{"id":44458,"date":"2021-12-16T14:55:09","date_gmt":"2021-12-16T14:55:09","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32923\/Documents-Link-Huawei-To-Uyghur-Surveillance-Projects.html"},"modified":"2021-12-16T14:55:09","modified_gmt":"2021-12-16T14:55:09","slug":"documents-link-huawei-to-uyghur-surveillance-projects","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/documents-link-huawei-to-uyghur-surveillance-projects\/","title":{"rendered":"Documents Link Huawei To Uyghur Surveillance Projects"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/i.guim.co.uk\/img\/media\/18db0804aa3a958552f2c66c680e829a13138df7\/0_187_3500_2100\/master\/3500.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=454c132f77f9a5b715bd98f8a54e94fa\" class=\"ff-og-image-inserted\"><\/div>\n<p class=\"dcr-o5gy41\">Huawei has helped Chinese authorities create surveillance technology that targets the country\u2019s Uyghur minority population, an investigation has alleged.<\/p>\n<p class=\"dcr-o5gy41\">A series of marketing presentation slides <a href=\"https:\/\/www.washingtonpost.com\/world\/2021\/12\/14\/huawei-surveillance-china\/\" data-link-name=\"in body link\">reviewed by the Washington Post<\/a> found Huawei had a role in developing surveillance projects created in a partnership with other Chinese companies.<\/p>\n<p class=\"dcr-o5gy41\">They included analysis of voice recordings, monitoring detention centres, tracking locations of political individuals of interest, police surveillance in the western <a href=\"https:\/\/www.theguardian.com\/world\/xinjiang\" data-component=\"auto-linked-tag\" data-link-name=\"in body link\">Xinjiang<\/a> region, and corporate tracking of employees and customers.<\/p>\n<p class=\"dcr-o5gy41\">While the slides did not specify who the presentations were for, the report said some of them showcased surveillance functions specific to police or government agencies, which suggests Chinese government authorities may have been the intended audience.<\/p>\n<p class=\"dcr-o5gy41\">Huawei said it had no knowledge of the projects mentioned in the Washington Post report. \u201cHuawei does not develop or sell systems that target any specific group of people and we require our partners comply with all applicable laws, regulations and business ethics,\u201d it said in a statement. \u201cPrivacy protection is our top priority and we require that all parts of our business comply with all applicable laws and regulations in the countries and regions where we operate.\u201d<\/p>\n<p class=\"dcr-o5gy41\">According to the report, many of the slides were created in 2014, a few months after a terrorist attack at <a href=\"https:\/\/www.theguardian.com\/world\/2014\/mar\/02\/china-mass-stabbings-yunnan-kunming-rail-station\" data-link-name=\"in body link\">Kunming railway station<\/a> that killed 31 people \u2013 a case Chinese officials often cite when justifying their policies in Xinjiang. The report said some modifications to the files were made in 2019 or 2020. Huawei\u2019s logo can be seen in many of these slides.<\/p>\n<p class=\"dcr-o5gy41\">The report claimed Xinjiang surveillance projects were highlighted in several slides. Although they did not mention the Uyghur ethnic minority specifically, at least one slide claimed Huawei\u2019s technology had helped the public security bureau in \u00dcr\u00fcmqi, the capital of Xinjiang, capture a number of criminal suspects.<\/p>\n<p class=\"dcr-o5gy41\">The presentation said the system had been in use in \u00dcr\u00fcmqi since 2017 \u2013 which experts believe is around the time when the mass detentions of <a href=\"https:\/\/www.theguardian.com\/world\/uyghurs\" data-component=\"auto-linked-tag\" data-link-name=\"in body link\">Uyghurs<\/a> began. <\/p>\n<p class=\"dcr-o5gy41\">In recent weeks the US and several of its allies have announced <a href=\"https:\/\/www.theguardian.com\/world\/2021\/dec\/07\/china-attacks-us-diplomatic-boycott-of-winter-games-as-travesty-of-olympic-spirit\" data-link-name=\"in body link\">a diplomatic boycott<\/a> of the Beijing Winter Olympics in response to what the Biden administration called \u201ccrimes against humanity in Xinjiang and other human rights abuses\u201d.<\/p>\n<p class=\"dcr-o5gy41\">The report said a \u201cone person one file\u201d facial recognition solution was co-developed by Huawei and a Beijing-based company, which was sanctioned by the US commerce department in July for alleged human rights abuses in Xinjiang.<\/p>\n<p class=\"dcr-o5gy41\">According to the report, other presentations said Huawei\u2019s equipment was used in surveillance camera systems in other Xinjiang cities, highways and detention centres.<\/p>\n<figure id=\"3a7abf87-854f-4bb5-9c91-a0a893de3d23\" class=\" dcr-1mfia18\"><\/figure>\n<p class=\"dcr-o5gy41\">The pitch to provide voice recording analysis aimed to help the authorities examine voice recordings for national security purposes, the report said. In <a href=\"https:\/\/www.theguardian.com\/world\/china\" data-component=\"auto-linked-tag\" data-link-name=\"in body link\">China<\/a>, the term \u201cnational security\u201d is broad. It could range from activities conducted by political dissents to policies in Hong Kong.<\/p>\n<p class=\"dcr-o5gy41\">One 2018 presentation introduced the iFlytek Voiceprint Management Platform, a product co-developed by Huawei and iFlytek, a Chinese artificial intelligence company. According to the slide, this product can identify individuals by comparing their voice against a \u201cvoiceprint library\u201d.<\/p>\n<p class=\"dcr-o5gy41\">It is unclear whether the developers of this product were involved in collecting voiceprints. But the partner, iFlytek, was <a href=\"https:\/\/www.reuters.com\/article\/us-usa-trade-china-exclusive-idUSKBN1WM25M\" data-link-name=\"in body link\">sanctioned by the US<\/a> for alleged human rights violations in 2019. The company did not respond to the Washington Post\u2019s inquiry.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32923\/Documents-Link-Huawei-To-Uyghur-Surveillance-Projects.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[9783],"class_list":["post-44458","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headlinegovernmentchinaspywarebackdoor"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Documents Link Huawei To Uyghur Surveillance Projects 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/documents-link-huawei-to-uyghur-surveillance-projects\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Documents Link Huawei To Uyghur Surveillance Projects 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/documents-link-huawei-to-uyghur-surveillance-projects\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-16T14:55:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i.guim.co.uk\/img\/media\/18db0804aa3a958552f2c66c680e829a13138df7\/0_187_3500_2100\/master\/3500.