial and tech executives, that the group’s recommendations amounted to “whitewashing” a thorny ethical issue. “They water down stuff we try to say to prevent the use of algorithms that don’t seem to work well” in detention decisions, he confided to one billionaire.</p>
<p>I also watched MIT help the U.S. military brush aside the moral complexities of drone warfare, hosting a superficial talk on AI and ethics by Henry Kissinger, the former secretary of state and notorious war criminal, and giving input on the U.S. Department of Defense’s “AI Ethics Principles” for warfare, which embraced “permissibly biased” algorithms and which avoided using the word “fairness” because the Pentagon believes “that fights should not be fair.”</p>
<p>Ito did not respond to requests for comment.</p>
<p><!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[2] -->
<img loading="lazy" decoding="async" width="2000" height="1335" class="aligncenter size-large wp-image-283341" src="https://theintercept.com/wp-content/uploads/2019/12/GettyImages-545487336edit-1576796351.jpg" alt="Joichi Ito, director of MIT Media Lab, speaks during a press conference in Tokyo, Japan, on Friday, July 8, 2016. Dentsu Inc., Japan's dominant advertising agency, launched a specialized digital marketing company Dentsu Digtial Inc. today. Photographer: Akio Kon/Bloomberg via Getty Images" srcset="https://theintercept.com/wp-content/uploads/2019/12/GettyImages-545487336edit-1576796351.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2019/12/GettyImages-545487336edit-1576796351.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2019/12/GettyImages-545487336edit-1576796351.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2019/12/GettyImages-545487336edit-1576796351.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2019/12/GettyImages-545487336edit-1576796351.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2019/12/GettyImages-545487336edit-1576796351.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2019/12/GettyImages-545487336edit-1576796351.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" />
<figcaption class="caption source">Joichi Ito, then-director of MIT Media Lab, speaks during a press conference in Tokyo on July 8, 2016.<br/>Photo: Akio Kon/Bloomberg/Getty Images</figcaption><!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] --><!-- INLINE(dropcap)[3](%7B%22componentName%22%3A%22DROPCAP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22resource%22%3Anull%7D)(%7B%22text%22%3A%22M%22%7D) --><span data-shortcode-type='dropcap' class='dropcap'><!-- INLINE-CONTENT(dropcap)[3] -->M<!-- END-INLINE-CONTENT(dropcap)[3] --></span><!-- END-INLINE(dropcap)[3] --><u>IT lent credibility</u> to the idea that big tech could police its own use of artificial intelligence at a time when the industry faced increasing criticism and calls for legal regulation. Just in 2018, there were several controversies: Facebook’s breach of private data on more than 50 million users to a political marketing firm hired by Donald Trump’s presidential campaign, revealed in March 2018; Google’s contract with the Pentagon for computer vision software to be used in combat zones, revealed that same month; Amazon’s sale of facial recognition technology to police departments, revealed in May; Microsoft’s contract with the U.S. Immigration and Customs Enforcement revealed in June; and IBM’s secret collaboration with the New York Police Department for facial recognition and racial classification in video surveillance footage, revealed in September. Under the slogan #TechWontBuildIt, thousands of workers at these firms have organized protests and circulated petitions against such contracts. From #NoTechForICE to #Data4BlackLives, several grassroots campaigns have demanded legal restrictions of some uses of computational technologies (e.g., forbidding the use of facial recognition by police).</p>
<p>Meanwhile, corporations have tried to shift the discussion to focus on voluntary “ethical principles,” “responsible practices,” and technical adjustments or “safeguards” framed in terms of “bias” and “fairness” (e.g., requiring or encouraging police to adopt “unbiased” or “fair” facial recognition). In January 2018, Microsoft published its “ethical principles” for AI, starting with “fairness.” In May, Facebook announced its “commitment to the ethical development and deployment of AI” and a tool to “search for bias” called “Fairness Flow.” In June, Google published its “responsible practices” for AI research and development. In September, IBM announced a tool called “AI Fairness 360,” designed to “check for unwanted bias in datasets and machine learning models.” In January 2019, Facebook granted $7.5 million for the creation of an AI ethics center in Munich, Germany. In March, Amazon co-sponsored a $20 million program on “fairness in AI” with the U.S. National Science Foundation. In April, Google canceled its AI ethics council after <a href="https://www.theverge.com/2019/4/1/18290341/google-heritage-foundation-ai-kay-coles-james">backlash</a> over the selection of Kay Coles James, the vocally anti-trans president of the right-wing Heritage Foundation. These corporate initiatives frequently cited academic research that Ito had supported, at least partially, through the MIT-Harvard fund.</p>
<p>To characterize the corporate agenda, it is helpful to distinguish between three kinds of regulatory possibilities for a given technology: (1) no legal regulation at all, leaving “ethical principles” and “responsible practices” as merely voluntary; (2) moderate legal regulation encouraging or requiring technical adjustments that do not conflict significantly with profits; or (3) restrictive legal regulation curbing or banning deployment of the technology. Unsurprisingly, the tech industry tends to support the first two and oppose the last. The corporate-sponsored discourse of “ethical AI” enables precisely this position. Consider the case of facial recognition. This year, the municipal legislatures of San Francisco, Oakland, and Berkeley — all in California — plus Somerville, Massachusetts, have passed strict bans on facial recognition technology. Meanwhile, Microsoft has lobbied in favor of less restrictive legislation, requiring technical adjustments such as tests for “bias,” most notably in Washington state. Some big firms may even prefer this kind of mild legal regulation over a complete lack thereof, since larger firms can more easily invest in specialized teams to develop systems that comply with regulatory requirements.</p>
<p>Thus, Silicon Valley’s vigorous promotion of “ethical AI” has constituted a strategic lobbying effort, one that has enrolled academia to legitimize itself. Ito played a key role in this corporate-academic fraternizing, meeting regularly with tech executives. The MIT-Harvard fund’s initial director was the former “global public policy lead” for AI at Google. Through the fund, Ito and his associates sponsored many projects, including the creation of a prominent conference on “Fairness, Accountability, and Transparency” in computer science; other sponsors of the conference included Google, Facebook, and Microsoft.</p>

<p>Although the Silicon Valley lobbying effort has consolidated academic interest in “ethical AI” and “fair algorithms” since 2016, a handful of papers on these topics had appeared in earlier years, even if framed differently. For example, Microsoft computer scientists published the <a href="https://dl.acm.org/citation.cfm?id=2090255">paper</a> that arguably inaugurated the field of “algorithmic fairness” in 2012. In 2016, the paper’s lead author, Cynthia Dwork, became a professor of computer science at Harvard, with simultaneous positions at its law school and at Microsoft. When I took her Harvard course on the mathematical foundations of cryptography and statistics in 2017, I interviewed her and asked how she became interested in researching algorithmic definitions of fairness. In her account, she had long been personally concerned with the issue of discriminatory advertising, but Microsoft managers encouraged her to pursue this line of work because the firm was developing a new system of online advertising, and it would be economically advantageous to provide a service “free of regulatory problems.” (To be fair, I believe that Dwork’s personal intentions were honest despite the corporate capture of her ideas. Microsoft declined to comment for this article.)</p>
<p>After the initial steps by MIT and Harvard, many other universities and new institutes received money from the tech industry to work on AI ethics. Most such organizations are also headed by current or former executives of tech firms. For example, the Data &amp; Society Research Institute is directed by a Microsoft researcher and initially funded by a Microsoft grant; New York University&#8217;s AI Now Institute was co-founded by another Microsoft researcher and partially funded by Microsoft, Google, and DeepMind; the Stanford Institute for Human-Centered AI is co-directed by a former vice president of Google; University of California, Berkeley&#8217;s Division of Data Sciences is headed by a Microsoft veteran; and the MIT Schwarzman College of Computing is headed by a board member of Amazon. During my time at the Media Lab, Ito maintained frequent contact with the executives and planners of all these organizations.</p>
<p><!-- BLOCK(photo)[5](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[5] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-283329 size-large" src="https://theintercept.com/wp-content/uploads/2019/12/Comp-7-for-spot-2-1576795206.jpg?w=1024" alt="" width="1024" height="854" srcset="https://theintercept.com/wp-content/uploads/2019/12/Comp-7-for-spot-2-1576795206.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2019/12/Comp-7-for-spot-2-1576795206.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2019/12/Comp-7-for-spot-2-1576795206.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2019/12/Comp-7-for-spot-2-1576795206.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2019/12/Comp-7-for-spot-2-1576795206.jpg?w=1000 1000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />

<figcaption class="caption source">Illustration: Yoshi Sodeoka for The Intercept</figcaption><!-- END-CONTENT(photo)[5] --></figure><!-- END-BLOCK(photo)[5] --><!-- INLINE(dropcap)[6](%7B%22componentName%22%3A%22DROPCAP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22resource%22%3Anull%7D)(%7B%22text%22%3A%22B%22%7D) --><span data-shortcode-type='dropcap' class='dropcap'><!-- INLINE-CONTENT(dropcap)[6] -->B<!-- END-INLINE-CONTENT(dropcap)[6] --></span><!-- END-INLINE(dropcap)[6] --><u>ig tech money</u> and direction proved incompatible with an honest exploration of ethics, at least judging from my experience with the “Partnership on AI to Benefit People and Society,&#8221; a group founded by Microsoft, Google/DeepMind, Facebook, IBM, and Amazon in 2016. PAI, of which the Media Lab is a member, defines itself as a “multistakeholder body” and claims it is “not a lobbying organization.” In an April 2018 hearing at the U.S. House Committee on Oversight and Government Reform, the Partnership’s executive director claimed that the organization is merely “a <i>resource</i> to policymakers — for instance, in conducting research that informs AI best practices and exploring the societal consequences of certain AI systems, as well as policies around the development and use of AI systems.”</p>
<p>But even if the Partnership’s activities may not meet the legal threshold requiring registration as lobbyists — for example, by seeking to directly affect the votes of individual elected officials — the partnership has certainly sought to influence legislation. For example, in November 2018, the Partnership staff asked academic members to contribute to a collective statement to the Judicial Council of California regarding a Senate bill on penal reform (S.B. 10). The bill, in the course of eliminating cash bail, expanded the use of algorithmic risk assessment in pretrial decision making, and required the Judicial Council to “address the identification and mitigation of any implicit bias in assessment instruments.” The Partnership staff wrote, “we believe there is room to impact this legislation (and CJS [criminal justice system] applications more broadly).”</p>
<p>In December 2018, three Media Lab colleagues and I raised serious objections to the Partnership’s efforts to influence legislation. We observed that the Partnership’s policy recommendations aligned consistently with the corporate agenda. In the penal case, our research led us to strongly oppose the adoption of risk assessment tools, and to reject the proposed technical adjustments that would supposedly render them “unbiased” or “fair.” But the Partnership’s draft statement seemed, as a colleague put it in an internal email to Ito and others, to “validate the use of RA [risk assessment] by emphasizing the issue as a technical one that can therefore be solved with better data sets, etc.” A second colleague agreed that the “PAI statement is weak and risks doing exactly what we’ve been warning against re: the risk of legitimation via these industry led regulatory efforts.” A third colleague wrote, “So far as the criminal justice work is concerned, what PAI is doing in this realm is quite alarming and also in my opinion seriously misguided. I agree with Rodrigo that PAI’s association with ACLU, MIT and other academic / non-profit institutions practically ends up serving a legitimating function. Neither ACLU nor MIT nor any non-profit has any power in PAI.”</p>
<p>Worse, there seemed to be a mismatch between the Partnership’s recommendations and the efforts of a grassroots coalition of organizations fighting jail expansion, including the movement Black Lives Matter, the prison abolitionist group Critical Resistance (where I have volunteered), and the undocumented and queer/trans youth-led Immigrant Youth Coalition. The grassroots coalition argued, “The notion that any risk assessment instrument can account for bias ignores the racial disparities in current and past policing practices.” There are abundant theoretical and empirical reasons to support this claim, since risk assessments are typically based on data of arrests, convictions, or incarcerations, all of which are poor proxies for individual behaviors or predispositions. The coalition continued, “Ultimately, risk-assessment tools create a feedback-loop of racial profiling, pre-trial detention and conviction. A person’s freedom should not be reduced to an algorithm.” By contrast, the Partnership’s statement focused on “minimum requirements for responsible deployment,” spanning such topics as “validity and data sampling bias, bias in statistical predictions; choice of the appropriate targets for prediction; human-computer interaction questions; user training; policy and governance; transparency and review; reproducibility, process, and recordkeeping; and post-deployment evaluation.”</p>
<p>To be sure, the Partnership staff did respond to criticism of the draft by noting in the final version of the statement that “within PAI’s membership and the wider AI community, many experts further suggest that individuals can never justly be detained on the basis of their risk assessment score alone, without an individualized hearing.” This meek concession — admitting that it might not be time to start imprisoning people based strictly on software, without input from a judge or any other “individualized” judicial process — was easier to make because none of the major firms in the Partnership sell risk assessment tools for pretrial decision-making; not only is the technology too controversial but also the market is too small. (Facial recognition technology, on the other hand, has a much larger market in which Microsoft, Google, Facebook, IBM, and Amazon all operate.)</p>
<p>In December 2018, my colleagues and I urged Ito to quit the Partnership. I argued, “If academic and nonprofit organizations want to make a difference, the only viable strategy is to quit PAI, make a public statement, and form a counter alliance.” Then a colleague proposed, “there are many other organizations which are doing much more substantial and transformative work in this area of predictive analytics in criminal justice — what would it look like to take the money we currently allocate in supporting PAI in order to support their work?” We believed Ito had enough autonomy to do so because the MIT-Harvard fund was supported largely by the Knight Foundation, even though most of the money came from tech investors Pierre Omidyar, founder of eBay, via the Omidyar Network, and Reid Hoffman, co-founder of LinkedIn and Microsoft board member. I wrote, “If tens of millions of dollars from nonprofit foundations and individual donors are not enough to allow us to take a bold position and join the right side, I don’t know what would be.” (Omidyar funds The Intercept.)</p>
<p class="p1"><!-- BLOCK(pullquote)[7](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22left%22%7D) --><blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><!-- CONTENT(pullquote)[7] -->It is strange that Ito, with no formal training, became positioned as an “expert” on AI ethics, a field that barely existed before 2017.<!-- END-CONTENT(pullquote)[7] --></blockquote><!-- END-BLOCK(pullquote)[7] --></p>
<p>Ito did acknowledge the problem. He had just received a message from David M. Siegel, co-chair of the hedge fund Two Sigma and member of the MIT Corporation. Siegel proposed a self-regulatory structure for “search and social media” firms in Silicon Valley, modeled after the Financial Industry Regulatory Authority, or FINRA, a private corporation that serves as a self-regulatory organization for securities firms on Wall Street. Ito responded to Siegel’s proposal, “I don’t feel civil society is well represented in the industry groups. We’ve been participating in Partnership in AI and they water down stuff we try to say to prevent the use of algorithms that don’t seem to work well like risk scores for pre-trial bail. I think that with personal data and social media, I have concerns with self-regulation. For example, a full blown genocide [of the Rohingya, a mostly Muslim minority group in Myanmar] happened using What’s App and Facebook knew it was happening.” (Facebook has <a href="https://newsroom.fb.com/news/2018/11/myanmar-hria/">admitted</a> that its platform was used to incite violence in Myanmar; news reports have documented how content on the Facebook platform <a href="https://www.nytimes.com/2018/10/15/technology/myanmar-facebook-genocide.html">facilitated</a> a genocide in the country despite <a href="https://www.reuters.com/investigates/special-report/myanmar-facebook-hate/">repeated warnings</a> to Facebook executives from human rights activists and researchers. Facebook texting service WhatsApp made it harder for its users to forward messages after WhatsApp was <a href="https://www.nytimes.com/2018/05/14/technology/whatsapp-india-elections.html">reportedly</a> used to spread misinformation during elections in India.)</p>
<p>But the corporate-academic alliances were too robust and convenient. The Media Lab remained in the Partnership, and Ito continued to fraternize with Silicon Valley and Wall Street executives and investors. Ito described Siegel, a billionaire, as a “potential funder.” With such people, I saw Ito routinely express moral concerns about their businesses — but in a friendly manner, as he was simultaneously asking them for money, whether for MIT or his own venture capital funds. For corporate-academic “ethicists,” amicable criticism can serve as leverage for entering into business relationships. Siegel replied to Ito, “I would be pleased to speak more on this topic with you. Finra is not an industry group. It’s just paid for by industry. I will explain more when we meet. I agree with your concerns.”</p>
<p>In private meetings, Ito and tech executives discussed the corporate lobby quite frankly. In January, my colleagues and I joined a meeting with Mustafa Suleyman, founding co-chair of the Partnership and co-founder of DeepMind, an AI startup acquired by Google for about $500 million in 2014. In the meeting, Ito and Suleyman discussed how the promotion of “AI ethics” had become a “whitewashing” effort, although they claimed their initial intentions had been nobler. In a message to plan the meeting, Ito wrote to my colleagues and me, “I do know, however, from speaking to Mustafa when he was setting up PAI that he was meaning for the group to be much more substantive and not just ‘white washing.’ I think it’s just taking the trajectory that these things take.” (Suleyman did not respond to requests for comment.)</p>
<p><!-- INLINE(dropcap)[8](%7B%22componentName%22%3A%22DROPCAP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22resource%22%3Anull%7D)(%7B%22text%22%3A%22R%22%7D) --><span data-shortcode-type='dropcap' class='dropcap'><!-- INLINE-CONTENT(dropcap)[8] -->R<!-- END-INLINE-CONTENT(dropcap)[8] --></span><!-- END-INLINE(dropcap)[8] --><u>egardless of individual</u> actors’ intentions, the corporate lobby’s effort to shape academic research was extremely successful. There is now an enormous amount of work under the rubric of “AI ethics.” To be fair, some of the research is useful and nuanced, especially in the humanities and social sciences. But the majority of well-funded work on “ethical AI” is aligned with the tech lobby’s agenda: to voluntarily or moderately adjust, rather than legally restrict, the deployment of controversial technologies. How did five corporations, using only a small fraction of their budgets, manage to influence and frame so much academic activity, in so many disciplines, so quickly? It is strange that Ito, with no formal training, became positioned as an “expert” on AI ethics, a field that barely existed before 2017. But it is even stranger that two years later, respected scholars in established disciplines have to demonstrate their relevance to a field conjured by a corporate lobby.</p>
