英文媒体关于中国的报道汇总 2025-09-10
September 13, 2025 42 min 8789 words
随手搬运西方主流媒体的所谓的民主自由的报道,让帝国主义的丑恶嘴脸无处遁形。
- US tech companies enabled the surveillance and detention of hundreds of thousands in China
- Detailed findings from AP investigation into how US tech firms enabled China’s digital police state
- Takeaways from AP’s investigation into how US tech companies enabled China’s digital police state
摘要
1. US tech companies enabled the surveillance and detention of hundreds of thousands in China
中文标题:美国科技公司助长了对中国数十万人进行监视和拘留的行为
内容摘要:文章探讨了美国科技公司在中国监控体系中的关键角色,尤其是如何帮助中国政府实现对公民的全面监控。以杨家为例,描述了他们在中国政府监控网络下的生活:个人信息被政府收集,家庭受到严格监视及限制。调查发现,许多监控技术来源于美国公司,它们将“预测性警务”等技术转卖给中国政府,助力打击异议人士和少数群体,特别是在新疆地区。这些技术的使用引发了人权侵犯,数以万计的维吾尔人被关押在再教育营中。文章强调,美国技术不仅塑造了中国的监控国家,也为全球其他国家的监控提供了借鉴,引发对个人自由的警惕。
2. Detailed findings from AP investigation into how US tech firms enabled China’s digital police state
中文标题:《美联社调查美国科技公司如何助力中国数字警察国家的详细发现》
内容摘要:一项美联社的调查显示,美国科技公司在中国监控国家建设中发挥了重要作用,帮助推动了人权侵犯的现象。这些公司向中国警方、政府及监控公司销售了数十亿美元的技术,尽管美国国会和媒体多次发出警告,指出这些工具可能被用于镇压异议、迫害宗教团体和针对少数民族。 调查基于大量泄露的内部文件和营销材料,揭示出多家公司(包括IBM、Dell、Intel等)如何向中国各级公安机关出售技术。比如,IBM的i2软件被用于新疆的警务分析,Dell和VMWare则提供了云软件和存储设备,帮助监控少数民族。此外,外国公司如Toshiba和Samsung也为中国警方提供了监控和数据存储设备。尽管这些公司声称遵守相关法律法规,但其产品仍被广泛用于中国的监控和压制工具中。
3. Takeaways from AP’s investigation into how US tech companies enabled China’s digital police state
中文标题:美国科技公司如何助力中国数字警察国家的调查要点
内容摘要:一项调查显示,美国科技公司在过去25年内在中国建立了世界上最大的数字监控体系,在极大程度上促进了人权侵犯。大量被标记为“麻烦制造者”的中国公民被限制在其省份甚至家中,面临来自监控技术的威胁。这些监控技术 predominantly 是由美国公司研发并出售给中国政府和警察,尽管美国国会和媒体多次警告其用途会压制异议、迫害宗教团体和少数民族。 尤其在新疆地区,这些技术支持了大规模的拘留行动,并通过预测犯罪来强化控制。尽管一些公司在面临人权问题时终止了与中国的合同,但法律存在不少漏洞。随着科技的快速发展,这一课题也为其他国家的监控形势敲响了警钟,警示所有人最终可能面临失去自由的风险。
US tech companies enabled the surveillance and detention of hundreds of thousands in China
https://apnews.com/article/chinese-surveillance-silicon-valley-uyghurs-tech-xinjiang-8e000601dadb6aea230f18170ed54e882025-09-09T04:04:41Z
BEIJING (AP) — The body camera hung from the top of the IV drip, recording the slightest twitch made by Yang Guoliang as he lay bloody and paralyzed in a hospital bed after a police beating with bricks.
By then, surveillance was nothing new for the Yang family in rural China, snared in an intricate network based on U.S. technology that spies on them and predicts what they’ll do.
Their train tickets, hotel bookings, purchases, text messages and phone calls are forwarded to the government. Their house is ringed with more than a dozen cameras. They’ve tried to go to Beijing 20 times in the past few years, but masked men show up and grab them, often before they depart. And last year, Yang’s wife and younger daughter were detained and now face trial for disrupting the work of the Chinese state — a crime carrying a sentence of up to a decade in prison.
Yet the Yangs say they are not criminals. They are simply farmers trying to beg Beijing to stop local officials from seizing their 1 1/2 acres of land in China’s eastern Jiangsu province.
“Every move in my own home is monitored,” Yang said, sitting behind black curtains that block him from the glare of police lights trained straight at his house. “Their surveillance makes me feel unsafe all the time, everywhere.”
The AP obtained tens of thousands of pages of classified and internal documents that show how U.S. companies designed and marketed systems that became the foundation for China’s digital cage. (AP Video/Serginho Roosblad, Marshall Ritzel)
Across China, tens of thousands of people tagged as troublemakers like the Yangs are trapped in a digital cage, barred from leaving their province and sometimes even their homes by the world’s largest digital surveillance apparatus. Most of this technology came from companies in a country that has long claimed to support freedoms worldwide: the United States.
Over the past quarter century, American tech companies to a large degree designed and built China’s surveillance state, playing a far greater role in enabling human rights abuses than previously known, an Associated Press investigation found. They sold billions of dollars of technology to the Chinese police, government and surveillance companies, despite repeated warnings from the U.S. Congress and in the media that such tools were being used to quash dissent, persecute religious sects and target minorities.
Critically, American surveillance technologies allowed a brutal mass detention campaign in the far west region of Xinjiang — targeting, tracking and grading virtually the entire native Uyghur population to forcibly assimilate and subdue them.
U.S. companies did this by bringing “predictive policing” to China — technology that sucks in and analyzes data to prevent crime, protests, or terror attacks before they happen. Such systems mine a vast array of information — texts, calls, payments, flights, video, DNA swabs, mail deliveries, the internet, even water and power use — to unearth individuals deemed suspicious and predict their behavior. But they also allow Chinese police to threaten friends and family and preemptively detain people for crimes they have not even committed.
