Tag Archive for: Uyghur

Inside China’s secret Uyghur detention system


Rahile Omer looks into the camera, her angular face expressionless. Her eyes hold the only hint of emotion.

She has been flagged by China’s sweeping surveillance system in Xinjiang province. It monitors Uyghurs, the Muslim ethnic group, and other minority groups for “micro-clues” that officials deem suspicious. Rahile has been deemed a “Type 12 person,” someone connected to an existing police case.

She is 14 years old.

In Rahile’s case, the flag was triggered by a family connection, according to police records; her mother was serving six years in prison for allegedly disturbing “the social order” after authorities accused her of following a puritanical form of Islam and engaging in extremist religious practices. The girl’s father, also labeled a “Type 12 person,” had already been sent to a “reeducation” camp after being detained in 2017.

Now, Rahile’s mug shot is captured by an official’s digital camera. Her name and supposed infractions are logged in a spreadsheet along with those of thousands of other people. And Rahile, too, will be sent to a camp that outside experts say is essentially a prison.

The photo and details of Rahile Omer’s case are among thousands of secret files that were obtained from computer systems of two local police agencies in China, according to a U.S.-based China researcher, Adrian Zenz.

Zenz, a well-known expert on China’s treatment of the Uyghurs, says a hacker extracted the files and gave them to him. Zenz then launched an extensive effort to authenticate the records and provided them to an international media consortium, including USA TODAY. Journalists independently reviewed the massive trove of records and verified portions of the contents, which experts say offer an unprecedented look inside China’s detention and internment of Uyghur Muslims and other ethnic minorities.

Zenz published a peer-reviewed research paper on his findings Tuesday, along with a website that discloses thousands of photos and other evidence.

The files include more than 5,000 photos of what appear to be Uyghur people taken at police facilities – essentially mug shots. Zenz concluded thousands of those people were held in detention at the time the…

Source…

Hackers in China used fake Facebook accounts, impostor websites to break into computers, smartphones of Uyghur Muslims




graphical user interface, text, application: Hackers in China used fake Facebook accounts, impostor websites to break into computers, smartphones of Uyghur Muslims


© Provided by Firstpost
Hackers in China used fake Facebook accounts, impostor websites to break into computers, smartphones of Uyghur Muslims

Hackers in China used fake Facebook accounts and impostor websites to try to break into the computers and smartphones of Uyghur Muslims, the social network said Wednesday. The company said the sophisticated, covert operation targeted Uyghur activists, journalists and dissidents from China’s Xinjiang region, as well as individuals living in Turkey, Kazakhstan, the US, Syria, Australia, Canada and other nations.

The hackers attempted to gain access to the computers and phones by creating fake Facebook accounts for supposed journalists and activists, as well as fake websites and apps intended to appeal to a Uyghur audience. In some cases, the hackers created lookalike websites almost identical to legitimate news sites popular with Uyghurs.

The accounts and sites contained malicious links. If the target clicked on one, their computer or smartphone would be infected with software allowing the network to spy on the target’s device.



a close up of a screen of a cell phone: Facebook iOS app. Image: AP


© Provided by Firstpost
Facebook iOS app. Image: AP

The software could obtain information including the victim’s location, keystrokes and contacts, according to FireEye, a cybersecurity firm that worked on the investigation.

In all, fewer than 500 people were targeted by the hackers in 2019 and 2020, Facebook said. The company said it uncovered the network during its routine security work, and has deactivated the fictitious accounts and notified individuals whose devices may have been compromised. Most of the hackers’ activities took place on non-Facebook sites and platforms.

“They tried to create these personas, build trust in the community, and use that as a way to trick people into clicking on these links to expose their devices,” said Nathaniel Gleicher, Facebook’s head of security policy.

Facebook’s investigation found links between the hackers and two technology firms based in China but no direct links to the Chinese government, which has been criticized for its harsh treatment of Uyghurs in Xinjiang. FireEye, however, said in a statement that “we believe this operation was…

Source…