<p><!-- BLOCK(photo)[9](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[9] -->
<img loading="lazy" decoding="async" class="aligncenter wp-image-283354 size-large" src="https://theintercept.com/wp-content/uploads/2019/12/GettyImages-947557996edit-1576797360.jpg?w=1024" alt="UNITED STATES - APRIL 17: Eric Schmidt, Chairman of the Defense Innovation Board, takes his seat for the House Armed Services Committee hearing on &quot;Promoting DOD's Culture of Innovation&quot; on Tuesday, April 17, 2018. (Photo By Bill Clark/CQ Roll Call)" width="1024" height="671" srcset="https://theintercept.com/wp-content/uploads/2019/12/GettyImages-947557996edit-1576797360.jpg?w=2000 2000w, https://theintercept.com/wp-content/uploads/2019/12/GettyImages-947557996edit-1576797360.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2019/12/GettyImages-947557996edit-1576797360.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2019/12/GettyImages-947557996edit-1576797360.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2019/12/GettyImages-947557996edit-1576797360.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2019/12/GettyImages-947557996edit-1576797360.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2019/12/GettyImages-947557996edit-1576797360.jpg?w=1000 1000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" />
<figcaption class="caption source">Former Google CEO Eric Schmidt, now chair of the Department of Defense&#8217;s Defense Innovation Board, takes his seat for the House Armed Services Committee hearing on &#8220;Promoting DOD&#8217;s Culture of Innovation&#8221; on April 17, 2018.<br/>Photo: Bill Clark/CQ Roll Call/Getty Images</figcaption><!-- END-CONTENT(photo)[9] --></figure><!-- END-BLOCK(photo)[9] -->The field has also become relevant to the U.S. military, not only in official responses to moral concerns about technologies of targeted killing but also in disputes among Silicon Valley firms over lucrative military contracts. On November 1, the Department of Defense’s innovation board published its recommendations for “AI Ethics Principles.” The board is chaired by Eric Schmidt, who was the executive chair of Alphabet, Google’s parent company, when Obama’s defense secretary Ashton B. Carter established the board and appointed him in 2016. <a href="https://www.propublica.org/article/how-amazon-and-silicon-valley-seduced-the-pentagon">According to</a> ProPublica, “Schmidt’s influence, already strong under Carter, only grew when [James] Mattis arrived as [Trump’s] defense secretary.” The board includes multiple executives from Google, Microsoft, and Facebook, raising controversies regarding conflicts of interest. A Pentagon employee responsible for policing conflicts of interest was removed from the innovation board after she challenged &#8220;the Pentagon’s cozy relationship not only with [Amazon CEO Jeff] Bezos, but with Google’s Eric Schmidt.” This relationship is potentially lucrative for big tech firms: The AI ethics recommendations appeared less than a week after the Pentagon awarded a $10 billion cloud-computing contract to Microsoft, which is being legally challenged by Amazon.</p>
<p class="p1"><!-- BLOCK(pullquote)[10](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[10] -->The majority of well-funded work on “ethical AI” is aligned with the tech lobby’s agenda: to voluntarily or moderately adjust, rather than legally restrict, the deployment of controversial technologies.<!-- END-CONTENT(pullquote)[10] --></blockquote><!-- END-BLOCK(pullquote)[10] --></p>
<p>The recommendations seek to compel the Pentagon to increase military investments in AI and to adopt “ethical AI” systems such as those developed and sold by Silicon Valley firms. The innovation board calls the Pentagon a “deeply ethical organization” and offers to extend its “existing ethics framework” to AI. To this end, the board cites the AI ethics research groups at Google, Microsoft, and IBM, as well as academics sponsored by the MIT-Harvard fund. However, there are caveats. For example, the board notes that although “the term ‘fairness’ is often cited in the AI community,” the recommendations avoid this term because of “the DoD mantra that fights should not be fair, as DoD aims to create the conditions to maintain an unfair advantage over any potential adversaries.” Thus, “some applications will be permissibly and justifiably biased,” specifically “to target certain adversarial combatants more successfully.” The Pentagon’s conception of AI ethics forecloses many important possibilities for moral deliberation, such as the prohibition of drones for targeted killing.</p>
<p>The corporate, academic, and military proponents of “ethical AI” have collaborated closely for mutual benefit. For example, Ito told me that he informally advised Schmidt on which academic AI ethicists Schmidt’s private foundation should fund. Once, Ito even asked me for second-order advice on whether Schmidt should fund a certain professor who, like Ito, later served as an “expert consultant” to the Pentagon’s innovation board. In February, Ito joined Carter at a panel titled “Computing for the People: Ethics and AI,” which also included current and former executives of Microsoft and Google. The panel was part of the inaugural celebration of MIT’s $1 billion college dedicated to AI. Other speakers at the celebration included Schmidt on “Computing for the Marketplace,” Siegel on “How I Learned to Stop Worrying and Love Algorithms,” and Henry Kissinger on “How the Enlightenment Ends.” As Kissinger declared the possibility of “a world relying on machines powered by data and algorithms and ungoverned by ethical or philosophical norms,” a <a href="https://thetech.com/2019/03/07/protest-college-of-computing-kissinger">protest outside the MIT auditorium</a> called attention to Kissinger’s war crimes in Vietnam, Cambodia, and Laos, as well as his support of war crimes elsewhere. In the age of automated targeting, what atrocities will the U.S. military justify as governed by “ethical” norms or as executed by machines beyond the scope of human agency and culpability?</p>
<p>No defensible claim to “ethics” can sidestep the urgency of legally enforceable restrictions to the deployment of technologies of mass surveillance and systemic violence. Until such restrictions exist, moral and political deliberation about computing will remain subsidiary to the profit-making imperative expressed by the Media Lab’s motto, “Deploy or Die.” While some deploy, even if ostensibly “ethically,” others die.</p>
<p>The post <a href="https://theintercept.com/2019/12/20/mit-ethical-ai-artificial-intelligence/">How Big Tech Manipulates Academia to Avoid Regulation</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2019/12/20/mit-ethical-ai-artificial-intelligence/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2019/12/Comp-6-1576795099.jpg?fit=2000%2C1000' width='2000' height='1000' /><post-id xmlns="com-wordpress:feed-additions:1">283316</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2019/12/GettyImages-545487336edit-1576796351.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2019/12/GettyImages-545487336edit-1576796351.jpg?fit=2000%2C1335" medium="image">
			<media:title type="html">Dentsu Inc. Launches New Digital Company</media:title>
			<media:description type="html">Joichi Ito, former director of MIT Media Lab, speaks during a press conference in Tokyo, Japan, on Friday, July 8, 2016.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2019/12/GettyImages-545487336edit-1576796351.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2019/12/Comp-7-for-spot-2-1576795206.jpg?fit=1024%2C854" medium="image">
			<media:title type="html">Comp-7-for-spot-2-1576795206</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2019/12/Comp-7-for-spot-2-1576795206.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2019/12/GettyImages-947557996edit-1576797360.jpg?fit=2000%2C1311" medium="image">
			<media:title type="html">Eric Schmidt</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2019/12/GettyImages-947557996edit-1576797360.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA["Never Be Ashamed”: Why I Decided Not to Delete My Old Internet Posts]]></title>
                <link>https://theintercept.com/2019/09/21/edward-snowden-permanent-record-book/</link>
                <comments>https://theintercept.com/2019/09/21/edward-snowden-permanent-record-book/#respond</comments>
                <pubDate>Sat, 21 Sep 2019 09:00:54 +0000</pubDate>
                                    <dc:creator><![CDATA[Edward Snowden]]></dc:creator>
                                		<category><![CDATA[National Security]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=268781</guid>
                                    <description><![CDATA[<p>In this excerpt from his memoir, the NSA whistleblower describes his realization that no one should have to “pretend to be perfect.”</p>
<p>The post <a href="https://theintercept.com/2019/09/21/edward-snowden-permanent-record-book/">&#8220;Never Be Ashamed”: Why I Decided Not to Delete My Old Internet Posts</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><em>While working for the National Security Agency, Edward Snowden helped build a system to enable the United States government to capture all phone calls, text messages, and emails. Six years ago, he provided documents about this electronic panopticon to journalists, and the shocking revelations that ensued set off massive changes — changes in attitudes and behaviors, in policies and technologies, across private industry and the public sector, in the U.S. and around the world.</em></p>
<p><em>Now, in his new memoir &#8220;<a href="https://us.macmillan.com/books/9781250237231">Permanent Record</a>,&#8221; Snowden explains how his revolutionary act of whistleblowing came to occur. At its root was a decision dating to Snowden&#8217;s earliest contact with the NSA — &#8220;the first thing that you might call a principle that occurred to me during this idle but formative time,&#8221; as the future government systems engineer puts it in the excerpt below: The determination to live in an honest world, a world where people could show their true faces and own their full history, a world without shame. This was the ideal that guided Snowden into the NSA. And of course it would be the ideal that guided him out, as well.</em></p>
<p><u>After my injured</u> legs forced me out of the Army, I still had the urge to serve my country. I would have to serve it through my head and hands — through computing. That, and only that, would be giving my country my best. Though I wasn’t much of a veteran, having passed through the military’s vetting could only help my chances of working at an intelligence agency, which was where my talents would be most in demand and, perhaps, most challenged.</p>
<p>That meant that I needed a security clearance. There are, generally speaking, three levels of security clearance in the American Intelligence Community, or IC: from low to high, confidential, secret, and top secret. The last of these can be further extended with a Sensitive Compartmented Information qualifier, creating the coveted TS/SCI access required by positions with the top-tier agencies — CIA and NSA. The TS/SCI was by far the hardest access to get, but also opened the most doors, and so I went back to Anne Arundel Community College while I searched for jobs that would sponsor my application for the grueling background investigation the clearance required. The approval process for a TS/SCI can take a year or more. All it involves is filling out some paperwork, then sitting around with your feet up and trying not to commit too many crimes while the federal government renders its verdict. The rest, after all, is out of your hands.</p>
<!-- BLOCK(promote-post)[0](%7B%22componentName%22%3A%22PROMOTE_POST%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22slug%22%3A%22snowden-archive%22%2C%22crop%22%3A%22promo%22%7D) --><aside class="promote-banner">
    <a class="promote-banner__link" href="/collections/snowden-archive/">
              <span class="promote-banner__image">
          <img loading="lazy" decoding="async" width="300" height="150" src="https://theintercept.com/wp-content/uploads/2019/09/edward-snowden-the-intercept-1568924550.jpg?fit=300%2C150" class="attachment-medium size-medium" alt="" srcset="https://theintercept.com/wp-content/uploads/2019/09/edward-snowden-the-intercept-1568924550.jpg?w=1440 1440w, https://theintercept.com/wp-content/uploads/2019/09/edward-snowden-the-intercept-1568924550.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2019/09/edward-snowden-the-intercept-1568924550.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2019/09/edward-snowden-the-intercept-1568924550.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2019/09/edward-snowden-the-intercept-1568924550.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2019/09/edward-snowden-the-intercept-1568924550.jpg?w=1000 1000w" sizes="auto, (max-width: 300px) 100vw, 300px" />        </span>
            <div class="promote-banner__text">
                  <p class="promote-banner__eyebrow">
            Read all our stories from Snowden documents          </p>
        
        <h2 class="promote-banner__title">Snowden Archive</h2>
      </div>
    </a>
  </aside><!-- END-BLOCK(promote-post)[0] -->
<p>On paper, I was a perfect candidate. I was a kid from a service family, nearly every adult member of which had some level of clearance; I’d tried to enlist and fight for my country until an unfortunate accident had laid me low. I had no criminal record, no drug habit. My only financial debt was the student loan for my Microsoft certification, and I hadn’t yet missed a payment.</p>
<p>None of this stopped me, of course, from being nervous.</p>
<p>I drove to and from classes at community college as the National Background Investigations Bureau rummaged through nearly every aspect of my life and interviewed almost everyone I knew: my parents, my extended family, my classmates and friends. They went through my spotty school transcripts and, I’m sure, spoke to a few of my teachers. I got the impression that they even spoke to a guy I’d worked with one summer at a snow cone stand at Six Flags America. The goal of all this background checking was not only to find out what I’d done wrong, but also to find out how I might be compromised or blackmailed. The most important thing to the IC is not that you’re 100 percent perfectly clean, because if that were the case, they wouldn’t hire anybody. Instead, it’s that you’re robotically honest — that there’s no dirty secret out there that you’re hiding that could be used against you, and thus against the agency, by an enemy power.</p>
<!-- BLOCK(pullquote)[1](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[1] -->I didn’t want to live in a world where everyone had to pretend that they were perfect, because that was a world that had no place for me or my friends.<!-- END-CONTENT(pullquote)[1] --></blockquote><!-- END-BLOCK(pullquote)[1] -->
<p>This, of course, set me thinking — sitting stuck in traffic as all the moments of my life that I regretted went spinning around in a loop inside my head. Nothing I could come up with would have raised even an iota of eyebrow from investigators who are used to finding out that the middle-aged analyst at a think tank likes to wear diapers and get spanked by grandmothers in leather. Still, there was a paranoia that the process created, because you don’t have to be a closet fetishist to have done things that embarrass you and to fear that strangers might misunderstand you if those things were exposed. I mean, I grew up on the Internet, for Christ’s sake. If you haven’t entered something shameful or gross into that search box, then you haven’t been online very long — though I wasn’t worried about the pornography. Everybody looks at porn, and for those of you who are shaking your heads, don’t worry: Your secret is safe with me. My worries were more personal, or felt more personal: the endless conveyor belt of stupid jingoistic things I’d said, and the even stupider misanthropic opinions I’d abandoned, in the process of growing up online. Specifically, I was worried about my chat logs and forum posts, all the supremely moronic commentary that I’d sprayed across a score of gaming and hacker sites. Writing pseudonymously had meant writing freely, but often thoughtlessly. And since a major aspect of early Internet culture was competing with others to say the most inflammatory thing, I’d never hesitate to advocate, say, bombing a country that taxed video games, or corralling people who didn’t like anime into reeducation camps. Nobody on those sites took any of it seriously, least of all myself.</p>
<p>When I went back and reread the posts, I cringed. Half the things I’d said I hadn’t even meant at the time — I’d just wanted attention — but I didn’t fancy my odds of explaining that to a gray-haired man in horn-rimmed glasses peering over a giant folder labeled PERMANENT RECORD. The other half, the things I think I had meant at the time, were even worse, because I wasn’t that kid anymore. I’d grown up. It wasn’t simply that I didn’t recognize the voice as my own — it was that I now actively opposed its overheated, hormonal opinions. I found that I wanted to argue with a ghost. I wanted to fight with that dumb, puerile, and casually cruel self of mine who no longer existed. I couldn’t stand the idea of being haunted by him forever, but I didn’t know the best way how to express my remorse and put some distance between him and me, or whether I should even try to do that. It was heinous, to be so inextricably, technologically bound to a past that I fully regretted but barely remembered.</p>
<p>This might be the most familiar problem of my generation, the first to grow up online. We were able to discover and explore our identities almost totally unsupervised, with hardly a thought spared for the fact that our rash remarks and profane banter were being preserved for perpetuity, and that one day we might be expected to account for them. I’m sure everyone who had an Internet connection before they had a job can sympathize with this — surely everyone has that one post that embarrasses them, or that text or email that could get them fired.</p>
<p>My situation was somewhat different, however, in that most of the message boards of my day would let you delete your old posts. I could put together one tiny little script — not even a real program — and all of my posts would be gone in under an hour. It would’ve been the easiest thing in the world to do. Trust me, I considered it.</p>
<p>But ultimately, I couldn’t. Something kept preventing me. It just felt wrong. To blank my posts from the face of the earth wasn’t illegal, and it wouldn’t even have made me ineligible for a security clearance had anyone found out. But the prospect of doing so bothered me nonetheless. It would’ve only served to reinforce some of the most corrosive precepts of online life: that nobody is ever allowed to make a mistake, and anybody who does make a mistake must answer for it forever. What mattered to me wasn’t so much the integrity of the written record but that of my soul. I didn’t want to live in a world where everyone had to pretend that they were perfect, because that was a world that had no place for me or my friends. To erase those comments would have been to erase who I was, where I was from, and how far I’d come. To deny my younger self would have been to deny my present self’s validity.</p>
<p>I decided to leave the comments up and figure out how to live with them. I even decided that true fidelity to this stance would require me to continue posting. In time, I’d outgrow these new opinions, too, but my initial impulse remains unshakable, if only because it was an important step in my own maturity. We can’t erase the things that shame us, or the ways we’ve shamed ourselves, online. All we can do is control our reactions — whether we let the past oppress us, or accept its lessons, grow, and move on.</p>
<p>This was the first thing that you might call a principle that occurred to me during this idle but formative time, and though it would prove difficult, I’ve tried to live by it.</p>
<!-- BLOCK(pullquote)[2](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22left%22%7D) --><blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><!-- CONTENT(pullquote)[2] -->We can&#8217;t erase the things that shame us, or the way we&#8217;ve shamed ourselves, online. All we can do is control our reactions.<!-- END-CONTENT(pullquote)[2] --></blockquote><!-- END-BLOCK(pullquote)[2] -->
<p>Believe it or not, the only online traces of my existence whose past iterations have never given me worse than a mild sense of embarrassment were my dating profiles. I suspect this is because I’d had to write them with the expectation that their words truly mattered — since the entire purpose of the enterprise was for somebody in Real Life to actually care about them, and, by extension, about me.</p>