For example, the AP found a Chinese defense contractor, Huadi, worked with IBM to design the main policing system known as the “Golden Shield” for Beijing to censor the internet and crack down on alleged terrorists, the Falun Gong religious sect, and even villagers deemed troublesome, according to thousands of pages of classified government blueprints taken out of China by a whistleblower, verified by AP and revealed here for the first time. IBM and other companies that responded said they fully complied with all laws, sanctions and U.S. export controls governing business in China, past and present.
Across China, surveillance systems track blacklisted “key persons,” whose movements are restricted and monitored. In Xinjiang, administrators logged people as high, medium, or low risk, often according to 100-point scores with deductions for factors like growing a beard, being 15 to 55 years old, or just being Uyghur.
Cellphone videos provided by the Yang family show how their every move is monitored, from an IV drip at a hospital, to their backyard, to being physically stopped at a bus station. (AP Video/Marshall Ritzel)
Some tech companies even specifically addressed race in their marketing. Dell and a Chinese surveillance firm promoted a “military-grade” AI-powered laptop with “all-race recognition” on Dell’s official WeChat account in 2019. And until contacted by AP in August, biotech giant Thermo Fisher Scientific’s website marketed DNA kits to the Chinese police as “designed” for the Chinese population, including “ethnic minorities like Uyghurs and Tibetans.”
While the flood of American technology slowed considerably starting in 2019 after outrage and sanctions over atrocities in Xinjiang, it laid the foundation for China’s surveillance apparatus that Chinese companies have since built on and in some cases replaced. To this day, concerns remain over where technology sold to China will end up.
For example, 20 former U.S. officials and national security experts wrote a letter in late July criticizing a deal for NVIDIA to sell H20 chips used in artificial intelligence to China, with 15% of revenues going to the U.S. government. They said no matter who the chip is sold to, it will fall into the hands of Chinese military and intelligence services.
NVIDIA said it does not make surveillance systems or software, does not work with police in China and has not designed the H20 for police surveillance. NVIDIA posted on its WeChat social media account in 2022 that Chinese surveillance firms Watrix and GEOAI used its chips to train AI patrol drones and systems to identify people by their walk, but told the AP those relationships no longer continue. The White House and Department of Commerce did not respond to requests for comment.
Thermo Fisher and hard drive maker Seagate promoted their products to Chinese police at conferences and trade shows this year, according to online posts. Officers stroll the streets of Beijing with Motorola walkie talkies. NVIDIA and Intel chips remain critical for Chinese policing systems, procurements show. And contracts to maintain existing IBM, Dell, HP, Cisco, Oracle, and Microsoft software and gear remain ubiquitous, often with third parties.
What started in China more than a decade ago could be seen as a cautionary tale for other countries at a time when the use of surveillance technology worldwide is rising sharply, including in the United States. Emboldened by the Trump administration, U.S. tech companies are more powerful than ever, and President Donald Trump has rolled back a Biden-era executive order meant to safeguard civil rights from new surveillance technologies.
As the capacity and sophistication of such technologies has grown, so has their reach. Surveillance technologies now include AI systems that help track and detain migrants in the U.S. and identify people to kill in the Israel-Hamas war. China, in the meantime, has used what it learned from the U.S. to turn itself into a surveillance superpower, selling technologies to countries like Iran and Russia.
The AP investigation was based on tens of thousands of leaked emails and databases from a Chinese surveillance company; tens of thousands of pages of confidential corporate and government documents; public Chinese language marketing material; and thousands of procurements, many provided by ChinaFile, a digital magazine published by the non-profit Asia Society. The AP also drew from dozens of open record requests and interviews with more than 100 current and former Chinese and American engineers, executives, experts, officials, administrators, and police officers.
Though the companies often claim they aren’t responsible for how their products are used, some directly pitched their tech as tools for Chinese police to control citizens, marketing material from IBM, Dell, Cisco, and Seagate show. Their sales pitches — made both publicly and privately — cited Communist Party catchphrases on crushing protest, including “stability maintenance,” “key persons,” and “abnormal gatherings,” and named programs that stifle dissent, such as “Internet Police,” “Sharp Eyes” and the “Golden Shield.”
Other companies, like Intel, NVIDIA, Oracle, Thermo Fisher, Motorola, Amazon Web Services, Microsoft, Western Digital, creator of mapping software ArcGIS Esri, and what was then Hewlett Packard, or HP, also sold technology or services knowingly to Chinese police or surveillance companies. Four practicing lawyers said sales like those uncovered by AP could potentially go against at least the spirit, if not the letter, of U.S. export laws at the time, which the companies denied.
American technology made up nearly every part of China’s surveillance apparatus, AP found:
In 2009, Chinese defense contractor Huadi worked with IBM to build national intelligence systems, including a counterterrorism database, used by the Chinese military and China’s secret police, the Ministry of State Security. Chinese agents sold IBM’s i2 police surveillance analysis software to the same ministry and to Chinese police, including in Xinjiang, through the 2010s, leaked emails and marketing posts show. IBM said it has no record of its i2 software ever having been sold to the Public Security Bureau in Xinjiang.
NVIDIA and Intel partnered with China’s three biggest surveillance companies to add AI capabilities to cameras used for video surveillance across China, including Xinjiang and Tibet, until sanctions were imposed. NVIDIA said in a post dating to at least 2013 that it collaborated with a Chinese police research institute on advanced surveillance technology.
IBM, Oracle, HP, and ArcGIS developer Esri sold hundreds of thousands of dollars’ worth of geographic and mapping software to Chinese police that allows officers to detect when blacklisted Uyghurs, Tibetans or dissidents stray out of provinces or villages. As late as 2019, with detentions in Xinjiang well underway, Dell hosted an industry summit in its capital. Dell and then-subsidiary VMWare sold cloud software and storage devices to police and entities providing data to police in Tibet and Xinjiang, even in 2022 after abuses there became widely known.
