Amazon, IBM, and Dell helped build China’s surveillance state brick by brick, investigation finds
Amazon, IBM, and Dell helped build China’s surveillance state brick
Selling surveillance superpowers
Predict and prevent
Technologies of terror
Minority report
Automated autocracy
BEIJING (
Their train tickets, hotel bookings, purchases, text messages and phone calls are forwarded to the government. Their house is ringed with more than a dozen cameras. They’ve tried to go to Beijing 20 times in the past few years, but masked men show up and grab them, often before they depart. And last year, Yang’s wife and younger daughter were detained and now face trial for disrupting the work of the Chinese state — a crime carrying a sentence of up to a decade in prison.
Yet the Yangs say they are not criminals. They are simply farmers trying to beg Beijing to stop local officials from seizing their 1 1/2 acres of land in China’s eastern Jiangsu province.
“Every move in my own home is monitored,” Yang said, sitting behind black curtains that block him from the glare of police lights trained straight at his house. “Their surveillance makes me feel unsafe all the time, everywhere.”
Across China, tens of thousands of people tagged as troublemakers like the Yangs are trapped in a digital cage, barred from leaving their province and sometimes even their homes
Over the past quarter century, American tech companies to a large degree designed and built China’s surveillance state, playing a far greater role in enabling human rights abuses than previously known, an
Critically, American surveillance technologies allowed a brutal mass detention campaign in the far west region of Xinjiang — targeting, tracking and grading virtually the entire native Uyghur population to forcibly assimilate and subdue them.
U.S. companies did this
For example, the
Across China, surveillance systems track blacklisted “key persons,” whose movements are restricted and monitored. In Xinjiang, administrators logged people as high, medium, or low risk, often according to 100-point scores with deductions for factors like growing a beard, being 15 to 55 years old, or just being Uyghur.
Some tech companies even specifically addressed race in their marketing. Dell and a Chinese surveillance firm promoted a “military-grade” AI-powered laptop with “all-race recognition” on Dell’s official WeChat account in 2019. And until contacted
While the flood of American technology slowed considerably starting in 2019 after outrage and sanctions over atrocities in Xinjiang, it laid the foundation for China’s surveillance apparatus that Chinese companies have since built on and in some cases replaced. To this day, concerns remain over where technology sold to China will end up.
For example, 20 former U.S. officials and national security experts wrote a letter in late July criticizing a deal for Nvidia to sell H20 chips used in artificial intelligence to China, with 15% of revenues going to the U.S. government. They said no matter who the chip is sold to, it will fall into the hands of Chinese military and intelligence services.
Nvidia said it does not make surveillance systems or software, does not work with police in China and has not designed the H20 for police surveillance. Nvidia posted on its WeChat social media account in 2022 that Chinese surveillance firms Watrix and GEOAI used its chips to train AI patrol drones and systems to identify people
Thermo Fisher and hard drive maker Seagate promoted their products to Chinese police at conferences and trade shows this year, according to online posts. Officers stroll the streets of Beijing with Motorola walkie talkies. Nvidia and Intel chips remain critical for Chinese policing systems, procurements show. And contracts to maintain existing IBM, Dell, HP, Cisco, Oracle, and Microsoft software and gear remain ubiquitous, often with third parties.
What started in China more than a decade ago could be seen as a cautionary tale for other countries at a time when the use of surveillance technology worldwide is rising sharply, including in the United States. Emboldened
As the capacity and sophistication of such technologies has grown, so has their reach. Surveillance technologies now include AI systems that help track and detain migrants in the U.S. and identify people to kill in the Israel-Hamas war. China, in the meantime, has used what it learned from the U.S. to turn itself into a surveillance superpower, selling technologies to countries like Iran and Russia.
The
Though the companies often claim they aren’t responsible for how their products are used, some directly pitched their tech as tools for Chinese police to control citizens, marketing material from IBM, Dell, Cisco, and Seagate show. Their sales pitches — made both publicly and privately — cited Communist Party catchphrases on crushing protest, including “stability maintenance,” “key persons,” and “abnormal gatherings,” and named programs that stifle dissent, such as “Internet Police,” “Sharp Eyes” and the “Golden Shield.”