<p>I’d joined a website called HotOrNot.com, which was the most popular of the rating sites of the early 2000s, like RateMyFace and AmIHot. (Their most effective features were combined by a young Mark Zuckerberg into a site called FaceMash, which later became Facebook.) HotOrNot was the most popular of these pre-Facebook rating sites for a simple reason: It was the best of the few that had a dating component.</p>
<p>Basically, how it worked was that users voted on each other’s photos: Hot or Not. An extra function for registered users such as myself was the ability to contact other registered users, if each had rated the other’s photos Hot and clicked “Meet Me.” This banal and crass process is how I met Lindsay Mills, my partner and the love of my life.</p>
<p>Looking at the photos now, I’m amused to find that 19-year-old Lindsay was gawky, awkward, and endearingly shy. To me at the time, though, she was a smoldering blonde, absolutely volcanic. What’s more, the photos themselves were beautiful: They had a serious artistic quality, self-portraits more than selfies. They caught the eye and held it. They played coyly with light and shade. They even had a hint of meta fun: there was one taken inside the photo lab where she worked, and another where she wasn’t even facing the camera.</p>
<p>I rated her Hot, a perfect 10. To my surprise, we matched (she rated me an eight, the angel), and in no time we were chatting. Lindsay was studying fine art photography. She had her own website, where she kept a journal and posted more shots: forests, flowers, abandoned factories, and — my favorite — more of her.</p>
<p>I scoured the Web and used each new fact I found about her to create a fuller picture: the town she was born in (Laurel, Maryland), her school’s name (MICA, the Maryland Institute College of Art). Eventually, I admitted to cyberstalking her. I felt like a creep, but Lindsay cut me off. “I’ve been searching about you, too, mister,” she said, and rattled off a list of facts about me. She’d checked my email address against dozens of sites, figuring out which ones I’d registered on.</p>
<!-- BLOCK(pullquote)[3](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22none%22%7D) --><blockquote class="stylized pull-none" data-shortcode-type="pullquote" data-pull="none"><!-- CONTENT(pullquote)[3] -->I felt like a creep, but Lindsay cut me off. “I’ve been searching about you, too, mister.”<!-- END-CONTENT(pullquote)[3] --></blockquote><!-- END-BLOCK(pullquote)[3] -->
<p>These were among the sweetest words I’d ever heard, yet I was reluctant to see her in person. We scheduled a date, and as the days ticked down my nervousness grew. It’s a scary proposition, to take an online relationship offline. It would be scary even in a world without ax murderers and scammers. In my experience, the more you’ve communicated with someone online, the more disappointed you’ll be by meeting them in person. Things that are the easiest to say on-screen become the most difficult to say face-to-face. Distance favors intimacy: No one talks more openly than when they’re alone in a room, chatting with an unseen someone alone in a different room. Meet that person, however, and you lose your latitude. Your talk becomes safer and tamer, a common conversation on neutral ground.</p>
<p>Online, Lindsay and I had become total confidants, and I was afraid of losing our connection in person. In other words, I was afraid of being rejected.</p>
<p>I shouldn’t have been.</p>
<p>Lindsay — who’d insisted on driving — told me that she’d pick me up at my mother’s condo. The appointed hour found me standing outside in the twilight cold, guiding her by phone through the similarly named, identical-looking streets of my mother’s development. I was keeping an eye out for a gold ’98 Chevy Cavalier, when suddenly I was blinded, struck in the face by a beam of light from the curb. Lindsay was flashing her brights at me across the snow.</p>
<p>“Buckle up.” Those were the first words that Lindsay said to me in person, as I got into her car. Then she said, “What’s the plan?”</p>
<p>It’s then that I realized that despite all the thinking I had been doing about her, I’d done no thinking whatsoever about our destination.</p>
<p>If I’d been in this situation with any other woman, I’d have improvised, covering for myself. But with Lindsay, it was different. With Lindsay, it didn’t matter. She drove us down her favorite road — she had a favorite road — and we talked until we ran out of miles on Guilford and ended up in the parking lot of the Laurel Mall. We just sat in her car and talked.</p>
<p class="p1"></p>
<p>It was perfection. Talking face-to-face turned out to be just an extension of all our phone calls, emails, and chats. Our first date was a continuation of our first contact online and the start of a conversation that will last as long as we will. We talked about our families, or what was left of them. Lindsay’s parents were also divorced: Her mother and father lived 20 minutes apart, and as a kid Lindsay had been shuttled back and forth between them. She’d lived out of a bag. Mondays, Wednesdays, and Fridays she slept in her room at her mother’s house. Tuesdays, Thursdays, and Saturdays she slept in her room at her father’s house. Sundays were the dramatic day, because she had to choose.</p>
<p>She told me how bad my taste was and criticized my date apparel: a button-down shirt decorated with metallic flames over a wifebeater and jeans (I’m sorry). She told me about the two other guys she was dating, whom she’d already mentioned online, and Machiavelli would’ve blushed at the ways in which I set about undermining them (I’m not sorry). I told her everything, too, including the fact that I wouldn’t be able to talk to her about my work — the work I hadn’t even started. This was ludicrously pretentious, which she made obvious to me by nodding gravely.</p>
<p>I told her I was worried about the upcoming polygraph required for my clearance, and she offered to practice with me — a goofy kind of foreplay. The philosophy she lived by was the perfect training: Say what you want, say who you are, never be ashamed. If they reject you, it’s their problem. I’d never been so comfortable around someone, and I’d never been so willing to be called out for my faults. I even let her take my photo.</p>
<!-- BLOCK(pullquote)[5](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[5] -->I told her I was worried about the upcoming polygraph. The philosophy she lived by was the perfect training: say what you want, say who you are, never be ashamed.<!-- END-CONTENT(pullquote)[5] --></blockquote><!-- END-BLOCK(pullquote)[5] -->
<p>I had her voice in my head on my drive to the NSA’s oddly named Friendship Annex complex for the final interview for my security clearance. I found myself in a windowless room, bound like a hostage to a cheap office chair. Around my chest and stomach were pneumographic tubes that measured my breathing. Finger cuffs on my fingertips measured my electrodermal activity, a blood pressure cuff around my arm measured my heart rate, and a sensor pad on the chair detected my every fidget and shift. All of these devices — wrapped, clamped, cuffed, and belted tightly around me — were connected to the large black polygraph machine placed on the table in front of me.</p>
<p><!-- BLOCK(photo)[6](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[6] -->
<a href="https://theintercept.com/wp-content/uploads/2019/09/edward-snowden-book-excerpt-the-intercept-spot-1569015877.jpg"><img data-recalc-dims="1" height="1024" width="1024" decoding="async" class="aligncenter size-large wp-image-269085" src="https://theintercept.com/wp-content/uploads/2019/09/edward-snowden-book-excerpt-the-intercept-spot-1569015877.jpg?fit=1024%2C1024" alt="edward-snowden-book-excerpt-the-intercept-spot-1569015877" /></a>
<figcaption class="caption source">Illustration: Jialun Deng for The Intercept</figcaption><!-- END-CONTENT(photo)[6] --></figure><!-- END-BLOCK(photo)[6] --><br />
Behind the table, in a nicer chair, sat the polygrapher. She reminded me of a teacher I once had — and I spent much of the test trying to remember the teacher’s name, or trying not to. She, the polygrapher, began asking questions. The first ones were no-brainers: Was my name Edward Snowden? Was 6/21/83 my date of birth? Then: Had I ever committed a serious crime? Had I ever had a problem with gambling? Had I ever had a problem with alcohol or taken illegal drugs? Had I ever been an agent of a foreign power? Had I ever advocated the violent overthrow of the United States government? The only admissible answers were binary: “Yes” and “No.” I answered “No” a lot, and, before I knew it, the test was over.</p>
<p>I’d passed with flying colors.</p>
<p>As required, I had to answer the series of questions three times in total, and all three times I passed, which meant that not only had I qualified for the TS/SCI, I’d also cleared the “full scope polygraph” — the highest clearance in the land.</p>
<p>I had a girlfriend I loved, and I was on top of the world.</p>
<p>I was 22 years old.</p>
<p><em>Excerpted from &#8220;Permanent Record&#8221; by Edward Snowden, published by Metropolitan Books, an imprint of Henry Holt and Company. Copyright ©2019 by Edward Snowden. All rights reserved.</em></p>
<p>The post <a href="https://theintercept.com/2019/09/21/edward-snowden-permanent-record-book/">&#8220;Never Be Ashamed”: Why I Decided Not to Delete My Old Internet Posts</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2019/09/21/edward-snowden-permanent-record-book/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2019/09/edward-snowden-book-excerpt-the-intercept-1569012866.jpg?fit=1440%2C720' width='1440' height='720' /><post-id xmlns="com-wordpress:feed-additions:1">268781</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2019/09/edward-snowden-the-intercept-1568924550.jpg?fit=300%2C150" />
		<media:content url="https://theintercept.com/wp-content/uploads/2019/09/edward-snowden-the-intercept-1568924550.jpg?fit=300%2C150" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2019/09/edward-snowden-book-excerpt-the-intercept-spot-1569015877.jpg?fit=1024%2C854" medium="image">
			<media:title type="html">edward-snowden-book-excerpt-the-intercept-spot-1569015877</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2019/09/edward-snowden-book-excerpt-the-intercept-spot-1569015877.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[British and Canadian Governments Accidentally Exposed Passwords and Security Plans to the Entire Internet]]></title>
                <link>https://theintercept.com/2018/08/16/trello-board-uk-canada/</link>
                <comments>https://theintercept.com/2018/08/16/trello-board-uk-canada/#respond</comments>
                <pubDate>Thu, 16 Aug 2018 17:13:47 +0000</pubDate>
                                    <dc:creator><![CDATA[Yael Grauer]]></dc:creator>
                                		<category><![CDATA[Technology]]></category>
		<category><![CDATA[World]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=204841</guid>
                                    <description><![CDATA[<p>On Trello, a project management site, the governments posted credentials for servers and domain names and even some emails and code.</p>
<p>The post <a href="https://theintercept.com/2018/08/16/trello-board-uk-canada/">British and Canadian Governments Accidentally Exposed Passwords and Security Plans to the Entire Internet</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p class="Standard"><span class="T2"><u>By misconfiguring pages</u> on Trello, a popular project management website, the governments of the United Kingdom and Canada exposed to the entire internet details of software bugs and security plans, as well as passwords for servers, official internet domains, conference calls, and an event-planning system.</span></p>
<p class="Standard"><span class="T2">The U.K. government also exposed a small quantity of code for running a government website, as well as a limited number of emails. All told, between the two governments, a total of 50 Trello pages, known on the site as “boards,” were published on the open web and indexed by Google.</span></p>
<p class="Standard"><span class="T2">The computer researcher who found the sensitive material, </span><a class="Internet_20_link" href="https://twitter.com/xKushagra?lang=en"><span class="Internet_20_link"><span class="T2">Kushagra Pathak</span></span></a><span class="T2">, had disclosed just this past April a wide swath of additional private data </span><a class="Internet_20_link" href="https://medium.freecodecamp.org/discovering-the-hidden-mine-of-credentials-and-sensitive-information-8e5ccfef2724"><span class="Internet_20_link"><span class="T2">exposed to the public on Trello,</span></span></a><span class="Internet_20_link"><span class="T2"> which is widely used by software developers, among others. </span></span><span class="T2">That earlier disclosure revealed how, on dozens of public Trello boards run by various organizations and individuals, the information available included email and social media credentials, as well as specific information on unfixed bugs and security vulnerabilities. Pathak even found an NGO sharing login details to a donor management software database, which in turn contained, he said, personally identifiable information and financial records on donors. In both the April and new security research, the sensitive data on Trello was tracked down starting with a </span><a class="Internet_20_link" href="https://twitter.com/xKushagra/status/989074112411824129"><span class="Internet_20_link"><span class="T2">simple Google query</span></span></a><span class="T2">.</span></p>
<p class="Standard"><span class="T2">The data exposures underscore how easy it has become to improperly leak sensitive data in the era of cloud computing. More broadly, they show how the use and development of software has become a complex endeavor, involving a wide range of independent online systems, and how this complexity itself represents a security risk, encouraging users and developers to take shortcuts intended to cut through the morass. Tools like Trello can help master the tangle of development in a safe and constructive way, but can also be misused. </span></p>
<p class="Standard"><!-- BLOCK(pullquote)[0](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[0] --><span class="T5">He hopes to draw attention to what he believes is a major issue: the proliferation of </span><span class="T6">sensitive information on public Trello boards. It is incredibly easy to search for such boards on Google.<!-- END-CONTENT(pullquote)[0] --></blockquote><!-- END-BLOCK(pullquote)[0] --></span></p>
<p class="Standard"><span class="T2">In his new research, Pathak first discovered 25 public Trello boards belonging to different U.K. government departments. These included login credentials to a U.K. government account on a domain registrar, emails that had been pasted onto the boards, a link to a snippet of backend code of a government site, and information on bugs, albeit not bugs disclosing security issues. Also included were boards with conference call details and access codes, login information for a server administration tool known as </span><span class="T3">CPanel, a discussion of how to prevent personal information from being exposed to Google’s web analytics platform, and details about an earlier incident in which such information was exposed to the platform. </span><span class="T2">Pathak reported this through the U.K. National Cyber Security Centre, which identified the boards and removed most of them within two or three days. </span></p>
<p class="Standard"><span class="T2">Shortly thereafter, Pathak found 25 Canadian government boards that had even more sensitive information, such as remote file access, or FTP, credentials, and login details for the Eventbrite event-planning platform. Other boards included a link to an Excel file about managing control of web applications, discussion of additional security testing in the aftermath of a recent security incident, links to a Google folder with research documents, a security working group’s board with tasks related to audits and security testing, and a bug discussion. Pathak reported these to the Canadian Cyber Incident Response Centre, which also took prompt action to remove the boards, most of which were down within a week. </span></p>
<p class="Standard"><span class="T2">Pathak began researching computer science and hacking </span><span class="T2">when he was young, eventually teaching himself to program</span><span class="T5">. He hopes to draw attention to what he believes is a major issue: the proliferation of </span><span class="T6">sensitive information on public Trello boards. It is incredibly easy to search such boards on Google; one could recently find and search within them, for example, using the search modifier like “inurl:</span><a class="Internet_20_link" href="https://trello.com/b/"><span class="Internet_20_link"><span class="T6">https://trello.com/b/</span></span></a><span class="T6">,” which restricts Google to finding only results whose address begins with that text. Trello cards can be searched with the modifier “inurl:</span><a class="Internet_20_link" href="https://trello.com/c/"><span class="Internet_20_link"><span class="T6">https://trello.com/c/</span></span></a><span class="T6">” — this yields thousands (if not millions) of results, and many contain sensitive information.</span></p>
<p class="Standard"><span class="T7">Pathak</span><span class="T8"> said that in many cases, </span><span class="T9">it can be very difficult to identify the organization to which a board belongs. “I literally spent hours finding the contact details of organizations to which a board belonged so I could report them,” he told me.</span></p>
<p class="Standard"><span class="T2">Trello co-founder Michael Pryor provided a written statement highlighting the company’s privacy safeguards.</span></p>
<p class="Standard"><span class="T2">“Trello boards are set to private by default and must be manually changed to public by the user,” the statement read. “We strive to make sure public boards are being created intentionally and have built in safeguards to confirm the intention of a user before they make a  board publicly visible. Additionally, visibility settings are displayed persistently on the top of every board.”</span></p>
<p class="Standard"><span class="T3">In a Medium comment, Pathak said that he has seen many organizations using public Trello boards to share useful information that they want to be listed in the search results, so there are good reasons to expose some boards. But he also said it’s possible that some boards are made public due to sheer laziness: it’s slightly easier to make a board public and share the URL internally than it is to add people to a Trello team of authorized viewers. </span></p>
<p class="Standard"><span class="T3">It’s true, as Pryor stated, that Trello’s boards are set to private by default and that when a user sets a board to public, the visibility setting and what it entails (including search engine indexing) is clearly explained. But </span><span class="T2">Pathak had three additional suggestions to these built-in safeguards: Trello could highlight the visibility in red if a board is set to public; it could show a pop-up notice to users when they create or change board visibility to public in order to let them know that this can be viewed by anyone with the link and is indexed by search engines; and it could add to the Trello interface that automatically checks to try and detect if a user has posted a username or password to a public board.</span></p>
<p class="Standard"></p>
<p class="Standard"><span class="T2">Informed of Pathak’s suggestions, Pryor said that Trello is looking at other similar cloud apps and how they balance users’ quite often safe decision to share a set of information publicly with the desire to protect against inappropriate sharing of sensitive data. In the meantime, security researchers who find additional boards with sensitive information can send them to </span><a class="Internet_20_link" href="mailto:support@trello.com"><span class="Internet_20_link"><span class="T2">support@trello.com</span></span></a><span class="T2">, and Trello will get in contact with the owner and close them down if needed, according to Pryor.</span></p>
<p class="Standard"><span class="T3">U.K.’s Government Digital Service, which declined to comment for publication, provided its staff with internal communication guidance to make sure it is using online tools such as Trello appropriately; the guidance states that no personal or sensitive data should be published on Trello. The service also has an Information Assurance Team to guide staff on the appropriate use of online tools.</span></p>
<p class="Standard"><span class="T3">A written statement provided by a spokesperson for the government of Canada said, “</span><span class="T10">The Government of Canada recognizes that open access to modern digital tools is essential to transforming how public servants work and serve Canadians. … Departments and agencies of the Government of Canada must also apply adequate security controls to protect their users, information, and assets. This includes ensuring that their users are appropriately educated about their obligation to safeguard information and assets and to never use external web services and tools for communicating or storing sensitive information unless the service is approved by the appropriate security and technical authorities. Government of Canada employees are being reminded of their obligation never to communicate or store sensitive information on Trello boards or any other unauthorized digital tool or service.”</span></p>
