Search This Blog

Tuesday, August 22, 2023

Mass surveillance in China

From Wikipedia, the free encyclopedia
Surveillance cameras at Tiananmen Square in 2009. In 2019, Comparitech reported that 8 out of 10 of the most monitored cities in the world are in China.

Mass surveillance in the People's Republic of China (PRC) is the network of monitoring systems used by the Chinese central government to monitor Chinese citizens. It is primarily conducted through the government, although corporate surveillance in connection with the Chinese government has been reported to occur. China monitors its citizens through Internet surveillance, camera surveillance, and through other digital technologies. It has become increasingly widespread and grown in sophistication under General Secretary of the Chinese Communist Party (CCP) Xi Jinping's administration.

Background

Mass surveillance has significantly expanded under the PRC Cybersecurity Law (2016) and with the help of local companies like Tencent, Dahua Technology, Hikvision, SenseTime, ByteDance, Megvii, Huawei and ZTE, among many others. As of 2019, it is estimated that 200 million monitoring CCTV cameras of the "Skynet" system have been put to use in mainland China, four times the number of surveillance cameras in the United States. By 2020, the number of surveillance cameras in mainland China is expected to reach 626 million. The coronavirus pandemic has accelerated the implementation of mass surveillance as it has provided a plausible pretext to do so.

History

Origin

Mass surveillance in China emerged in the Maoist era after the establishment of the People's Republic of China in 1949. Mao invented this mechanism of control that encompassed the entire nation and its people in order to strengthen his power in the newly founded government. In the early years, when technology was relatively undeveloped in China, mass surveillance was accomplished through disseminating information by word of mouth. Chinese people kept a watchful eye on one another and reported inappropriate behaviors that infringed upon the dominant social ideals of the time. According to a publication from 1987, computer and Internet technology spread to China in the late 20th century as a result of the Chinese economic reform.

21st century

In 2005, the Chinese government created a mass surveillance system called Skynet. The government revealed Skynet's existence in 2013, by which time the network included over 20 million cameras. In addition to monitoring the general public, cameras were installed outside mosques in the Xinjiang region, temples in Tibet, and the homes of dissidents.

In 2017, the Chinese government encouraged the use of various mobile phone apps as part of a broader surveillance push. Local regulators launched mobile apps for national security purposes and to allow citizens to report violations.

As of 2018, the most notable surveillance mechanisms were mass camera surveillance on the streets, internet surveillance, and newly invented surveillance methods based on social credit and identity.

As of 2018, the Chinese central government had also adopted facial recognition technology, surveillance drones, robot police, and big data collection targeting online social media platforms to monitor its citizens.

In 2019 NSA whistleblower Edward Snowden said China's mass surveillance mechanisms and machinery of private communications was "utterly mind-boggling". As of 2019, it was estimated that 200 million monitoring CCTV cameras of the "Skynet" system had been put to use in mainland China, four times as many as the surveillance cameras in the United States. State media in China claim that Skynet is the largest video surveillance system in the world, utilizing facial recognition technology and big data analysis. In 2019, Comparitech reported that 8 out of 10 most monitored cities in the world are in China, with Chongqing, Shenzhen and Shanghai being the world's top 3. In 2019, China supplied surveillance technology to most of the world, and positioned the country in control over the mass surveillance industry.

According to industry researcher IHS Markit, at the end of 2019 there were 770 million surveillance cameras in the world, with approximately 415.8 million of them located in China. If these trends continue, by the end of 2021 there will be about 1 billion in the world and 540 million in China. The government says this prevents crime, but citizens worry that their data and privacy could be compromised. In late October 2020, Deng Yufeng, an artist, used performance art to highlight how difficult it is to dodge the view of security cameras.

Timeline

  • In 2011, the Beijing Municipal Science & Technology Commission proposed a mobile phone tracking program, to be called the Information Platform of Real-time Citizen Movement, which was ostensibly intended to ease traffic flow on the city's streets.
  • In the four years up to 2012, 100,000 crimes had reportedly been solved with the aid of surveillance cameras in Guangdong according to officials. However, a critic said that "one of the most important purposes of such a smart surveillance system is to crack down on social unrest triggered by petitioners and dissidents".
  • In 2013, the government saw the severe atmospheric pollution in Chinese cities as a security threat because the closed-circuit television cameras were rendered useless. In December 2013, the Vice Minister of the Ministry of Industry and Information Technology asked China Telecom, a major landline and mobile telephone company, to implement a real name registration scheme.
  • In 2014, the Ministry of Industry and Information Technology followed with a request to regulate the dissemination of objectionable information over the network. Also in 2014, China used a government-backed brain and emotional surveillance project on an unprecedented scale in factories, public transport, state-owned companies and the military.
  • In January 2014, the State Administration of Press, Publication, Radio, Film, and Television announced that users who wished to upload videos to Chinese web sites would be required to use their real names. The agency explained that the requirement was meant to prevent vulgar content, base art forms, exaggerated violence and sexual content in internet video having a negative effect on society.
  • According to an official document released in 2015, the Chinese government aimed to build a nationwide video surveillance network by 2020 to ensure public security, which will be omnipresent, fully networked, working all the time, and fully controllable. (subscription required)
  • In 2016, China introduced a cybersecurity law requiring internet companies to store all network logs for at least six months and to store all personal data and critical information within mainland China. Also in 2016, China deploys AnBot Police Robot equipped with stun weapon and facial recognition cameras to start patrolling the Shenzhen airport.
  • In 2018, Chinese law enforcement officials were equipped with facial recognition Smartglasses in order to apprehend criminals, especially drug smugglers. The technology was originally adopted at the 2017 Qingdao International Beer Festival. With its assistance the police claimed to have captured many criminals, including 25 fugitives, 19 drug smugglers, and 37 plagiarists. Also in 2018, Chinese authorities admitted for the first time that they could access WeChat users' deleted messages without their permission. The Chaohu city discipline inspection and supervision commission retrieved a suspect's entire conversation history that had already been deleted in one incident.
  • In March 2019, China announced a regulation on small video apps to help prevent teenagers' internet addiction disorder. It allows related apps to forcibly trigger "teenager mode" by tracing users' location and analyzing their behavior. It was used in all small video apps by June 2019. In 2019, China announced that the third generation of Resident Identity Cards will be able to trace location. Blood information will also be collected and recorded in the card.
  • In 2020, Chinese law enforcement officials wore "smart helmets" equipped with AI-powered infrared cameras to detect pedestrians' temperature amid the COVID-19 pandemic. The smart helmets, used by the Chinese police, also have facial recognition capabilities, license plate recognition and the ability to scan QR codes.

