[current_date format=l,] [current_date]

Made in China’ Gadgets Turned into Mass Surveillance Devices

916 Views

By Paul Hunter

"If you’ve been waiting for an invitation, this calligraphy is it. Commissioned by Facebook, this is a hand-lettered design for a poster. Quote is Facebook mine "

- Massimo Vignelli

There has been growing concern in the West over the proliferation of Chinese electronics, which appear to have been hard-wired for mass surveillance and espionage. This should come as no surprise to consumers who have long been aware of various corporations and government entities monitoring them through their devices. But the problem with Chinese Communist Party is much worse than most would imagine. According to a University of Edinburgh Study, published in February of this year, Chinese tech companies like OnePlus and Xiaomi pack their phones  with spyware, designed to scoop up everything from your contacts list to your app usage. They do so even when the devices are off or out of service, and without paying any mind to data protection laws and opt-outs—all of which are routinely

There has been growing concern in the West over the proliferation of Chinese electronics, which appear to have been hard-wired for mass surveillance and espionage. This should come as no surprise to consumers who have long been aware of various corporations and government entities monitoring them through their devices. But the problem with Chinese Communist Party is much worse than most would imagine.

According to a University of Edinburgh Study, published in February of this year, Chinese tech companies like OnePlus and Xiaomi pack their phones  with spyware, designed to scoop up everything from your contacts list to your app usage. They do so even when the devices are off or out of service, and without paying any mind to data protection laws and opt-outs—all of which are routinely respected by tech giants and government agencies in the United States.

All of this data is transmitted to third-party groups, including mobile network operators, outside service providers like Baidu, and of course the Chinese government. These companies—and in fact all companies that do business with China—are required to create backdoors in both their hardware and their software, giving the Chinese government unfettered access to their devices. A government official could tap into a video feed or read text messages without a warrant or a notification, and they can do so from halfway across the world regardless of where you are.

Over the years China has fought to become a leader in technological innovation. They’ve upgraded their manufacturing capabilities and invested in research, allowing them to produce cheap, state-of-the-art devices, many of which are sold overseas. It’s not just smartphones. Chinese companies are churning out everything from household gadgets to smartwatches, and they’ve become so ubiquitous that many buyers have forgotten the dangers of investing in Chinese tech. It’s resulted in some alarming scenarios.

Law enforcement in the UK relies on closed-circuit television cameras (CCTV), which were mostly purchased from Chinese tech companies like Hikvision. They’re so common that it has been said that every high street in London is now being surveilled by the Chinese government. They even found cameras that were being trained on UK military bases. Efforts to correct the issue have been slow. The cameras were not banned in government buildings until November of last year, and while there has been outcry, the public surveillance system has yet to be replaced.

The US government has been debating and shelving the issue of Chinese tech companies for more than a decade. Public discourse began in September of 2012 when the US House Permanent Select Committee on Intelligence (USHPSCI) interviewed representatives from Chinese tech giants ZTE and Huawei. When Rep. Adam Schiff (D – Calif.) asked them about Article 11 of the Chinese National Intelligence Law, which requires tech companies to give the Chinese government access to their data, they claimed that they had never heard of such a law. They also insisted that they would never release their customer’s data should the Chinese government ask them to do so.. The matter was far from resolved after the hearing. Committee Chairman Mike Rogers (R-Mich.) voiced his disappointment, stating that he hoped the Chinese tech companies would be more forthcoming about their operations. Instead, there was an obvious pattern of deflection and lies. Huawei still refuses to disclose their ownership structure, and they will not admit to basic facts, such as their establishment of a nationwide mobile network.

Both parties agreed that Huawei and ZTE posed a serious threat to national security. But the American government allowed them to continue doing business in the US—thereby continuing their mass surveillance campaign–until November of 2022 when sales of new products were banned. Many of their older models are still on the shelves.

Chinese tech companies have zero plausible deniability when it comes to data collection. The United States frequently sounds the alarm on Chinese espionage. They’ve stolen military secrets, information pertaining to national security, even blueprints for fighter jets. No field has been left neglected, and that’s within the private sector as well. . Companies on Wall Street lose an estimated total of $320 billion annually from Chinese economic theft.

Corporations and foreign governments aren’t the only ones who should be worried. The Chinese government has been dissidents overseas. In one of several cases made public by the DOJ, Wu Xiaolei, a 25-year-old student in Boston, was arrested for harassing his classmate, a fellow Chinese national. The victim in the caseput up a series of anti-government posters. Wu’s reponse was to threaten to cut her hands off. He also alerted Chinese security officials, who he said would be making a visit to the victim’sfamily home on the mainland.

Those same security officials have setup unofficial police stations around the world known as “110 Overseas Police Service Centers.” There are 54 known locations on 5 continents, including several offices in the US and the UK. They’re used to harass and intimidate Chinese citizens into returning to the mainland for criminal proceedings, a violation of international law. They’re also utilizing China’s mass surveillance network to go after anyone they deem to be a threat to the Communist party. Chinese devices and social media companies play a large part in their operations, so much so that the FBI has been monitoring Wechat, a popular social media platform in China, for signs of harassment.