<p>The post <a href="https://theintercept.com/2018/08/16/trello-board-uk-canada/">British and Canadian Governments Accidentally Exposed Passwords and Security Plans to the Entire Internet</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2018/08/16/trello-board-uk-canada/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2018/08/trello-1534262959.jpg?fit=2880%2C1440' width='2880' height='1440' /><post-id xmlns="com-wordpress:feed-additions:1">204841</post-id>
            </item>
        
            <item>
                <title><![CDATA[Trump Administration Fights Effort to Unionize Uber Drivers]]></title>
                <link>https://theintercept.com/2018/03/26/uber-drivers-union-seattle/</link>
                <comments>https://theintercept.com/2018/03/26/uber-drivers-union-seattle/#respond</comments>
                <pubDate>Mon, 26 Mar 2018 17:14:08 +0000</pubDate>
                                    <dc:creator><![CDATA[Avi Asher-Schapiro]]></dc:creator>
                                		<category><![CDATA[Uncategorized]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=177955</guid>
                                    <description><![CDATA[<p>Federal prosecutors claim the City of Seattle violated antitrust law when it tried to organize the drivers — advancing Uber's strategy to bypass local officials.</p>
<p>The post <a href="https://theintercept.com/2018/03/26/uber-drivers-union-seattle/">Trump Administration Fights Effort to Unionize Uber Drivers</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>In 2015, Seattle</u> became the first and only city to allow its ride-share drivers to unionize. But now the union may be broken up before it holds a single bargaining session, thanks to a legal alliance between Uber and the U.S. Chamber of Commerce — joined recently by the Trump administration.</p>
<p>The 9th Circuit of Appeals is currently deliberating <a href="http://www.chamberlitigation.com/cases/chamber-commerce-v-city-seattle">Chamber of Commerce v. City of Seattle</a><i>,</i> a suit brought on Uber’s behalf by the pro-business organization. Uber and the chamber hope to label the Seattle ordinance, passed unanimously by the city council in 2015, an antitrust violation. The argument, in essence, is that the city’s coalition of largely working-class and immigrant drivers would violate antitrust rules if they were allowed to negotiate together with the ride-sharing companies that sign their paychecks. Since the drivers are classified as independent business operators, the logic goes, they would be illegally conspiring to set prices.</p>
<p>Recently, Uber’s side got a boost from lawyers from the U.S. Department of Justice, led by an <a href="https://nypost.com/2016/03/09/to-save-the-supreme-court-vote-trump-over-clinton/">outspoken</a> Donald Trump supporter and former aide, and from the Federal Trade Commission. The agencies filed an <a href="https://www.ftc.gov/system/files/documents/amicus_briefs/chamber-commerce-united-states-america-rasier-llc-v-city-seattle-et-al/seattle_17-35640_-_ftcdoj_amicus_11317.pdf">amicus brief</a> late last year, and an FTC lawyer presented oral arguments last month in front of a three-judge panel. The City of Seattle, for its part, maintains it should able to set its own labor rules, and that it <a href="http://www.chamberlitigation.com/sites/default/files/cases/files/17171717/Opening%20Brief%20--%20Chamber%20v.%20Seattle%20%28Ninth%20Circuit%29.pdf">wants</a> to be a “laboratory’ for testing innovative policy responses to the problems created by new technologies and the changing economy.”</p>
<p>The appeals case, the culmination of a more than two years of legal battle, stands as an example of how Uber has cultivated support well over the heads of local officials, who are directly exposed to its operations and often most inclined to regulate it. Beyond the courts and sympathetic members of the executive branch, Uber also benefits from a sprawling army of lobbyists. Recruited from both parties, these lobbyists help enact industry-friendly transportation laws at the state level, which can make Seattle-style unionization efforts nearly impossible. Against this political backdrop, <a href="http://www.chamberlitigation.com/cases/chamber-commerce-v-city-seattle">Chamber of Commerce v. City of Seattle</a> takes on an added urgency: It underlines just how difficult it is for workers in the precarious gig economy, who generally cannot unionize, to gain any leverage over the well-capitalized platforms for which they work</p>
<p>Uber’s battle against municipal legislation has been long, grinding, and multifaceted. It has also tended to get lost in the news cycle, even as Uber’s scandals have become increasingly explosive. Allegations that the company fostered a top-to-bottom culture of sexual harassment, that it stole self-driving car technology from Google, that it built software to evade regulatory monitoring — these charges and others have been scrupulously documented and dissected, down to how much water ousted Uber CEO Travis Kalanick drank during recent court testimony. The company&#8217;s political and legal maneuvers, meanwhile, tend to rumble below the surface. But the outcome of the Seattle case, like other slogging regulatory Uber fights, could have far-reaching implications for countless workers trying to earn a living in the app-based labor market.</p>
<h3>Seattle&#8217;s &#8220;Enterprising&#8221; Effort to Help Uber Drivers</h3>
<p>The city ordinance aims to create a framework for the city’s drivers to vote and decide if they want to collectively bargain with ride-sharing companies like Uber and Lyft over working conditions. It didn’t define these drivers as official employees. But it would set up an alternative system that recognized the unique predicament of ride-sharing drivers, sitting somewhere in between traditional salaried employees, and independent contractors who completely control their work environment. “It was an enterprising proposal,” said Charlotte Garden, a professor and labor law expert at the Seattle University School of Law who supports the ordinance. Garden stressed that the legislation would empower drivers in the city to address a range of concerns, including low wages and opaque deactivation rules. If negotiations break down, the ordinance provides mechanisms to facilitate an agreement. Either party can request arbitration, under the supervision of the city.</p>
<!-- BLOCK(pullquote)[0](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[0] -->An economist called the Trump administration&#8217;s use of antitrust law against Uber drivers “galling.”<!-- END-CONTENT(pullquote)[0] --></blockquote><!-- END-BLOCK(pullquote)[0] -->
<p>Uber moved quickly to fight the Seattle law on multiple fronts. It created an anti-unionization podcast, offered free pizza to drivers who showed up to anti-union meetings, and bought local TV ads critical of the Teamsters, the union working to organize drivers on the ground.</p>
<p>One of its local subsidiaries in Seattle teamed up with the Chamber of Commerce and launched a suit shortly after the ordinance passed. The plaintiffs <a href="https://www.seattletimes.com/seattle-news/politics/judge-tosses-chambers-suit-against-seattle-over-uber-law/">argued</a>, among other things, that the city was violating antitrust rules. By allowing drivers to form an organization and bargain to set prices and working conditions, the chamber argued, the drivers were setting up what amounted to an illegal cartel. Although a district court ruled against Uber in 2015, the chamber appealed to the 9th Circuit, where it was eventually joined by the FTC and DOJ. (The FTC has not always been in Uber’s corner; last year, it fined the company $20 million for misleading drivers about pay).</p>
<p>While the Seattle law is tied up in court, Uber drivers have not been able to convene a bargaining unit as the ordinance allows.</p>
<p>The merits of the Seattle case hinge on a series of highly technical questions. Seattle argues that a Washington state transportation law from the 1990s, which empowers cities to regulate the for-hire vehicle industry, now authorizes the city to regulate the relationship between Uber drivers and the company. Uber and its allies say it doesn’t. The city argues that its law doesn’t interfere with federal antitrust regulations, because it falls under something known as the “state-action exemption,” a legal standard that allows elected governments, in some circumstances, to sanction anti-competitive behavior, such as price floors for drivers. This position is supported by a <a href="http://members.naag.org/assets/files/Antitrust/files/Amicus--City%20of%20Seattle.pdf">dozen</a> state attorneys general, the AFL-CIO, and the National Employment Law Project. Uber and its allies disagree, and arguments by federal attorneys have focused on establishing that, between Seattle’s ordinance and the older state law on which it rests, this exemption has not been properly met.</p>
<p><a href="https://onlabor.org/amicus-brief-in-seattle-case-antitrust-and-worker-cooperation/">Antitrust</a> and labor experts have come down on both sides. Marshall Steinbaum, an economist who serves as research director at the left-leaning Roosevelt Institute, called the federal government’s decision to use antitrust law to block Uber drivers from negotiating better working conditions “galling.”</p>
<p>“Their job is to make the economy competitive,&#8221; he said. “That does not include siding with the Chamber of Commerce and Uber in a case against labor.” (When an Uber customer in New York filed a suit accusing Uber themselves of price-fixing, the FTC did not side with that customer, and the case was eventually sent to arbitration.)</p>
<p>The top DOJ lawyer on the case, Makan Delrahim, is a Trump supporter and the president’s former deputy assistant. He was <a href="https://www.nytimes.com/2017/11/09/technology/justice-department-antitrust.html">accused</a> of politicizing the recent enforcement of antitrust rules against a communications merger involving CNN, of which Trump has been critical. (The DOJ did not respond to a request for comment.)</p>
<p>Still, the Uber-Seattle spat is not so clear-cut. The federal antitrust concerns in the case bear some resemblance to past regulatory action, including a groundbreaking 2015 Supreme Court ruling that the FTC could enforce an antitrust order against North Carolina’s State Board of Dental Examiners, which the state had claimed was immune from antitrust law. The case went to the Supreme Court, which ruled in 2015 that the FTC had correctly identified the scheme as an antitrust violation.</p>
<p>Christopher Koopman, the director of the Technology Policy Program at the Mercatus Center at George Mason University, wrote in an email to The Intercept that the Seattle plan in unfair because only some drivers would be allowed to bargain; the ordinance only covers longtime drivers who drive close to full time. This is an <a href="https://www.uber.com/drive/seattle/collective-bargaining/">argument</a> Uber has been making as well. Boycotts or work stoppages, Koopman argued, would be a better way to pressure Uber to improve working conditions. “A much more powerful mechanism, and one that can be used by all drivers to voice concerns, is refusing to drive,” Koopman wrote.</p>
<p>For drivers on the ground organizing in Seattle, the lawsuit — and the federal government’s decision to side with Uber — feels like a gut punch: “To me, it looks like the government is sheltering the business class from us,” said Don Creery, an Uber driver in Seattle who is also on the leadership team of the App-Based Drivers Association, the organization leading that driver negotiating effort. Creery’s been waiting for two years for the law to go into effect, and he’s starting to despair. He’s been working longer hours to earn the same amount of money, his rent keeps creeping up too. Meanwhile, other drivers are less and less interested in getting organized. “I don’t blame them,” Creery said. “What do we have to show for it?”</p>
<h3>How Uber Cancels Local Regulations</h3>
<p>A recent report out from the National Employment Law Project and the Partnership for Working Families underlines just how significant the battle in Seattle is. It charts how Uber steadily built up one of the country’s most extensive lobbying juggernauts — in 2016, it had 370 active lobbyists working on its behalf, more than Amazon, Microsoft, and Walmart combined. The lobbying campaign helped enact statewide regulatory regimes that would preempt efforts by cities to craft their own rules governing safety issues, insurance, background checks, and, in Seattle’s case, collective bargaining arrangements.</p>
<p>Uber and its allies have not been able to pass such a law in Washington state, which is why Seattle was able to make some headway with its collective bargaining ordinance in the first place.</p>
<!-- BLOCK(pullquote)[1](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22left%22%7D) --><blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><!-- CONTENT(pullquote)[1] -->&#8220;It looks like the government is sheltering the business class from us.&#8221;<!-- END-CONTENT(pullquote)[1] --></blockquote><!-- END-BLOCK(pullquote)[1] -->
<p>But Seattle is an outlier. According to the report, more than 40 states have enacted legislation that can block local transportation network regulations before they ever end up in a courtroom, by stripping cities of their regulatory power outright. The lobbying efforts were tightly focused on local politics: In Portland, Oregon, where Uber’s preferred legislation ultimately failed in the state legislature, the company’s lobbying activity in 2015 accounted for 30 percent of the city’s total lobbying that year.</p>
<p>“Uber took advantage of legislatures’ lack of familiarity with the industry,” said Miya Saika Chen, one of the report’s authors, and a lawyer with the Partnership for Working Families. What’s perhaps most striking about the lobbying effort, Saika Chen said, is just how bipartisan it is: In Pennsylvania, Uber hired Krystjan Callahan, the former chief of staff to the Republican House speaker; in Texas its PAC hired former Democratic mayor of Austin, Lee Leffingwell. Uber even <a href="https://news.vice.com/article/seattle-just-became-the-first-city-in-the-us-to-allow-uber-drivers-to-unionize">deployed</a> former Obama adviser David Plouffe to Seattle back in 2015, to squash the drivers’ collective bargaining campaign.</p>
<p>Sometimes, Uber has been a bit overzealous; Plouffe had to pay a $90,000 fine for violating lobbying rules in Chicago.</p>
<p>And while they don’t always win, the influence of these Uber lobbyists is hard to overstate. Take Ohio, where Uber’s lobbying efforts are laid bare thanks to public documents obtained through the Freedom of Information Act and provided to The Intercept by the authors of the new report. In the spring of  2015, Robert Klaffky, a lobbyist working for Uber in Ohio, sent Mike Duffey, a state representative from the small affluent town of Worthington, an email to his private Gmail account. “Here is a draft bill for Ohio,” the lobbyist wrote. “Please review and let&#8217;s set a time we can chat to walk through it.”</p>
<p>At that time, a number of cities in Ohio had begun disseminating their own rules and regulations for how ride-sharing companies — including Uber and Lyft — would operate. In Columbus, for <a href="http://www.cleveland.com/metro/index.ssf/2015/07/cleveland_officials_want_to_re.html">example</a>, city leaders had worked for a year on a set of regulations for driver background checks and safety inspections. Uber protested that these rules were too onerous.</p>
<p>The file Klaffky sent to Duffey contained a new state law that would cancel out any local regulations. The records show that Klaffky even drafted responses for Duffey to send to other lawmakers skeptical of the bill. And just eight months after Klaffky emailed Duffey, the bill found itself on Ohio Gov. John Kasich’s desk. As Cleveland.com once <a href="http://www.cleveland.com/open/index.ssf/2015/07/meet_the_advisers_and_insiders.html">reported</a>, Klaffky was considered to be in Kasich’s inner circle and a member of his “kitchen cabinet.” And Kasich prompted sign a bill that closely resembled Uber’s original wording into law. It came over the <a href="http://www.crainscleveland.com/article/20151018/NEWS/310189986/state-legislation-is-likely-for-uber-lyft">objections</a> from organizations like the Ohio Municipal League, which argued that the bill stripped cities of their ability to regulate their own transportation sector.</p>
<p>In an email to The Intercept, Duffey defended the bill as a necessary fix. As individual cities moved to regulate Uber, he says, the legislature needed to step in and provide a statewide standard. “Every bill involves input from the affected industries, including draft language for review,” Duffey wrote.</p>
<h3>Uber Says It&#8217;s &#8220;Confusing&#8221; When Cities Have Their Own Laws</h3>
<p>“Regulating ride-share at a city level creates barriers to entry and costs to drivers, confusion for riders, and unnecessary administrative costs for local governments &#8212; all without any increase in safety for riders and drivers or benefits for local jurisdictions,” an Uber spokesperson told The Intercept. “We will continue working with lawmakers and regulators to develop rules and policies that benefit riders and drivers while providing businesses like ours legal certainty.”</p>
<p>Critics of Uber’s strategy call this technique “preemption” or “state interference.” Pioneered by conservative pressure groups, this legislative strategy has been used to block city-level attempts to raise minimum wages and enact gun control by passing sweeping state laws that nullify local ordinances.</p>
<p>Klaffky, the lobbyist, told The Intercept that Uber’s efforts in Ohio are a “fairly ordinary” example of how industry shapes its regulatory environment. Though, he’s noticed that Uber’s government affairs team is a cut above the rest: “They are very sophisticated,” he said. “Most of them come out of government, there are Republicans and Democrats, and they know how government works.”</p>
<p>Uber is currently pushing a regulatory law in the Washington state legislature — although, the company says it is happy to let the courts decide the fate of Seattle’s collective bargaining scheme.</p>
<p>The Seattle case could set a strong precedent, either inviting a new wave of driver organizing or solidifying the labor model that Uber wants. “Other states and cities are waiting to see what happens,” said Garden, the labor lawyer. A similar effort by the California legislature has already <a href="https://techcrunch.com/2016/04/21/california-bill-to-give-gig-workers-organizing-rights-stalls-over-antitrust-concerns/">stalled</a>. Assembly Member Lorena Gonzalez, who had been pushing to unionize California ride-sharing drivers, pulled her bill in 2016 because, her office said at the time, it relied on “a number of untested legal theories.”</p>
<p>The 9th Circuit could throw the case back to district court, or it’s possible that the court could make a definitive ruling, provoking a potential Supreme Court appeal. The future of the law is still up in the air — though during oral arguments, the three-judge panel was <a href="https://www.reuters.com/article/labor-seattle/9th-circuit-judges-skeptical-of-seattles-driver-unionizing-law-idUSL2N1PW2IS">reportedly</a> unsympathetic to the city’s case (video is available <a href="https://www.ca9.uscourts.gov/media/view_video.php?pk_vid=0000012904">here</a> and <a href="https://www.ca9.uscourts.gov/media/view_video.php?pk_vid=0000012905">here</a>).</p>
<p>Meanwhile, Uber’s effort to smooth out its regulatory environment continued apace. An industry-backed bill <a href="http://www.al.com/news/index.ssf/2018/02/lawmakers_pass_bill_on_statewi.html">passed</a> the Alabama legislature last month with unanimous support. Uber’s lobbying team in the state includes a former deputy attorney general and a former chief of staff to the governor.</p>
<p>Back in Seattle, Greery, the driver and labor leader, is not at all optimistic that he’ll ever be allowed to sit across the table from the company he works for and bargain. “People say it could go to the Supreme Court” he said, sounding despondent. “That’s an anti-labor court — and I think we would lose.”</p>
<p><strong>Corrections</strong></p>
<p><em>March 26, 2018: An earlier version of this story misidentified the plaintiff in a New York case accusing Uber of price fixing; the plaintiff was a customer, not a driver.</em></p>
<p><em>March 29, 2018: An earlier version of this story contained a passage incorrectly tying Uber to a fine for lobbying in California. In fact, the lobbying was for Lyft.</em></p>
<p class="caption">Top photo: An Uber car waits for a client in Manhattan a day after it was announced that Uber co-founder Travis Kalanick will take a leave of absence as chief executive on June 14, 2017 in New York City.</p>
<p>The post <a href="https://theintercept.com/2018/03/26/uber-drivers-union-seattle/">Trump Administration Fights Effort to Unionize Uber Drivers</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2018/03/26/uber-drivers-union-seattle/feed/</wfw:commentRss>
                <slash:comments>0</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2018/03/Uber-seattle-1521733262.jpg?fit=1440%2C720' width='1440' height='720' /><post-id xmlns="com-wordpress:feed-additions:1">177955</post-id>
            </item>
        
            <item>