Huadi worked with IBM to construct China’s national fingerprint database; IBM told AP it never sold “fingerprinting-specific product or technology” to the Chinese government “in violation of US law”. HP and VMWare sold technology used for fingerprint comparison by Chinese police, while Intel partnered with a Chinese fingerprinting company to make their devices more effective. IBM, Dell, and VMWare also promoted facial recognition to Chinese police. China’s police and police DNA labs bought Dell and Microsoft software and equipment to save genetic data on police databases.
In 2016, Dell boasted on its WeChat account that its services assisted the Chinese internet police in “cracking down on rumormongers.” Seagate said on WeChat in 2022 that it sells hard drives “tailor made” for AI video systems in China for use by police to help them ”control key persons,” despite facing backlash for selling drives in Xinjiang.
For extended findings, click here.
“Everything was built on American tech,” said Valentin Weber, a researcher at the German Council on Foreign Relations who studied the use of U.S. tech by Chinese police. “China’s capability was close to zero.”
IBM, Dell, Cisco, Intel, Thermo Fisher and Amazon Web Services all said they adhere to export control policies. Seagate and Western Digital said they adhere to all relevant laws and regulations where they operate.
Oracle, Hewlett Packard Enterprise, and tech conglomerate Broadcom, which acquired VMWare and cloud company Pivotal in 2023, did not comment on the record; HP, Motorola and Huadi did not respond, and Esri denied involvement but did not reply to examples. Microsoft told AP it found no evidence that it “knowingly sold technology to the military or police” as part of updates to the “Golden Shield”.
◆ Stay up to date with similar stories by signing up to our WhatsApp channel.
Some U.S. companies ended contracts in China over rights concerns and after sanctions. For example, IBM said it has prohibited sales to Tibet and Xinjiang police since 2015, and suspended business relations with defense contractor Huadi in 2019.
However, sanctions experts noted that the laws have significant loopholes and often lag behind new developments. For example, a ban on military and policing gear to China after the 1989 Tiananmen massacre does not take into account newer technologies or general-use products that can be applied in policing.
They also noted that the law around export controls is complicated. Raj Bhala, an expert in international trade law at the University of Kansas, said the issues the AP described fell into “the kind of gray area that we put in exams.”
“It would raise concerns about possible inconsistencies, possible violations,” said Bhala, who emphasized he was speaking generally and not about any specific company. “But I really stress ‘possible.’ We need to know more facts.”
While German, Japanese and Korean firms also played a role, American tech firms were by far the biggest suppliers.
The Xinjiang government said in a statement that it uses surveillance technologies to “prevent and combat terrorist and criminal activity,” that it respects citizens’ privacy and legal rights and that it does not target any particular ethnicity. The statement said Western countries also use such technology, calling the U.S. “a true surveillance state.” Other government agencies did not respond to a request for comment, including China’s police and authorities in the Yangs’ province.
This technology still powers the police database that controls the Yangs and other ordinary people. An estimate based on Chinese government statistics found at least 55,000 to 110,000 were put under residential surveillance in the past decade, and vast numbers are restricted from travel in Xinjiang and Tibet. China’s cities, roads and villages are now studded with more cameras than the rest of the world combined, analysts say — one for every two people.
“Because of this technology … we have no freedom at all,” said Yang Guoliang’s elder daughter, Yang Caiying, now in exile in Japan. “At the moment, it’s us Chinese that are suffering the consequences, but sooner or later, Americans and others, too, will lose their freedoms.”
AI analysis of people walking and commuting in Beijing. (AP Video/Marshall Ritzel)
Selling surveillance superpowers
Back when China was emerging from the chaotic violence of the Cultural Revolution in 1976, three in four Chinese were farmers, including the Yangs. They lived in a three-room home of tiles and pounded earth nestled among the lush, humid fields of the Yangtze River delta.
After Chairman Mao Zedong’s death that year, Beijing’s new leaders opened China to the world, and American tech firms like HP and IBM rushed in. But there were hard limits on how much change the government would accept. In 1989, the Tiananmen pro-democracy protests rattled Beijing, which sent tanks and troops to shoot students.
Soon after, Beijing began planning the “Golden Shield,” aimed at digitizing China’s police force.
In 2001, the 9/11 al-Qaida attacks turbocharged interest in surveillance technology. One researcher claimed authorities could have foiled the attack by unearthing connections between hijackers through public information in databases.
PHOTO ESSAY: Those caught in the dragnet of China’s digital cage
click here ❮ ❯
American companies cashed in, selling the U.S. billions of dollars in surveillance technologies they said could prevent crime and terror attacks.
They spotted the same sales opportunity in China. Researchers warned surveillance technologies would be “instruments of repression” in the hands of authoritarian states. Yet IBM, Cisco, Oracle, and other American companies clinched orders to supply Beijing’s “Golden Shield.”
“China didn’t have this kind of thing before,” said Wang, a former Chinese police official in Xinjiang who asked to be identified only by last name for fear of retaliation. “These concepts all came from the West.”
Soon, disturbing stories emerged. Chinese police blocked sensitive news, pinpointing dissidents with unnerving precision. They stalked adherents of the Falun Gong sect banned by authorities. Congress demanded explanations from tech companies.
In 2008, documents leaked to the press showed Cisco saw the “Golden Shield” as a sales opportunity, quoting a Chinese official calling the Falun Gong an “evil cult.” A Cisco presentation reviewed by AP from the same year said its products could identify over 90% of Falun Gong material on the web. Followers sued Cisco, which is now petitioning the U.S. Supreme Court to throw out the lower court ruling that allowed the lawsuit.
At a human rights conference in February, then-Cisco lawyer Katie Shay said companies had a responsibility to understand how customers might misuse their technology for “surveillance and censorship.”
“A lot of people have suffered at the hands of their government, and I want to acknowledge that pain,” said Shay, who left Cisco in June. “I also will say that Cisco disputes the allegations of Cisco’s involvement.”
Cisco told the AP it is committed to human rights, but the court allegations may “open the floodgates for suits against U.S. corporations merely for legal exports of off-the-shelf goods and services.”
As Cisco was summoned before Congress, IBM partnered with a Chinese defense contractor on Phase Two of China’s “Golden Shield.”
