Jump to content

Zhenhua Data leak: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Added {{Merge to}} tag
Grammar fix
 
(32 intermediate revisions by 21 users not shown)
Line 1: Line 1:
{{short description|Revelation of Chinese mass surveillance activities}}
{{Merge to|Chinese intelligence activity abroad|discuss=Talk:Chinese intelligence activity abroad#Proposed merge of Zhenhua Data leak into Chinese intelligence activity abroad|date=September 2020}}
'''Shenzhen Zhenhua Data Information Technology Co''' is a [[big data]] scraping company that provides [[open-source intelligence]] profiling and [[threat intelligence]] services. While the data Zenhua uses is publicly available data, Zenhua's usage of that data is a security concern to democratic countries. The company claims to work with the Chinese government, including Chinese intelligence agencies and the military.<ref name=":0">{{Cite web|last=Hurst|first=Daniel|last2=Kuo|first2=Lily|last3=Graham-McLay|first3=Charlotte|date=2020-09-14|title=Zhenhua Data leak: personal details of millions around world gathered by China tech company|url=http://www.theguardian.com/world/2020/sep/14/zhenhua-data-full-list-leak-database-personal-details-millions-china-tech-company|url-status=live|archive-url=|archive-date=|access-date=2020-09-17|website=The Guardian|language=en}}</ref><ref>{{Cite web|last=Mazoomdaar|first=Jay|last2=Iyer|first2=P Vaidyanathan|date=2020-09-16|title=China is watching — Hybrid warfare: What data they collect, why it’s cause for concern|url=https://indianexpress.com/article/explained/hybrid-warfare-pm-modi-cds-gen-rawat-zhenhua-data-information-artificial-intelligence-china-is-watching-6594884/|url-status=live|archive-url=|archive-date=|access-date=2020-09-17|website=The Indian Express|language=en}}</ref> Zhenhua Data’s CEO has publicly supported "hybrid warfare" and "psychological warfare".<ref>{{Cite web|date=2020-09-15|title=Zhenhua Data: 35,000 Aussies being spied on by China|url=https://web.archive.org/web/20200915051942/https://www.news.com.au/technology/online/security/zhenhua-data-35000-aussies-being-spied-on-by-china-as-part-of-psychological-war/news-story/3ce5b88c00e3ae81d59976911a96319b|access-date=2020-09-17|website=web.archive.org}}</ref>
'''Shenzhen Zhenhua Data Information Technology Co''' is a [[big data]] scraping company that provides [[open-source intelligence]] profiling and threat intelligence services. The company is reported to be owned by China Zhenhua Electronics Group, which is owned by [[China Electronics Corporation ]] (CEC), a state-owned military research enterprise.<ref>{{Cite news|last1=Probyn|first1=Andrew|last2=Doran|first2=Matthew|date=September 14, 2020|title=China's 'hybrid war': Beijing's mass surveillance of Australia and the world for secrets and scandal|work=[[Australian Broadcasting Corporation]]|url=https://www.abc.net.au/news/2020-09-14/chinese-data-leak-linked-to-military-names-australians/12656668|access-date=September 26, 2020}}</ref> While the data Zhenhua uses is publicly available data, Zhenhua's usage of that data is a security concern to western countries. The company claims to work with the Chinese government, including Chinese intelligence agencies and the military.<ref name=":0">{{Cite web|last1=Hurst|first1=Daniel|last2=Kuo|first2=Lily|last3=Graham-McLay|first3=Charlotte|date=2020-09-14|title=Zhenhua Data leak: personal details of millions around world gathered by China tech company|url=http://www.theguardian.com/world/2020/sep/14/zhenhua-data-full-list-leak-database-personal-details-millions-china-tech-company|access-date=2020-09-17|website=The Guardian|language=en}}</ref><ref>{{Cite web|last1=Mazoomdaar|first1=Jay|last2=Iyer|first2=P Vaidyanathan|date=2020-09-16|title=China is watching — Hybrid warfare: What data they collect, why it's cause for concern|url=https://indianexpress.com/article/explained/hybrid-warfare-pm-modi-cds-gen-rawat-zhenhua-data-information-artificial-intelligence-china-is-watching-6594884/|access-date=2020-09-17|website=The Indian Express|language=en}}</ref> Zhenhua Data's CEO has publicly supported "hybrid warfare" and "psychological warfare".<ref>{{Cite news|date=2020-09-15|title=Zhenhua Data: 35,000 Aussies being spied on by China|newspaper=News.com.au|url=https://www.news.com.au/technology/online/security/zhenhua-data-35000-aussies-being-spied-on-by-china-as-part-of-psychological-war/news-story/3ce5b88c00e3ae81d59976911a96319b|access-date=2020-09-17|archive-url=https://web.archive.org/web/20200915051942/https://www.news.com.au/technology/online/security/zhenhua-data-35000-aussies-being-spied-on-by-china-as-part-of-psychological-war/news-story/3ce5b88c00e3ae81d59976911a96319b|archive-date=2020-09-15|last1=Graham|first1=Ben}}</ref> [[Winston Peters]], the Foreign Affairs Minister of New Zealand, stated that it would be 'naive' to think there was no connection to the Chinese state.<ref>{{Cite web|date=2020-09-17|title=Zhenhua Data collection 'disquieting in the extreme' - Winston Peters|website=[[Radio New Zealand]]|url=https://www.rnz.co.nz/news/political/426264/zhenhua-data-collection-disquieting-in-the-extreme-winston-peters|access-date=2020-09-17|archive-url=https://web.archive.org/web/20200915051942/https://www.rnz.co.nz/news/political/426264/zhenhua-data-collection-disquieting-in-the-extreme-winston-peters|archive-date=2020-09-15}}</ref>