Other companies, like Intel, Nvidia, Oracle, Thermo Fisher, Motorola, Amazon Web Services, Microsoft, Western Digital, creator of mapping software ArcGIS Esri, and what was then Hewlett Packard, or HP, also sold technology or services knowingly to Chinese police or surveillance companies. Four practicing lawyers said sales like those uncovered
American technology made up nearly every part of China’s surveillance apparatus,
MILITARY AND POLICE: In 2009, Chinese defense contractor Huadi worked with IBM to build national intelligence systems, including a counterterrorism system, used
SURVEILLANCE: Nvidia and Intel partnered with China’s three biggest surveillance companies to add AI capabilities to camera systems used for video surveillance across China, including Xinjiang and Tibet, until sanctions were imposed. Nvidia said in a post dating to 2013 or later that a Chinese police institute used its chips for surveillance technology research.
ETHNIC REPRESSION: IBM, Oracle, HP, and ArcGIS developer Esri sold hundreds of thousands of dollars’ worth of geographic and mapping software to Chinese police that allows officers to detect when blacklisted Uyghurs, Tibetans or dissidents stray out of provinces or villages. As late as 2019, with detentions in Xinjiang well underway, Dell hosted an industry summit in its capital. Dell and then-subsidiary VMWare sold cloud software and storage devices to police and entities providing data to police in Tibet and Xinjiang, even in 2022 after abuses there became widely known.
IDENTIFICATION: Huadi worked with IBM to construct China’s national fingerprint database; IBM told
CENSORSHIP AND CONTROL: In 2016, Dell boasted on its WeChat account that its services assisted the Chinese internet police in “cracking down on rumormongers.” Seagate said on WeChat in 2022 that it sells hard drives “tailor made” for AI video systems in China for use
For extended findings, click here.
“Everything was built on American tech,” said Valentin Weber, a researcher at the German Council on Foreign Relations who studied the use of U.S. tech
IBM, Dell, Cisco, Intel, Thermo Fisher and Amazon Web Services all said they adhere to export control policies. Seagate and Western Digital said they adhere to all relevant laws and regulations where they operate.
Oracle, Hewlett Packard Enterprise, and tech conglomerate Broadcom, which acquired VMWare and cloud company Pivotal in 2023, did not comment on the record; HP, Motorola and Huadi did not respond, and Esri denied involvement but did not reply to examples. Microsoft told
Some U.S. companies ended contracts in China over rights concerns and after sanctions. For example, IBM said it has prohibited sales to Tibet and Xinjiang police since 2015, and suspended business relations with defense contractor Huadi in 2019.
However, sanctions experts noted that the laws have significant loopholes and often lag behind new developments. For example, a ban on military and policing gear to China after the 1989 Tiananmen massacre does not take into account newer technologies or general-use products that can be applied in policing.
They also noted that the law around export controls is complicated. Raj Bhala, an expert in international trade law at the University of Kansas, said the issues the
“It would raise concerns about possible inconsistencies, possible violations,” said Bhala, who emphasized he was speaking generally and not about any specific company. “But I really stress ‘possible.’ We need to know more facts.”
While German, Japanese and Korean firms also played a role, American tech firms were
The Xinjiang government said in a statement that it uses surveillance technologies to “prevent and combat terrorist and criminal activity,” that it respects citizens’ privacy and legal rights and that it does not target any particular ethnicity. The statement said Western countries also use such technology, calling the U.S. “a true surveillance state.” Other government agencies did not respond to a request for comment, including China’s police and
This technology still powers the police database that controls the Yangs and other ordinary people. An estimate based on Chinese government statistics found at least 55,000 to 110,000 were put under residential surveillance in the past decade, and vast numbers are restricted from travel in Xinjiang and Tibet. China’s cities, roads and villages are now studded with more cameras than the rest of the world combined, analysts say — one for every two people.
“Because of this technology … we have no freedom at all,” said Yang Guoliang’s elder daughter, Yang Caiying, now in exile in Japan. “At the moment, it’s us Chinese that are suffering the consequences, but sooner or later, Americans and others, too, will lose their freedoms.”
Back when China was emerging from the chaotic violence of the Cultural Revolution in 1976, three in four Chinese were farmers, including the Yangs. They lived in a three-room home of tiles and pounded earth nestled among the lush, humid fields of the Yangtze River delta.