Classified government blueprints obtained by AP show that in 2009, IBM worked with Huadi, the state-owned subsidiary of China’s biggest missile military contractor spun off from China’s Ministry of Defense, to build out predictive policing.
“Consolidate Communist Party rule,” read the Huadi blueprint, which showed the databases would track hundreds of thousands of people online.
In response to AP’s questions, IBM referred to any possible relationship it may have had with Chinese government agencies as “old, stale interactions”:
“ ... If older systems are being abused today — and IBM has no knowledge that they are — the misuse is entirely outside of IBM’s control, was not contemplated by IBM decades ago, and in no way reflects on IBM today.”
Back in 2009, Beijing needed the technology urgently to quash critics bonding online. Among them were the Yangs.
In April that year, local authorities ordered the Yangs and more than 300 other families in their village off their land. Developers coveted their prime lakefront property for “Western-style” apartments and villas, with fountains, football fields and shopping centers.
The Yangs had no idea police were installing systems that could target families like theirs. They just knew their land was being seized — in return for just a unit in a five-floor walk-up, too many stairs for their elderly mother to climb.
The Yangs and other farmers across China filed complaints.
“I discovered the way the government took our land was illegal,” Yang Caiying said. “They cheated us.”
Predict and prevent
In July 2009, three months after the Yang land was seized, riots erupted on the other side of the country in Xinjiang. Gory images of a Uyghur lynched at a toy factory spread online, angry Uyghurs took to the streets, and hundreds were killed.
Once again, American firms pitched their technology as the solution.
The government sent troops and cut Xinjiang’s phone and internet connections. In secret meetings, officials concluded that police had failed to spot the danger signs because they couldn’t identify Uyghurs deemed separatists, terrorists, and religious extremists, three engineers then working for the Xinjiang government told AP.
At the time, Xinjiang police and data systems were already running on American technology including IBM, Cisco, Oracle, and Microsoft, the engineers said, which AP verified by reviewing government contracts. But the databases were unconnected.
So Xinjiang launched an ambitious initiative to fuse data from all available sources, including banks, railways, and phone companies, into a central database. Officials demanded complete information on all suspicious individuals and their relatives going back three generations, according to the engineers, who described specific meetings in which they participated. Two asked to remain anonymous, fearing for their family in China; the third, Nureli Abliz, is now in Germany.
Soon, lucrative contracts went up for bidding. Among those seeking to profit was IBM.
“Prevent problems before they happen,” IBM promised Chinese officials. In an August 2009 pamphlet, IBM cited the Xinjiang riots and said its technology could help the government “ensure urban safety and stability.”
IBM executives fanned out across the country to court Chinese officials. In December 2009, they set up a new “IBM Institute for Electronic Governance Innovation” in Beijing. In 2011, IBM acquired i2, a software program designed to prevent “terrorist threats.” IBM touted i2’s ability to analyze Chinese social media and licensed a Shanghai-based firm called Landasoft to sell it to China’s police, corporate records show.
Chinese police purchased tens of millions of dollars’ worth of products from companies like IBM, Cisco, Oracle, and Microsoft to upgrade the “Golden Shield” policing systems, a leaked accounting ledger acquired by AP from a whistleblower shows.
In the confrontation between the Chinese state and its critics, American technology tipped the scales of power.
In 2011, thieves ransacked the Yangs’ house, hunting for their property deed. They didn’t find it.
Two years later, bald men with tattoos and gold chains smashed down their door, shattered windows and flipped furniture to bully them out of their home anyway. Yang’s mother dropped to the floor in terror. Doctors diagnosed a heart attack, but the Yangs didn’t have money for a pacemaker.
Furious, the Yangs sued local police. In June 2015, a judge ruled their land had been seized illegally. The Yangs celebrated.
But just weeks after the ruling, officers identified human rights lawyers through the “Golden Shield” technology, cuffed hundreds of them and pressed them into police vans across China. One lawyer later recalled how police monitored his messages on human rights in WeChat before they grabbed him, shackled him to a chair, and tortured him.
Overnight, China’s budding rights-defense movement was dealt a fatal blow — and with it, the Yangs’ case. The Yangs were called in and curtly told the judgment was being overturned, their lawsuit dismissed without trial.
“We really had too much faith in the law, you know?” Yang Guoliang said, his hands clenched in fists. “It turned out to be worthless.”
Technologies of terror
In the meantime, Beijing was transforming Xinjiang into the most heavily surveilled place on earth, sweeping around a million people into camps and prisons.
When bombs tore through a train station in Xinjiang’s capital hours after a visit by leader Xi Jinping in 2014, Xi demanded a crackdown.
“He was super angry,” said Abliz, one of the engineers with the Xinjiang government. “They concluded they weren’t surveilling Uyghurs closely enough.”
The next year, in April 2015, Abliz attended a closed-door exposition in Xinjiang. A booth ran by Landasoft, the former IBM partner, caught his eye.
After years as a vendor of IBM’s i2 police surveillance analysis software to Xinjiang police, Landasoft had struck out on its own, touting i2-like software it said could detain extremists before they caused trouble. The similarity was no coincidence: Landasoft’s software was copied from i2, according to leaked emails and records.
“The platform is developed based on i2,” a Landasoft project manager wrote in an email.
It used a proprietary data visualization system developed by i2. The software powered what was called the Integrated Joint Operations Platform, or IJOP, with the authority to trigger arrests.
Abliz went numb.
“I thought then that this was the end of humanity,” he said.
Landasoft did not respond to repeated requests for comment. IBM said it cut ties with Landasoft in 2014 and was not aware of any interaction between Landasoft and the Public Security Bureau in Xinjiang.
In the autumn of 2015, months after the Xinjiang expo, Landasoft signed contracts with Xinjiang police, emails show. Workers installed millions of cameras and wired over 7,000 police outposts, often built just hundreds of meters apart. Nearly 100,000 officers were recruited to pound on doors and collect names, addresses, fingerprints and face-scans.
Though Chinese hardware was favored, foreign software was irreplaceable for its performance and compatibility with China’s American-built systems, engineers told AP. That included server and database software from Oracle and Microsoft and cloud software from VMWare, which Dell acquired in 2016.
