NEW: An Oracle spokesperson claimed the company's surveillance tech documents were "theoretical" and that Oracle does not sell such tech directly to Chinese police. But she left open the possibility that a broker could do so.

I looked into that. 1/
theintercept.com/2021/04/22/ora…
Turns out Oracle has worked with several unsavory partners in China, including:
- a reseller active in the PRC 'war industry'
- a subsidiary of state-owned CEC, which is listed by DoD
- a Xinjiang broker tied up with the bingtuan, which runs internment and labor camps 2/
Oracle has a special relationship with Beijing-based broker Digital China, which it recently named a "Partner of the Year."

Digital China is involved in some major surveillance efforts in China, including a Beijing police project that uses "localized" Oracle technology. 3/
Documents from March 2021 show that Beijing police are buying a powerful server for a Police Cloud project.

Manufactured by a Digital China subsidiary, the server closely resembles Oracle's Exadata machine.

Here is @hrw on Police Cloud 4/
hrw.org/news/2017/11/1…
So a "localized" Oracle server will be a major component of a project whose goals include:

- automated license plate recognition
- flagging of cars entering Beijing for the first time
- facial recognition of people *inside their vehicles* 5/
theintercept.com/2021/04/22/ora…
Foreign tech companies including AWS, IBM, and Microsoft work with brokers in China. These relationships deserve more scrutiny.

But in Oracle's case, the brokers advertise Oracle-compatible "solutions" for data-driven policing platforms *on Oracle.com.* 6/
Oracle’s work with brokers illustrates the role that Western companies play in driving surveillance in China, even as they scale back their presence there. 7/ theintercept.com/2021/04/22/ora…
Oracle denies that its work with brokers in China is problematic. When I interviewed Oracle VP Ken Glueck, he told me, “We all have different definitions of what surveillance might be." 🧐

Here is more on Oracle's apparent definition 8/ theintercept.com/2021/04/22/ora…
And in part 1 of this story, you can find the documents in which Oracle marketed its analytics software for police use in China - as well as in Brazil, Pakistan, Turkey, and the UAE. 9/
theintercept.com/2021/02/18/ora…
If you have worked with Oracle or have details about how its products are used in China or in security applications, ping me on Signal at +1 651-400-7987 or write me securely at marahv at protonmail. 10/

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Mara Hvistendahl

Mara Hvistendahl Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @MaraHvistendahl

18 Feb
SCOOP: The Oracle TikTok deal was supposed to prevent TikTok from passing data to Chinese police. Turns out Oracle has been marketing its own data analytics software to...Chinese police.

a.k.a. the weirdest China tech story I’ve ever written 1/1
theintercept.com/2021/02/18/ora…
I found dozens of Oracle documents detailing how Chinese police can use the company's analytics software to mine databases containing DNA, vehicle records, facial recognition images, hotel registrations, and lists of drug users. 2/2
Oracle documents give detailed "use cases" that include screenshots of the software interface, suggesting that two provincial police departments (Liaoning and Shanxi) actually used Oracle tech to mine social and other data. One such case was presented at Oracle’s HQ in 2018. 3/3 Image
Read 14 tweets
17 Jul 20
I did a deep dive on the far-right brothers behind the national reopen & anti-mask protests. Turns out one of them lives in my hometown in Minnesota theintercept.com/2020/07/17/dor…
The Dorr brothers have been denounced as scammers by the right and as astroturfers by the left. But the reopen movement now counts 2.7 million members, according to @IREHR. It's a toxic mixture of public health denialism & blatant hate
The Dorrs are, in short, the perfect people to stoke hate in a Trump presidency during a global pandemic theintercept.com/2020/07/17/dor…
Read 4 tweets
26 Jun 20
After the killing of George Floyd, #BlueLeaks documents show, law enforcement agencies told police in Minneapolis that they were under attack. The culprits: antifa, “black separatists,” and social media users. By me & @AlleenBrown theintercept.com/2020/06/26/blu…
Even before the Third Precinct burned, law enforcement agencies began emphasizing to Minneapolis police that they were in danger. The evidence given: the doxxing of two of the officers involved in Floyd's killing, a few examples of vandalism, and a threatening tweet to MPD.
In an effort to rein in this purported assault, a fusion center set up in the wake of 9/11 monitored the Facebook RSVP counts for peaceful protest events, including a suburban candlelight vigil. Agencies also collected intelligence from private messaging and Slack groups.
Read 7 tweets
18 May 20
I did a deep dive on iFlytek, the Chinese AI company with a bunch of neat consumer products that is helping the authorities identify people by the sound of their voice.
iFlytek was once a darling of the western tech press. Until February, @MIT_CSAIL had a major partnership with the company. This continued even after @hrw published a critical report detailing iFlytek's work building a national voiceprint database -- & its work in Xinjiang.
Back in the 1990s, tech companies were focused on finding a better Chinese input method. Liu Qingfeng, iFlytek's co-founder and CEO, was inspired by the success of this IBM product. It stung that a foreign company had made strides toward conquering the Chinese language.
Read 13 tweets
11 Feb 20
In 2011, a man named Robert Mo was found near a Monsanto cornfield in Iowa. His appearance there set off a two-year FBI investigation involving car chases, surveillance planes, and airport busts.
Robert worked for a Beijing company named DBN (大北农)。DBN had hatched a shortcut to obtaining genetically modified seeds: steal them from Monsanto and DuPont Pioneer by digging them out of the ground, then smuggle them back to China in microwave popcorn bags.
The investigation of DBN was one of dozens brought by the FBI over the past decade. Because the court proceedings dragged on for years, and because I spent as long trudging through cornfields, recreating the case scene by scene, we now have unusual insight into what happened.
Read 9 tweets
2 Feb 20
NEW: A few years, a woman came to me with the story of a family friend, Chinese-American engineer Harry Sheng, who lost his job after a 1970s run-in with the FBI. He never found work in his field again.

We FOIAed documents that might explain why. (1/12) theintercept.com/2020/02/02/fbi…
In 1967, following China's detonation of a hydrogen bomb, J. Edgar Hoover's office ordered agents around the country to compile lists of ethnic Chinese scientists. The goal was to identify all 4,000 such researchers (FBI's estimate) then in the U.S. (2/12)
The bureau likely didn't reach that goal, but it certainly tried. The idea of the Chinese scientist program, as it was called, was to assemble the various lists into an index of 3x5 cards listing researchers' names, clearance levels, and "degree of cooperation." (3/12)
Read 12 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!