After Chairman Mao Zedong’s death that year, Beijing’s new leaders opened China to the world, and American tech firms like HP and IBM rushed in. But there were hard limits on how much change the government would accept. In 1989, the Tiananmen pro-democracy protests rattled Beijing, which sent tanks and troops to shoot students.
Soon after, Beijing began planning the “Golden Shield,” aimed at digitizing China’s police force.
In 2001, the 9/11 al-Qaida attacks turbocharged interest in surveillance technology. One researcher claimed
American companies cashed in, selling the U.S. billions of dollars in surveillance technologies they said could prevent crime and terror attacks.
They spotted the same sales opportunity in China. Researchers warned surveillance technologies would be “instruments of repression” in the hands of
“China didn’t have this kind of thing before,” said Wang, a former Chinese police official in Xinjiang who asked to be identified only
Soon, disturbing stories emerged. Chinese police blocked sensitive news, pinpointing dissidents with unnerving precision. They stalked adherents of the Falun Gong sect banned
In 2008, documents leaked to the press showed Cisco saw the “Golden Shield” as a sales opportunity, quoting a Chinese official calling the Falun Gong an “evil cult.” A Cisco presentation reviewed
At a human rights conference in February, then-Cisco lawyer Katie Shay said companies had a responsibility to understand how customers might misuse their technology for “surveillance and censorship.”
“A lot of people have suffered at the hands of their government, and I want to acknowledge that pain,” said Shay, who left Cisco in June. “I also will say that Cisco disputes the allegations of Cisco’s involvement.”
Cisco told the
As Cisco was summoned before Congress, IBM partnered with a Chinese defense contractor on Phase Two of China’s “Golden Shield.”
Classified government blueprints obtained
“Consolidate Communist Party rule,” read the Huadi blueprint, which showed the databases would track hundreds of thousands of people online.
In response to
“ … If older systems are being abused today — and IBM has no knowledge that they are — the misuse is entirely outside of IBM’s control, was not contemplated
Back in 2009, Beijing needed the technology urgently to quash critics bonding online. Among them were the Yangs.
In April that year, local
The Yangs had no idea police were installing systems that could target families like theirs. They just knew their land was being seized — in return for just a unit in a five-floor walk-up, too many stairs for their elderly mother to climb.
The Yangs and other farmers across China filed complaints.
“I discovered the way the government took our land was illegal,” Yang Caiying said. “They cheated us.”
In July 2009, three months after the Yang land was seized, riots erupted on the other side of the country in Xinjiang. Gory images of a Uyghur lynched at a toy factory spread online, angry Uyghurs took to the streets, and hundreds were killed.
Once again, American firms pitched their technology as the solution.
The government sent troops and cut Xinjiang’s phone and internet connections. In secret meetings, officials concluded that police had failed to spot the danger signs because they couldn’t identify Uyghurs deemed separatists, terrorists, and religious extremists, three engineers then working for the Xinjiang government told
At the time, Xinjiang police and data systems were already running on American technology including IBM, Cisco, Oracle, and Microsoft, the engineers said, which
So Xinjiang launched an ambitious initiative to fuse data from all available
Soon, lucrative contracts went up for bidding. Among those seeking to profit was IBM.
“Prevent problems before they happen,” IBM promised Chinese officials. In an August 2009 pamphlet, IBM cited the Xinjiang riots and said its technology could help the government “ensure urban safety and stability.”
IBM executives fanned out across the country to court Chinese officials. In December 2009, they set up a new “IBM Institute for Electronic Governance Innovation” in Beijing. In 2011, IBM acquired i2, a software program designed to prevent “terrorist threats.” IBM touted i2’s ability to analyze Chinese social media and licensed a Shanghai-based firm called Landasoft to sell it to China’s police, corporate records show.
Chinese police purchased tens of millions of dollars’ worth of products from companies like IBM, Cisco, Oracle, and Microsoft to upgrade the “Golden Shield” policing systems, a leaked accounting ledger acquired
In the confrontation between the Chinese state and its critics, American technology tipped the scales of power.
In 2011, thieves ransacked the Yangs’ house, hunting for their property deed. They didn’t find it.