Technologies

Internet

The Chinese government has been strengthening its tight control over the Internet and digital communication. There are more than 750 million Internet users in China, and their online actions are strictly regulated. In 2017, the Cyberspace Administration of China (CAC) released a new regulation, which imposed restrictions on the production and distribution of online news. The regulation required all platforms, such as online blogs, forums, websites, and social media apps to be managed by party-sanctioned editorial staff. These staff must obtain approval from the national or local government Internet and information offices and be trained by the central government. As required by the Chinese government, major internet platforms and messaging services in China established elaborate self-censorship mechanisms. Some have hired teams of thousands to police content and invested in powerful artificial intelligence algorithms. In 2019, on the 30th anniversary of the 1989 Tiananmen Square protests and massacre, China's AI censors cranked up.

Launched in 2011, WeChat, China's most popular messaging app, is under surveillance by Internet police. Any message sent through a WeChat group is monitored by the Chinese technology giant Tencent, the application's operator. All conversations are stored for six months. Even conversations deleted by WeChat users can be retrieved back by Tencent, especially when government authorities seek evidence of a suspect's illegal activities. Authorities have admitted that they can retrieve archived messages once sent on WeChat. Nevertheless, Tencent CEO Ma Huateng stated that his company will not use user chats for big data analysis or invade users' privacy.

In 2017, the Chinese government required all users of Sina Weibo, microblogging site, to register with their real names and identity numbers by September 15 of that year. Weibo users who refused to register their accounts with real names were not able to post, repost, and comment on the site.

At the beginning of 2018, Ma Huateng, chairman and CEO of Tencent, claimed that WeChat's monthly active users across the globe reached a billion for the first time. Since Tencent cooperates with the central government to implement self-censorship and mass surveillance, it enjoys dominance of its industry in China. Other messaging apps, such as WhatsApp, Messenger, and Line are mostly blocked or even forced out of the Chinese market.

Chinese Internet users have several ways to circumvent censorship. Netizens generally rely on virtual private networks (VPNs) to access blocked websites and messaging apps. However, in July 2017, the Chinese government required telecommunications carriers including China Mobile, China Unicom, and China Telecom to block individual access to VPNs by February 1. In August 2017, more than 60 VPNs, such as Astrill and Express VPN, were removed from China's App Store. VPNs that are allowed to be used in China must be approved by state regulators and use the state network infrastructure. Instead of sensitive words which can be censored online, Chinese netizens use puns and Chinese homophones to communicate.

Sex and pornography on the Internet

The Chinese government has been denouncing sex and pornography culture and actively establishes "sex education" for teenagers and high school students in order to prevent them from developing an interest in this culture. As of 2012 the most frequent way Chinese people were accessing otherwise banned sexual material was through the Internet. According to a 2012 article, the number of sex-related pages was increasing at the time. As of 2010 China's Ministry of Public Security had collected intelligence agents from student groups to spy on people's internet activities. When government efforts at porn censorship and surveillance heightened in 2010, instances of erotic activism also emerged online. As of 2012 movies, books, comics, and videos involving sexually sensitive or provocative material were typically banned on Chinese Internet. Web administrators have been seeking sexual information online to remove it as soon as they found it or otherwise censor it.

As of 2018, there have been sections in China's criminal law which explicitly forbid the production, dissemination, or sale of obscene material, for which people can be imprisoned. In the 1980s, there was a campaign against "spiritual pollution", referring to sex-related content. In 2018, a Chinese erotic writer who wrote and sold a gay porn novel named Occupy online was sentenced to a ten-and-a-half year prison sentence. As of 2019, conservative attitudes toward sex talk have remained standard amongst the general public.

Surveillance cameras

A camera monitoring warning sign near the Monument to the Peaceful Liberation of Tibet, Lhasa, Tibet, 2018

By 2018, the Chinese government had installed close to 200 million surveillance cameras across the country, which amounts to approximately one camera per seven citizens. At the same time, approximately 40 million surveillance cameras were active in the United States in 2014, which amounts to approximately one camera per eight citizens; however, these are largely installed by homeowners and stores rather than the government. According to official statistics in 2012, more than 660 of the mainland's 676 cities use surveillance systems. In Guangdong province, 1.1 million cameras were installed in 2012, with plans to increase the number to two million by 2015 at a predicted cost of 12.3 billion yuan. By 2020, the Chinese government expects to integrate private and public cameras, leveraging the country's technological expertise in facial recognition technology to build a nationwide surveillance network.

The facial recognition technology has technological and systematic limitations. For example, a supervisor at an AI firm that provides research support for this technology has stated that the system of activity profile can only look for a maximum of a thousand people in one search. Additionally, the system cannot work continuously for long periods of time, requiring reactivation in cases of extreme need.

The National Information Security Standardization Technical Committee (全国信标委生物特征识别分技术委), which is subordinate to the China Communications Standards Association, started a project in November 2019 to create mandatory standards for facial recognition in China. The project is led by SenseTime and has been assigned to a working group comprising 27 Chinese companies. Also Chinese companies are working to shape United Nations' standards for facial recognition, video surveillance of cities and vehicles, with ZTE, Dahua Technology, China Telecom and others proposing standards to the International Telecommunication Union (ITU).

Other digital technologies

China has highly advanced facial recognition technology. The technology is integrated with others, such as big data and AI, to build a national surveillance and data sharing platform. The smart system is equipped with facial recognition technology to record jaywalkers and non-motor vehicles that break traffic rules. When shopping in the self-service markets of Alibaba and Jingdong, two top Chinese e-commerce companies, customers can use electronic payments through the facial recognition system, which links them with their bank cards. Moreover, Baidu, a Chinese multinational technology company, cooperated with China Southern Airlines to install the facial recognition technology in Nanyang Jiangying Airport, Henan for boarding.

Robot police have been installed in public places such as train stations, museums, and tourist attractions.

Furthermore, the Chinese government uses big data technology in order to analyze and monitor people's online behavior, such as Sesame Credit, which ranks its users based on their online activities along with its previously mentioned functions.

Mainland China

Social credit system

In connection with camera surveillance, the Chinese government was believed to be developing a social credit system that gives their citizens a numerical score by analyzing their social behaviors and collecting fiscal and government data, and accordingly punishing and rewarding them with that score. However, new reports state that such information is false, with the social credit system being low-tech, with no unified score for citizens and the government mainly focusing on fraudulent and unethical businesses who renege on debt repayments, financial agreements or fail to honor legal contracts.

Smart cities

Smart cities began rolling out in 2003 and China is host to hundreds of smart city pilot programs aiming to measure, track and analyse data from every aspect of city life including air quality, traffic flow, congestion and waste water disposal. A key component of smart cities includes the installation of public security cameras in order to more effectively deter crime and anti-social behaviour, however critics have stated the projects are also used as a form of social control in order to target dissidents and crackdown on any potential unrest.