In September 2020, a data leak revealed that Zenhua was globally monitoring over 2 million people. The database, called the Overseas Key Information Database (OKIDB), was leaked to American academic who shared the data with Internet 2.0, an Australian based cybersecurity consultancy. On 14 September 2020, a consortium of media outlets published the findings.<ref>{{Cite news|last=Shih|first=Gerry|title=Chinese firm harvests social media posts, data of prominent Americans and military|language=en-US|work=Washington Post|url=https://www.washingtonpost.com/world/asia_pacific/chinese-firm-harvests-social-media-posts-data-of-prominent-americans-and-military/2020/09/14/b1f697ce-f311-11ea-8025-5d3489768ac8_story.html|access-date=2020-09-17|issn=0190-8286}}</ref><ref name=":02">{{Cite news|last=|first=|date=14 September 2014|title=Zhenhua Data leak: From Narendra Modi to Ratan Tata, here's the list of prominent Indians China spied on|work=The Economic Times|url=https://economictimes.indiatimes.com/news/defence/zhenhua-data-leak-from-narendra-modi-to-ratan-tata-heres-list-of-prominent-indians-china-spied-on/articleshow/78107743.cms|url-status=live|access-date=2020-09-17}}</ref> Researchers found out that about 20% of the data was not from open source locations.<ref name=":1">{{Cite web|last=Graham|first=Ben|date=2020-09-14|title=China spying on huge number of Aussies|url=https://www.goldcoastbulletin.com.au/zhenhua-data-35000-aussies-being-spied-on-by-china-as-part-of-psychological-war/news-story/3ce5b88c00e3ae81d59976911a96319b|url-status=live|archive-url=|archive-date=|access-date=2020-09-17|website=Gold Coast Bulletin|language=en}}</ref> There have been "conflicting assessments" of the value of the data, from it being an entirely "aspirational" venture, to it being a small peak into the world of hybrid warfare and psychological warfare being waged by the Chinese.<ref name=":02" /><ref name=":1" />
In September 2020, a data leak revealed that Zhenhua was globally monitoring over 2.4 million people. The databases, collectively called the '''Overseas Key Information Database''' (OKIDB), was leaked to an American academic who shared the data with [[Internet 2.0 (company)|Internet 2.0]], an Australian-based cybersecurity consultancy. On 14 September 2020, a consortium of media outlets published the findings.<ref>{{Cite news|last=Shih|first=Gerry|title=Chinese firm harvests social media posts, data of prominent Americans and military|language=en-US|newspaper=Washington Post|url=https://www.washingtonpost.com/world/asia_pacific/chinese-firm-harvests-social-media-posts-data-of-prominent-americans-and-military/2020/09/14/b1f697ce-f311-11ea-8025-5d3489768ac8_story.html|access-date=2020-09-17|issn=0190-8286}}</ref><ref name=":02">{{Cite news|date=14 September 2014|title=Zhenhua Data leak: From Narendra Modi to Ratan Tata, here's the list of prominent Indians China spied on|work=The Economic Times|url=https://economictimes.indiatimes.com/news/defence/zhenhua-data-leak-from-narendra-modi-to-ratan-tata-heres-list-of-prominent-indians-china-spied-on/articleshow/78107743.cms|access-date=2020-09-17}}</ref> Researchers found out that about 20% of the data was not from open source locations.<ref name=":1">{{Cite news|last=Graham|first=Ben|date=2020-09-14|title=China spying on huge number of Aussies|url=https://www.goldcoastbulletin.com.au/zhenhua-data-35000-aussies-being-spied-on-by-china-as-part-of-psychological-war/news-story/3ce5b88c00e3ae81d59976911a96319b|access-date=2020-09-17|website=Gold Coast Bulletin|language=en}}</ref> Investigation by journalists in New Zealand found that some people with no online presence were profiled in the database.<ref name=":11">{{Cite web|last=Graham|first=Ben|date=2020-09-14|title=Details of citizens from Pacific island nations harvested by Chinese technology firm|url=https://www.tvnz.co.nz/one-news/world/details-citizens-pacific-island-nations-harvested-chinese-technology-firm|access-date=2020-09-17|website=1 News|language=en}}</ref>