                <title><![CDATA[NSA Secretly Helped Convict Defendants in U.S. Courts, Classified Documents Reveal]]></title>
                <link>https://theintercept.com/2017/11/30/nsa-surveillance-fisa-section-702/</link>
                <comments>https://theintercept.com/2017/11/30/nsa-surveillance-fisa-section-702/#comments</comments>
                <pubDate>Thu, 30 Nov 2017 15:29:26 +0000</pubDate>
                                    <dc:creator><![CDATA[Trevor Aaronson]]></dc:creator>
                                		<category><![CDATA[Uncategorized]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=159252</guid>
                                    <description><![CDATA[<p>By withholding evidence of warrantless spying, the government avoided a court challenge to controversial mass surveillance — which is now before Congress.</p>
<p>The post <a href="https://theintercept.com/2017/11/30/nsa-surveillance-fisa-section-702/">NSA Secretly Helped Convict Defendants in U.S. Courts, Classified Documents Reveal</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><!-- INLINE(dropcap)[0](%7B%22componentName%22%3A%22DROPCAP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22resource%22%3Anull%7D)(%7B%22text%22%3A%22F%22%7D) --><span data-shortcode-type='dropcap' class='dropcap'><!-- INLINE-CONTENT(dropcap)[0] -->F<!-- END-INLINE-CONTENT(dropcap)[0] --></span><!-- END-INLINE(dropcap)[0] --><u>azliddin Kurbanov is</u> a barrel-chested man from Uzbekistan who came to the United States in 2009, when he was in his late 20s. A Christian who had converted from Islam, Kurbanov arrived as a refugee and spoke little English. Resettled in Boise, Idaho, he rented an apartment, worked odd jobs, and was studying to be a truck driver.</p>
<p>But about three years after entering the U.S., around the time he converted back to Islam, Kurbanov was placed under FBI surveillance. According to emails and internet chat logs obtained by the government, Kurbanov was disgusted by having seen Americans burn the Quran and by reports that an American soldier had tried to rape a Muslim girl. “My entire life, everything, changed,” Kurbanov wrote in a July 31, 2012 email.</p>
<p>After the FBI assigned one informant to live with him and another informant to attend his truck-driving school, Kurbanov was arrested in May 2013. Prosecutors accused him of providing material support to the Islamic Movement of Uzbekistan and possessing bomb-making materials.</p>
<p>During Kurbanov&#8217;s trial, the government notified him that his conversations with an alleged Islamic Movement of Uzbekistan associate based in Pakistan had been intercepted. The spying, federal prosecutors said, had been authorized under the Foreign Intelligence Surveillance Act of 1978, which regulates the monitoring of agents of foreign governments and terrorist organizations. Kurbanov was convicted at trial and sentenced to 25 years in prison, after which he’ll be deported to Uzbekistan. He is an apparent success story for U.S. counterterrorism officials. If there was any doubt about Kurbanov&#8217;s propensity for violence, he eliminated it by stabbing a prison warden in California, an act for which he is now facing additional charges.</p>
<p>But Justice Department lawyers gained their conviction against Kurbanov after failing to disclose a legally significant fact: Kurbanov’s conversations with his alleged terrorist associate had been captured through <a href="https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data">PRISM</a>, a National Security Agency mass surveillance program whose existence was revealed in documents provided by whistleblower Edward Snowden. Under PRISM, the government obtains communications directly from at least eight large technology companies without the need for warrants, a type of practice authorized in 2008, when Congress provided new surveillance powers under FISA.</p>
<!-- BLOCK(pullquote)[1](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[1] -->The government must disclose when information against defendants originates from warrantless surveillance — but prosecutors did not do so to Kurbanov.<!-- END-CONTENT(pullquote)[1] --></blockquote><!-- END-BLOCK(pullquote)[1] -->
<p>While traditional FISA authority permits spying on a particular person or group through warrants issued by the secret Foreign Intelligence Surveillance Court, under the new powers, codified in FISA Section 702, monitoring is approved in bulk by the court through what is essentially a recipe for mass surveillance. Once approved, such a recipe can be used against thousands of targets. Under Section 702 authority, the NSA is currently monitoring digital communications of more than 100,000 people; it swept up an estimated 250 million internet communications each year as of a <a href="https://www.clearinghouse.net/chDocs/public/NS-DC-0057-0002.pdf">2011 Foreign Intelligence Surveillance Court opinion</a>. The FBI frequently searches Section 702 databases when it opens national security and domestic criminal &#8220;assessments,&#8221; precursors to full investigations.</p>
<p>According to <a href="https://theintercept.com/document/2017/11/28/sso-weekly-brief-25-april-2013-excerpt">a slide in an NSA presentation</a>, provided by Snowden and published for the first time today by The Intercept, the interception of Kurbanov’s conversations was a “Reporting Highlight” for PRISM. The document indicates that the NSA captured Kurbanov’s Skype conversations from October 2012 through April 2013, roughly the same period the FBI was investigating him with undercover informants. It further details how an NSA unit in April 2013 issued a report describing “how Kurbanov believed he was under surveillance (which he is by the FBI) but was cautiously continuing his work, which was not specified — could be raising money for the IMU or explosive testing.” The alleged terrorist associate with whom Kurbanov was communicating “wanted Kurbanov to set this work in motion, probably related to sending money back to the IMU,” the document added.</p>
<!-- BLOCK(document)[2](%7B%22componentName%22%3A%22DOCUMENT%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22sourceId%22%3A%224310977-SSO-Weekly-Brief-25-April-2013-Excerpt%22%2C%22sourceName%22%3A%22documentcloud%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fdocument%5C%2Fsso-weekly-brief-25-april-2013-excerpt%5C%2F%22%7D) -->
    <iframe loading="lazy"
      height="450"
      sandbox="allow-scripts allow-same-origin allow-popups allow-forms"
      src="https://embed.documentcloud.org/documents/4310977-SSO-Weekly-Brief-25-April-2013-Excerpt/?embed=1&amp;title=1"
      style="border: 1px solid #aaa;"
      width="100%"
    ></iframe>
  <!-- END-BLOCK(document)[2] -->
<p>The government is obligated to disclose to criminal defendants when information against them originates from Section 702 reporting, but federal prosecutors did not do so in Kurbanov’s case. In fact, when Kurbanov’s lawyers demanded disclosure of FISA-related evidence and the suppression of that evidence, Attorney General Eric Holder asserted national security privilege, claiming in a declaration that disclosure of FISA information would “harm the national security of the United States.” Kurbanov’s lawyer, Chuck Peterson, declined to comment about the government’s use of Section 702 surveillance against his client.</p>
<p>Kurbanov does not appear to be the only defendant kept in the dark about how warrantless surveillance was used against him. A nationwide review of federal court records by The Intercept found that of 75 terrorism defendants notified of some type of FISA spying since Section 702 became law, just 10 received notice of Section 702 surveillance. And yet Section 702 was credited with “well over 100 arrests on terrorism-related offenses” in a July 2014 <a href="https://www.pclob.gov/library/702-Report.pdf">report</a> from the Privacy and Civil Liberties Oversight Board, the federal entity created to oversee intelligence authorities granted in the wake of the 9/11 attacks. Additional documents from Snowden, previously unpublished and dated before the Kurbanov case, provide further examples of how NSA intelligence repeatedly played an undisclosed role in bringing accused terrorists to trial in U.S. courts over the past decade and a half. They also reveal an instance in which the NSA incorrectly identified a U.S. citizen as a foreign target of a FISA warrant.</p>
<p>Civil liberties advocates have long suspected that the Justice Department is underreporting Section 702 cases in order to limit court challenges to the controversial law. Some theorize that the government conceals Section 702 use through a process known as “parallel construction,” in which evidence obtained from the warrantless surveillance authority is reobtained through traditional FISA authorization, and the government only discloses the latter authority in U.S. District Court. One defense lawyer referred to this practice in a court filing as “laundering” Section 702 evidence. Beyond the Kurbanov case, circumstantial evidence in other  prosecutions suggests that this type of parallel construction could be widespread.</p>
<!-- BLOCK(pullquote)[3](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22left%22%7D) --><blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><!-- CONTENT(pullquote)[3] -->“The government intercepts Americans’ emails and phone calls in vast quantities. &#8230; Yet only a handful of individuals have ever received notice.”<!-- END-CONTENT(pullquote)[3] --></blockquote><!-- END-BLOCK(pullquote)[3] -->
<p>“The government intercepts Americans’ emails and phone calls in vast quantities using this spying law and stores them in databases for years,” said Patrick Toomey, staff attorney for the American Civil Liberties Union’s National Security Project. “FBI agents around the country then go searching through that trove of data as a matter of course, including in domestic criminal investigations. Yet, over almost a decade, only a handful of individuals have ever received notice.”</p>
<p>The Justice Department, FBI, and NSA declined to comment for this article. The New York Times in 2013 <a href="http://www.nytimes.com/2013/10/17/us/politics/us-legal-shift-may-open-door-for-challenge-to-secret-wiretaps.html">reported</a> that lawyers in the Justice Department’s National Security Division had believed they did not need to disclose in court whether evidence obtained through FISA specifically originated with Section 702 unless they were presenting material received directly from a Section 702 sweep. The U.S. solicitor general then successfully pushed for a change in policy, bolstered by fallout from the Snowden disclosures; this was followed by a review of past cases by the National Security Division, after which prosecutors filed supplemental Section 702 notices in a handful of cases around the country. In four such cases, the defendants had already been convicted by the time of the disclosure. And whatever changes occurred in 2013 were clearly limited, given that fewer than a dozen such notices have ever been given in court cases, and none at all has been filed in the last year and a half. Kurbanov, meanwhile, was convicted in 2015, well after the purported change in policy.</p>
<p>The government’s handling of its Section 702 authority is particularly important at the moment because the powers are scheduled to expire at the end of the year unless Congress reauthorizes them. Three reauthorization bills are winding through Congress. The Senate Intelligence Committee and the House Judiciary Committee have each produced one, while a third has been sponsored by U.S. senators and longtime intelligence community critics Ron Wyden, an Oregon Democrat, and Rand Paul, a Republican from Kentucky. As currently written, <a href="https://www.documentcloud.org/documents/4114759-Wyden-Paul-USA-Rights-Act.html">the Wyden-Paul bill</a> would strengthen notification requirements and curb the Justice Department’s ability to launder Section 702 evidence through traditional FISA. The bill would require notification of Section 702 surveillance even when evidence derived from that surveillance “was subsequently reobtained through other means.” Meanwhile, the bill that emerged from the Senate Intelligence Committee appears to <a href="https://www.emptywheel.net/2017/10/23/the-senate-intelligence-committee-702-bill-is-a-domestic-spying-bill/">expand</a> Section 702 without providing additional safeguards.</p>
<p>The undisclosed use of warrantless surveillance to win prosecutions is also troubling from a constitutional standpoint, foreclosing a rare opportunity to discover Section 702 abuses and challenge the law, which civil liberties advocates have argued <a href="https://www.brennancenter.org/sites/default/files/analysis/What_Went_%20Wrong_With_The_FISA_Court.pdf">is unconstitutional</a>. Although FISA stipulates that targets of surveillance may challenge the order that led to spying against them, and although Section 702 is clearly used on a massive scale, courts have been strict in deciding who is a “target” of the surveillance authority, and of similar mass spying programs, and thus has standing to challenge the monitoring. For example, the Supreme Court in 2013 ruled, in a 5-4 decision, that Amnesty International and other plaintiffs could not bring a Section 702-related lawsuit because their claim that they would be targeted or harmed by such eavesdropping was too speculative. During arguments prior to the ruling, the U.S. solicitor general specifically told the justices that more suitable plaintiffs would likely emerge because people charged due to Section 702 surveillance would be notified by prosecutors and could then challenge the use of the surveillance in court.</p>
<p>“The failure to provide notice not only prevents defendants from challenging surveillance programs in court, but also stymies the public’s interest in understanding how and when its vast authorities are used,” said Faiza Patel, co-director of the Brennan Center’s Liberty and National Security Program. “We know that the FBI has a practice of trawling through the vast databases of information captured under Section 702 for information about Americans, but it has only acknowledged relying on such surveillance in a handful of cases and then only when its failure to provide the legally required notice generated public pressure to do so.”</p>
<p><!-- BLOCK(photo)[4](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%22852px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 852px;"><!-- CONTENT(photo)[4] -->
<a href="https://theintercept.com/wp-content/uploads/2017/11/FISA16-1511987843.jpg"><img data-recalc-dims="1" decoding="async" src="https://theintercept.com/wp-content/uploads/2017/11/FISA16-1511987843.jpg?w=1200" alt="" /></a>

<figcaption class="caption source">Graphic: The Intercept</figcaption><!-- END-CONTENT(photo)[4] --></figure><!-- END-BLOCK(photo)[4] --><br />
<!-- INLINE(dropcap)[5](%7B%22componentName%22%3A%22DROPCAP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22resource%22%3Anull%7D)(%7B%22text%22%3A%22C%22%7D) --><span data-shortcode-type='dropcap' class='dropcap'><!-- INLINE-CONTENT(dropcap)[5] -->C<!-- END-INLINE-CONTENT(dropcap)[5] --></span><!-- END-INLINE(dropcap)[5] --><u>lassified documents provided</u> by Snowden expose the questionable use of NSA surveillance to spy on a U.S. citizen and the covert role NSA played in several investigations that resulted in criminal convictions. More broadly, the documents offer a view into how the relationship between the NSA and the FBI has evolved over more than a decade into a de facto partnership for investigating alleged terrorists who ultimately wind up in U.S. courts.</p>
<p>In the immediate years after the 9/11 attacks, as the FBI and NSA refocused on counterterrorism as their top priority, the NSA was acutely reliant on the FBI for its relationships with the Foreign Intelligence Surveillance Court, a secret judicial body that provides oversight of surveillance authorization requests, and with U.S. internet and telecommunications companies. In large measure, in these early years the NSA needed the FBI to function effectively as a signals intelligence agency for counterterrorism purposes. For example, when the NSA required authority to target for surveillance a specific phone number or email address — even when the NSA did not know the identity of the person behind that phone number or email address — <a href="https://theintercept.com/document/2017/11/30/nsa-classification-guide-for-fisa/">the FBI went before the Foreign Intelligence Surveillance Court to obtain authorization on the NSA’s behalf</a>. In turn, once that authorization was granted, the NSA needed the FBI to contact the internet or telecommunications company to obtain the data.</p>
<!-- BLOCK(pullquote)[6](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22left%22%7D) --><blockquote class="stylized pull-left" data-shortcode-type="pullquote" data-pull="left"><!-- CONTENT(pullquote)[6] -->The NSA defined a U.S. citizen’s email address as not being related to a U.S. person when the NSA and FBI should have known this was incorrect — Tarik Shah  had played at Bill Clinton’s inauguration.<!-- END-CONTENT(pullquote)[6] --></blockquote><!-- END-BLOCK(pullquote)[6] -->
<p>An <a href="https://theintercept.com/document/2017/11/28/sidtoday-fisa-teaming-with-the-fbi-in-the-global-war-on-terrorism">August 17, 2005, edition of SIDtoday</a>, the internal newsletter of the NSA’s Signals Intelligence Directorate, disclosed that at the time 40 percent of all NSA counterterrorism reporting was derived from FISA collection. The newsletter added: “NSA gets most of its (counterterrorism)-related FISA collection from the FBI. The FBI collects, formats, and disseminates international terrorism-related FISA intercept to NSA, CIA, and internally to FBI agents and analysts.” In 2004, the NSA began to embed employees in the FBI’s Data Intercept Technology Unit, in Quantico, Virginia, so that NSA employees could speak more directly with U.S. data providers, such as internet companies, about formatting data to NSA specifications. “This is the first time that the NSA FISA team has had direct access to the providers, which has proven to be extremely useful to NSA,” the newsletter stated.</p>
<p>According to <a href="https://theintercept.com/document/2017/11/28/pinwale-transnational-dni-training">internal NSA documents</a>, FISA data obtained by the FBI is funneled into a special partition in PINWALE , the NSA’s massive database of digital communications that can be queried by email address, internet protocol address, and other parameters. From 2002 through 2008, according to internal files, the NSA kept a spreadsheet titled “FISA recap” of 7,485 FISA surveillance targets consisting of email addresses or phone numbers, with columns indicating the start and end dates of the authorized surveillance and whether the target was associated with a U.S. person, defined by law as a citizen or lawful resident.</p>
<p>A decade later, most of these email addresses and phone numbers can’t be traced to anyone; many belonged at the time to foreigners the government suspected were involved with terrorist organizations. Others were used by <a href="https://theintercept.com/2014/07/09/under-surveillance/">civil rights activists, lawyers, and academics</a> in the United States who were never charged with federal crimes, such as Nihad Awad of the Council on American-Islamic Relations and Rutgers University professor Hooshang Amirahmadi. To have obtained FISA surveillance authority for those U.S. persons, the government had to have demonstrated to the Foreign Intelligence Surveillance Court that they were acting as agents of a foreign power. It’s unknown how the government demonstrates this, since individual FISA applications are secret, even when evidence derived from FISA surveillance is introduced against criminal defendants.</p>
<p>In the case of at least one FISA target, the NSA defined a U.S. citizen’s email address as not being related to a U.S. person when the NSA and FBI should have known this was incorrect, suggesting the government did not have to prove the target was a foreign agent. <a href="https://trial-and-terror.theintercept.com/people/35aea606-45d0-4633-b39f-d39f769b074f">Tarik Shah</a>, a jazz bassist who had played at Bill Clinton’s inauguration, was arrested in 2005 following an informant-led FBI sting, in which Shah pledged allegiance to Al Qaeda before an undercover agent. Shah’s FISA-authorized surveillance from October 2004 through June 2005 occurred concurrently with the FBI’s sting. Shah had a friend, <a href="https://trial-and-terror.theintercept.com/people/bb9d491f-3190-43df-8ab3-2c320baefb3e">Mahmud Faruq Brent</a>, who had attended a Lashkar-e-Taiba training camp in Pakistan and complained about how “difficult it was to be back in the United States.” But the primary link between Shah and overseas terrorists was the undercover FBI agent who pretended to be from Al Qaeda. And there was no reasonable reason for ambiguity about whether the email address belonged to Tarik Shah, the U.S. citizen, as opposed to another Tarik Shah somewhere else in the world. The email address was thebassman_12963@hotmail.com, the username a reference to Shah’s music profession. In a September 2006 filing, Attorney General Alberto Gonzales asserted national security privilege to prevent disclosure of Shah’s FISA application. Shah pleaded guilty to a material support charge; he is scheduled to be released from prison next year. It’s impossible to know from available NSA records whether the classification of Shah’s email address as a non-U.S. person was an anomaly or part of a broader NSA practice of targeting U.S. persons without having to provide probable cause to the FISA court that they were agents of foreign powers — a requirement intended protect U.S. citizens and legal residents from unreasonable search and seizure.</p>