Skynet

Skynet is an interlinked system of facial recognition software enabled surveillance cameras currently in operation in 16 Chinese provinces used to help public security organs crack down on crime and identify citizens in public through cross reference with criminal and national identity databases held by the Ministry of Public Security and the National Citizen Identity Information Center (NCIIC). According to CCP-owned tabloid Global Times, the system is fast enough to scan the entire population of the People's Republic of China in under a second and allegedly has an accuracy rate of 99.8%

Police cloud

In 2020, reporting by Human Rights Watch indicated that public security bureaus (PSB's) across the country began implementing "Police Cloud" systems in order to aggregate data from healthcare, social media activity and internet browsing activity, reportedly to track and predict the activities of activists, dissidents, and ethnic minorities, including those alleged to be in possession of "extreme thoughts". The Central Political and Legal Affairs Commission plans to construct a network of police clouds in every provincial and municipal public security bureau, eventually interlinking them together in one unified national police cloud system.

The police cloud system aims to integrate information from all available sources to public security bureaus including but not limited to: residential addresses, family relations, birth control information, religious affiliations, hotel, flight records, train records, biometrics, CCTV footage, mail delivery information and information shared across from other government departments. Reporting by Human Rights Watch also revealed PSB's also intended to purchase data such as navigation data on the internet (browsing histories) and the logistical purchase and transaction records of major e-commerce companies from third party brokers in order to more effective predict crime while crack down and target any potential dissent.

Sharp eyes project

Sharp eyes (Chinese: 锐眼工程; pinyin: Ruì yǎn gōngchéng) is a project which aims to surveil a hundred percent of public space using surveillance in China by 2020, according to the 13th Five Year Plan released in 2016. Although it is questionable whether such targets outlined in the plan have been achieved, the 14th Five Year Plan continues with the project, instructing public security organs to: "closely guard against, and crack down on, the infiltration, sabotage, subversion and separatist activities by hostile forces"

Digital RMB

Digital RMB or digital Yuan is a centralised digital currency issued by the People's Bank of China (PBOC) in order to facilitate transactions as a supplement and possible eventual replacement of a physical national currency. As of 2021, the project is still pilot stage rolling out across select Chinese cities. Widespread adoption would theoretically allow authorities to see economic activity in real time in addition to all financial transactions which occur in an economy leading to greater surveillance and ability to maintain social control using techniques such as restricting transactions of certain entities or groups, optimising surveillance to the individual level.

Public records

The public records or Dang'an (simplified Chinese: 档案; traditional Chinese: 檔案; pinyin: dàng'àn) literally: "archived record/file". Is a permanent dossier or archival system that records the "performance and attitudes" of citizens of mainland China. Together with the current system of household registration, the Hukou system, it has been an important mechanism of social control. The contents of the file include physical characteristics, employment records, photograph, appraisals by supervisors and peers, academic reports from primary school to university, professional credentials, criminal convictions or administrative penalties, club/society memberships, employment records and political history such as membership in the Communist Youth League and or party membership. If an individual is a party member, the file will also include membership assessments of political integrity and performance of duties. Death certificate and eulogy may also be placed in file. In 2001, a human rights group claimed Public Security Bureaus located throughout the country were in the process of digitising hundreds of millions of dang'an. The dang'an system is the precursor or foundation of the social credit system in that data stored within dossiers are pulled into a broader pool of data and amalgamated together with data pulled from other sources in order to provide a more complete picture of an individual's movements, actions and life.

Resident Identity Card

All Chinese citizens are required to hold a national identity card from the age of 16. The resident ID card (Chinese: 居民身份证; pinyin: Jūmín shēnfèn zhèng) acts as a national ID card and contains basic identifying information such as photograph, residential address, gender, ethnicity, date of birth and fingerprints of both thumbs embedded on an IC chip. Card information is stored within the National Population Basic Information Database (Chinese: 全国人口基本信息数据库; pinyin: Quánguó rénkǒu jīběn xìnxī shùjùkù) administered by the Ministry of Public Security, Ministry of Civil Affairs and the Ministry of Human Resources and Social Security. The resident ID card acts as the primary form of identification for citizens within China and is required for almost all basic government services and administrative tasks in everyday life. In March 2022, Chinese premier Li Keqiang stated that the government was planning the roll out of digital national ID cards with national rollout scheduled for an unspecified date.

Household registration

Household registration or Hukou (Chinese: 户口; pinyin: Hùkǒu) has been in existence since the establishment of the People's Republic of China in 1949 and since imperial times. The "Hukou" or family registration system lists the members of an individual's immediate family and any extended relatives which may be connected to the individual in addition to births, deaths, marriages, divorces and relocations and other movements.

Hukou is divided into either agricultural or urban status and acts as a form of social control through restricting the area in which an individual and his or her children can obtain access to education, healthcare, housing, employment and or other government services. The system also acts as a convenient method for the state to exert collective punishment i.e. individuals who commit or engage in acts of dissent may have their family arrested or detained for leverage.

In recent years Hukou information has been utilised extensively to suppress dissent both at home and abroad in Xi Jinping's anti-corruption campaign, specifically operation Fox Hunt in which suspects accused of corruption in China are coerced into returning to home to face charges for fear of consequences which may befall their family and or extended relatives residing in country. The Ministry of Public Security manages the National Basic Population Information Database (NBPIB) as part of the Golden Shield Project which contains digitised Hukou information in addition to information on past travels and criminal history. The database contains information on 96% of the Chinese population.

Household registration is governed by the "Regulations of the People's Republic of China on Household Registration" issued in 1958 which states:

Article 2: All citizens of the People's Republic of China shall perform household registration.

Article 3 The household registration work shall be in charge of the public security organs at all levels.

Cities and towns with public security police stations shall be under the jurisdiction of public security police stations; townships and towns without public security stations shall be under the jurisdiction of townships and towns. The township and township people's committees and police stations are the household registration authorities.

— Regulations of the People's Republic of China on Household Registration (1958), Chapter I.

Residency registration

In accordance with the Entry Exit Administration Law of the People's Republic of China, all persons entering the country or upon moving to each new region within China must register their residency by obtaining a temporary residence permit at the nearest Public Security Bureau or PSB within 24 hours of arrival. Failure to do so may result in fines of up to 2,000 RMB or detention.

Hotels hosting the stay of foreigners or non-PRC nationals are obligated to report and upload information to platforms stipulated by the PSB's in each respective area. The regulation is reminiscent of soviet practice in that it is designed to closely surveil all foreign nationals in the event they may be potential spies which pose a risk to national security in addition to being able to quickly respond or detain anyone who may be in violation of laws or disrupt public order.

Article 38: Foreigners who reside in China shall, within the prescribed time limit, submit foreigners' residence permits to public security organs under local people's governments at or above the county level in the places of residence for examination.

Article 39: Where foreigners stay in hotels in China, the hotels shall register their accommodation in accordance with the regulations on the public security administration of the hotel industry, and submit foreigners' accommodation registration information to the public security organs in the places where the hotels are located.