Two years later, bald men with tattoos and gold chains smashed down their door, shattered windows and flipped furniture to bully them out of their home anyway. Yang’s mother dropped to the floor in terror. Doctors diagnosed a heart attack, but the Yangs didn’t have money for a pacemaker.
Furious, the Yangs sued local police. In June 2015, a judge ruled their land had been seized illegally. The Yangs celebrated.
But just weeks after the ruling, officers identified human rights lawyers through the “Golden Shield” technology, cuffed hundreds of them and pressed them into police vans across China. One lawyer later recalled how police monitored his messages on human rights in WeChat before they grabbed him, shackled him to a chair, and tortured him.
Overnight, China’s budding rights-defense movement was dealt a fatal blow — and with it, the Yangs’ case. The Yangs were called in and curtly told the judgment was being overturned, their lawsuit dismissed without trial.
“We really had too much faith in the law, you know?” Yang Guoliang said, his hands clenched in fists. “It turned out to be worthless.”
In the meantime, Beijing was transforming Xinjiang into the most heavily surveilled place on earth, sweeping around a million people into camps and prisons.
When bombs tore through a train station in Xinjiang’s capital hours after a visit
“He was super angry,” said Abliz, one of the engineers with the Xinjiang government. “They concluded they weren’t surveilling Uyghurs closely enough.”
The next year, in April 2015, Abliz attended a closed-door exposition in Xinjiang. A booth ran
After years as a vendor of IBM’s i2 police surveillance analysis software to Xinjiang police, Landasoft had struck out on its own, touting i2-like software it said could detain extremists before they caused trouble. The similarity was no coincidence: Landasoft’s software was copied from i2, according to leaked emails and records.
“The platform is developed based on i2,” a Landasoft project manager wrote in an email.
It used a proprietary data visualization system developed
Abliz went numb.
“I thought then that this was the end of humanity,” he said.
Landasoft did not respond to repeated requests for comment. IBM said it cut ties with Landasoft in 2014 and was not aware of any interaction between Landasoft and the Public Security Bureau in Xinjiang.
In the autumn of 2015, months after the Xinjiang expo, Landasoft signed contracts with Xinjiang police, emails show. Workers installed millions of cameras and wired over 7,000 police outposts, often built just hundreds of meters apart. Nearly 100,000 officers were recruited to pound on doors and collect names, addresses, fingerprints and face-scans.
Though Chinese hardware was favored, foreign software was irreplaceable for its performance and compatibility with China’s American-built systems, engineers told
In late 2016, the crackdown began. Internal documents, a leaked copy of the Landasoft software and interviews with 16 former Xinjiang police officers, officials and engineers reveal how the system worked.
Landasoft’s software combined data fed into a central police database to compile a dossier on vast swaths of Xinjiang’s population, tagging them with categories like “went on pilgrimage” or “studied abroad.” Administrators then questioned them, computed risk scores and decided who to detain.
Hundreds of thousands of people were tagged “untrustworthy”, leaked messages show. Leaked documents show the IJOP flagged 24,412 people as “suspicious” in just one week in 2017, leading to most being detained.
“They thought it better to grab thousands of innocents than let a single criminal slip free,” Abliz said.
The technology was crude and flawed. Landasoft emails show engineers frantically fixing a software bug to release hundreds of people categorized as high-risk. And surveillance cameras often misidentified people, a former Xinjiang police officer found when he checked their ID cards.
Yet officers were told “computers cannot lie” and that the IJOP’s listed targets were “absolutely correct,” Abliz said. The software’s orders were often obeyed fearfully, unquestioningly.
“The tech companies told the government their software is perfect,” Abliz said. “It’s all a myth.”
The all-encompassing surveillance forced total compliance: Officers arrested colleagues, neighbors informed on each other.
In May 2017, Kalbinur Sidik, a teacher now in the Netherlands, was summoned to her district government office in a yellow brick apartment building in Xinjiang’s capital. A young Uyghur woman, fresh from college, rose and introduced herself as a local official. Sidik, the woman explained, was being appointed as the head of her building, responsible for collecting information on neighbors.
“What’s this data going to be used for?” Sidik asked.