<p>Because the FBI stood between the NSA and FISA data collection, NSA analysts encountered bottlenecks that frustrated counterterrorism and intelligence operations, internal NSA communication show. In April 2006, for example, the NSA was monitoring <a href="https://trial-and-terror.theintercept.com/people/1464e927-8696-449e-9da3-12a2ee6f098d">Ehsanul Islam Sadequee</a> through a FISA authorization the FBI had obtained. A Bangladeshi-American who was born in the United States and grew up in the Atlanta suburbs, Sadequee came to the attention of U.S. authorities after he and a friend, <a href="https://trial-and-terror.theintercept.com/people/120b7857-b75a-4657-accc-fbbeefb81db9">Syed Haris Ahmed</a>, traveled to Toronto to meet with several young men who were being investigated for terrorism in Canada. After that meeting in Toronto, Sadequee traveled to Bangladesh. He told U.S. counterterrorism agents prior to leaving that he was going to Bangladesh to be married. On April 5, 2006, as the FBI was closing in to arrest Sadequee, <a href="https://theintercept.com/document/2017/11/28/re-ehsanul-sadequee-fisa-request">an NSA analyst urgently emailed the agency&#8217;s FBI liaison</a> asking for the bureau&#8217;s help documenting their FISA authorization on Sadequee’s email address. “The reason we are pursing (sic) this is because we would like to retrieve a file that was passed between him and an associate about three weeks ago,” the NSA employee wrote. Sadequee was found guilty at trial of terrorism-related offenses, including material support for terrorists, and sentenced to 17 years in prison. His friend, Ahmed, was also found guilty at trial and received 13 years in prison; he was released in August.</p>
<p><!-- BLOCK(photo)[7](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[7] -->
<a href="https://theintercept.com/wp-content/uploads/2017/11/Mohammed-Ali-Al-Moayad--1511371265.jpg"><img data-recalc-dims="1" height="1024" width="1024" decoding="async" class="aligncenter size-large wp-image-159244" src="https://theintercept.com/wp-content/uploads/2017/11/Mohammed-Ali-Al-Moayad--1511371265.jpg?fit=1024%2C1024" alt="Yemeni Religious Endowments and Guidance Minister Hamud al-Hattar walks past pictures of Yemeni cleric Sheikh Mohammed Ali al-Moayad (L) and his assistant and bodyguard Mohammed Zayed (R) as he arrives to greet them at the airport in Sanaa on August 11, 2009 following their deportation from the US. Yemen staged a warm welcome for Moayad, expelled from the United States after originally being sentenced to 75 years in jail for supporting terrorism. The ailing Muslim cleric returned home after a US federal judge ordered his deportation, along with Zayed. AFP PHOTO/KHALED FAZAA (Photo credit should read KHALED FAZAA/AFP/Getty Images)" /></a>
<figcaption class="caption source pullright">Yemeni Religious Endowments and Guidance Minister Hamud al-Hattar walks past pictures of Yemeni cleric Sheikh Mohammed Ali Hassan al-Moayad, left, and his assistant and bodyguard Mohammed Zayed, right, as he arrives to greet them at the airport in Sana&#8217;a on Aug. 11, 2009 following their deportation from the U.S.<br/>Photo: Khaled Fazaa/AFP/Getty Images</figcaption><!-- END-CONTENT(photo)[7] --></figure><!-- END-BLOCK(photo)[7] --><br />
<!-- INLINE(dropcap)[8](%7B%22componentName%22%3A%22DROPCAP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22resource%22%3Anull%7D)(%7B%22text%22%3A%22A%22%7D) --><span data-shortcode-type='dropcap' class='dropcap'><!-- INLINE-CONTENT(dropcap)[8] -->A<!-- END-INLINE-CONTENT(dropcap)[8] --></span><!-- END-INLINE(dropcap)[8] --><u>s the NSA was</u> experiencing some gridlock in its FBI-enabled FISA collection, the agency was developing new programs that sidestepped the Foreign Intelligence Surveillance Court — programs that would later be exposed as warrantless wiretapping and would evolve into the programs codified into law by FISA&#8217;s Section 702. Internal NSA documents written before the warrantless wiretapping program was exposed to the public reveal that the information flow slowly began to transform from the FBI to the NSA to a more bidirectional stream between both agencies. And in those early days of mass surveillance, NSA information secretly helped investigate accused terrorists who would be prosecuted in U.S. courts, Snowden documents show, although it’s not clear if the intelligence originated with warrantless eavesdropping or other sources.</p>
<p>In 2003, following a sting operation involving two informants and a meeting in Germany, Yemeni cleric <a href="https://trial-and-terror.theintercept.com/people/edb63180-668c-48ae-a448-7a4618341198">Mohammed Ali Hassan al-Moayad</a> was arrested in Frankfurt and extradited to the United States, where he was charged with raising money for Hamas and Al Qaeda. Moayad was convicted at trial in 2005. <a href="https://theintercept.com/document/2017/11/28/sidtoday-life-as-the-sid-liaison-to-the-joint-terrorism-task-force-in-nyc">In an August 3, 2005, edition of SIDtoday</a>, an NSA employee gave the agency credit for Moayad’s conviction. “Although this fact is unknown to the general public, and to the vast majority of the law enforcement community, NSA reporting played a key role in bringing the sheikh to trial,” the NSA employee wrote. It’s not clear what role NSA played in Moayad’s investigation. Moayad, who was not a U.S. person during the investigation, was not notified of FISA surveillance, court records show; nonetheless, his verdict was overturned after an appeals court ruled that testimony about unrelated terrorist activity had been allowed to prejudice the jury. Moayad was deported to Yemen in 2009 as part of a deal in which he pleaded guilty to conspiring to raise money for Hamas.</p>
<!-- BLOCK(document)[9](%7B%22componentName%22%3A%22DOCUMENT%22%2C%22entityType%22%3A%22EMBED%22%7D)(%7B%22sourceId%22%3A%224310981-2005-08-03-SIDToday-Life-as-the-SID-Liaison-to%22%2C%22sourceName%22%3A%22documentcloud%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ftheintercept.com%5C%2Fdocument%5C%2Fsidtoday-life-as-the-sid-liaison-to-the-joint-terrorism-task-force-in-nyc%5C%2F%22%7D) -->
    <iframe loading="lazy"
      height="450"
      sandbox="allow-scripts allow-same-origin allow-popups allow-forms"
      src="https://embed.documentcloud.org/documents/4310981-2005-08-03-SIDToday-Life-as-the-SID-Liaison-to/?embed=1&amp;title=1"
      style="border: 1px solid #aaa;"
      width="100%"
    ></iframe>
  <!-- END-BLOCK(document)[9] -->
<p>A week after crowing about its secret role in Moayad’s trial, <a href="https://theintercept.com/document/2017/11/28/sidtoday-the-saudi-assassination-plot-how-it-was-thwarted">the NSA boasted internally through SIDtoday</a> that the agency played a key role in investigating <a href="https://trial-and-terror.theintercept.com/people/5017bc15-e68d-4159-a7a2-263b157e7253">Abdurahman Muhammad al-Amoudi</a>, a U.S. citizen who was involved in financial transactions with Libya and a plot to assassinate the Saudi crown prince. According to SIDtoday, Libyan President Moammar Gadhafi organized the failed assassination plot after a perceived insult and threat by the Saudi crown prince during an Arab League summit. In 2004, <span class="">Amoudi</span> pleaded guilty to terrorism-related charges and was sentenced to 23 years in prison. “NSA’s contributions were significant,” the agency’s newsletter reported.</p>
<!-- BLOCK(pullquote)[10](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[10] -->“Although this fact is unknown to the general public, NSA reporting played a key role in bringing the sheikh to trial.” —Top-secret passage in internal NSA newsletter<!-- END-CONTENT(pullquote)[10] --></blockquote><!-- END-BLOCK(pullquote)[10] -->
<p>The NSA also played a previously undisclosed role in the capture of <a href="https://trial-and-terror.theintercept.com/people/36097ddf-5ed3-4cc8-b1e0-55919b5ccd36">Nancy Conde Rubio</a>, who at the time of her arrest was the fourth-ranking member of Marxist guerrilla group FARC in Colombia. Rubio had joined the FARC when she was 16 years old, and U.S. intelligence indicated that she was the girlfriend of a FARC commander suspected of holding hostage three U.S. citizens. Through digital communications intercepts, the NSA discovered that Rubio was to travel from Venezuela to Colombia without valid paperwork, <a href="https://theintercept.com/document/2017/11/30/sidtoday-perseverance-pays-off-eight-year-sigint-effort-culminates-in-arrest-of-elusive-colombian-terrorist">according to a 2008 SIDtoday article</a>. U.S. government officials provided that information to Colombian law enforcement, whose agents arrested Rubio and extradited her to Washington, D.C., for federal prosecution. She pleaded guilty to material support charges and was sentenced to 11 years and six months in prison.</p>
<p>Following the exposure of the NSA’s warrantless wiretapping programs, and the legalization of mass surveillance programs through the FISA Amendments Acts of 2008, which added Section 702 and other new provisions, the NSA continued to play a large, and largely secret, role in terrorism prosecutions in the United States.</p>
<p>One of the most notable examples involves <a href="https://trial-and-terror.theintercept.com/people/508412de-d0d0-48cd-975b-22e1fa036cdf">Najibullah Zazi</a>, who was arrested before he could move forward in an Al Qaeda-backed plot to bomb the New York subway. Zazi, a legal permanent resident of the United States, pleaded guilty to terrorism-related offenses in February 2010. The next month, on March 11, 2010, <a href="https://theintercept.com/document/2017/11/28/sidtoday-2009-a-watershed-year-in-the-fight-against-terrorism">SIDtoday celebrated</a> “a watershed period in the fight against terrorism and radical extremist groups,” noting that the NSA first discovered Zazi’s email connections to Al Qaeda operatives in Pakistan.</p>
<p>“Without that SIGINT lead on Zazi, his activities might not have come to the attention of the US intelligence and law enforcement communities until he actually conducted a terrorist attack against the US homeland,” an NSA employee wrote, referring to signals intelligence.</p>
<p>In July 2015, five years after Zazi pleaded guilty, prosecutors in New York notified him that he had been subjected to Section 702 surveillance. Zazi has not yet been sentenced; he is now a cooperating witness, part of a larger effort to <a href="https://theintercept.com/2017/04/20/terrorism-defendants-with-concrete-ties-to-violent-extremists-leverage-their-connections-to-avoid-prison/">flip well-connected terrorists into government informants</a>. His case has become the prime example for counterterrorism officials defending the utility of Section 702 in stopping attacks in the United States.</p>
<p><!-- BLOCK(photo)[11](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[11] -->
<a href="https://theintercept.com/wp-content/uploads/2017/11/Najibullah-Zazi-1511371271.jpg"><img data-recalc-dims="1" height="1024" width="1024" decoding="async" class="aligncenter size-large wp-image-159245" src="https://theintercept.com/wp-content/uploads/2017/11/Najibullah-Zazi-1511371271.jpg?fit=1024%2C1024" alt="DENVER, COLORADO - SEPTEMEBER 17: Najibullah Zazi (R), 24, arrives at the Byron G. Rogers Federal Building in downtown with his attorney Art Folsom (not pictured) September 17, 2009 in Denver, Colorado. Zazi has been undergoing questioning at the FBI's Denver branch for suspected involvement in a terrorism plot involving peroxide-based explosives. Federal and local authorities searched Zazi's apartment and the home of relatives close by yesterday but have not commented on whether anything was found during the searches. Zazi has repeatedly denied being involved with terrorism or bomb making. (Photo by Marc Piscotty/Getty Images)" /></a>
<figcaption class="caption source pullright">Najibullah Zazi, right, 24, arrives at the Byron G. Rogers Federal Building in downtown with his attorney Art Folsom (not pictured) Sept. 17, 2009 in Denver, Colo.<br/>Photo: Marc Piscotty/Getty Images</figcaption><!-- END-CONTENT(photo)[11] --></figure><!-- END-BLOCK(photo)[11] --><br />
<!-- INLINE(dropcap)[12](%7B%22componentName%22%3A%22DROPCAP%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22inlineType%22%3A%22TEXT%22%2C%22resource%22%3Anull%7D)(%7B%22text%22%3A%22Z%22%7D) --><span data-shortcode-type='dropcap' class='dropcap'><!-- INLINE-CONTENT(dropcap)[12] -->Z<!-- END-INLINE-CONTENT(dropcap)[12] --></span><!-- END-INLINE(dropcap)[12] --><u>azi is one of</u> 10 terrorism defendants who have been notified of Section 702 surveillance. Most of those notifications occurred in 2014 and 2015, as supplemental notices intended to correct the record after the Justice Department review of cases in which 702 notice was not provided.</p>
<p>According to a review of nationwide court records by The Intercept, the most recent Section 702 notification was delivered in April 2016, when prosecutors in Chicago informed <a href="https://trial-and-terror.theintercept.com/people/1a24cd5c-f43f-4850-8b7c-b6b509e0a433">Aws Mohammed Younis Al-Jayab</a>, a Palestinian refugee who emigrated from Iraq. Jayab is awaiting trial on charges that he lied to federal agents about fighting with terrorist groups in Syria.</p>
<!-- BLOCK(pullquote)[13](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22right%22%7D) --><blockquote class="stylized pull-right" data-shortcode-type="pullquote" data-pull="right"><!-- CONTENT(pullquote)[13] -->“Something is funky on one side of the ledger.”<!-- END-CONTENT(pullquote)[13] --></blockquote><!-- END-BLOCK(pullquote)[13] -->
<p>To those who follow these notifications, the absence of any new Section 702 filings for more than 18 months — a period during which more than 50 terrorism defendants have been charged in U.S. courts and counterterrorism officials have trumpeted the critical need for Section 702 — is suspicious.</p>
<p>“Something is funky on one side of the ledger,” said Neema Singh Guliani, a legislative counsel at the ACLU in Washington, D.C.</p>
<p>If the FBI uses parallel construction to conceal intelligence community information, it would not be the only federal law enforcement agency doing so. In 2013, <a href="https://www.reuters.com/article/us-dea-sod/exclusive-u-s-directs-agents-to-cover-up-program-used-to-investigate-americans-idUSBRE97409R20130805">Reuters</a> obtained documents from the U.S. Drug Enforcement Administration that showed how agents were trained to “recreate” investigative trails to conceal how intelligence intercepts helped to identify criminal targets. Separately, <a href="https://www.documentcloud.org/documents/1011382-responsive-documents.html#document/p2">MuckRock obtained DEA documents</a> that suggested FISA could be used by law enforcement agencies “for prosecutorial purposes in a manner that protects [intelligence community] sources and methods.”</p>
<p>Adding to the suspicion that FBI counterterrorism agents use parallel construction to conceal NSA cooperation is a growing number of filings in terrorism cases in which defense lawyers say circumstantial evidence suggestss some form of mass surveillance program was used against their clients.</p>
<p>In South Florida, the FBI nabbed two brothers, <a href="https://trial-and-terror.theintercept.com/people/67c99def-014d-4a49-8f2b-e7b43a75dcfa">Sheheryar Alam Qazi</a> and <a href="https://trial-and-terror.theintercept.com/people/c793b443-5bcd-453f-8bd6-edd5f49cde5d">Raees Alam Qazi</a>, in an informant-led sting, in which the brothers discussed and planned for a bomb plot in New York. Federal prosecutors notified the Qazis that evidence against them included surveillance authorized under traditional FISA authority. But Sheheryar Alam Qazi’s lawyer questioned whether that evidence might have been first obtained from Section 702 and then re-obtained through traditional FISA. “That argument was what was suspected but no hard evidence to support,” said Daniel L. Ecarius, an assistant federal public defender in Miami. The judge ruled that the government’s FISA notification was legally sufficient.</p>
<!-- BLOCK(photo)[14](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221000px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1000px;"><!-- CONTENT(photo)[14] --><a href="https://trial-and-terror.theintercept.com/"><img loading="lazy" decoding="async" width="1000" height="500" class="aligncenter size-article-large wp-image-144104" src="https://theintercept.com/wp-content/uploads/2017/08/Final-click-trial-and-terror-1504037137.gif" alt="" /></a><!-- END-CONTENT(photo)[14] --></figure><!-- END-BLOCK(photo)[14] -->
<p>Across the country, in California, <a href="https://trial-and-terror.theintercept.com/people/70fa1d0a-f612-4046-8cc9-8d5b570f7e1b">Adam Shafi</a> was accused of providing material support to terrorist groups after the FBI discovered that Shafi had disappeared from his family for two days while they were in Egypt. Shafi later told his family and the FBI that he had traveled to Turkey to see the conditions of Syrian refugee camps, but in an affidavit to support a criminal charge, the FBI disclosed that intercepted communications revealed that Shafi had discussed traveling to Syria to join Nusra Front. Prosecutors in June told Shafi’s lawyer, Galia Amram, that they did not intend to file Section 702 notice in the case. Amram demanded that the judge determine whether Section 702 notice was required, as Qazi&#8217;s lawyer had. The judge in California also ruled that the government’s notification was legally sufficient.</p>
<p>The case of <a href="https://trial-and-terror.theintercept.com/people/5727a7f3-b71f-4cab-9a65-b14321555446">Khalid Ouazzani</a> is even more perplexing. In May 2016 testimony before the Senate Judiciary Committee, Matthew G. Olsen, former director of the National Counterterrorism Center, specifically touted Ouazzani’s arrest as a success story for Section 702 surveillance.</p>
<p>“NSA conducted surveillance under Section 702 of an email address used by a suspected extremist in Yemen,” Olsen said. “This surveillance led NSA to discover a connection between the extremist and an unknown person in Kansas City, Missouri, who was then identified as Khalid Ouazzani. The follow-up investigation revealed that Ouazzani was connected to other Al Qaeda associates in the United States, who were part of an earlier plot to bomb the New York Stock Exchange.”</p>
<p>Ouazzani, a used car and auto parts dealer, pleaded guilty in 2010 to sending $23,500 to Al Qaeda. But court records in his case show that he was not notified of either traditional FISA or Section 702 surveillance.</p>
<p>Explaining why Ouazzani would not be notified of Section 702 surveillance while 10 other terrorism defendants were notified of such surveillance is impossible because the Justice Department has refused to release documents related to its notification policy. The ACLU sued the Justice Department in 2013 under the Freedom of Information Act to release documents related to the policy. The Justice Department still refused to comply, claiming none of its documents contained a “binding” interpretation of the obligation to provide Section 702 notice.</p>
<p>“Without knowing the government’s policy, it’s impossible to even begin to audit whether these notifications are taking place in all cases where they are legally required,” said Andrew Crocker, a staff attorney for the Electronic Frontier Foundation.</p>
<p>The notification concerns surrounding Section 702 do not affect only accused terrorists. While to date only terrorism defendants have received notification of Section 702 evidence, the FBI does not have a policy limiting the use of Section 702 searches to suspected terrorists. The searches are available for all domestic criminal investigations.</p>
<p>“The immense authorities given to security agencies for counterterrorism purposes should be of concern to every American,” said Patel of the Brennan Center. “The government is able to circumvent the Fourth Amendment’s warrant requirement to go poking around into private communications. This allows for targeting for reasons of politics and prejudice.”</p>
<h3>Documents</h3>
<ul>
<li><a href="https://theintercept.com/document/2017/11/28/sso-weekly-brief-25-april-2013-excerpt">SSO Weekly Brief 25 April 2013: Excerpt</a></li>
<li><a href="https://theintercept.com/document/2017/11/28/sidtoday-fisa-teaming-with-the-fbi-in-the-global-war-on-terrorism">SIDtoday: FISA: Teaming with the FBI in the Global War on Terrorism</a></li>
<li><a href="https://theintercept.com/document/2017/11/28/pinwale-transnational-dni-training">PINWALE: Transnational DNI Training</a></li>
<li><a href="https://theintercept.com/document/2017/11/28/re-ehsanul-sadequee-fisa-request">Re: Ehsanul Sadequee FISA Request</a></li>
<li><a href="https://theintercept.com/document/2017/11/28/sidtoday-life-as-the-sid-liaison-to-the-joint-terrorism-task-force-in-nyc">SIDtoday: Life as the SID Liaison to the Joint Terrorism Task Force in NYC</a></li>
<li><a href="https://theintercept.com/document/2017/11/28/sidtoday-the-saudi-assassination-plot-how-it-was-thwarted">SIDtoday: The Saudi Assassination Plot — How It Was Thwarted</a></li>
<li><a href="https://theintercept.com/document/2017/11/28/sidtoday-2009-a-watershed-year-in-the-fight-against-terrorism">SIDtoday: 2009: A Watershed Year in the Fight Against Terrorism</a></li>