For foreigners who reside or stay in domiciles other than hotels, they or the persons who accommodate them shall, within 24 hours after the foreigners' arrival, go through the registration formalities with the public security organs in the places of residence.

— Entry Exit Administration Law of the People's Republic of China (2013), Chapter IV (Section I)

Grid-based social management

On July 11, 2020, state media outlet Xinhua announced that local party committees and officials including neighbourhood management committees would be empowered to engage in law enforcement activities and hand out administrative punishments of residents within their perimeters. According to a high level opinion document: "[Officials at] township, village and neighbourhood [level] shall be given administrative law enforcement powers...while existing law enforcement powers and resources shall be integrated".

According to directives sent out in 2018, the grid system carves up city neighbourhoods into a grid pattern containing 15-20 households per square, with each grid appointed a designated monitor who reports back on residents' affairs to local party committees. According to reporting by RFA the task of a "grid monitor" for a neighbourhood committee is to: "fully understand the residents of their grid, including exactly who lives where, which organizations they belong to, and the sort of lives they lead".

The devolvement of law enforcement powers down to the county and village levels has been described as "unprecedented" with potential to lead to "major turmoil" and social unrest due to the fact village and local party cadres lack the ability or necessary legal knowledge to enforce laws.

Real name registration

Since all citizens of China are required to carry a national ID card, the resident ID card is the only acceptable form of government issued identification for a variety of services including the purchase of SIM cards, plane tickets, high speed train tickets, banking, financial services, education and healthcare. Further, real name registration is mandatory for internet access in China and as of December 2019, the Ministry of Industry and Information Technology required that all individuals wishing to purchase SIM cards in China submit to facial recognition scans in order to tie mobile phone numbers, text messaging and internet browsing activity to real name identities.

The Cybersecurity Law of the People's Republic of China passed in 2017 by the Standing Committee of the National Peoples's Congress (NPCSC) mandates that providers of instant messaging services, telecommunications and internet service providers companies as well as domain name registration providers verify the real ID of users prior to provision of service.

Article 24: Network operators handling network access and domain name registration services for users, handling stationary or mobile phone network access, or providing users with information publication or instant messaging services, shall require users to provide real identity information when signing agreements with users or confirming the provision of services. Where users do not provide real identity information, network operators must not provide them with relevant services.

— Cybersecurity Law of the People's Republic of China (2017), Chapter III.

Internet browsing history

As a result of the passage of the cybersecurity law, network operators (widely believed to refer to internet service providers) are required to maintain unspecified "network logs" for at least 6 months. Although the exact definition of what constitute network logs remains unclear, it has been interpreted by Jones Day and other international law firms to refer to web logs or internet browsing history.

National Citizen Identity Information Centre (NCIIC)

In 2007, the state-run China Internet Information Center reported that the world's largest ID database hosting over 1.3 billion entries was complete. NCIIC or the National Citizen Identity Information Center is located in Beijing and is the backbone of the National ID card system used throughout China by banking, financial services, healthcare, education and various government agencies, the law enforcement apparatus, internet service providers and social media platforms to verify the real ID information of users and customers who wish to use their services.

Biometrics Collection and Entry Exit Administration Law of the People's Republic of China

From 8 February 2021, Chinese embassies started requiring the submission of biometrics including photographs and the fingerprints from all 10 fingers as a pre-requisite for visa applications.

Since February 2017, the Ministry of Public Security in conjunction with its child agency China Immigration Inspection (CII) have required all foreign nationals entering the People's Republic of China to submit biometric information including an in person facial scan and as well as fingerprints from all 10 fingers as a national security measure.

Legislative basis is provided by article 7 of the Entry Exit Administration Law of the People's Republic of China and since implementation, the scheme has already resulted in the cancellation of some covert dual citizenship holders attempting to obtain or renew Chinese passports (Chinese nationality law does not allow for dual citizenship).

Article 7: Upon approval by the State Council, the Ministry of Public Security and the Ministry of Foreign Affairs may, on the basis of the need for exit/entry administration, set forth regulations on the collection and keep of fingerprints and other biometric identification information of the persons who exit or enter China.

— Entry Exit Administration Law of the People's Republic of China (2013), Chapter I.

Current biometrics scanning equipment used by China Immigration Inspection is manufactured by Chinese company Max Vision.

Facial recognition scanners and security checks in subway stations

Following an attack at the Kunming railway station in Southern China, the Chinese government began mandating security screening prior to entrance at metro and train stations across China. In 2021 four subway stations in Guangzhou began in the southern city of Guangzhou began allowing people to use a biometric security gate instead of going through a security check by station staff. In 2019, the South China Morning Post reported that Beijing metro would also begin sorting passengers using facial recognition based on information pulled from the social credit system and criminal offending databases. Commuters who exhibited anti-social behaviour or had previous bad credit scores would also be penalised under the system.

Tibet and Xinjiang

In mainland China, one of the most important ongoing projects is a Skynet project with an installation of more than 200 million video surveillance cameras. The real-time pedestrian tracking and recognition system can precisely identify people's clothing, gender, and age, as well as both motor and non-motor vehicles. Additionally, the surveillance system can instantly match a person's image with their personal identification and information. Golden Shield is a giant mechanism of censorship and surveillance that blocks tens of thousands of websites that may present negative reports about the CCP's narrative and control.

Tibet

The Chinese government sent groups of cadres to Tibetan villages as part of the Benefit the Masses campaign in 2012. The purpose of the campaign was to improve service and living quality in Tibet and to educate the locals about the importance of social stability and adherence to the CCP. The local people were also supervised in order to prevent uprisings from taking place.

In Tibet, users of mobile phones and the Internet must identify themselves by name. The government reported that the program had reached full realization in June 2013. An official said that "the real-name registration is conducive to protecting citizens' personal information and curbing the spread of detrimental information".

In 2018, during the Saga Dawa, the holy fourth month for Tibetan Buddhists, the government enforced stricter rules in Lhasa, according to the Global Times. People were also discouraged from engaging in religious practices in this month. When they did, they were supervised closely.

As a method of protesting, some Tibetans have engaged in immolation, which is a tradition of protest against Chinese control that was first practiced in the mid-20th century.

Xinjiang

In Xinjiang and especially its capital city, Ürümqi, there are security checkpoints and identification stations almost everywhere. The Uyghurs are among those that fall under the “focus personnel” category and is subjected to intense surveillance. People need to show their ID cards and have their faces scanned by cameras at a security station before entering a supermarket, a hotel, a train station, a highway station, or other public place. The ratio of police officers stationed in Xinjiang to population is higher than elsewhere. This strict enforcement of security checks is partly a response to the separatist movement in 2009 associated with Uyghurs. Additionally, the cameras on streets are denser there than elsewhere, numbering 40,000. The information collected by the cameras is matched with individual profiles, which include previously collected biometric data, such as DNA samples and voice samples. People are rated on a level of trustworthiness based on their profiles, which also takes into account their familial relations and social connections. These levels include "trustworthy", "average", and "untrustworthy". The data is fed into the Integrated Joint Operations Platform (Chinese: 一体化联合作战平台), an AI-powered system used for mass surveillance which generates lists of suspects for detention.

