
Beijing – During the last quarter of the American Technology Society, they have largely designed and built a Chinese monitoring state and play a much greater role in allowing human rights to violate than previously known, found the Associated Press.
Journalists spoke with more than 100 sources, explored tens of thousands of documents, and gained several main leaks of internal and classified material, whose existence is first reported here.
Scientists and reporters have raised questions about American technology in Chinese police activities. Companies pushed back and said they were not aware of or responsible for how their technology was used.
However, they found that the Chinese police and the state suppliers of defense contracts cooperate with American technology companies-especially IBM-K designing the Chinese supervisory apparatus from top to bottom. American technology societies not only knew, but some also directly built their technologies as tools for the Chinese police to control citizens. IBM and other companies that responded have stated that they fully fulfilled all laws, sanctions and US export controls of management business in China, the past and the present.
Reporters and freelance partners spent three years browsing tens of thousands of documents, including:
-The pages of classified government documents, plans and books from the Chinese military supplier and IBM partner. They were exported from China by the announcer and handed over to the intermediary who both refused to name themselves for fear of retribution.
-20 000 leaked internal e -mails and large databases from Landasoft, Chinese supervisory company and former IBM partner. They were obtained from an intermediary who refused to be identified for fear of retribution. Landasoft has sold software used to designate and detain people in the Chinese long western region of Xinjiang during the brutal government intervention.
– Hundreds of marketing presentations, leaflets, brochures and contributions, often obtained from the companies themselves, in police business exhibitions, on the company’s and third -party websites, and official accounts on WeChat, the Chinese social media platform. Many of them advertised their equipment directly for use by Chinese police or tracking companies and were marked as “internal”.
-An 4,000 Chinese offers for awarding public procurement provided by Chinafile, a digital magazine published by the non -profit Asian company, as well as others that find separately reporters. Many of them showed shopping by American and foreign technology through the Chinese police.
-Underly available records, including Chinese research, intelligence articles, corporate reports and courts. Most of them have been obtained in China, where access to this information is growing closely.
The survey began with a massive approach of internal e -mails and databases from the Chinese Landasoft Firm, which was received by journalist Yael Grauer, freelance journalist. Grauer worked with journalists to verify, analyze and report its content.
E -Maily and Landasoft detected documents were in the heart of the Chinese campaign for mass retaining in Sin -Eťiang -targeting, watching and sorting virtually the entire native population of Uyghur to violently assimilate and conquer them. The leaked material was peppered by links to American companies.
Reporters searched for phone numbers and checked the leaked material by publicly available information to confirm its authenticity. Chinese company records revealed Landasoft’s links to IBM as a software dealer for analyzing the IBM IBM police supervision. The analysis of leaked e -mails revealed that Landasoft employees said their software was copied from I2 and adapted to the Chinese market.
Reporters watched the IBM partnership with Landasoft and associated companies back to 2000 years. Classified documents of the Chinese government acquired that IBM and other American companies have played an auxiliary role from the very beginning in the Beijing tracking apparatus.
Three external experts in Chinese supervision have assessed classified documents as authentic.
“It is indeed unimaginable that they are not legitimate,” said Conor Healy, Director of Research Research Affairs, Research Publications for Monitoring. Healy added that the documents are “in line with hundreds of documents on the deployment of government technologies that I have reviewed over the years.”
Seened sources on a dozen area on three continents. This included dozens of contemporary and former executives, officials, officers and engineers from China – a difficult task due to extensive fear and supervision. Many felt forced to speak, but most did it anonymously, worried about the security of themselves and their families.
Occasionally, the reporters themselves settled in the Chinese digital police state: they were tracked, stopped and pulled to the interrogation.
Together, the evidence of the compiled evidence revealed how American societies brought China “predictive police activity”, which allowed the Chinese police to preliminarily detain people for crimes that did not even commit. Such systems benefit from a huge amount of information – texts, calls, payments, flights, video, DNA swabs, mail supply, internet, even use of water and energy – to reveal individuals considered suspicious and predict their movements.
The partnership between American companies and the Chinese police laid the foundations for Chinese digital supervision, as exists today – the largest and most demanding on Earth.
Contact the global investigative team at recaptative@ap.org or
This article was generated from an automated news agency without text modifications.
(Tagstotranslate) American Technology Society (T) Chinese Supervision (T) Human Rights Break (T) IBM (T) Chinese Police