Chinese tech companies represent a clear threat to both sovereignty and security, and the American government has known that for well over a decade; the same can be said for the UK. But they’ve only recently begun taking decisive action against them. Every nation across the world should take a comprehensive look at the entire Chinese tech sector.. They should ban any piece of technology that could be used for surveillance and remove every device that has been compromised. Anything less represents a reckless disregard for public safety and the rule of law.

Tag

More on this topic

More Stories

SubscribeNewsletter@2x
Refreshing and Insights
at No Cost to You!

Cancel anytime

Latest Articles

Trending

Top Products

Contact us

Wherever & whenever you are,
we are here always.

The Middle Land

100 Wilshire Blvd., Suite 700 Santa Monica, CA 90401
Footer Contact

Terms and Conditions

October, 2023

Using our website

You may use the The Middle Land website subject to the Terms and Conditions set out on this page. Visit this page regularly to check the latest Terms and Conditions. Access and use of this site constitutes your acceptance of the Terms and Conditions in-force at the time of use.

Intellectual property

Names, images and logos displayed on this site that identify The Middle Land are the intellectual property of New San Cai Inc. Copying any of this material is not permitted without prior written approval from the owner of the relevant intellectual property rights.

Requests for such approval should be directed to the competition committee.

Please provide details of your intended use of the relevant material and include your contact details including name, address, telephone number, fax number and email.

Linking policy

You do not have to ask permission to link directly to pages hosted on this website. However, we do not permit our pages to be loaded directly into frames on your website. Our pages must load into the user’s entire window.

The Middle Land is not responsible for the contents or reliability of any site to which it is hyperlinked and does not necessarily endorse the views expressed within them. Linking to or from this site should not be taken as endorsement of any kind. We cannot guarantee that these links will work all the time and have no control over the availability of the linked pages.

Submissions 

All information, data, text, graphics or any other materials whatsoever uploaded or transmitted by you is your sole responsibility. This means that you are entirely responsible for all content you upload, post, email or otherwise transmit to the The Middle Land website.

Virus protection

We make every effort to check and test material at all stages of production. It is always recommended to run an anti-virus program on all material downloaded from the Internet. We cannot accept any responsibility for any loss, disruption or damage to your data or computer system, which may occur while using material derived from this website.

Disclaimer

The website is provided ‘as is’, without any representation or endorsement made, and without warranty of any kind whether express or implied.

Your use of any information or materials on this website is entirely at your own risk, for which we shall not be liable. It is your responsibility to ensure any products, services or information available through this website meet your specific requirements.

We do not warrant the operation of this site will be uninterrupted or error free, that defects will be corrected, or that this site or the server that makes it available are free of viruses or represent the full functionality, accuracy and reliability of the materials. In no event will we be liable for any loss or damage including, without limitation, loss of profits, indirect or consequential loss or damage, or any loss or damages whatsoever arising from the use, or loss of data, arising out of – or in connection with – the use of this website.

Privacy & Cookie Policy

September 11, 2024

Last Updated: September 11, 2024

New San Cai Inc. (hereinafter “The Middle Land,” “we,” “us,” or “our”) owns and operates www.themiddleland.com, its affiliated websites and applications (our “Sites”), and provides related products, services, newsletters, and other offerings (together with the Sites, our “Services”) to art lovers and visitors around the world.

This Privacy Policy (the “Policy”) is intended to provide you with information on how we collect, use, and share your personal data. We process personal data from visitors of our Sites, users of our Services, readers or bloggers (collectively, “you” or “your”). Personal data is any information about you. This Policy also describes your choices regarding use, access, and correction of your personal information.

If after reading this Policy you have additional questions or would like further information, please email at middleland@protonmail.com.

PERSONAL DATA WE COLLECT AND HOW WE USE IT

We collect and process personal data only for lawful reasons, such as our legitimate business interests, your consent, or to fulfill our legal or contractual obligations.

Information You Provide to Us

Most of the information Join Talents collects is provided by you voluntarily while using our Services. We do not request highly sensitive data, such as health or medical information, racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, etc. and we ask that you refrain from sending us any such information.

Here are the types of personal data that you voluntarily provide to us:

  • Name, email address, and any other contact information that you provide by filling out your profile forms
  • Billing information, such as credit card number and billing address
  • Work or professional information, such as your company or job title
  • Unique identifiers, such as username or password
  • Demographic information, such as age, education, interests, and ZIP code
  • Details of transactions and preferences from your use of the Services
  • Correspondence with other users or business that you send through our Services, as well as correspondence sent to JoinTalents.com

As a registered users or customers, you may ask us to review or retrieve emails sent to your business. We will access these emails to provide these services for you.