Xinjiang residents, especially those from the Uyghur ethnic group, are not allowed to practice certain religious acts. They are also more actively and strictly monitored by surveillance apps, voice printing, and facial recognition cameras. Since 2017, the government has set up internment camps in Xinjiang to force citizens into compliance. People in the re-education camps are usually closely watched by guards and are not allowed to contact others outside the facilities, including family members and other close relations. They learn about Mandarin Chinese characters and the rules that they need to follow in those camps as well as outside once they leave.

The security spending in Xinjiang ballooned in 2017, witnessing an increase of 90% to $8.52 billion as compared to that in 2016. Since at least 2017, Chinese police have forced Uyghurs in Xinjiang to install the Jingwang Weishi app on their phones, allowing for remote monitoring of the phones' contents.

That same year, Chinese drone manufacturer DJI signed a cooperation agreement with local police to provide surveillance drones in support of their operations. In 2018, China deployed a flock of drones disguised to look like birds to step up surveillance levels in region.

The Integrated Joint Operations Platform (IJOP, 一体化联合作战平台), used by the government to monitor the population, particularly Uyghurs, was reported by The Washington Post and Human Rights Watch (HRW) in 2018. The platform gathers biometrics, including DNA samples, to track individuals in Xinjiang.

In November 2019, the International Consortium of Investigative Journalists published the China Cables, consisting of six documents, an "operations manual" for running the camps and detailed use of predictive policing and AI to target people and regulate life inside the camps.

In late 2020, HRW obtained a list of 2000 names of Uyghur prisoners held in the Aksu prefecture leaked from IJOP. The list showed that reasons for imprisonment included religious practice such as studying the Koran without state permission or having a long beard, using software or online services such as a VPN, travelling outside of Aksu, switching off one's phone repeatedly, or having "extremist thoughts". The leaked IJOP list provided detailed, day-to-day evidence on the workings of the Xinjiang re-education camps that The Guardian described as "unprecedented". An earlier list, the Karakax (or Qaraqash) list, leaked in February 2020, showed decision-making about retaining or releasing detainees.

In 2023, IPVM found that all foreign journalists traveling to Xinjiang are tracked via Alibaba's police cloud.

Hong Kong

Hong Kong's Umbrella Movement, a pro-democracy campaign, aims to demand full democracy so that Hong Kong's citizens can have the right to nominate and elect the head of the Hong Kong government. However, key pro-democracy figures, such as some lawmakers, academics, and political activists, are under the central government's surveillance. Some activists engaged in the umbrella movement have been intimidated or arrested by policemen. News reports, social media posts, and images about Hong Kong's pro-democracy protests are censored in mainland China.

Internet users and civil society groups in Hong Kong have been facing cyber-attacks and debated threats to privacy online during the past few years. In June 2014, a white paper on the "one country, two systems" agreement issued by Beijing articulated that the central government has comprehensive jurisdiction over Hong Kong and that the power to run local affairs is authorized by the central government.

Hong Kong Identity Card

Like in mainland China, all residents of Hong Kong are required to hold an IC or identity card, known as the Hong Kong Identity Card or HKID issued by the immigration department in accordance with the Registration of Persons Ordinance (Cap. 177) stating that: "all residents of age 11 or above who are living in Hong Kong for longer than 180 days must, within 30 days of either reaching the age of 11 or arriving in Hong Kong, register for an HKID".

In addition to containing standard biographical information such as name, age and sex, the card contains a chip which contains the fingerprint scans of two thumbprints of the holder.

National ID's are a characteristic of surveillance states in that the ID is part of the "daily papers" individuals are required to carry on them at all times in order to access government, banking or other financial and social services. Holders of HKID's can pass through customs checkpoints faster at ports of entry throughout the city by scanning their fingerprints when entering.

National Security Law

Since the passage of the Hong Kong national security law, or 'Law on Safeguarding National Security in the Hong Kong Special Administrative Region', Hong Kong has been the target of creeping authoritarianism from mainland Chinese government through a variety of methods including stacking the legislative council with pro-Beijing candidates, arrest of opposition leaders and disqualification of candidates of the legislative council considered insufficiently "patriotic". The law also created the Office for Safeguarding National Security of the Hong Kong Special Administrative Region otherwise known as the "Central People's Government National Security Office" (CPGNSO), an agency which allows mainland law enforcement officers and agents to operate on Hong Kong jurisdiction without permission from Hong Kong police or the HKSAR government.

On November 11, 2020, the National People's Congress Standing Committee (NPCSC) adopted a decision disqualifying Hong Kong legislators who "publicize or support independence", "seek foreign interference", or pursue "other activities that endanger national security". The "reforms" as referred to by Beijing, paved the way for the insertion of loyalists and subsequent proposal and passage of series of laws considered authoritarian including on patriotic education, sim card registration and laws preventing the doxing of police officers of the HKPF.

Anti-Doxing Law

On July 21, 2021, the Hong Kong Legislative Council began talks to implement "anti-doxing" laws in response to the 2019-pro democracy protests in which members of the Hong Kong Police Force and certain judges were doxed or had their personal information such as names, addresses, names of family members, details of children and schools attended leaked to the public in retribution for violence or police brutality encountered during the course of the protests. Critics of the legislation, including human rights and tech industry groups stated that the measures could be used to protect those in power and target civil society. Under the proposed laws, violators could face fines of up to HK$1 million ($128,736) and five years in prison.

The law also empowers the Office of the Privacy Commissioner for Personal Data to access electronic devices without warrant. In response Asia Internet Coalition an advocacy group consisting of Google, Facebook and Twitter, warned in a June 25 letter to the commissioner that tech companies could stop offering their services in Hong Kong if changes were enacted since "the measures were "not aligned with global norms and trends", and that any legislation that could curb freedom of speech "must be built upon principles of necessity and proportionality".

SIM Card Registration (Telecommunications Ordinance Amendment)

On June 2, 2021, the cabinet body of Hong Kong known as the Executive Council or "ExCo" announced from March 2022, that all purchasers of SIM cards would be required to provide their identity card number, date of birth, and a copy of their identification document when purchasing a SIM Card in Hong Kong. Edward Yau, the Secretary of Commerce and Economic Development described the amendment as an: "overdue move to fight crime". Yau also claimed that among the 100,000 submissions received during consultation, 70 percent supported the arrangements.

According to the details of the legislation, from September 1, operators will be given 180 days to implement a system to store customers' registration details and from March 1, 2022, users would be given 360 days to register any pre-paid sim cards already in circulation. Under new arrangements, law enforcement agencies will be allowed access to information without a warrant in vaguely defined: "urgent and exceptional circumstances".