In late 2016, the crackdown began. Internal documents, a leaked copy of the Landasoft software and interviews with 16 former Xinjiang police officers, officials and engineers reveal how the system worked.
Landasoft’s software combined data fed into a central police database to compile a dossier on vast swaths of Xinjiang’s population, tagging them with categories like “went on pilgrimage” or “studied abroad.” Administrators then questioned them, computed risk scores and decided who to detain.
Hundreds of thousands of people were tagged “untrustworthy”, leaked messages show. Leaked documents show the IJOP flagged 24,412 people as “suspicious” in just one week in 2017, leading to most being detained.
“They thought it better to grab thousands of innocents than let a single criminal slip free,” Abliz said.
The technology was crude and flawed. Landasoft emails show engineers frantically fixing a software bug to release hundreds of people categorized as high-risk. And surveillance cameras often misidentified people, a former Xinjiang police officer found when he checked their ID cards.
Yet officers were told “computers cannot lie” and that the IJOP’s listed targets were “absolutely correct,” Abliz said. The software’s orders were often obeyed fearfully, unquestioningly.
“The tech companies told the government their software is perfect,” Abliz said. “It’s all a myth.”
Minority report
The all-encompassing surveillance forced total compliance: Officers arrested colleagues, neighbors informed on each other.
In May 2017, Kalbinur Sidik, a teacher now in the Netherlands, was summoned to her district government office in a yellow brick apartment building in Xinjiang’s capital. A young Uyghur woman, fresh from college, rose and introduced herself as a local official. Sidik, the woman explained, was being appointed as the head of her building, responsible for collecting information on neighbors.
“What’s this data going to be used for?” Sidik asked.
The woman looked at a computer, with a Landasoft program running and lists of names and tags: “Goes out at night,” “Overseas phone,” “unemployed.” One button stood out: “Push Alert.”
The woman clicked it, and the screen filled with names. These people, the woman explained, would be detained and interrogated for suspected ties to terrorism. Sidik’s eyes widened.
“I hated her for what she was doing,” Sidik said. “I knew those people would disappear.”
Xinjiang officials issued arrest quotas, Sidik and five other former officers and administrators said. Sidik watched with horror as the number of people who attended her compound’s weekly mandatory flag-raising ceremony shrank, from 400 to just over 100, as residents were arrested.
At the district office, she observed the logos popping up on screens: Oracle, Microsoft, Intel. The AP found evidence of products from all three companies used in Xinjiang’s policing and data systems during the crackdown, along with Esri, Seagate, Western Digital, NVIDIA, Thermo Fisher, and VMWare, then owned by Dell, which advertised cooperation with Xinjiang authorities on its website.
Sidik asked her neighborhood official where it all came from.
“We’ve spent a lot of money to import foreign technology,” she recalls the official telling her.
Among those caught in the digital dragnet was Parida Qabylqai, an ethnic Kazakh pharmacist at a military hospital in Xinjiang.
In February 2018, Qabylqai was flagged by the IJOP for visiting her parents in Kazakhstan. At first, her boss thought it was a mistake.
“You’re a good person, you shouldn’t be listed,” she recalled him saying. Then he checked the IJOP and spotted her name.
“It’s really serious! You’re going to end up in the camps,” he blurted out in shock.
An officer pressed a confession into her hands.
“What did I do wrong?” Qabylqai asked.
“Just sign!” the officer shouted.
Qabylqai was cuffed, hooded, and whisked to a camp, where cameras watched her day and night, even peering at her naked body in the toilet. Guards barking over speakers ordered her not to speak or even to move.
“They did things to us that no human being should ever have to experience,” she said. “But they said my name was listed by the IJOP, so they didn’t need to explain anything.”
Even enforcers of the system weren’t spared.
In 2018, Liu Yuliang, a civil servant in Xinjiang, was ordered to the home of a young police officer in his village. He and dozens of others stood, silent, as the officer embraced his sobbing, pregnant wife.
The officer had forced many people into the camps. Then he himself was flagged for detention.
Too fearful to resist, Liu went along with the arrest, just as the young officer had done before him.
Landasoft software alerted police when flagged people did anything labeled suspicious, like going out at night or logging on the internet repeatedly. Liu was sent to knock on doors, questioning residents whose “eyes filled with fear.”
As police swept Xinjiang, Landasoft purchased software from Pivotal, a cloud company later acquired by Broadcom, emails show. And Landasoft registered accounts on both Amazon Web Services and Microsoft Azure in 2018, seeking to expand cloud offerings to police clients, emails show.
AWS said Landasoft “consumed very limited cloud services for a brief period” and not for software in the Xinjiang crackdown. Microsoft said Landasoft used Azure services through a self-service portal retired in 2021, and that any Landasoft data was deleted.
The Xinjiang government told the AP: “There is absolutely no such thing as ‘large-scale human rights violations.’”
Liu eventually resigned and returned to his hometown in eastern China, trying to forget what he had seen and done. But he noted with unease the new cameras and checkpoints being installed around his home.
Four days later, state security called and summoned him for questioning. The all-seeing surveillance apparatus had followed him home.
“The Xinjiang model is being copied everywhere, in every city in China,” Liu said.
In 2024, Liu left China, ignoring an airport officer who warned that wherever he went, he would be watched.
“This technology has no emotions,” Liu said. “But in the hands of a government that doesn’t respect the law, it becomes a tool for evil.”
In this security camera video, police officers hold up Yang Li as she is returned to her family home after she was knocked unconscious by masked police after petitioning in Beijing, Friday, March, 8, 2024, in Changzhou in eastern China’s Jiangsu Province. (Yang Family via AP)
Automated autocracy
The Yangs are still trapped by U.S. technology. IBM, Dell, HP, Cisco, and Seagate servers, switches and drives power police systems targeting them, maintenance contracts dating to this year show. Intel and NVIDIA chips process data. Oracle and VMWare software run the database.
But the harder the Yangs push, the harder the system pushes back.
In February 2023, they went to the National Public Complaints Administration in Beijing with a letter. Two days later, police grabbed them from their hotel and drove them home.
