, 26 tweets, 14 min read Read on Twitter
There is this company in China named SenseNets. They make artificial intelligence-based security software systems for face recognition, crowd analysis, and personal verification. And their business IP and millions of records of people tracking data is fully accessible to anyone.
This database contains over 2.565.724 records of people with personal information like ID card number (issue & expire date, sex, nation, address, birthday, passphoto, employer and which locations with trackers they have passed in the last 24 hours which is about 6.680.348 records
The database is now "protected" with a firewall rule. Although the suspicion is that all traffic from outside China is blocked for this service. At least the data is not to access the data anymore for outlanders.
In the process of tracking down each tracker, we even stumbled upon abandon locations (according to Google maps). If there is anyone living or working in Keriya who can confirm this location? We also would like to a photo of the device.
These are the trackers which are connected the SenseNets database. They make part of this artificial intelligence-based security network which uses face recognition, crowd analysis, and personal verification.

mapmakerapp.com/?map=5c66817e4…
Jeffers got a little bit lost in translation here but does this guy really say: ”details are basically not a problem.”?

And no one is going to sell this database ”on the dark web” because it was given away for free for more than a half year.

popyard.com/cgi-mod/newspa…
This is small overview of the nationalities in that database.
And this is the data to make of the graph: plot.ly/~0xDUDE/0
The age of the oldest person is 93. The youngest person with a valid ID number is a girl of the age of 1 year and 5 months. Both have 汉 nationality and no 维吾尔. The youngest person is 9 days old and has no ID number, no nationality, no address and was registered at this loc.
The oldest woman with 维吾尔 nationality is 88 years old and was last seen by a tracker on 31-01-2019 at 17:57:44

The youngest woman with 维吾尔 nationality and without a valid ID number is a 22 days old infant and was last seen on 13-02-2019 at 10:21:19 on this location.
There are 301.214 维吾尔 women with an average age of 32 and
424.590 维吾尔 men with an average age of 30 being tracked.
Between 2018 and 2019 about 2,280 people from 俄罗斯 🇷🇺 have visited over 1,113 unique locations in the Yunnan, Sichuan, Shandong, Guangdong, Guangxi, Jiangsu, Hebei, Hubei, Fujian and Liaoning province while being tracked.
Around the same time all the database of SenseNets were exposed to the internet the developers starting pushing code to Github sharing their internal passwords, but also their emailaccounts & other credentials online services were shared readable to world on this famous platform.
But even with that confidential information publicly exposed there is no technical knowledge needed to control these cameras. The instructions for these things are also on Github. And this why you should NEVER trust technology because the people behind IT can be ignorant idIOTs.
It has been 22 days after our initial report about the SenseNets incident. I decided to start investigating the strategic & technical partners from Silicon Valley that contribute to "face recognition" part of this system. Within a few days, I'm going to share some new insights.
The company 微软 also known as @Microsoft has been a precious partner who has turned more than once a blind eye to the (technical)/(mal)practices of the engineers of SenseNets. From pirated versions of Windows servers to offering Azure Cognitive services for Face (recognition).
And this is not the first time @Microsoft was called out not to sell @Azure cognitive services to provide a face surveillance product to governments.

"To take an ethical stand, and put children and families above profits”

hrw.org/news/2019/01/1…
After SenseNets became news the API key for cognitive services suddenly disappeared from @Github. But other sensitive materials were still leaked by the developers through their personal repos like e-mail, database, SSH and Gitlab credentials, where the lost API key was found.
At this moment it is not clear if the @Microsoft @Azure Cognitive services are still being used. The developers of SenseNets did not learn much from the previous incident and keep pushing new code and credentials to @Github for their new "Face device management system". 🤦‍♂️🤷‍♂️
The SenseNets case shortly reviewed on an episode off @ChinaUncensored
You should watch the entire video but here the part with some interesting observations made by the host.
"Protecting democratic freedoms and human rights" is a paragraph of the blog post titled "Facial recognition: It’s time for action" by @Microsoft President @BradSmi where he describes the risk of mass surveillance can encroach on democratic freedoms. blogs.microsoft.com/on-the-issues/… 🤷‍♂️
Xinjiang Dispatch. How China Turned a City Into a Prison
A surveillance state reaches new heights.

By Chris Buckley (@ChuBailiang ), Paul Mozur (@paulmozur) and Austin Ramzy (@austinramz)

nyti.ms/2I3Rkr5
Microsoft has been working with a Chinese military-run university on artificial intelligence research that could be used for surveillance and censorship. The government is using these technologies to build surveillance systems and to detain minorities.

irishtimes.com/business/techn…
Microsoft accused of complicity in human rights abuses after helping China develop ‘disturbing’ AI. >>

As long they are pushing their code and API keys to public open repositories we can at least keep track of what they are doing.
How Microsoft Helped Build China’s Nightmare Surveillance by @ChinaUncensored
Watch the entire episode here:
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to Victor Gevers
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!