The move coincided closely with the passage of the national security law and reflects parallel arrangements in mainland China where users are also required to register new SIM cards using real name identification. The move marks increasing efforts by the CCP to assert its control over Hong Kong through increased surveillance and the intrusion of digital authoritarianism.

Dan McDevitt, manager of website Greatfire.org wrote on Nikkei Asia in response to the new regulations that Beijing had "brought its repressive surveillance tools to Hong Kong", gradually tightening control over the internet and eroding the privacy, forums for open communication and civil society post enactment of the national security law. Anyone found guilty of faking registration details under the ordinance liable to be jailed for 14 years.

Suspension of data requests from Hong Kong police

On July 6, 2020, social media companies such as Facebook, Google and Twitter suspended processing requests for user data from Hong Kong Law Enforcement agencies out of fear the data could be used to engage suppression of political dissent and targeting of peaceful participants of the protests, owing to the overly broad interpretations of the law in respect to definitions of the incitement of "subversion, collusion, espionage" and "secession". In response to the enactment of the law, TikTok also stated that it would exit the Hong Kong market in the days following the promulgation of the national security law.

Facial recognition checkpoints at ports of entry

Since 2017, China Immigration Inspection and the Ministry of Public Security has required submission of biometrics before entering the territory of the People's Republic of China. Fingerprints from all 10 fingers and a photograph of a person's face is also required when crossing into mainland China from any immigration control points.

Over the years China has been building a large facial recognition databases for the purposes of targeting and suppressing dissent in addition to enhancing border control through the placement of entry and exit bans on corruption suspects, dissidents and targets of criminal investigations or persons of interest to the ruling CCP.

Residents of Hong Kong have expressed fear of being unable to leave upon entering mainland China and since the anti-extradition bill and pro democracy protests of 2019, certain residents suspected of involvement in political activism and protests have been blacklisted and barred from entry into mainland China.

Since 2018, HKIA (Hong Kong International Airport) has also operated facial recognition and biometric smart-gates to assist passengers to pass through security and clear customs faster. Hong Kong residents are eligible for accelerated entry into Hong Kong by scanning their fingerprints and ID cards when entering Hong Kong. The machine works by cross matching information contained on the card-chip to that of the holder in order to verify the identity of the holder.

Public security cameras

According to reports by South China Morning Post, the city is home to some 50,000 security cameras, with some 20,000 operated by the Housing Authority of Hong Kong. It is not known whether the cameras contain facial recognition capabilities.

Installation of Cameras in Classrooms

In March 2020, pro-Beijing legislators of the Hong Kong Legislative Council suggested that cameras be installed in classrooms in order to monitor the contents of lectures being delivered to students in addition to monitoring the teachers themselves.

Application of Chinese law within Hong Kong

West Kowloon Station

In June 2021, the Hong Kong Court of Appeal upheld the constitutional status of a controversial arrangement to allow the application of mainland Chinese law of the West Kowloon Terminus of the cross-border high speed rail way between the Special Administrative Region of Hong Kong and the territory of the People's Republic of China (mainland China).

The plan would mean that mainland law enforcement officials from MPS or the Ministry of Public Security and the Shenzhen Municipal Public Security Bureau would be able to enforce Chinese law inside the station and potentially arrest any dissidents of the ruling CCP when they cross over into mainland China at the checkpoint.

Critics described the arrangement as infringing upon Hong Kong's autonomy and being in violation of the Hong Kong Basic Law. Since 2007, a similar arrangement has operated at the border where Hong Kong jurisdiction overlaps with areas of the Shenzhen Bay Port on the mainland.

Earlier in 2019, Simon Cheng an investment officer at the British Consulate General in Hong Kong was arrested by public security officers at the station after returning from a business trip in Shenzhen for allegedly soliciting prostitution. Cheng was a vocal activist and supporter of the 2019 pro-democracy protests in Hong Kong.

Hong Kong-Zhuhai Macau Bridge

On 15 December 2019, the Hong Kong Immigration department received reports that a man had apparently disappeared while crossing the Hong Kong-Zhuhai Macau Bridge to Macau.

The bridge, since constructed in 2018 had hosted a Chinese police checkpoint staffed by officers from the mainland China Immigration Inspection agency of the Ministry of Public Security. Upon further investigation it was revealed the man had been detained by Chinese police while on his way to Macau on the Zhuhai-Macau Port Artificial Island (a section of the bridge mid-way leading into an underwater tunnel).

Reports by the Hong Kong Free Press revealed that officers from Guangdong Public Security Bureau had set up a checkpoint consisting of X-ray machines and facial recognition scanners ahead of an up-coming visit to Macau by CCP general secretary Xi Jinping, which had picked up the man as he crossed the checkpoint into Macau. Since the bridge was built by the central government, Beijing exercises jurisdictional authority over it, on the basis that the Zhuhai-Macau Port Artificial Island is part of Chinese territory.

This expansive interpretation of what is considered Chinese territory reflects increasing efforts under CCP general secretary Xi Jinping's administration to increase Chinese soft power while enhancing the extraterritorial reach of its laws through actions such as the stationing of security agents outside of territories where they normally operate.

Taiwan

The "SkyNet" technology used by the Chinese government to monitor the population through pervasive cameras covers everyone appearing under the camera network, while it does not affect Taiwan. Meanwhile, Taiwanese officials have informed Taiwanese people living in mainland China about the increasing prevalence of surveillance on their activities. This has become a heightened concern since China started offering residence cards and a full national status to people from Taiwan, Hong Kong, and Macau who were living in the mainland. As a result of Beijing's initiative, individuals such as students and workers can apply for a residence permit after residing in mainland China for six months. This policy extends social service and medical benefits to them, who now enjoy those services in the same way as other Chinese citizens. Taiwanese authorities are worried about surveillance on the Taiwanese because of the residence cards issued to them, which provide their identities to the Chinese government and subject them to the same surveillance regime composed of cameras, facial recognition technology, and social credit.

Mainland travel permit

The PRC institutes a policy of mainland travel permits for "Taiwanese residents" or "Taiwanese compatriots". Since the People's Republic of China claims sovereignty over Taiwan and does not officially recognise Taiwanese passports, all Taiwanese residents are required to apply for a mainland travel permit for Taiwan residents in order to travel to mainland China for the purposes of work, study or otherwise. As part of the application process, personal information such as biometrics, fingerprints, photograph and date of birth are collected.

Spending estimates

In 2010, domestic security expenditure exceeded spending on external defense for the first time. By 2016, domestic security spending surpassed external defense by 13%.

In 2017, China's spending on domestic security was estimated to be US$197 billion, excluding spending on security-related urban management and surveillance technology initiatives. In the same year, the central government's total public security spending in Xinjiang reached 57.95 billion RMB, the equivalent of US$9.16 billion, which is ten times the spending of the previous decade.