There have been "conflicting assessments" of the value of the data, from it being an entirely "aspirational" venture, to it being a small peek into the world of hybrid warfare and psychological warfare being waged by the Chinese.<ref name=":02" /><ref name=":1" />
Internet 2.0 recovered a quarter of a million people from OKIDB, including about 52,000 Americans, 35,000 Australians and 10,000 Britons.<ref>{{Cite web|date=2020-09-13|title=China's mass surveillance of 35,000 Australians revealed|url=https://www.abc.net.au/news/2020-09-14/chinese-data-leak-linked-to-military-names-australians/12656668|access-date=2020-09-17|website=www.abc.net.au|language=en-AU}}</ref> British people in the database include prime ministers [[Boris Johnson]] and [[Scott Morrison]] and their family.<ref name=":0" /> Australians in the database include [[Natalie Imbruglia]], [[Larry Anthony]], [[Emma Husar]], [[Ellen Whinnett]] and [[Junaid Thorne]].<ref name=":1" /> Around 10,000 people and organisations from India were also on the list, including senior India diplomats such as [[Harsh Vardhan Shringla]] and [[Sanjeev Singh (archer)|Sanjeev Singla]], policymakers such as [[Amitabh Kant]], academics such as [[Romila Thapar]], and sportsperson such as [[Sachin Tendulkar]].<ref>{{Cite news|last=|first=|date=14 September 2020|title=Shenzhen panopticon: The who's who of India were sitting ducks for a China tech company, reveals report|work=The Economic Times|url=https://economictimes.indiatimes.com/news/defence/shenzhen-panopticon-the-whos-who-of-india-were-sitting-ducks-for-a-china-tech-company-reveals-report/articleshow/78098934.cms|url-status=live|access-date=2020-09-17}}</ref><ref name=":2">{{Cite web|last=M|first=Kaunain Sheriff|last2=Mazoomdaar|first2=Jay|last3=Iyer|first3=P Vaidyanathan|date=2020-09-17|title=Express Investigation Part-4: Foreign secy, Niti CEO on list; Facebook bans Zhenhua Data|url=https://indianexpress.com/article/express-exclusive/express-investigation-part-4-foreign-secy-niti-ceo-on-list-facebook-bans-zhenhua-data-6599039/|url-status=live|archive-url=|archive-date=|access-date=2020-09-17|website=The Indian Express|language=en}}</ref> Numerous Indian think-tanks were also being monitored.<ref name=":2" />

