More than 300 million private chat logs and profiles of Chinese social-media users were left exposed online, and gathered by a government surveillance network, according to a Dutch security researcher.
Victor Gevers, a security researcher at the cyber-security non-profit GDI Foundation, wrote on Twitter on March 2 that he found a database containing information generated by Chinese social-media accounts, including private messages, names, identity card numbers, photos, and GPS location data.
The database also fed the data to 17 other remote servers, which, according to Gevers, belong to local police stations around China.
The researcher wrote that police review thousands of chat logs every day.
The records in the database were tagged to six labels referring to messaging apps, according to Gevers, who sought help from Twitter users to identify the messaging services. Two of those were identified by users as QQ and WeChat, both operated by Chinese internet giant Tencent.
Great Firewall
Beijing monitors internet discussion as part of its sprawling online censorship apparatus, collectively known as the “Great Firewall.” The regime enforces tight censorship over its cyberspace to snuff out facts, ideas, and opinions that contradict the Chinese Communist Party’s rule and propaganda.For instance, The Epoch Times has reported that WeChat’s privacy policy agreement, updated in September 2017, stated that it would “retain, preserve, or disclose” users’ data to comply with the Chinese regime’s “applicable laws or regulations.”
Past Cases
This isn’t the only unsecured Chinese database that Gevers has uncovered.During one 24-hour span, SenseNet collected about 6.7 million individual GPS coordinates. These location data points were linked to names, identification card numbers, birth dates, addresses, photos, and employers.
In recent years, the communist regime has drastically ramped up surveillance in Xinjiang, a region home to more than 12 million Uyghur and other Muslim minorities, under the narrative of combating “extremist threats.”
On Feb. 22, China’s National Computer Network Emergency Response Technical Team, a non-profit cybersecurity technical center, reported on its website that of the roughly 25,000 MongoDB databases, a type of database management system, in China, 468 had been exposed to the public. The exposed databases originated from 28 different provinces, including Beijing and Shanghai.