In 2018, China spent the equivalent of US$20 billion purchasing closed-circuit television cameras and other surveillance equipment. This large number of purchases reaches half the size of the global market's, according to an estimate reported in a state newspaper.

Dark web

From Wikipedia, the free encyclopedia

The dark web is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communicate and conduct business anonymously without divulging identifying information, such as a user's location. The dark web forms a small part of the deep web, the part of the web not indexed by web search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web.

The darknets which constitute the dark web include small, friend-to-friend networks, as well as large, popular networks such as Tor, Freenet, I2P, and Riffle operated by public organizations and individuals. Users of the dark web refer to the regular web as Clearnet due to its unencrypted nature. The Tor dark web or onionland uses the traffic anonymization technique of onion routing under the network's top-level domain suffix .onion.

Terminology

Definition

The dark web has often been confused with the deep web, the parts of the web not indexed (searchable) by search engines. The term dark web first emerged in 2009; however, it is unknown when the actual dark web first emerged. Many internet users only use the surface web, data that can be accessed by a typical web browser. The dark web forms a small part of the deep web, but requires custom software in order to access its content. This confusion dates back to at least 2009. Since then, especially in reporting on Silk Road, the two terms have often been conflated, despite recommendations that they should be distinguished.

Tor. Software Logo

The dark web, also known as darknet websites, are accessible only through networks such as Tor ("The Onion Routing" project) that are created specifically for the dark web. Tor browser and Tor-accessible sites are widely used among the darknet users and can be identified by the domain ".onion". Tor browsers create encrypted entry points and pathways for the user, allowing their dark web searches and actions to be anonymous.

Identities and locations of darknet users stay anonymous and cannot be tracked due to the layered encryption system. The darknet encryption technology routes users' data through a large number of intermediate servers, which protects the users' identity and guarantees anonymity. The transmitted information can be decrypted only by a subsequent node in the scheme, which leads to the exit node. The complicated system makes it almost impossible to reproduce the node path and decrypt the information layer by layer. Due to the high level of encryption, websites are not able to track geolocation and IP of their users, and users are not able to get this information about the host. Thus, communication between darknet users is highly encrypted allowing users to talk, blog, and share files confidentially.

Content

Web-based onion services in January 2015
Category Percentage
Gambling
0.4
Guns
1.4
Chat
2.2
New
(not yet indexed)
2.2
Abuse
2.2
Books
2.5
Directory
2.5
Blog
2.75
Porn
2.75
Hosting
3.5
Hacking
4.25
Search
4.25
Anonymity
4.5
Forum
4.75
Counterfeit
5.2
Whistleblower
5.2
Wiki
5.2
Mail
5.7
Bitcoin
6.2
Fraud
9
Market
9
Drugs
15.4
Web-based onion services in February 2016
Category % of total % of active
Violence
0.3
0.6
Arms
0.8
1.5
Illicit Social
1.2
2.4
Hacking
1.8
3.5
Illicit links
2.3
4.3
Illicit pornography
2.3
4.5
Extremism
2.7
5.1
Illicit Other
3.8
7.3
Illicit Finance
6.3
12
Illicit Drugs
8.1
15.5
Non-illicit+Unknown
22.6
43.2
Illicit total
29.7
56.8
Inactive
47.7
Active
52.3

A December 2014 study by Gareth Owen from the University of Portsmouth found that the most commonly hosted type of content on Tor was child pornography, followed by black markets, while the individual sites with the highest traffic were dedicated to botnet operations (see attached metric). Many whistleblowing sites maintain a presence as well as political discussion forums. Sites associated with Bitcoin, fraud-related services, and mail order services are some of the most prolific.

As of December 2020, the number of active Tor sites in .onion was estimated at 76,300 (containing a lot of copies). Of these, 18 000 would have original content.

In July 2017, Roger Dingledine, one of the three founders of the Tor Project, said that Facebook is the biggest hidden service. The dark web comprises only 3% of the traffic in the Tor network.

A February 2016 study from researchers at King's College London gives the following breakdown of content by an alternative category set, highlighting the illicit use of .onion services.

Ransomware

The dark web is also used in certain extortion-related processes. Indeed, it is common to observe data from ransomware attacks on several dark web sites (data sales sites, public data repository sites)

Botnets

Botnets are often structured with their command-and-control servers based on a censorship-resistant hidden service, creating a large amount of bot-related traffic.

Darknet markets

Commercial darknet markets mediate transactions for illegal goods and typically use Bitcoin as payment. These markets have attracted significant media coverage, starting with the popularity of Silk Road and Diabolus Market and its subsequent seizure by legal authorities. Silk Road was one of the first dark web marketplaces that emerged in 2011 and has allowed for the trading of weapons and identity fraud resources. These markets have no protection for its users and can be closed down at any time by authorities. Despite the closures of these marketplaces, others pop up in their place. As of 2020, there have been at least 38 active dark web market places. These marketplaces are similar to that of eBay or Craigslist where users can interact with sellers and leave reviews about marketplace products.

Examination of price differences in dark web markets versus prices in real life or over the World Wide Web have been attempted as well as studies in the quality of goods received over the dark web. One such study was performed on Evolution, one of the most popular crypto-markets active from January 2013 to March 2015. Although it found the digital information, such as concealment methods and shipping country, "seems accurate", the study uncovered issues with the quality of illegal drugs sold in Evolution, stating that, "the illicit drugs purity is found to be different from the information indicated on their respective listings." Less is known about consumer motivations for accessing these marketplaces and factors associated with their use. Darknets markets also sell leaked credit cards that can be downloaded for free or purchased for to be used in illegal activities.

Bitcoin services

Bitcoin is one of the main cryptocurrencies used in dark web marketplaces due to the flexibility and relative anonymity of the currency. With Bitcoin, people can hide their intentions as well as their identity. A common approach was to use a digital currency exchanger service which converted Bitcoin into an online game currency (such as gold coins in World of Warcraft) that will later be converted back into fiat currency. Bitcoin services such as tumblers are often available on Tor, and some – such as Grams – offer darknet market integration. A research study undertaken by Jean-Loup Richet, a research fellow at ESSEC, and carried out with the United Nations Office on Drugs and Crime, highlighted new trends in the use of Bitcoin tumblers for money laundering purposes.

Due to its relevance in the digital world, Bitcoin has become a popular product for users to scam companies with. Cybercriminal groups such as DDOS"4" have led to over 140 cyberattacks on companies since the emergence of Bitcoins in 2014. These attacks have led to the formation of other cybercriminal groups as well as Cyber Extortion.

Hacking groups and services

Many hackers sell their services either individually or as a part of groups. Such groups include xDedic, hackforum, Trojanforge, Mazafaka, dark0de and the TheRealDeal darknet market. Some have been known to track and extort apparent pedophiles. Cyber crimes and hacking services for financial institutions and banks have also been offered over the dark web. Attempts to monitor this activity have been made through various government and private organizations, and an examination of the tools used can be found in the Procedia Computer Science journal. Use of Internet-scale DNS distributed reflection denial of service (DRDoS) attacks have also been made through leveraging the dark web. There are many scam .onion sites also present which end up giving tools for download that are infected with trojan horses or backdoors.