<li><a href="https://theintercept.com/document/2017/11/30/sidtoday-perseverance-pays-off-eight-year-sigint-effort-culminates-in-arrest-of-elusive-colombian-terrorist">SIDtoday: Perseverance Pays Off: Eight-Year SIGINT Effort Culminates in the Arrest of Elusive Colombian Terrorist</a></li>
<li><a href="https://theintercept.com/document/2017/11/30/nsa-classification-guide-for-fisa">NSA Classification Guide for FISA</a></li>
</ul>
<p class="caption">Top photo: A security officer stands outside of U.S. Federal Court House on the morning the court begins jury selection for the Abu Hamza terrorism trial on April 14, 2014 in New York City.</p>
<p>The post <a href="https://theintercept.com/2017/11/30/nsa-surveillance-fisa-section-702/">NSA Secretly Helped Convict Defendants in U.S. Courts, Classified Documents Reveal</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2017/11/30/nsa-surveillance-fisa-section-702/feed/</wfw:commentRss>
                <slash:comments>63</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2017/11/Court-house-1511379244.jpg?fit=3000%2C1500' width='3000' height='1500' /><post-id xmlns="com-wordpress:feed-additions:1">159252</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/11/FISA16-1511987843.jpg?w=1200" />
		<media:content url="https://theintercept.com/wp-content/uploads/2017/11/FISA16-1511987843.jpg?w=1200" medium="image" />
		<media:content url="https://theintercept.com/wp-content/uploads/2017/11/Mohammed-Ali-Al-Moayad--1511371265.jpg?fit=2500%2C1686" medium="image">
			<media:title type="html">Yemeni Religious Endowments and Guidance</media:title>
			<media:description type="html">Yemeni Religious Endowments and Guidance Minister Hamud al-Hattar walks past pictures of Yemeni cleric Sheikh Mohammed Ali al-Moayad (L) and his assistant and bodyguard Mohammed Zayed (R) as he arrives to greet them at the airport in Sanaa on August 11, 2009 following their deportation from the US.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/11/Mohammed-Ali-Al-Moayad--1511371265.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/11/Najibullah-Zazi-1511371271.jpg?fit=3000%2C2019" medium="image">
			<media:title type="html">Terror Suspect Questioned For Second Day In Denver</media:title>
			<media:description type="html">Najibullah Zazi (R), 24, arrives at the Byron G. Rogers Federal Building in downtown with his attorney Art Folsom (not pictured) September 17, 2009 in Denver, Colorado.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/11/Najibullah-Zazi-1511371271.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/08/Final-click-trial-and-terror-1504037137.gif?fit=1000%2C500" medium="image">
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/08/Final-click-trial-and-terror-1504037137.gif?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
        
            <item>
                <title><![CDATA[YouTube and Facebook Are Removing Evidence of Atrocities, Jeopardizing Cases Against War Criminals]]></title>
                <link>https://theintercept.com/2017/11/02/war-crimes-youtube-facebook-syria-rohingya/</link>
                <comments>https://theintercept.com/2017/11/02/war-crimes-youtube-facebook-syria-rohingya/#comments</comments>
                <pubDate>Thu, 02 Nov 2017 18:55:18 +0000</pubDate>
                                    <dc:creator><![CDATA[Avi Asher-Schapiro]]></dc:creator>
                                		<category><![CDATA[Uncategorized]]></category>

                <guid isPermaLink="false">https://theintercept.com/?p=155556</guid>
                                    <description><![CDATA[<p>After claiming to be forces for accountability in the Arab Spring, social media networks these days routinely remove war crimes evidence, human rights groups say.</p>
<p>The post <a href="https://theintercept.com/2017/11/02/war-crimes-youtube-facebook-syria-rohingya/">YouTube and Facebook Are Removing Evidence of Atrocities, Jeopardizing Cases Against War Criminals</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></description>
                                        <content:encoded><![CDATA[<p><u>Abdulsalam was in</u> the middle of Friday prayer at his neighborhood mosque in al-Bab, Aleppo, when he heard a crash — a nearby bakery had just disintegrated under the force of a barrel bomb, a deadly metal container filled with shrapnel and explosives, favored by the Syrian military.</p>
<p>Scanning the sky he saw the hovering chopper that had dropped the weapon. He tried to snap photos as it loomed above the rubble, but the images looked fuzzy. Abdulsalam hopped on the back of a passing ambulance and was among the first on the scene. He trained his camera on the smoldering facade of a bakery, panned to series of blasted-apart food stalls, and then settled his lens on mangled bodies. He kept snapping photos in rapid succession, until he spotted his cousin amid the carnage. Holstering his camera, Abdulsalam decided to join the rescue effort and helped his relative to a nearby hospital.</p>
<p>It was January 2014, almost two years after the Syrian army opened fire on protesters in Abdulsalam’s hometown of al-Bab, in the north of Aleppo province, bringing the country’s raging war to a farming community that had, until that point, remained largely <a href="https://www.washingtonpost.com/world/syrian-rebels-seize-rural-territory-while-assad-forces-focus-on-major-cities/2012/07/30/gJQA13UbLX_story.html?utm_term=.33a5c4ba1b72">untouched</a>. Since then, Abdulsalam had worked with a group of local media activists to publicize the human toll of the civil war as rebel fighters established a foothold in al-Bab and the Assad regime pounded the town from above.</p>
<p>Within hours of the attack that injured his cousin, Abdulsalam uploaded his photos to Facebook. He thought it was the best way to simultaneously preserve the images — he didn’t know when his camera or computer could be destroyed — and get them out to the world. “It was a particularly horrific bombing,” he told me recently. There had been a pause in the fighting that week, and families who’d spent months cowering inside had just emerged to stroll through an outdoor bazaar near the mosque.</p>
<p>Seven months later, Abdulsalam got an automated email from Facebook notifying him that the images had been removed. Other users had complained that his photos were too gory. By the time he got the email, Abdulsalam’s other copies of the pictures were gone; his hard drive had been burned, along with his small office, when the Islamic State stormed al-Bab and Abdulsalam fled across the border to Turkey.</p>
<p>There’s good reason to believe Abdulsalam’s photos could have been used to address the atrocities he had witnessed. Since the beginning of the Syrian Civil War, investigators with Human Rights Watch have been making regular trips to Aleppo to <a href="https://www.hrw.org/news/2012/08/30/syria-government-attacking-bread-lines">document</a> potential war crimes, including a disturbing pattern of Syrian helicopters blowing up bakeries with barrel bombs. By the time Abdulsalam snapped his pictures, the Islamic State had begun to move into the city, and HRW could no longer collect on-the-ground evidence. Ole Solvang, an HRW researcher who visited Aleppo more than a dozen times, in part to research the bakery attacks, said of Abdulsalam’s photos, which he never saw, “If there is ever a trial, this is the stuff that could become important evidence.”</p>
<!-- BLOCK(photo)[0](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[0] --> <a href="https://theintercept.com/wp-content/uploads/2017/11/GettyImages-466335491-1509571610.jpg"><img loading="lazy" decoding="async" class="aligncenter wp-image-155562 size-large" src="https://theintercept.com/wp-content/uploads/2017/11/GettyImages-466335491-1509571610.jpg?w=1024" alt="Civilians react following a reported airstrike on the Tariq al-Bab district of the northern Syrian city of Aleppo on February 1, 2014. Syrian government and opposition delegations leave 10 days of peace talks with few results and a follow-up meeting uncertain, but analysts and negotiators say the discussions are an important beginning. AFP PHOTO/Mohammed Al-khatieb        (Photo credit should read MOHAMMED AL-KHATIEB/AFP/Getty Images)" width="1024" height="686" srcset="https://theintercept.com/wp-content/uploads/2017/11/GettyImages-466335491-1509571610.jpg?w=1440 1440w, https://theintercept.com/wp-content/uploads/2017/11/GettyImages-466335491-1509571610.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2017/11/GettyImages-466335491-1509571610.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2017/11/GettyImages-466335491-1509571610.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2017/11/GettyImages-466335491-1509571610.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2017/11/GettyImages-466335491-1509571610.jpg?w=1000 1000w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a>
<figcaption class="caption source pullright">Civilians react following a reported airstrike on the Tariq al-Bab district of the northern Syrian city of Aleppo on February 1, 2014.<br/>Photo: Mohammed Al-Khatieb/AFP/Getty Images</figcaption><!-- END-CONTENT(photo)[0] --></figure><!-- END-BLOCK(photo)[0] -->
<p>The disappearance of Abdusalam’s photos are part of a pattern that’s causing a quiet panic among human rights groups and war crimes investigators. Social media companies can, and do, remove content with little regard for its evidentiary value. First-hand accounts of extrajudicial killings, ethnic cleansing, and the targeting of civilians by armies can disappear with little warning, sometimes before investigators notice. When groups do realize potential evidence has been erased, recovering it can be a kafkaesque ordeal. Facing a variety of pressures — to safeguard user privacy, neuter extremist propaganda, curb harassment and, most recently, combat the spread of so-called fake news — social media companies have over and over again chosen to ignore, and, at times, disrupt the work of human rights groups scrambling to build cases against war criminals.</p>
<p>“It’s something that keeps me awake at night,” says Julian Nicholls, a senior trial lawyer at the International Criminal Court,  where he’s responsible for prosecuting cases against war criminals, “the idea that there&#8217;s a video or photo out there that I could use, but before we identify it or preserve it, it disappears.”</p>
<p>Worries over disappearing evidence are not just theoretical. This past summer, YouTube rolled out a new artificial intelligence system designed to identify violent content that may be extremist propaganda or disturbing to viewers. Almost overnight, it <a href="https://www.cbsnews.com/news/youtube-videos-syria-war-activists-human-rights-violations-war-crimes/">shut</a> down 900 groups and individuals documenting the civil war in Syria. That included a channel run by Bellingcat, a reputable U.K.-based organization devoted to analyzing images coming out of conflict zones including Syria, Ukraine, and Libya. YouTube also took down content from the group AirWars, which tracks the toll of U.S. airstrikes in Iraq and Syria. Countless media organizations run from Syria were also shut down, including the Idlib Media Center, one of the few groups producing videos from the last Syrian province controlled by rebels. Meanwhile, in September, Facebook began removing photos and images <a href="https://www.theguardian.com/technology/2017/sep/20/facebook-rohingya-muslims-myanmar">documenting</a> ethnic cleansing and torture of the Rohingya ethnic minority at the hands of the Myanmar government. Like the images taken by Abdulsalam, other users had flagged the Rohingya images as disturbing, and Facebook agreed.</p>
<p>The takedowns, and the murky processes that led to them, represent a dramatic shift from the heady days of the Arab Spring, when protesters posted images of their governments firing on them, and social media chiefs promoted their platforms as nearly limitless tools for reform. “Anyone with a mobile handset and access to the Internet will be able to play a part in promoting accountability,” Google Executive Chair Eric Schmidt wrote in his 2013 book, &#8220;The New Digital Age<i>.&#8221;</i>  Around the same time, Facebook CEO Mark Zuckerberg declared, in a 10-page <a href="https://scontent-lga3-1.xx.fbcdn.net/v/t39.2365-6/12057105_1001874746531417_622371037_n.pdf?oh=fa8964ea8b698de85da26bfc69971873&amp;oe=5A659027">paper</a> about wiring the world for internet: “I believe connectivity is a human right.”</p>
<p>“They could have said: ‘Don’t use your platforms for this,’” said Alexa Koenig, executive director at the Human Rights Center at UC Berkeley. “But they actually tried to get these people use their platforms [for it] — they held themselves up as arbiters of social good, and at that point of creating dependency, I would argue they acquired a heightened responsibility.”</p>
<p>“They had grandiose ideas,” added Keith Hiatt, a former software engineer turned human rights activist who’s served as a sort of intermediary for the tech industry and the human rights community. He is now vice president of Human Rights Programs at the NGO, Benetech, and serves on the Technology Advisory Board for the ICC, a group of experts trying to bridge the gap between investigators and technology. “The big story these companies told, justifying the massive freedom that they had to operate, was that their technologies would lead to openness — and openness will lead to democracy and human freedom,” he said.</p>
<p>Now that their own behavior is at issue, social media companies seem oblivious to the stakes, said Mohammad Al Abdallah, executive director of the Syrian Justice and Accountability Centre, an NGO backed by more 30 governments, including the U.S., which works to preserve social media evidence of atrocities.</p>
<!-- BLOCK(pullquote)[1](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22none%22%7D) --><blockquote class="stylized pull-none" data-shortcode-type="pullquote" data-pull="none"><!-- CONTENT(pullquote)[1] -->“They just don’t appreciate what’s going on on their platforms,” he said. “They don’t take this as seriously as they should.”<!-- END-CONTENT(pullquote)[1] --></blockquote><!-- END-BLOCK(pullquote)[1] -->
<p>Facebook would not answer specific questions about war crimes evidence. A spokesperson, who would not agree to sit for an interview or be named, said Facebook tried to be flexible and allow violent content to live on its platform when that content had some social or documentary value, and pointed to a year-old <a href="https://newsroom.fb.com/news/2016/10/input-from-community-and-partners-on-our-community-standards/">blog post</a> in which the company said it would be &#8220;<span class="s1">working closely with experts, publishers, journalists, photographers, law enforcement officials and safety advocates about how to do better when it comes to the kinds of items we allow</span>.&#8221;</p>
<p>YouTube defended the way it deals with war crimes evidence and its relationship with the human rights groups who collect that evidence. &#8220;We are committed to ensuring human rights activists and citizen journalists have a voice on YouTube and are proud of how our service has been used to expose what is happening across the globe,&#8221; Juniper Downs, YouTube’s director of public policy, said. &#8220;We collaborate across civil society on many issues, including working with human rights groups to better understand the needs of content creators on the ground. Their expertise helps us make smarter policies and enforcement decisions, and we value the collaboration.&#8221;</p>
<p>Social media evidence is increasingly used to <a href="https://www.hrw.org/report/2017/10/03/these-are-crimes-we-are-fleeing/justice-syria-swedish-and-german-courts">build</a> cases against perpetrators of abuses by human rights organizations, by European courts that have “universal jurisdiction” and can bring war crimes charges, and by United Nations investigators. Over the summer, the ICC issued an arrest <a href="http://opiniojuris.org/2017/08/17/and-so-it-begins-social-media-evidence-in-an-icc-arrest-warrant/">warrant</a> for a Libyan commander accused of extrajudicial killings on the battlefield, basing the warrant, in part, on videos posted to Facebook. (One of the prosecutors on that case is Nicholls, the ICC lawyer who frets about atrocity evidence disappearing on social media.) Last year in Germany, an ISIS fighter was <a href="http://foreignpolicy.com/2016/07/12/german-jihadist-gets-two-years-in-jail-for-posing-with-severed-heads/">found</a> guilty of posing with decapitated prisoners based in part on evidence found on Facebook. This year, in Sweden, Syrian <a href="https://www.hrw.org/news/2017/09/15/move-restore-dignity-syrias-victims">regime</a> and rebel fighters were successfully prosecuted for war crimes using evidence from both Facebook and YouTube. In total, <a href="https://www.nytimes.com/2017/10/03/world/middleeast/syria-war-crime.html">there are 30</a> ongoing war crimes investigations in Swedish and German courts connected to crimes committed in Syria and Iraq. On the other side of the world, the government of Myanmar has barred NGOs and aid agencies from entering northern parts of the country, where human rights groups say a genocide is taking place against the Rohingya population. Human rights workers are often reliant on social media evidence to document the <a href="http://www.bbc.com/news/world-asia-38505228">atrocities</a>. At the same time, the U.N. has launched an independent investigation into the Syria conflict — known as the International, Impartial and Independent Mechanism — which has a specific mandate to collect evidence of war crimes in Syria, much of which is housed on social media platforms.</p>
<!-- BLOCK(photo)[2](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[2] --> <a href="https://theintercept.com/wp-content/uploads/2017/11/GettyImages-612997072-1509572385.jpg"><img loading="lazy" decoding="async" width="1440" height="960" class="aligncenter size-large wp-image-155569" src="https://theintercept.com/wp-content/uploads/2017/11/GettyImages-612997072-1509572385.jpg" alt="Mark Zuckerberg, chief executive officer and founder of Facebook Inc., speaks during the Oculus Connect 3 event in San Jose, California, U.S., on Thursday, Oct. 6, 2016. Facebook Inc. is working on a new virtual reality product that is more advanced than its Samsung Gear VR, but doesn't require connection to a personal computer, like the Oculus Rift does. Photographer: David Paul Morris/Bloomberg via Getty Images" srcset="https://theintercept.com/wp-content/uploads/2017/11/GettyImages-612997072-1509572385.jpg?w=1440 1440w, https://theintercept.com/wp-content/uploads/2017/11/GettyImages-612997072-1509572385.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2017/11/GettyImages-612997072-1509572385.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2017/11/GettyImages-612997072-1509572385.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2017/11/GettyImages-612997072-1509572385.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2017/11/GettyImages-612997072-1509572385.jpg?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">Mark Zuckerberg, chief executive officer and founder of Facebook, speaks during the Oculus Connect 3 event in San Jose, Calif., on Thursday, Oct. 6, 2016.<br/>Photo: David Paul Morris/Bloomberg/Getty Images</figcaption><!-- END-CONTENT(photo)[2] --></figure><!-- END-BLOCK(photo)[2] -->
<p><u>For some who</u> post on social media to document ongoing atrocities, the takedowns seem, at best, a destruction of evidence — and, at worst, complicity in atrocities. “Three years of documentation, just gone, in a moment,” Obayda Abo-Al Bara, a manager at the Idlib Media Center, said. Mohammad Anwar, one of the Rohingya activists whose posts were deleted by Facebook, told The Intercept that “I did feel that Facebook was colluding with the Myanmar regime in the Rohingya genocide.”</p>
<p>Facebook declined to address that statement directly, but said through a spokesperson that it is now making exceptions to its community standards for that conflict, working with NGOs, and conceded some mistakes in its handling of posts from Myanmar after they were <a href="https://www.thedailybeast.com/exclusive-rohingya-activists-say-facebook-silences-them">brought to light by the Daily Beast in September</a>.</p>
<p>In the tribunals of the future, investigators imagine a constellation of evidence — social media content will be introduced alongside traditional materials, such as eyewitness testimony or official documents to build stronger, more durable, cases against war criminals. Social media will never replace flesh-and-blood witnesses or old-fashioned forensics. But such evidence is clearly growing in importance — and is uniquely concentrated on the servers of Silicon Valley corporations.</p>
<!-- BLOCK(pullquote)[3](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22none%22%7D) --><blockquote class="stylized pull-none" data-shortcode-type="pullquote" data-pull="none"><!-- CONTENT(pullquote)[3] -->“These platforms are now essentially privately owned evidence lockers,” said Christoph Koettl, a senior analyst at Amnesty International.<!-- END-CONTENT(pullquote)[3] --></blockquote><!-- END-BLOCK(pullquote)[3] -->
<p>“But they are not in the business of being a human rights evidence locker; that work is not included in their business model.”</p>