Internet 2.0 recovered a quarter of a million people from OKIDB, including about 52,000 Americans, 35,000 Australians and 10,000 Britons.<ref>{{Cite web|date=2020-09-13|title=China's mass surveillance of 35,000 Australians revealed|url=https://www.abc.net.au/news/2020-09-14/chinese-data-leak-linked-to-military-names-australians/12656668|access-date=2020-09-17|website=www.abc.net.au|language=en-AU}}</ref> Prominent people in the database include prime ministers [[Boris Johnson]] and [[Scott Morrison]],<ref name=":0" /> the President of Austria [[Alexander Van der Bellen]] and their families.<ref>{{cite news |last1=Csekö |first1=Balazs |last2=Sulzbacher |first2=Markus |title=Zhenhua Files": Chinesische Datensammler spähen österreichische Politik aus |url=https://www.derstandard.at/story/2000121041377/zhenhua-files-chinesische-datensammler-spaehen-oesterreichische-politik-aus |access-date=2020-10-28 |publisher=Der Standard |date=2020-10-20}}</ref> One of Hungarian Prime Minister [[Viktor Orbán]]'s children appears on the list as well.<ref>{{cite news |last1=Keller-Alánt |first1=Ákos |title=Orbán, Rogán és Kósa gyerekei is szerepelnek a kínai adatbázisban |url=https://www.szabadeuropa.hu/a/orb%C3%A1n-rog%C3%A1n-%C3%A9s-k%C3%B3sa-gyerekei-is-szerepelnek-a-k%C3%ADnai-adatb%C3%A1zisban-adatgyujtes-kina-zhenhua-data/30890672.html |access-date=2020-10-28 |publisher=Szabad Európa |date=2020-10-13}}</ref> Australians in the database include [[Natalie Imbruglia]], [[Larry Anthony]], [[Emma Husar]], [[Ellen Whinnett]] and [[Junaid Thorne]].<ref name=":1" /> Around 10,000 people and organisations from India were also on the list, including senior Indian diplomats such as [[Harsh Vardhan Shringla]] and [[Sanjeev Singla]], policymakers such as [[Amitabh Kant]], academics such as [[Romila Thapar]], and sportspeople such as [[Sachin Tendulkar]].<ref>{{Cite news|date=14 September 2020|title=Shenzhen panopticon: The who's who of India were sitting ducks for a China tech company, reveals report|work=The Economic Times|url=https://economictimes.indiatimes.com/news/defence/shenzhen-panopticon-the-whos-who-of-india-were-sitting-ducks-for-a-china-tech-company-reveals-report/articleshow/78098934.cms|access-date=2020-09-17}}</ref><ref name=":2">{{Cite web|last1=M|first1=Kaunain Sheriff|last2=Mazoomdaar|first2=Jay|last3=Iyer|first3=P Vaidyanathan|date=2020-09-17|title=Express Investigation Part-4: Foreign secy, Niti CEO on list; Facebook bans Zhenhua Data|url=https://indianexpress.com/article/express-exclusive/express-investigation-part-4-foreign-secy-niti-ceo-on-list-facebook-bans-zhenhua-data-6599039/|access-date=2020-09-17|website=The Indian Express|language=en}}</ref> Numerous Indian think-tanks were also being monitored.<ref name=":2" />