Financing and fraud

Scott Dueweke the president and founder of Zebryx Consulting states that Russian electronic currency such as WebMoney and Perfect Money are behind the majority of the illegal actions. In April 2015, Flashpoint received a 5 million dollar investment to help their clients gather intelligence from the deep and dark web. There are numerous carding forums, PayPal and Bitcoin trading websites as well as fraud and counterfeiting services. Many such sites are scams themselves. Phishing via cloned websites and other scam sites are numerous, with darknet markets often advertised with fraudulent URLs.

Illegal pornography

The type of content that has the most popularity on the dark web is illegal pornography—more specifically, child pornography. About 80% of its web traffic is related to accessing child pornography despite it being difficult to find even on the dark web. A website called Lolita City, which has since been taken down, contained over 100 GB of child pornographic media and had about 15,000 members.

There is regular law enforcement action against sites distributing child pornography – often via compromising the site and tracking users' IP addresses. In 2015, the FBI investigated and took down a website called Playpen. At the time, Playpen was the largest child pornography website on the dark web with over 200,000 members. Sites use complex systems of guides, forums and community regulation. Other content includes sexualised torture and killing of animals and revenge porn. In May 2021, German police said that they had dismantled one of the world's biggest child pornography networks on the dark web known as Boystown, the website had over 400,000 registered users. Four people had been detained in raids, including a man from Paraguay, on suspicion of running the network. Europol said several pedophile chat sites were also taken down in the German-led intelligence operation.

Terrorism

Terrorist organizations took to the internet as early as the 1990s; however, the birth of the dark web attracted these organizations due to the anonymity, lack of regulation, social interaction, and easy accessibility. These groups have been taking advantage of the chat platforms within the dark web to inspire terrorist attacks. Groups have even posted "How To" guides, teaching people how to become and hide their identities as terrorists.

The dark web became a forum for terrorist propaganda, guiding information, and most importantly, funding. With the introduction of Bitcoin, an anonymous transactions were created which allowed for anonymous donations and funding. By accepting Bitcoin, terrorists were now able to fund money to purchase weaponry. In 2018, an individual named Ahmed Sarsur was charged for attempting to purchase explosives and hire snipers to aid Syrian terrorists, as well as attempting to provide them financial support, all through the dark web.

There are at least some real and fraudulent websites claiming to be used by ISIL (ISIS), including a fake one seized in Operation Onymous. With the increase of technology, it has allowed cyber terrorists to flourish by attacking the weaknesses of the technology. In the wake of the November 2015 Paris attacks, an actual such site was hacked by an Anonymous-affiliated hacker group, GhostSec, and replaced with an advert for Prozac. The Rawti Shax Islamist group was found to be operating on the dark web at one time.

Social media

Within the dark web, there exists emerging social media platforms similar to those on the World Wide Web, this is known as the Dark Web Social Network (DWSN). The DWSN works a like a regular social networking site where members can have customizable pages, have friends, like posts, and blog in forums. Facebook and other traditional social media platforms have begun to make dark-web versions of their websites to address problems associated with the traditional platforms and to continue their service in all areas of the World Wide Web. Unlike Facebook, the privacy policy of the DWSN requires that members are to reveal absolutely no personal information and remain anonymous.

Hoaxes and unverified content

There are reports of crowdfunded assassinations and hitmen for hire; however, these are believed to be exclusively scams. The creator of Silk Road, Ross Ulbricht, was arrested by Homeland Security investigations (HSI) for his site and allegedly hiring a hitman to kill six people, although the charges were later dropped. There is an urban legend that one can find live murder on the dark web. The term "Red Room" has been coined based on the Japanese animation and urban legend of the same name; however, the evidence points toward all reported instances being hoaxes.

On June 25, 2015, the indie game Sad Satan was reviewed by YouTubers Obscure Horror Corner which they claimed to have found via the dark web. Various inconsistencies in the channel's reporting cast doubt on the reported version of events. There are several websites which analyze and monitor the deep web and dark web for threat intelligence.

Policing the dark web

There have been arguments that the dark web promotes civil liberties, like "free speech, privacy, anonymity". Some prosecutors and government agencies are concerned that it is a haven for criminal activity. The deep and dark web are applications of integral internet features to provide privacy and anonymity. Policing involves targeting specific activities of the private web deemed illegal or subject to internet censorship.

When investigating online suspects, police typically use the IP (Internet Protocol) address of the individual; however, due to Tor browsers creating anonymity, this becomes an impossible tactic. As a result, law enforcement has employed many other tactics in order to identify and arrest those engaging in illegal activity on the dark web. OSINT, or Open Source Intelligence, are data collection tools that legally collect information from public sources. OSINT tools can be dark web specific to help officers find bits of information that would lead them to gaining more knowledge about interactions going on in the dark web.

In 2015 it was announced that Interpol now offers a dedicated dark web training program featuring technical information on Tor, cybersecurity and simulated darknet market takedowns. In October 2013 the UK's National Crime Agency and GCHQ announced the formation of a "Joint Operations Cell" to focus on cybercrime. In November 2015 this team would be tasked with tackling child exploitation on the dark web as well as other cybercrime. In March 2017 the Congressional Research Service released an extensive report on the dark web, noting the changing dynamic of how information is accessed and presented on it; characterized by the unknown, it is of increasing interest to researchers, law enforcement, and policymakers. In August 2017, according to reportage, cybersecurity firms which specialize in monitoring and researching the dark web on behalf of banks and retailers routinely share their findings with the FBI and with other law enforcement agencies "when possible and necessary" regarding illegal content. The Russian-speaking underground offering a crime-as-a-service model is regarded as being particularly robust.

Journalism

Many journalists, alternative news organizations, educators, and researchers are influential in their writing and speaking of the darknet, and making its use clear to the general public. Media coverage typically reports on the dark web in two ways; detailing the power and freedom of speech the dark web allows people to express, or more commonly reaffirms the illegality and fear of its contents, such as computer hackers. Many headlines tie the dark web to child pornography with headlines such as, "N.J. man charged with surfing 'Dark Web' to collect nearly 3K images of child porn", along with other illegal activities where news outlets describe it as "a hub for black markets that sell or distribute drugs".

Specialist Clearweb news sites such as DeepDotWeb and All Things Vice provide news coverage and practical information about dark web sites and services; however, DeepDotWeb was shut down by authorities in 2019. The Hidden Wiki and its mirrors and forks hold some of the largest directories of content at any given time. Traditional media and news channels such as ABC News have also featured articles examining the darknet.

Introduction to entropy

From Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/Introduct...