We use the personal data you provide to us for the following business purposes:

  • Set up and administer your account
  • Provide and improve the Services, including displaying content based on your previous transactions and preferences
  • Answer your inquiries and provide customer service
  • Send you marketing communications about our Services, including our newsletters (please see the Your Rights/Opt Out section below for how to opt out of marketing communications)
  • Communicate with users who registered their accounts on our site
  • Prevent, discover, and investigate fraud, criminal activity, or violations of our Terms and Conditions
  • Administer contests and events you entered

Information Obtained from Third-Party Sources

We collect and publish biographical and other information about users, which we use to promote the articles and our bloggers  who use our sites. If you provide personal information about others, or if others give us your information, we will only use that information for the specific reason for which it was provided.

Information We Collect by Automated Means

Log Files

The site uses your IP address to help diagnose server problems, and to administer our website. We use your IP addresses to analyze trends and gather broad demographic information for aggregate use.

Every time you access our Site, some data is temporarily stored and processed in a log file, such as your IP addresses, the browser types, the operating systems, the recalled page, or the date and time of the recall. This data is only evaluated for statistical purposes, such as to help us diagnose problems with our servers, to administer our sites, or to improve our Services.

Do Not Track

Your browser or device may include “Do Not Track” functionality. Our information collection and disclosure practices, and the choices that we provide to customers, will continue to operate as described in this Privacy Policy, whether or not a “Do Not Track” signal is received.

HOW WE SHARE YOUR INFORMATION

We may share your personal data with third parties only in the ways that are described in this Privacy Policy. We do not sell, rent, or lease your personal data to third parties, and We does not transfer your personal data to third parties for their direct marketing purposes.

We may share your personal data with third parties as follows:

  • With service providers under contract to help provide the Services and assist us with our business operations (such as our direct marketing, payment processing, fraud investigations, bill collection, affiliate and rewards programs)
  • As required by law, such as to comply with a subpoena, or similar legal process, including to meet national security or law enforcement requirements
  • When we believe in good faith that disclosure is necessary to protect rights or safety, investigate fraud, or respond to a government request
  • With other users of the Services that you interact with to help you complete a transaction

There may be other instances where we share your personal data with third parties based on your consent.

HOW WE STORE AND SECURE YOUR INFORMATION

We retain your information for as long as your account is active or as needed to provide you Services. If you wish to cancel your account, please contact us middleland@protonmail.com. We will retain and use your personal data as necessary to comply with legal obligations, resolve disputes, and enforce our agreements.

All you and our data are stored in the server in the United States, we do not sales or transfer your personal data to the third party. All information you provide is stored on a secure server, and we generally accepted industry standards to protect the personal data we process both during transmission and once received.

YOUR RIGHTS/OPT OUT

You may correct, update, amend, delete/remove, or deactivate your account and personal data by making the change on your Blog on www.themiddleland.com or by emailing middleland@protonmail.com. We will respond to your request within a reasonable timeframe.

You may choose to stop receiving Join Talents newsletters or marketing emails at any time by following the unsubscribe instructions included in those communications, or you can email us at middleland@protonmail.com

LINKS TO OTHER WEBSITES

The Middle Land include links to other websites whose privacy practices may differ from that of ours. If you submit personal data to any of those sites, your information is governed by their privacy statements. We encourage you to carefully read the Privacy Policy of any website you visit.

NOTE TO PARENTS OR GUARDIANS

Our Services are not intended for use by children, and we do not knowingly or intentionally solicit data from or market to children under the age of 18. We reserve the right to delete the child’s information and the child’s registration on the Sites.

PRIVACY POLICY CHANGES

We may update this Privacy Policy to reflect changes to our personal data processing practices. If any material changes are made, we will notify you on the Sites prior to the change becoming effective. You are encouraged to periodically review this Policy.

HOW TO CONTACT US

If you have any questions about our Privacy Policy, please email middleland@protonmail.com

Logout

Are you sure? Do you want to logout of the account?

Article Submission

[forminator_form id="30962"]

New Programs Added to Your Plan

March 2, 2023

The Michelin brothers created the guide, which included information like maps, car mechanics listings, hotels and petrol stations across France to spur demand.

The guide began to award stars to fine dining restaurants in 1926.

At first, they offered just one star, the concept was expanded in 1931 to include one, two and three stars. One star establishments represent a “very good restaurant in its category”. Two honour “excellent cooking, worth a detour” and three reward “exceptional cuisine, worth a

 

February 28, 2023        Hiring Journalists all hands apply

January 18, 2023          Hiring Journalists all hands apply

More

Forgot Password ?

Please enter your email id or user name to
recover your password

Roaster-JT
Thank you for your participation!
Back to Home
Roaster-JT
Thank you for your subscription!
Please check your email to activate your account.
Back to Home
Roaster-JT
Thank you for your participation!
Please check your email for the results.
Back to Home

Login to Vote!

Thank you for your participation,
please Log in or Sign up to Vote

Thank you for your Comment

Back to Home

Reply To:

New Programs Added to Your Plan

[forminator_form id="31075"]

Login Now

123Sign in to your account