Read the Beforeitsnews.com story here. Advertise at Before It's News here.
Profile image
Story Views
Now:
Last hour:
Last 24 hours:
Total:

China Weaponizes the Smartphone?

% of readers think this story is Fact. Add your two cents.


Concerned about Big Brother?  You should be, but not just in the US.  It’s being reported by Forbes that China has now weaponized the smartphone and has presented reasons why this should cause you concern.

Zapya is a new mobile app that has gone viral.

According to its developers, “File sharing has never been simpler.  You can share files from device to device for free—Zapya allows you to seamlessly transfer massive files across multiple platforms.”

China is well known for its blatant copyright and patent infringements and so, it’s not surprising to see this kind of app appearing on the scene.

Since 2012, the app has been downloaded more than 450 million times.

However, here is what Forbes points out:

Somewhat awkwardly, though, it now appears that the authorities in Xinjiang have been “targeting” Zapya users among the minority Uighur population. If the app is found on a device, it’s reason enough for an investigation. And depending on what files have been shared, that investigation could lead to internment.

The Zapya revelations can be found among a leaked cache of documents that expose the surveillance ecosystem deployed in Xinjiang. The China Cables, published by the International Consortium of Investigative Journalists, detail the deployment of a no holds barred surveillance laboratory, where patterns of life can be monitored and the population can be controlled. Missteps run the risk of internment, and internment can only be escaped through modified thinking and behaviour.

It isn’t just Zapya, of course, and its developers had not responded to a request for comment at the time of publishing. Allegations that the authorities actively monitor communications on Tencent’s WeChat have long been made, and Western apps like WhatsApp are an immediate red flag. “Uighurs inside and outside China now live with the knowledge that their communications are constantly monitored by the authorities,” ICIJ says in its analysis of the leaked documents.

Forbes has been documenting the advancement of Chinese tyranny concerning smartphones.

  • In May, Xinjiang authorities had commissioned their own mobile app to access the Integrated Joint Operations Platform (IJOP), a surveillance platform that packages multiple data sources on the region’s subjugated population.
  •  
  • In July, a joint investigation by Motherboard, the Guardian, the New York Times, Süddeutsche Zeitung and Germany’s NDR reported that foreigners crossing into Xinjiang were being “forced to install a piece of malware on their phones that gives all of their text messages as well as other pieces of data to the authorities.” Border guards were taking phones and installing the malware—called BXAQ or Feng Cai—to scan the device for files against a target list, including “Islamic extremist content, but also innocuous Islamic material, academic books on Islam by leading researchers, and even music from a Japanese metal band.”
  •  
  • In August, there were claims by Hong Kong pro-democracy protesters that Chinese government agencies were exploiting a “bug” in Telegram, the banned but much used encrypted messaging platform, to leak real phone numbers which could then be linked to real identities. The “bug” enabled government agencies—so the theory ran—to load a phone with known protester numbers which would then sync to the anonymised profiles in public groups, exposing the matches. A quick chat with a state-owned telco could then link the number to the person.
  •  
  • Then by early September, China had deployed hacked websites to attack iPhones belonging to the Uighur community. Google’s Project Zero warned that “simply visiting the hacked site was enough for the exploit server to attack your device, and if it was successful, install a monitoring implant.” 

Due to the vast amounts of personal information and data kept on one’s smartphone, they are very valuable to those who wish to exploit that information.  Of course, we all know that virtually any app you want to use, you have to allow it to access all sorts of data that really isn’t necessary to run the app.  If you don’t, you can’t use the app.

Zak Doffman comments:

The Chinese authorities continue the fiction that what is taking place in Xinjiang is simply an intensive counter-terrorism program, which has local public support and which has made the region safe. “There are no so-called ‘detention camps’ in Xinjiang,” was the official response to the latest leaked documents. “Vocational education and training centres have been established for the prevention of terrorism—[Xinjiang was] a battleground—[with] thousands of terrorist incidents between 1990s and 2016—Since the measures have been taken, there’s no single terrorist incident.”

This weaponisation is wider than Xinjiang and Hong Kong. It’s a switch that has been flicked. In a world where we all carry pocket-sized devices to store all our data, to track our movements and interactions, to get to know us better than anyone else in our lives, China has shown that it only takes a state willing and able to cross the line at scale to create the dystopian reality now unfolding in Xinjiang. Without those mobile devices, it doesn’t work, it becomes materially harder if not impossible.

While Doffman rightly calls Apple and Google “gatekeepers,” his claim that we trust them to keep us safe is actually unwarranted, especially in the case of Google.  Google is anything but American.  It is a CIA-backed, corporate tyrant.  Along with other social media giants like Facebook and Twitter, and manufacturers of Android products, no one can actually trust that any of these companies actually have your privacy and security at heart, and in some cases, they are more than willing to turn over tons of raw data about you and contacts you have to government entities without a warrant.

One should be outraged at the US government’s abuse of this technology, but no one should be surprised that Communist China is utilizing it.

The reality though is that though Doffman claims that China has opened Pandora’s Box in all of this, he rightly points out “it’s been there all this time.”

That really should cause us to reflect on what has been obtained by our own government and how they are weaponizing our own devices against us.

Article posted with permission from Sons Of Liberty Media



Before It’s News® is a community of individuals who report on what’s going on around them, from all around the world.

Anyone can join.
Anyone can contribute.
Anyone can become informed about their world.

"United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.

Please Help Support BeforeitsNews by trying our Natural Health Products below!


Order by Phone at 888-809-8385 or online at https://mitocopper.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomic.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomics.com M - F 9am to 5pm EST


Humic & Fulvic Trace Minerals Complex - Nature's most important supplement! Vivid Dreams again!

HNEX HydroNano EXtracellular Water - Improve immune system health and reduce inflammation.

Ultimate Clinical Potency Curcumin - Natural pain relief, reduce inflammation and so much more.

MitoCopper - Bioavailable Copper destroys pathogens and gives you more energy. (See Blood Video)

Oxy Powder - Natural Colon Cleanser!  Cleans out toxic buildup with oxygen!

Nascent Iodine - Promotes detoxification, mental focus and thyroid health.

Smart Meter Cover -  Reduces Smart Meter radiation by 96%! (See Video).

Report abuse

    Comments

    Your Comments
    Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

    Total 1 comment
    • truck driver

      China hollows out their gold bars and fills them with copper

    MOST RECENT
    Load more ...

    SignUp

    Login

    Newsletter

    Email this story
    Email this story

    If you really want to ban this commenter, please write down the reason:

    If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.