A threat intelligence organisation published a report on Zhenhua Data's operation and found a number of monitoring systems that were publicly accessible.<ref>{{Cite web|date=2020-09-17|title=Investigating Chinese Intelligence Firm Zhenhua Data|url=https://shadowmap.com/security-research/investigating-chinese-intelligence-firm-zhenhua-data/|access-date=2020-09-22|website=ShadowMap|language=en-US}}</ref> The report found real-time monitoring of social media such as [[LinkedIn]], [[TikTok]], [[Facebook]], [[Twitter]] and online forums, and discovered an "Internet Big Data Military Intelligence System". This system tracks US warships in real-time and profiles the personnel on board, weapons being carried, LinkedIn profiles etc. This may be related to a previous story published by the NYT titled "How China Uses LinkedIn to Recruit Spies Abroad".<ref>{{Cite news|last=Wong|first=Edward|date=2019-09-27|title=How China Uses LinkedIn to Recruit Spies Abroad|language=en-US|work=The New York Times|url=https://www.nytimes.com/2019/08/27/world/asia/china-linkedin-spies.html|access-date=2020-09-22|issn=0362-4331}}</ref> The firm also found keywords that were being used to target US Embassy-supported activists in Hong Kong, which included political organisations, famous events and protestors.

== See also ==

* [[Global surveillance disclosures (2013–present)]]


== References ==
== References ==
{{Reflist}}
{{Reflist}}

[[Category:Computer surveillance]]
[[Category:Computer surveillance]]
[[Category:Cyberwarfare in China]]
[[Category:Cyberwarfare by China]]
[[Category:Data breaches]]
[[Category:Data breaches]]
[[Category:Data journalism]]
[[Category:2020 scandals]]

Latest revision as of 02:23, 26 November 2024

Shenzhen Zhenhua Data Information Technology Co is a big data scraping company that provides open-source intelligence profiling and threat intelligence services. The company is reported to be owned by China Zhenhua Electronics Group, which is owned by China Electronics Corporation (CEC), a state-owned military research enterprise.[1] While the data Zhenhua uses is publicly available data, Zhenhua's usage of that data is a security concern to western countries. The company claims to work with the Chinese government, including Chinese intelligence agencies and the military.[2][3] Zhenhua Data's CEO has publicly supported "hybrid warfare" and "psychological warfare".[4] Winston Peters, the Foreign Affairs Minister of New Zealand, stated that it would be 'naive' to think there was no connection to the Chinese state.[5]

In September 2020, a data leak revealed that Zhenhua was globally monitoring over 2.4 million people. The databases, collectively called the Overseas Key Information Database (OKIDB), was leaked to an American academic who shared the data with Internet 2.0, an Australian-based cybersecurity consultancy. On 14 September 2020, a consortium of media outlets published the findings.[6][7] Researchers found out that about 20% of the data was not from open source locations.[8] Investigation by journalists in New Zealand found that some people with no online presence were profiled in the database.[9]

There have been "conflicting assessments" of the value of the data, from it being an entirely "aspirational" venture, to it being a small peek into the world of hybrid warfare and psychological warfare being waged by the Chinese.[7][8]

Internet 2.0 recovered a quarter of a million people from OKIDB, including about 52,000 Americans, 35,000 Australians and 10,000 Britons.[10] Prominent people in the database include prime ministers Boris Johnson and Scott Morrison,[2] the President of Austria Alexander Van der Bellen and their families.[11] One of Hungarian Prime Minister Viktor Orbán's children appears on the list as well.[12] Australians in the database include Natalie Imbruglia, Larry Anthony, Emma Husar, Ellen Whinnett and Junaid Thorne.[8] Around 10,000 people and organisations from India were also on the list, including senior Indian diplomats such as Harsh Vardhan Shringla and Sanjeev Singla, policymakers such as Amitabh Kant, academics such as Romila Thapar, and sportspeople such as Sachin Tendulkar.[13][14] Numerous Indian think-tanks were also being monitored.[14]