<p>Koettl, who is also the founder of Citizen Evidence Lab, a group that trains human rights researchers to use social media to gather evidence of atrocities, recently received a YouTube link from a source who said it depicted an extrajudicial killing in Nigeria. By the time he clicked the link, the material had been taken down. When he contacted the company to ask for it to be restored, he said, they told him it wasn’t possible. A spokesperson at YouTube told The Intercept that, in such a scenario, the company has to respect the wishes of the video’s original poster — even if a human rights group like Amnesty flags the media as potential war crimes evidence.</p>
<p>Cases like the Nigeria video place social media companies in a difficult position, trying to strike a balance between the thirst for evidence of atrocities and privacy guarantees made to users. Nonprofit rights groups see less noble priorities at play, as well. Koenig has worked for years to help forge cooperation between human rights crusaders and the major social media companies. In 2014, she helped convene a meeting between investigators at the ICC and major tech companies in San Francisco; Google sent a representative, but Facebook pulled out last minute. (Koenig was able to debrief Facebook the week after at the 2014 meeting of RightsCon, an annual digital human rights conference.) This was the first meeting of its kind, she said, and the differences between the two camps were laid bare. “When you’re talking about privately held companies, with loyalty to their shareholders, they think on quarterly timelines and about maximizing profits,” she added.  “With war crimes, we’re talking about a totally different set of priorities, and a timeline of five years minimum.”</p>
<p>Silicon Valley’s attitude is not the only obstacle to deploying social media content in war crimes proceedings. Courts and prosecutors are still hammering out how the evidence can be used, how much weight to give it, and how to make sure defense attorneys can fairly rebut it. There’s the perpetual question of how to distinguish real from fake: Is a YouTube video of an execution authentic or staged? To address such concerns, investigators and activists are racing to standardize how they archive social media evidence, to make it searchable and easier to verify. One priority is sifting through hundreds of thousands of videos and photos to separate so-called lead evidence, content that indicates a crime has taken place, from “linkage evidence,” content that connects perpetrators to that crime.</p>
<p>Beyond the question of how to handle evidence is the challenge of obtaining it in the first place. Courts in European countries where war crimes prosecutions often take place can only submit warrants to American social media companies using cumbersome processes that operate via mutual legal assistance treaties, or MLATs, between their nations and the U.S. Through such channels, it can take years for the data to make its way into the hands of prosecutors. On top of that, the ICC is blocked from getting any social media data (or other information) from U.S. companies, thanks to the American Service-Members&#8217; Protection Act, a law signed by former President George W. Bush in 2002 that shields U.S. soldiers from war crimes prosecutions and also prevents U.S. companies from turning over evidence to the ICC.</p>
<p>Of course, information shared openly on social networks is fair game. And it’s hard to overstate the potency of such evidence — or the consequences of its deletion. Take the trial of Haisam Omar Sakhanh last February. A former Syrian rebel fighter, he sought asylum in Sweden and was then investigated by Swedish authorities for allegedly withholding details of his past. During that investigation, his role in an extrajudicial killing on the Syrian battlefield in 2012 came to light, and he was charged with a violation of international law. He was subsequently convicted and sentenced to life in prison.</p>
<p>Social media evidence proved crucial, the chief prosecutor on the case, Henrik Attorps, told The Intercept. A video <a href="https://www.nytimes.com/video/multimedia/100000002421671/syrian-rebels-execute-7-soldiers.html">published</a> by the New York Times in 2013 showed Sakhanh with an anti-Assad militia, known as the Suleiman Soldiers, executing bound prisoners after a battle in the northern province of Idlib.</p>
<p>Sakhanh claimed that those prisoners had been sentenced to death in a lengthy trial. Attorps was able to use social media to eviscerate that defense. He started Googling Sakhanh’s name and found videos posted on YouTube showing Sakhanh participating in the Idlib battle. He later subpoenaed YouTube for precise times that those videos were posted. He also subpoenaed Facebook for data from a deleted account of the Suleiman Soldiers; this included time-stamped announcements of the group’s attack on Syrian soldiers. Attorps then built a timeline showing that between the announcement on Facebook by the Suleiman Soldiers, the battle itself, and the execution, no more than 48 hours could have elapsed.</p>
<p>If YouTube had removed videos showing Sakhanh participating in that Idlib battle, Attorps could very well have failed to convict. But, the prosecutors still had mixed feeling about social media companies taking down disturbing images that could also be war crimes evidence. “As a prosecutor in this field of law, I’m worried,” he admitted. “But as a citizen, I’m a bit relieved.” Such images and video, Attorps said, can be disturbing for the general public and can serve as propaganda for extremist groups like ISIS.</p>
<p>Social media companies are under tremendous pressure to deny these extremist groups a safe haven for their propaganda. In September, U.K. Prime Minister Theresa May demanded that such firms come up with a way to remove extremist content within two hours of its posting. This presents a real dilemma, an official at YouTube told The Intercept: one person&#8217;s extremist propaganda is another person&#8217;s war-crime evidence.</p>
<!-- BLOCK(photo)[4](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22bleed%22%2C%22bleed%22%3A%22full%22%2C%22width%22%3A%22auto%22%7D) --><figure class="img-wrap align-bleed full-bleed width-auto" style="width: auto;"><!-- CONTENT(photo)[4] --> <a href="https://theintercept.com/wp-content/uploads/2017/11/GettyImages-134281504-1509572119.jpg"><img loading="lazy" decoding="async" width="3000" height="2001" class="aligncenter size-large wp-image-155564" src="https://theintercept.com/wp-content/uploads/2017/11/GettyImages-134281504-1509572119.jpg" alt="CAIRO, EGYPT - NOVEMBER 23:  A youth films the aftermath of a tear gas volley fired by police on protestors in Muhammed Mahmoud Street near Tahrir Square on November 23, 2011 in Cairo, Egypt. Thousands of Egyptians are continuing to occupy Tahrir Square after four days of clashes with security forces despite a promise from military leaders to bring forward Presidential elections.  (Photo by Peter Macdiarmid/Getty Images)" srcset="https://theintercept.com/wp-content/uploads/2017/11/GettyImages-134281504-1509572119.jpg?w=3000 3000w, https://theintercept.com/wp-content/uploads/2017/11/GettyImages-134281504-1509572119.jpg?w=300 300w, https://theintercept.com/wp-content/uploads/2017/11/GettyImages-134281504-1509572119.jpg?w=768 768w, https://theintercept.com/wp-content/uploads/2017/11/GettyImages-134281504-1509572119.jpg?w=1024 1024w, https://theintercept.com/wp-content/uploads/2017/11/GettyImages-134281504-1509572119.jpg?w=1536 1536w, https://theintercept.com/wp-content/uploads/2017/11/GettyImages-134281504-1509572119.jpg?w=2048 2048w, https://theintercept.com/wp-content/uploads/2017/11/GettyImages-134281504-1509572119.jpg?w=540 540w, https://theintercept.com/wp-content/uploads/2017/11/GettyImages-134281504-1509572119.jpg?w=1000 1000w, https://theintercept.com/wp-content/uploads/2017/11/GettyImages-134281504-1509572119.jpg?w=2400 2400w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<figcaption class="caption source pullright">A youth films the aftermath of a tear gas volley fired by police on protesters in Muhammad Mahmoud Street near Tahrir Square on Nov. 23, 2011 in Cairo.<br/>Photo: Peter Macdiarmid/Getty Images</figcaption><!-- END-CONTENT(photo)[4] --></figure><!-- END-BLOCK(photo)[4] -->
<p><u>“A video of</u> a terrorist attack may be informative news reporting if uploaded by a news outlet or citizen journalist,” Downs of YouTube said. “But that same video clip can be glorification of violence if uploaded in a different context by a different user.”</p>
<p>Cognizant of these tensions, human rights groups are building ways to preserve potential war crimes evidence outside of the purview of social media companies — a sort of emergent, anarchic alternative architecture for media collection. That effort is centered on the Syrian Civil War; the group Syrian Archive, for example, is building a parallel evidence locker, downloading and organizing thousands of hours of video, <a href="https://apnews.com/d9f1c4f1bf20445ab06cbdff566a2b70">with</a> a team of six and a budget of $96,000. Researchers are also coming up with new ways to amass atrocity evidence in conflicts in other regions, including sub-Saharan Africa, Eastern Europe, and Asia.</p>
<p>“NGOs are doing the work that companies should do,” said Dia Kayyali, a tech and advocacy program manager at Witness, a group that also maintains a network of contacts in conflict zones documenting human rights abuses on video. “They should be paying people to be in contact with these groups and have relationships with them.”</p>
<p>Of course, the human rights groups, scouring social media for evidence, have longstanding relationships with the platforms — especially YouTube. In 2012, YouTube partnered with Witness to release a tool that allows activists to blur the faces in a video so investigators could collect testimony from anonymous witnesses. More recently, YouTube worked with Eliot Higgins, founder of Bellingcat, the U.K. NGO stung by YouTube’s AI this summer, to develop a <a href="https://www.wired.com/2016/04/googles-youtube-montage-crowdsources-war-reporting/">tool</a> called “Montage” to help investigators crowdsource analysis of conflict videos. Facebook, human rights activists say, has been less open to such collaborations. “Facebook has been a mess forever,” Higgins told The Intercept. He points to one egregious case: In 2013, after the Syrian regime launched a chemical attack on the civilian population of Damascus, Higgins <a href="http://brown-moses.blogspot.co.uk/2014/02/how-facebook-is-destroying-history.html">said</a> that 80 percent of the firsthand reports of the attack, including videos and images, posted to Facebook were erased from the platform. (Facebook declined to answer a question about Higgins&#8217;s claim.)</p>
<p>Even human rights groups with strong ties to social media companies often feel buffeted by the whims of the platforms. Rules about what can and can’t be shared can change without much warning. In 2014, for example, YouTube decided to change its Application Program Interface, or API, essentially the language that outside organizations rely on to create software to extract data from, or otherwise interact with, the platform. The Syria Justice and Accountability Centre, a nonprofit group that has collected hundreds of thousands of videos of potential war crimes in Syria, was caught totally unaware and its system crashed. This summer, when YouTube introduced its new AI, channels feeding SJAC again disappeared.</p>
<p>“These companies don’t consult us or even give us educational guidance about how to post to not avoid things being blocked,” Abdallah, the group&#8217;s executive director, told The Intercept.</p>
<p>Even Witness was caught off guard by the company’s AI rollout. Many of the groups they partner with in conflict zones found their content removed.</p>
<p>“Who designs this AI? What was their understanding of these conflicts? We don&#8217;t know,” said Kayyali. “Huge companies need to recognize that every change they make &#8230; will have an effect on human rights users,” Kayyali added. “Instead of working to fix issues after policies and tools have already been instituted, it just makes sense to reach out to stakeholders.”</p>
<p><!-- BLOCK(photo)[5](%7B%22componentName%22%3A%22PHOTO%22%2C%22entityType%22%3A%22RESOURCE%22%7D)(%7B%22scroll%22%3Afalse%2C%22align%22%3A%22center%22%2C%22width%22%3A%221024px%22%7D) --><figure class="img-wrap align-center  width-fixed" style="width: 1024px;"><!-- CONTENT(photo)[5] --> <a href="https://theintercept.com/wp-content/uploads/2017/11/Screen-Shot-2017-11-01-at-10.46.22-AM-1509571866.png"><img loading="lazy" decoding="async" width="1375" height="1080" class="aligncenter size-large wp-image-155563" src="https://theintercept.com/wp-content/uploads/2017/11/Screen-Shot-2017-11-01-at-10.46.22-AM-1509571866.png" alt="Screen-Shot-2017-11-01-at-10.46.22-AM-1509571866" srcset="https://theintercept.com/wp-content/uploads/2017/11/Screen-Shot-2017-11-01-at-10.46.22-AM-1509571866.png?w=1375 1375w, https://theintercept.com/wp-content/uploads/2017/11/Screen-Shot-2017-11-01-at-10.46.22-AM-1509571866.png?w=300 300w, https://theintercept.com/wp-content/uploads/2017/11/Screen-Shot-2017-11-01-at-10.46.22-AM-1509571866.png?w=768 768w, https://theintercept.com/wp-content/uploads/2017/11/Screen-Shot-2017-11-01-at-10.46.22-AM-1509571866.png?w=1024 1024w, https://theintercept.com/wp-content/uploads/2017/11/Screen-Shot-2017-11-01-at-10.46.22-AM-1509571866.png?w=540 540w, https://theintercept.com/wp-content/uploads/2017/11/Screen-Shot-2017-11-01-at-10.46.22-AM-1509571866.png?w=1000 1000w" sizes="auto, (max-width: 1200px) 100vw, 1200px" /></a>
<p class="caption">Screenshot of Syrian Archive website.</p>
<!-- END-CONTENT(photo)[5] --></figure><!-- END-BLOCK(photo)[5] -->At times, activists said, it seems that the social media companies are just not tracking the issue closely. For example, last summer, when Syrian Archive spoke to YouTube about the urgency of restoring some of the videos the company’s AI had removed, YouTube officials didn’t seem aware that the International Criminal Court had just issued a landmark warrant citing social media evidence. “I don’t think they are intentionally destroying evidence, there’s just a real lack of understanding of what this stuff is,” said Jeff Deutch, a researcher at Syrian Archive and a fellow at the Center for Internet and Human Rights.</p>
<p>In August, when YouTube’s new AI removed thousands of videos associated with human rights and war crimes research, it caused a minor scandal. Higgins reamed the company to his 60,000 Twitter followers: “So far, YouTube&#8217;s attempts to remove ISIS and Jihadi content has proven to be a total flop, loads of false positives,” he wrote. YouTube has worked closely with human rights groups to restore videos and channels that its AI took down. A company spokesperson admitted that the rollout was executed poorly, and human rights groups should have been more in the loop.</p>
<p>“Inevitably, both humans and machines make mistakes. We use these errors to retrain our teams and our technology,” Downs, the YouTube spokesperson said. “We are also working on ways to educate those who share video meant to document or expose violence on how to add necessary context, so our reviewers can distinguish their videos from more malicious uploads.”</p>
<p>But more than three months after the botched AI rollout, human rights groups are still reeling:</p>
<!-- BLOCK(pullquote)[6](%7B%22componentName%22%3A%22PULLQUOTE%22%2C%22entityType%22%3A%22SHORTCODE%22%2C%22optional%22%3Atrue%7D)(%7B%22pull%22%3A%22none%22%7D) --><blockquote class="stylized pull-none" data-shortcode-type="pullquote" data-pull="none"><!-- CONTENT(pullquote)[6] -->“All our efforts have shifted to deal with YouTube thing,” said Hadi al-Khatib, the co-founder of the Syrian Archive.<!-- END-CONTENT(pullquote)[6] --></blockquote><!-- END-BLOCK(pullquote)[6] -->
<p>He used to spend his days archiving potential war crimes evidence; now he’s engaged in a Sisyphean battle with YouTube’s algorithm. “We spend all our time helping Syrian media organizations whose content is deleted — we take their accounts, we check them out, make sure they are doing good work, then we we send to YouTube,” he explained. “A few days later, it’s deleted again.” This couldn’t be happening at a worse time, Khatib says. The Syrian regime and its allies are quickly retaking large swaths of Syria from ailing rebel groups and Islamic extremists. “They are demolishing all  types of evidence on purpose — some of what we collect is the the only thing that is left indicating that a crime took place,” he said. In mid-October, for example, YouTube removed bloody video evidence of a Russian airstrike that Khatib said targeted civilians in the Idlib countryside. “This was quite crucial,” he says. “It was a violation of international law and, until now, we can’t get it restored.”</p>
<p>This ad-hoc process for restoring videos raises a lot of questions. Groups and individuals in Europe and the U.S. who have ties to the social media companies have a shot at getting their content back. But for others it’s not within reach: Talal Kharrat, a manager with the Turkish-based Qasioun News Agency, said his organization draws on 80 correspondents, some of them undercover, spread across Syria. Since 2014, he says, nearly 6,000 videos from his agency have been removed by YouTube. Sometimes the content is restored, sometimes not. He’s tried over and over again, he said, to get in touch with someone at YouTube using the “help” button on his personal account.  “I receive no reply,” he told The Intercept. “Please separate between people like us, working in a conflict zone, putting our lives in danger, and someone who’s posting violent images from a normal place, or some extremist,” he said.</p>
<p>The Idlib Media Center was only able to restore some of its videos after it appealed to the Syrian Archive. And Ro Nay San Lwin, a Rohingya activist whose account was shut down and later restored by Facebook in September, says he was able to get in touch with someone at the company because a friend knew someone there. “It isn’t so easy to reach them,” he told The Intercept</p>
<p>This all makes Alexa Koenig, the human rights expert at UC Berkeley, nervous: “We have huge equity concerns: What stories are we losing? Whose voices are we not hearing? Who’s in a dire situation who we don’t know about?”</p>
<p>Abdulsalam, the Syrian photographer, is now in Turkey and quite sympathetic to the dilemma a company like YouTube faces.  He’s also thankful to the platform and credits it with helping “spread the voice” of Syrians under duress. “I also understand why they don’t want bloody content,” he said in a recent phone call. “All I’d ask is that they deal with this issue with more integrity.”</p>
<p><i>Abdulsattar Abogoda and Rajaai Bourhan contributed to this report.</i></p>
<p>The post <a href="https://theintercept.com/2017/11/02/war-crimes-youtube-facebook-syria-rohingya/">YouTube and Facebook Are Removing Evidence of Atrocities, Jeopardizing Cases Against War Criminals</a> appeared first on <a href="https://theintercept.com">The Intercept</a>.</p>
]]></content:encoded>
                                <wfw:commentRss>https://theintercept.com/2017/11/02/war-crimes-youtube-facebook-syria-rohingya/feed/</wfw:commentRss>
                <slash:comments>67</slash:comments>
                <media:content url='https://theintercept.com/wp-content/uploads/2017/11/social-network-war-crime-nicolas-ortega-1509571251.gif?fit=1439%2C720' width='1439' height='720' /><post-id xmlns="com-wordpress:feed-additions:1">155556</post-id>
		<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/11/GettyImages-466335491-1509571610.jpg?w=440&amp;h=440&amp;crop=1" />
		<media:content url="https://theintercept.com/wp-content/uploads/2017/11/GettyImages-466335491-1509571610.jpg?fit=1440%2C964" medium="image">
			<media:title type="html">SYRIA-CONFLICT</media:title>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/11/GettyImages-466335491-1509571610.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/11/GettyImages-612997072-1509572385.jpg?fit=1440%2C960" medium="image">
			<media:title type="html">Inside The Oculus Connect 3 Event</media:title>
			<media:description type="html">Mark Zuckerberg, chief executive officer and founder of Facebook Inc., speaks during the Oculus Connect 3 event in San Jose, California, U.S., on Thursday, Oct. 6, 2016.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/11/GettyImages-612997072-1509572385.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/11/GettyImages-134281504-1509572119.jpg?fit=3000%2C2001" medium="image">
			<media:title type="html">Protesters Gather For Tahrir Square Rally</media:title>
			<media:description type="html">A youth films the aftermath of a tear gas volley fired by police on protestors in Muhammed Mahmoud Street near Tahrir Square on November 23, 2011 in Cairo, Egypt.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/11/GettyImages-134281504-1509572119.jpg?w=440&amp;h=440&amp;crop=1" />
		</media:content>
		<media:content url="https://theintercept.com/wp-content/uploads/2017/11/Screen-Shot-2017-11-01-at-10.46.22-AM-1509571866.png?fit=1375%2C1080" medium="image">
			<media:title type="html">Screen-Shot-2017-11-01-at-10.46.22-AM-1509571866</media:title>
			<media:description type="html">Screenshot of Syrian Archieve website.</media:description>
			<media:thumbnail url="https://theintercept.com/wp-content/uploads/2017/11/Screen-Shot-2017-11-01-at-10.46.22-AM-1509571866.png?w=440&amp;h=440&amp;crop=1" />
		</media:content>
            </item>
            </channel>
</rss>
