Revelation of Chinese mass surveillance activities
Shenzhen Zhenhua Data Information Technology Co is a big data scraping company that provides open-source intelligence profiling and threat intelligence services. The company is reported to be owned by China Zhenhua Electronics Group, which is owned by China Electronics Corporation (CEC), a state-owned military research enterprise.[1] While the data Zhenhua uses is publicly available data, Zhenhua's usage of that data is a security concern to western countries. The company claims to work with the Chinese government, including Chinese intelligence agencies and the military.[2][3] Zhenhua Data's CEO has publicly supported "hybrid warfare" and "psychological warfare".[4]Winston Peters, the Foreign Affairs Minister of New Zealand, stated that it would be 'naive' to think there was no connection to the Chinese state.[5]
In September 2020, a data leak revealed that Zhenhua was globally monitoring over 2.4 million people. The databases, collectively called the Overseas Key Information Database (OKIDB), was leaked to an American academic who shared the data with Internet 2.0, an Australian-based cybersecurity consultancy. On 14 September 2020, a consortium of media outlets published the findings.[6][7] Researchers found out that about 20% of the data was not from open source locations.[8] Investigation by journalists in New Zealand found that some people with no online presence were profiled in the database.[9]
There have been "conflicting assessments" of the value of the data, from it being an entirely "aspirational" venture, to it being a small peek into the world of hybrid warfare and psychological warfare being waged by the Chinese.[7][8]
A threat intelligence organisation published a report on Zhenhua Data's operation and found a number of monitoring systems that were publicly accessible.[15] The report found real-time monitoring of social media such as LinkedIn, TikTok, Facebook, Twitter and online forums, and discovered an "Internet Big Data Military Intelligence System". This system tracks US warships in real-time and profiles the personnel on board, weapons being carried, LinkedIn profiles etc. This may be related to a previous story published by the NYT titled "How China Uses LinkedIn to Recruit Spies Abroad".[16] The firm also found keywords that were being used to target US Embassy-supported activists in Hong Kong, which included political organisations, famous events and protestors.