A threat intelligence organisation published a report on Zhenhua Data's operation and found a number of monitoring systems that were publicly accessible.[15] The report found real-time monitoring of social media such as LinkedIn, TikTok, Facebook, Twitter and online forums, and discovered an "Internet Big Data Military Intelligence System". This system tracks US warships in real-time and profiles the personnel on board, weapons being carried, LinkedIn profiles etc. This may be related to a previous story published by the NYT titled "How China Uses LinkedIn to Recruit Spies Abroad".[16] The firm also found keywords that were being used to target US Embassy-supported activists in Hong Kong, which included political organisations, famous events and protestors.

See also

[edit]

References

[edit]
  1. ^ Probyn, Andrew; Doran, Matthew (September 14, 2020). "China's 'hybrid war': Beijing's mass surveillance of Australia and the world for secrets and scandal". Australian Broadcasting Corporation. Retrieved September 26, 2020.
  2. ^ a b Hurst, Daniel; Kuo, Lily; Graham-McLay, Charlotte (2020-09-14). "Zhenhua Data leak: personal details of millions around world gathered by China tech company". The Guardian. Retrieved 2020-09-17.
  3. ^ Mazoomdaar, Jay; Iyer, P Vaidyanathan (2020-09-16). "China is watching — Hybrid warfare: What data they collect, why it's cause for concern". The Indian Express. Retrieved 2020-09-17.
  4. ^ Graham, Ben (2020-09-15). "Zhenhua Data: 35,000 Aussies being spied on by China". News.com.au. Archived from the original on 2020-09-15. Retrieved 2020-09-17.
  5. ^ "Zhenhua Data collection 'disquieting in the extreme' - Winston Peters". Radio New Zealand. 2020-09-17. Archived from the original on 2020-09-15. Retrieved 2020-09-17.
  6. ^ Shih, Gerry. "Chinese firm harvests social media posts, data of prominent Americans and military". Washington Post. ISSN 0190-8286. Retrieved 2020-09-17.
  7. ^ a b "Zhenhua Data leak: From Narendra Modi to Ratan Tata, here's the list of prominent Indians China spied on". The Economic Times. 14 September 2014. Retrieved 2020-09-17.
  8. ^ a b c Graham, Ben (2020-09-14). "China spying on huge number of Aussies". Gold Coast Bulletin. Retrieved 2020-09-17.
  9. ^ Graham, Ben (2020-09-14). "Details of citizens from Pacific island nations harvested by Chinese technology firm". 1 News. Retrieved 2020-09-17.
  10. ^ "China's mass surveillance of 35,000 Australians revealed". www.abc.net.au. 2020-09-13. Retrieved 2020-09-17.
  11. ^ Csekö, Balazs; Sulzbacher, Markus (2020-10-20). "Zhenhua Files": Chinesische Datensammler spähen österreichische Politik aus". Der Standard. Retrieved 2020-10-28.
  12. ^ Keller-Alánt, Ákos (2020-10-13). "Orbán, Rogán és Kósa gyerekei is szerepelnek a kínai adatbázisban". Szabad Európa. Retrieved 2020-10-28.
  13. ^ "Shenzhen panopticon: The who's who of India were sitting ducks for a China tech company, reveals report". The Economic Times. 14 September 2020. Retrieved 2020-09-17.
  14. ^ a b M, Kaunain Sheriff; Mazoomdaar, Jay; Iyer, P Vaidyanathan (2020-09-17). "Express Investigation Part-4: Foreign secy, Niti CEO on list; Facebook bans Zhenhua Data". The Indian Express. Retrieved 2020-09-17.
  15. ^ "Investigating Chinese Intelligence Firm Zhenhua Data". ShadowMap. 2020-09-17. Retrieved 2020-09-22.
  16. ^ Wong, Edward (2019-09-27). "How China Uses LinkedIn to Recruit Spies Abroad". The New York Times. ISSN 0362-4331. Retrieved 2020-09-22.