The Yangs persisted, trying to plead their case to Beijing. In the following months, they were seized at bus and train stations, beaten at a hospital and abducted by ambulance.
Last July, Yang’s mother tried again. She carried a letter for Chinese leader Xi Jinping:
“They’re using violence and kidnapping to bar me from petitioning and seeking medical treatment ... We beg you, General Secretary, to save us.”
Outside Beijing’s leadership compound, burly men in black tackled Yang’s mother to the ground. She was jailed for over a month, questioned, strip-searched, force-fed medication and deprived of food and water. In October, she and Yang’s sister disappeared.
The Yangs’ house is now the last left standing. The father lives alone.
His relatives have cut contact, unnerved by the flock of police that tail him. Thousands of pages of documents stashed in drawers, stuffed in bags, and piled in boxes in a bathtub chronicle every step of their 16-year quest for justice.
In April, Yang was sent criminal charges showing how much police had spent to stop the family’s “abnormal petitioning.”
The cost: About $37,000.
__
Yael Grauer is an independent investigative tech reporter. AP journalists Garance Burke in San Francisco, Larry Fenn in New York and Byron Tau in Washington contributed to this report, along with Myf Ma, an independent investigative journalist, researcher and programmer in New York covering China.
__
Contact AP’s global investigative team at [email protected] or https://www.ap.org/tips/
Detailed findings from AP investigation into how US tech firms enabled China’s digital police state
https://apnews.com/article/chinese-surveillance-silicon-valley-uyghurs-tech-xinjiang-a80904158b771a14d5a734947f28d71b2025-09-09T04:30:13Z
BEIJING (AP) — American tech companies to a large degree designed and built China’s surveillance state, playing a far greater role in enabling human rights abuses than previously known, an Associated Press investigation found. They sold billions of dollars of technology to the Chinese police, government and surveillance companies, despite repeated warningsfrom the U.S. Congress and in the media that such tools were being used to quash dissent, persecute religious sects and target minorities.
The AP obtained tens of thousands of pages of classified and internal documents that show how U.S. companies designed and marketed systems that became the foundation for China’s digital cage. (AP Video/Serginho Roosblad, Marshall Ritzel)
The AP investigation was based on tens of thousands of leaked emails and databases from a Chinese surveillance company; thousands of pages of confidential corporate and government documents; public Chinese language marketing material; and thousands of procurements, many provided by ChinaFile, a digital magazine published by the non-profit Asia Society. The AP also drew from dozens of open record requests and interviews with more than 100 current and former Chinese and American engineers, executives, experts, officials, administrators, and police officers.
American tech firms were by far the biggest suppliers, but German, Japanese, and Korean firms also had a role. Here are some examples:
MILITARY ACCESS: A Chinese military contractor worked with Armonk, New York-based IBM in 2009 to design national intelligence systems, including a counterterrorism system, according to classified Chinese government documents. These systems were used by China’s secret police, the Ministry of State Security, and the Chinese military. IBM referred to any such deals as “old, stale interactions”: “ ... If older systems are being abused today — and IBM has no knowledge that they are — the misuse is entirely outside of IBM’s control, was not contemplated by IBM decades ago, and in no way reflects on IBM today.”
◆ Stay up to date with similar stories by signing up to our WhatsApp channel.
ANTI-TERROR ANALYSIS: IBM agents in China sold IBM’s i2 policing analysis software to the Xinjiang police, China’s Ministry of State Security, and other Chinese police units throughout the 2010s, leaked emails show. i2 software was subsequently copied and deployed by one former IBM agent, Landasoft, as the basis for a predictive policing platform that tagged hundreds of thousands of people as potential terrorists during a brutal crackdown in China’s far west Xinjiang region. IBM says it ceased relations with Landasoft in 2014, prohibited sales to police in Xinjiang and Tibet since 2015, and has no record of any sales of i2 software to the Public Security Bureau in Xinjiang.
ETHNIC REPRESSION: Dell and then-subsidiary VMWare sold cloud software and storage devices to police and entities providing data to police in Tibet and Xinjiang, even as late as 2022 after ethnic repression there was widely known. Dell addressed race in its marketing: In 2019, Dell said on WeChat it had teamed up with surveillance firm Yitu to sell a “military-grade” AI-powered laptop for Chinese police with “all-race recognition.” Dell, based in Round Rock, Texas, told AP it conducts “rigorous due diligence” to ensure compliance with U.S. export controls. Chinese policing systems, including in Xinjiang, also used software from Oracle, based in Austin, Texas, and from Microsoft, based in Seattle, according to procurements and a leaked database obtained by AP.
FINGERPRINT RECOGNITION: Chinese defense contractor Huadi worked with IBM to construct China’s national fingerprint database; IBM said it never sold “fingerprinting-specific” products to the Chinese government and that any possible misuse “for fingerprinting purposes” was done without its knowledge or assistance. HP and VMWare sold technology used for fingerprint comparison by Chinese police. Intel said in 2019 marketing material that it partnered with Hisign, a Chinese fingerprinting company that sold to Xinjiang police, to make their fingerprint readers more effective, and that the new reader was “fully tested in an actual application scenario” with a municipal police bureau. Hisign was still an Intel partner as of last year, according to Chinese media reports. California-based Intel said it has not had any technical engagement with Hisign since 2024, and told AP it would “act swiftly” if it became aware of any “credible misuse.”
AI CAMERAS: IBM, Dell, Tokyo-based Hitachi, and VMWare promoted facial recognition for use by Chinese police. Japanese electronics giant Sony said on its official WeChat account that it wired a Chinese prison with “intelligent” cameras, saying it was widely trusted for “surveillance projects.” California chip giant NVIDIA and Intel partnered with China’s three biggest surveillance companies to add AI capabilities to camera systems used for video surveillance across China, including in Xinjiang and Tibet, until sanctions were imposed. Relations with other Chinese surveillance companies continued more recently: NVIDIA posted on its WeChat social media account in 2022 that Chinese surveillance firms Watrix and GEOAI used its chips to train AI patrol drones and systems to identify people by their walk. NVIDIA told AP those relationships no longer continue.
