NEW: An Oracle spokesperson claimed the company's surveillance tech documents were "theoretical" and that Oracle does not sell such tech directly to Chinese police. But she left open the possibility that a broker could do so.
Turns out Oracle has worked with several unsavory partners in China, including:
- a reseller active in the PRC 'war industry'
- a subsidiary of state-owned CEC, which is listed by DoD
- a Xinjiang broker tied up with the bingtuan, which runs internment and labor camps 2/
Oracle has a special relationship with Beijing-based broker Digital China, which it recently named a "Partner of the Year."
Digital China is involved in some major surveillance efforts in China, including a Beijing police project that uses "localized" Oracle technology. 3/
Documents from March 2021 show that Beijing police are buying a powerful server for a Police Cloud project.
Manufactured by a Digital China subsidiary, the server closely resembles Oracle's Exadata machine.
So a "localized" Oracle server will be a major component of a project whose goals include:
- automated license plate recognition
- flagging of cars entering Beijing for the first time
- facial recognition of people *inside their vehicles* 5/ theintercept.com/2021/04/22/ora…
Foreign tech companies including AWS, IBM, and Microsoft work with brokers in China. These relationships deserve more scrutiny.
But in Oracle's case, the brokers advertise Oracle-compatible "solutions" for data-driven policing platforms *on Oracle.com.* 6/
Oracle’s work with brokers illustrates the role that Western companies play in driving surveillance in China, even as they scale back their presence there. 7/ theintercept.com/2021/04/22/ora…
Oracle denies that its work with brokers in China is problematic. When I interviewed Oracle VP Ken Glueck, he told me, “We all have different definitions of what surveillance might be." 🧐
And in part 1 of this story, you can find the documents in which Oracle marketed its analytics software for police use in China - as well as in Brazil, Pakistan, Turkey, and the UAE. 9/ theintercept.com/2021/02/18/ora…
If you have worked with Oracle or have details about how its products are used in China or in security applications, ping me on Signal at +1 651-400-7987 or write me securely at marahv at protonmail. 10/
• • •
Missing some Tweet in this thread? You can try to
force a refresh
SCOOP: The Oracle TikTok deal was supposed to prevent TikTok from passing data to Chinese police. Turns out Oracle has been marketing its own data analytics software to...Chinese police.
I found dozens of Oracle documents detailing how Chinese police can use the company's analytics software to mine databases containing DNA, vehicle records, facial recognition images, hotel registrations, and lists of drug users. 2/2
Oracle documents give detailed "use cases" that include screenshots of the software interface, suggesting that two provincial police departments (Liaoning and Shanxi) actually used Oracle tech to mine social and other data. One such case was presented at Oracle’s HQ in 2018. 3/3
I did a deep dive on the far-right brothers behind the national reopen & anti-mask protests. Turns out one of them lives in my hometown in Minnesota theintercept.com/2020/07/17/dor…
The Dorr brothers have been denounced as scammers by the right and as astroturfers by the left. But the reopen movement now counts 2.7 million members, according to @IREHR. It's a toxic mixture of public health denialism & blatant hate
The Dorrs are, in short, the perfect people to stoke hate in a Trump presidency during a global pandemic theintercept.com/2020/07/17/dor…
After the killing of George Floyd, #BlueLeaks documents show, law enforcement agencies told police in Minneapolis that they were under attack. The culprits: antifa, “black separatists,” and social media users. By me & @AlleenBrowntheintercept.com/2020/06/26/blu…
Even before the Third Precinct burned, law enforcement agencies began emphasizing to Minneapolis police that they were in danger. The evidence given: the doxxing of two of the officers involved in Floyd's killing, a few examples of vandalism, and a threatening tweet to MPD.
In an effort to rein in this purported assault, a fusion center set up in the wake of 9/11 monitored the Facebook RSVP counts for peaceful protest events, including a suburban candlelight vigil. Agencies also collected intelligence from private messaging and Slack groups.
I did a deep dive on iFlytek, the Chinese AI company with a bunch of neat consumer products that is helping the authorities identify people by the sound of their voice.
iFlytek was once a darling of the western tech press. Until February, @MIT_CSAIL had a major partnership with the company. This continued even after @hrw published a critical report detailing iFlytek's work building a national voiceprint database -- & its work in Xinjiang.
Back in the 1990s, tech companies were focused on finding a better Chinese input method. Liu Qingfeng, iFlytek's co-founder and CEO, was inspired by the success of this IBM product. It stung that a foreign company had made strides toward conquering the Chinese language.
In 2011, a man named Robert Mo was found near a Monsanto cornfield in Iowa. His appearance there set off a two-year FBI investigation involving car chases, surveillance planes, and airport busts.
Robert worked for a Beijing company named DBN (大北农)。DBN had hatched a shortcut to obtaining genetically modified seeds: steal them from Monsanto and DuPont Pioneer by digging them out of the ground, then smuggle them back to China in microwave popcorn bags.
The investigation of DBN was one of dozens brought by the FBI over the past decade. Because the court proceedings dragged on for years, and because I spent as long trudging through cornfields, recreating the case scene by scene, we now have unusual insight into what happened.
NEW: A few years, a woman came to me with the story of a family friend, Chinese-American engineer Harry Sheng, who lost his job after a 1970s run-in with the FBI. He never found work in his field again.
In 1967, following China's detonation of a hydrogen bomb, J. Edgar Hoover's office ordered agents around the country to compile lists of ethnic Chinese scientists. The goal was to identify all 4,000 such researchers (FBI's estimate) then in the U.S. (2/12)
The bureau likely didn't reach that goal, but it certainly tried. The idea of the Chinese scientist program, as it was called, was to assemble the various lists into an index of 3x5 cards listing researchers' names, clearance levels, and "degree of cooperation." (3/12)