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=454c132f77f9a5b715bd98f8a54e94fa\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/documents-link-huawei-to-uyghur-surveillance-projects\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/documents-link-huawei-to-uyghur-surveillance-projects\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Documents Link Huawei To Uyghur Surveillance Projects\",\"datePublished\":\"2021-12-16T14:55:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/documents-link-huawei-to-uyghur-surveillance-projects\\\/\"},\"wordCount\":557,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/documents-link-huawei-to-uyghur-surveillance-projects\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/18db0804aa3a958552f2c66c680e829a13138df7\\\/0_187_3500_2100\\\/master\\\/3500.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=454c132f77f9a5b715bd98f8a54e94fa\",\"keywords\":[\"headline,government,china,spyware,backdoor\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/documents-link-huawei-to-uyghur-surveillance-projects\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/documents-link-huawei-to-uyghur-surveillance-projects\\\/\",\"name\":\"Documents Link Huawei To Uyghur Surveillance Projects 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/documents-link-huawei-to-uyghur-surveillance-projects\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/documents-link-huawei-to-uyghur-surveillance-projects\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/18db0804aa3a958552f2c66c680e829a13138df7\\\/0_187_3500_2100\\\/master\\\/3500.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=454c132f77f9a5b715bd98f8a54e94fa\",\"datePublished\":\"2021-12-16T14:55:09+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/documents-link-huawei-to-uyghur-surveillance-projects\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/documents-link-huawei-to-uyghur-surveillance-projects\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/documents-link-huawei-to-uyghur-surveillance-projects\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/18db0804aa3a958552f2c66c680e829a13138df7\\\/0_187_3500_2100\\\/master\\\/3500.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=454c132f77f9a5b715bd98f8a54e94fa\",\"contentUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/18db0804aa3a958552f2c66c680e829a13138df7\\\/0_187_3500_2100\\\/master\\\/3500.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=454c132f77f9a5b715bd98f8a54e94fa\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/documents-link-huawei-to-uyghur-surveillance-projects\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,china,spyware,backdoor\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentchinaspywarebackdoor\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Documents Link Huawei To Uyghur Surveillance Projects\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Documents Link Huawei To Uyghur Surveillance Projects 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/documents-link-huawei-to-uyghur-surveillance-projects\/","og_locale":"en_US","og_type":"article","og_title":"Documents Link Huawei To Uyghur Surveillance Projects 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/documents-link-huawei-to-uyghur-surveillance-projects\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-12-16T14:55:09+00:00","og_image":[{"url":"https:\/\/i.guim.co.uk\/img\/media\/18db0804aa3a958552f2c66c680e829a13138df7\/0_187_3500_2100\/master\/3500.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=454c132f77f9a5b715bd98f8a54e94fa","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/documents-link-huawei-to-uyghur-surveillance-projects\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/documents-link-huawei-to-uyghur-surveillance-projects\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Documents Link Huawei To Uyghur Surveillance Projects","datePublished":"2021-12-16T14:55:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/documents-link-huawei-to-uyghur-surveillance-projects\/"},"wordCount":557,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/documents-link-huawei-to-uyghur-surveillance-projects\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/18db0804aa3a958552f2c66c680e829a13138df7\/0_187_3500_2100\/master\/3500.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=454c132f77f9a5b715bd98f8a54e94fa","keywords":["headline,government,china,spyware,backdoor"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/documents-link-huawei-to-uyghur-surveillance-projects\/","url":"https:\/\/www.threatshub.org\/blog\/documents-link-huawei-to-uyghur-surveillance-projects\/","name":"Documents Link Huawei To Uyghur Surveillance Projects 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/documents-link-huawei-to-uyghur-surveillance-projects\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/documents-link-huawei-to-uyghur-surveillance-projects\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/18db0804aa3a958552f2c66c680e829a13138df7\/0_187_3500_2100\/master\/3500.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=454c132f77f9a5b715bd98f8a54e94fa","datePublished":"2021-12-16T14:55:09+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/documents-link-huawei-to-uyghur-surveillance-projects\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/documents-link-huawei-to-uyghur-surveillance-projects\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/documents-link-huawei-to-uyghur-surveillance-projects\/#primaryimage","url":"https:\/\/i.guim.co.uk\/img\/media\/18db0804aa3a958552f2c66c680e829a13138df7\/0_187_3500_2100\/master\/3500.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=454c132f77f9a5b715bd98f8a54e94fa","contentUrl":"https:\/\/i.guim.co.uk\/img\/media\/18db0804aa3a958552f2c66c680e829a13138df7\/0_187_3500_2100\/master\/3500.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=454c132f77f9a5b715bd98f8a54e94fa"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/documents-link-huawei-to-uyghur-surveillance-projects\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,china,spyware,backdoor","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentchinaspywarebackdoor\/"},{"@type":"ListItem","position":3,"name":"Documents Link Huawei To Uyghur Surveillance Projects"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44458","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44458"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44458\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44458"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44458"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}