The woman looked at a computer, with a Landasoft program running and lists of names and tags: “Goes out at night,” “Overseas phone,” “unemployed.” One button stood out: “Push Alert.”
The woman clicked it, and the screen filled with names. These people, the woman explained, would be detained and interrogated for suspected ties to terrorism. Sidik’s eyes widened.
“I hated her for what she was doing,” Sidik said. “I knew those people would disappear.”
Xinjiang officials issued arrest quotas, Sidik and five other former officers and administrators said. Sidik watched with horror as the number of people who attended her compound’s weekly mandatory flag-raising ceremony shrank, from 400 to just over 100, as residents were arrested.
At the district office, she observed the logos popping up on screens: Oracle, Microsoft, Intel. The
Sidik asked her neighborhood official where it all came from.
“We’ve spent a lot of money to import foreign technology,” she recalls the official telling her.
Among those caught in the digital dragnet was Parida Qabylqai, an ethnic Kazakh pharmacist at a military hospital in Xinjiang.
In February 2018, Qabylqai was flagged
“You’re a good person, you shouldn’t be listed,” she recalled him saying. Then he checked the IJOP and spotted her name.
“It’s really serious! You’re going to end up in the camps,” he blurted out in shock.
An officer pressed a confession into her hands.
“What did I do wrong?” Qabylqai asked.
“Just sign!” the officer shouted.
Qabylqai was cuffed, hooded, and whisked to a camp, where cameras watched her day and night, even peering at her naked body in the toilet. Guards barking over speakers ordered her not to speak or even to move.
“They did things to us that no human being should ever have to experience,” she said. “But they said my name was listed
Even enforcers of the system weren’t spared.
In 2018, Liu Yuliang, a civil servant in Xinjiang, was ordered to the home of a young police officer in his village. He and dozens of others stood, silent, as the officer embraced his sobbing, pregnant wife.
The officer had forced many people into the camps. Then he himself was flagged for detention.
Too fearful to resist, Liu went along with the arrest, just as the young officer had done before him.
Landasoft software alerted police when flagged people did anything labeled suspicious, like going out at night or logging on the internet repeatedly. Liu was sent to knock on doors, questioning residents whose “eyes filled with fear.”
As police swept Xinjiang, Landasoft purchased software from Pivotal, a cloud company later acquired
AWS said Landasoft “consumed very limited cloud services for a brief period” and not for software in the Xinjiang crackdown. Microsoft said Landasoft used Azure services through a self-service portal retired in 2021, and that any Landasoft data was deleted.
The Xinjiang government told the
Liu eventually resigned and returned to his hometown in eastern China, trying to forget what he had seen and done. But he noted with unease the new cameras and checkpoints being installed around his home.
Four days later, state security called and summoned him for questioning. The all-seeing surveillance apparatus had followed him home.
“The Xinjiang model is being copied everywhere, in every city in China,” Liu said.
In 2024, Liu left China, ignoring an airport officer who warned that wherever he went, he would be watched.
“This technology has no emotions,” Liu said. “But in the hands of a government that doesn’t respect the law, it becomes a tool for evil.”
The Yangs are still trapped
But the harder the Yangs push, the harder the system pushes back.
In February 2023, they went to the National Public Complaints Administration in Beijing with a letter. Two days later, police grabbed them from their hotel and drove them home.
The Yangs persisted, trying to plead their case to Beijing. In the following months, they were seized at bus and train stations, beaten at a hospital and abducted
Last July, Yang’s mother tried again. She carried a letter for Chinese leader Xi Jinping:
“They’re using violence and kidnapping to bar me from petitioning and seeking medical treatment … We beg you, General Secretary, to save us.”
Outside Beijing’s leadership compound, burly men in black tackled Yang’s mother to the ground. She was jailed for over a month, questioned, strip-searched, force-fed medication and deprived of food and water. In October, she and Yang’s sister disappeared.
The Yangs’ house is now the last left standing. The father lives alone.
His relatives have cut contact, unnerved
In April, Yang was sent criminal charges showing how much police had spent to stop the family’s “abnormal petitioning.”
The cost: About $37,000.
About the Author
Claire Dubois
View all articlesComments (0)
No Comments Yet
Be the first to share your thoughts on this article!