SURVEILLANCE RESEARCH: NVIDIA, IBM, and Hitachi staff collaborated with Chinese police researchers and companies on surveillance technology. NVIDIA said in a post dating to 2013 or later that a Chinese police institute used its chips for surveillance technology research. NVIDIA said it doesn’t currently work with Chinese police but did not address the past. And in 2021, an IBM and a U.S. Army researcher coauthored an AI video study with a Chinese police researcher working at a sanctioned company, according to a paper unearthed by IPVM, a surveillance research publication. The U.S. Army told AP the Chinese police researcher only worked on the paper after the Army researcher’s work had concluded.
DNA: Chinese police DNA labs bought Dell and Microsoft software and equipment to save genetic data on police databases. In 2021, Hitachi advertised DNA sequencers to Chinese police, and police labs bought pipettes from German biotech firm Eppendorf last year. And until contacted by AP in August, Massachusetts-based biotech firm Thermo Fisher Scientific‘s website stated that its kits are made for China’s national DNA database and “designed” for the Chinese population, including “ethnic minorities like Uyghurs and Tibetans,” and featured the work of a Chinese police researcher who discussed using Thermo Fisher kits to identify ethnic Uyghur and Manchu populations at a 2016 conference. Thermo Fisher stopped sales in Xinjiang in 2021 and in Tibet in 2024, but still promotes kits to police elsewhere in China, including at a police trade show earlier this year. In a statement to AP, Thermo Fisher said its kits “are designed to be effective across diverse global populations” but “do not have the capability to distinguish among specific ethnic groups.”
INTERNET POLICE: In 2014, VMWare said internet police in cities across China used its software, and in 2016, Dell said on its WeChat account that its services assisted the Chinese internet police in “cracking down on rumormongers” — essentially promoting censorship. An undated IBM marketing presentation said that internet police in Shanghai and Guangzhou used its i2 software, with metadata suggesting it was from 2018. IBM held a conference in Beijing promoting i2 in 2018, according to its official WeChat account.
ENCRYPTION TECHNOLOGY: Leaked government blueprints show Illinois-based Motorola provided encrypted radio communications technology to the Chinese police for handling “sudden and mass events in Beijing.” Motorola did not respond to requests for comment.
AI DRIVES: Californian hard disk giants Seagate and Western Digital and Tokyo-based Toshiba sell hard drives specialized for AI video systems for use by Chinese police. In 2022, Toshiba wrote about how its surveillance hard drives can help police monitor communities to “identify and control suspicious” or “blacklisted” individuals. “They’re optimized and adapted for security systems,” Toshiba sales director Feng Hao told AP. Last year, Western Digital touted its partnership with Chinese surveillance company Uniview at a policing trade expo, months before Uniview was sanctioned over complicity in rights abuses. And Seagate said on WeChat in 2022 that it sells hard drives “tailor made” for AI video systems in China for use by police to help them ”control key persons,” and promoted their drives to police at a security trade association in China this year.
MAPPING SOFTWARE: Blueprints show that in 2009, IBM, Oracle, and Esri, the creator of ArcGIS based in California, sold hundreds of thousands of dollars’ worth of software to build China’s Police Geographic Information System, and in 2013, HP said it sold “digital fencing” solutions to Chinese police. Such systems alert Chinese police even today when Uyghurs, Tibetans or dissidents stray out of provinces, counties or even villages. The U.S. curbed exports of such mapping software to China in 2020. But the restrictions are narrow in scope, and Esri maintains a research center in Beijing that marketed to police and other Chinese clients. Esri denied involvement.
POLICE GEAR: Chinese police patrol the streets equipped with foreign technology. Officers stroll the streets of Beijing with Motorola walkie-talkies, for example, while Korean electronics giant Samsung sells microSD cards for police body cameras, advertising them at Chinese police trade shows in 2023 and 2024. And in WeChat posts, Chinese state-owned company Jinghua said it cooperated with German electronics giant Philips on China’s first ”AI-powered 5G” police body camera and advertised Philips-branded recorders and cameras to Chinese police. In a statement, Philips said it had no partnership with Jinghua, did not authorize sales of Philips-branded body cameras in China, and would be contacting Jinghua over the posts.
IBM, Dell, California network seller Cisco, Seattle-based Amazon Web Services, Seagate, Intel, Thermo Fisher and Western Digital all said they adhere to relevant export controls, laws and regulations where they operate. Eppendorf, Sony, and Hitachi declined to describe their business relationships in China but said they respected human rights.
Oracle, Hewlett Packard Enterprise, and California tech conglomerate Broadcom, which acquired VMWare in 2023, did not comment on the record. HP, Motorola, Samsung, Toshiba, Huadi, and Landasoft did not respond. Microsoft said it did not knowingly provide software for updates to China’s main policing system.
The Xinjiang government said in a statement that it uses surveillance technologies to “prevent and combat terrorist and criminal activity” and does not target any particular ethnicity. The statement said Western countries also use such technology, calling the U.S. “a true surveillance state.” Other government agencies did not respond to a request for comment.
__
Yael Grauer is an independent investigative tech reporter. AP journalists Garance Burke in San Francisco, Larry Fenn in New York and Byron Tau in Washington contributed to this report, along with Myf Ma, an independent investigative journalist, researcher and programmer in New York covering China.
__
Contact AP’s global investigative team at [email protected] or https://www.ap.org/tips/
Takeaways from AP’s investigation into how US tech companies enabled China’s digital police state
https://apnews.com/article/chinese-surveillance-silicon-valley-uyghurs-tech-xinjiang-7ddfd2a3260a541fd9ffedddb44e34f42025-09-09T04:31:18Z
BEIJING (AP) — Across China, tens of thousands of people tagged as troublemakers are trapped in a digital cage, barred from leaving their province and sometimes even their homes by the world’s largest digital surveillance apparatus. Most of this technology came from companies in a country that has long claimed to support freedoms worldwide: the United States.
Over the past quarter century, American tech companies to a large degree designed and built China’s surveillance state, playing a far greater role in enabling human rights abuses than previously known, an Associated Press investigation found. They sold billions of dollars of technology to the Chinese police, government and surveillance companies, despite repeated warnings from the U.S. Congress and in the media that such tools were being used to quash dissent, persecute religious sects and target minorities.
Most of the companies that responded said they fully complied with all laws, sanctions and U.S. export controls governing business in China, past and present. Here are key findings:
America brought ‘predicative policing’ to China
U.S. companies introduced systems that mine a vast array of information — texts, calls, payments, flights, video, DNA swabs, mail deliveries, the internet, even water and power use — to unearth individuals deemed suspicious and predict their movements. But this technology also allows Chinese police to threaten friends and family and preemptively detain people for crimes they have not even committed. The AP found a Chinese defense contractor, Huadi, worked with IBM in 2009 to design the main policing system for Beijing to censor the internet and crack down on alleged terrorists, the Falun Gong religious sect, and even villagers deemed troublesome. IBM referred to any possible relationship it may have had with Chinese government agencies as “old, stale interactions”: “ ... If older systems are being abused today — and IBM has no knowledge that they are — the misuse is entirely outside of IBM’s control, was not contemplated by IBM decades ago, and in no way reflects on IBM today.” Huadi did not respond.
◆ Stay up to date with similar stories by signing up to our WhatsApp channel.
US tech enabled the Xinjiang crackdown
American surveillance technologies allowed a brutal mass detention campaign in the far west region of Xinjiang — targeting, tracking and grading virtually the entire native Uyghur population to forcibly assimilate and subdue them. IBM agents in China sold its i2 software to the Xinjiang police, China’s Ministry of State Security, and many other Chinese police units throughout the 2010s, leaked emails show. One agent, Landasoft, subsequently copied and deployed it as the basis for a predictive policing platform that tagged hundreds of thousands of people as potential terrorists. IBM said it has no record of its i2 software ever being sold to the Public Security Bureau in Xinjiang, was not aware of any interaction between Landasoft and that bureau and cut ties with Landasoft in 2014. Landasoft did not respond.
Some tech companies even specifically addressed race in their marketing. Dell and a Chinese surveillance firm promoted a “military-grade” AI-powered laptop with “all-race recognition” on its official WeChat account in 2019. And until contacted by AP in August, biotech giant Thermo Fisher Scientific’s website marketed DNA kits to the Chinese police as “designed” for the Chinese population, including “ethnic minorities like Uyghurs and Tibetans.” The Xinjiang government said that it uses surveillance technologies to prevent terrorism, and that Western countries also use such technology, calling the U.S. “a true surveillance state.”
Companies pitched tech to control citizens
Though the companies often claim they aren’t responsible for how their products are used, some directly pitched their tech as tools for Chinese police to control citizens, marketing materials from IBM, Dell, Cisco, and Seagate show. Their sales pitches — made both publicly and privately — cited Communist Party catchphrases on crushing protest, including “stability maintenance,” “key persons,” and “abnormal gatherings,” and named programs that stifle dissent, such as “Internet Police,” “Sharp Eyes” and the “Golden Shield.” IBM, Dell, Cisco and Seagate said they adhere to all relevant laws.
American tech laid the foundation for Chinese surveillance
American technology laid the foundation for China’s surveillance apparatus that Chinese companies have since built on and in some cases replaced. Intel and NVIDIA helped China’s three biggest surveillance companies make their camera systems AI-powered. Contracts to maintain existing IBM, Dell, HP, Cisco, Oracle, and Microsoft software and gear remain ubiquitous, often with third parties. And to this day, concerns remain over where technology sold to China will end up, with former U.S. officials and national security experts criticizing a deal struck this summer for NVIDIA to sell chips used in artificial intelligence to China, saying the technology would fall into the hands of the Chinese military and intelligence. NVIDIA said in 2022 that Chinese surveillance firms Watrix and GEOAI used its chips to train AI patrol drones and systems to identify people by their walk, but told the AP those relationships no longer continue. NVIDIA said it does not make surveillance systems or software, does not work with police in China and has not designed the H20 chips for police surveillance, and the White House and Department of Commerce did not respond to requests for comment.
Big loopholes in sanctions remain
Some U.S. companies ended contracts in China over rights concerns and after sanctions. IBM said it has prohibited sales to Tibet and Xinjiang police since 2015, and suspended business relations with defense contractor Huadi in 2019. NVIDIA and Intel also ended partnerships with China’s top two surveillance companies in 2019. However, sanctions experts noted that the laws have significant loopholes and often lag behind new developments. For example, a ban on military and policing gear to China after the 1989 Tiananmen massacre does not take into account newer technologies or general-use products that can be applied in policing. They also noted that the law around export controls is complicated.
A cautionary tale
What started in China more than a decade ago could be seen as a cautionary tale for other countries at a time when the use of surveillance technology worldwide is rising sharply, including in the United States. Emboldened by the Trump administration, U.S. tech companies are more powerful than ever, and President Donald Trump has rolled back a Biden-era executive order meant to safeguard civil rights from new surveillance technologies. As the capacity and sophistication of such technologies has grown, so has their reach. Surveillance technologies now include AI systems that help track and detain migrants in the U.S. and identify people to kill in the Israel-Hamas war. China, in the meantime, has used what it learned from the U.S. to turn itself into a surveillance superpower, selling technologies to countries like Iran and Russia.
“Because of this technology … we have no freedom at all,” said Yang Caiying, now in exile in Japan, whose family has been trapped in an increasingly tight noose of surveillance for the past 16 years. “At the moment, it’s us Chinese that are suffering the consequences, but sooner or later, Americans and others, too, will lose their freedoms.”
__
Yael Grauer is an independent investigative tech reporter. AP journalists Garance Burke in San Francisco, Larry Fenn in New York and Byron Tau in Washington contributed to this report, along with Myf Ma, an independent investigative journalist, researcher and programmer in New York covering China.
__
Contact AP’s global investigative team at [email protected] or https://www.ap.org/tips/