{"id":46108,"date":"2022-04-08T14:04:09","date_gmt":"2022-04-08T14:04:09","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33309\/China-Uses-AI-Software-To-Improve-Its-Surveillance-Capabilities.html"},"modified":"2022-04-08T14:04:09","modified_gmt":"2022-04-08T14:04:09","slug":"china-uses-ai-software-to-improve-its-surveillance-capabilities","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/china-uses-ai-software-to-improve-its-surveillance-capabilities\/","title":{"rendered":"China Uses AI Software To Improve Its Surveillance Capabilities"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.reuters.com\/resizer\/1NS7R8mfbX33Ag_uv8qL3As8Ko4=\/1200x628\/smart\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/OVM7TPNDPBO4TB3L3ZKTVSE7BY.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p data-testid=\"paragraph-0\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">BEIJING, April 8 (Reuters) &#8211; Dozens of Chinese firms have built software that uses artificial intelligence to sort data collected on residents, amid high demand from authorities seeking to upgrade their surveillance tools, a Reuters review of government documents shows.<\/p>\n<p data-testid=\"paragraph-1\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">According to more than 50 publicly available documents examined by Reuters, dozens of entities in China have over the past four years bought such software, known as &#8220;one person, one file&#8221;. The technology improves on existing software, which simply collects data but leaves it to people to organise.<\/p>\n<p data-testid=\"paragraph-2\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">\u201cThe system has the ability to learn independently and can optimize the accuracy of file creation as the amount of data increases. (Faces that are) partially blocked, masked, or wearing glasses, and low-resolution portraits can also be archived relatively accurately,\u201d according to a tender published in July by the public security department of Henan, China\u2019s third-largest province by population. <a href=\"https:\/\/www.reuters.com\/technology\/exclusive-chinese-province-targets-journalists-foreign-students-with-planned-new-2021-11-29\/\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__medium__1kbOh text__large__nEccO link__underline_default__2prE_\"> read more <\/a><\/p>\n<div class=\"registration-prompt__container__ia3bM registration-prompt__inline__1zdn0 article-body__element__OOj6H article-body__inline-registration-prompt__39Ed8\">\n<div class=\"registration-prompt__text-content__1_ijH\">\n<h5 class=\"text__text__1FZLe text__white__3r45t text__medium__1kbOh text__heading_5__2krbj heading__base__2T28j heading__heading_5__2A2g- registration-prompt__heading__1zL6F\">Register now for FREE unlimited access to Reuters.com<\/h5>\n<p><button class=\"button__button__2Ecqi button__secondary__18moI button__round__1nYLA text-button__container__3q3zX registration-prompt__button-text__2ySbK\" type=\"button\"><\/p>\n<p><span class=\"text__text__1FZLe text__inherit-color__3208F text__bold__2-8Kc text__default__UPMUu text-button__medium__113uZ\">Register<\/span><\/p>\n<p><\/button><\/div>\n<\/div>\n<p data-testid=\"paragraph-3\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">Henan&#8217;s department of public security did not respond to requests for comment about the system and its uses.<\/p>\n<p data-testid=\"paragraph-4\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">The new software improves on Beijing&#8217;s current approach to surveillance. Although China&#8217;s existing systems can collect data on individuals, law enforcement and other users have been left to organise it.<\/p>\n<p data-testid=\"paragraph-5\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">Another limitation of current surveillance software is its inability to connect an individual\u2019s personal details to a real-time location except at security checkpoints such as those in airports, according to Jeffrey Ding, a postdoctoral fellow at Stanford&#8217;s Center for International Security and Cooperation.<\/p>\n<p data-testid=\"paragraph-6\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">One person, one file &#8220;is a way of sorting information that makes it easier to track individuals,&#8221; said Mareike Ohlberg, a Berlin-based senior fellow at the German Marshall Fund.<\/p>\n<p data-testid=\"paragraph-7\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">China&#8217;s Department of Public Security, which oversees regional police authorities, did not respond to a request for comment about one person, one file and its surveillance uses. Besides the police units, 10 bids were opened by Chinese Communist Party bodies responsible for political and legal affairs. China&#8217;s Central Political and Legal Affairs Commission declined to comment.<\/p>\n<p data-testid=\"paragraph-8\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">The tenders examined by Reuters represent a fraction of such efforts by Chinese police units and Party bodies to upgrade surveillance networks by tapping into the power of big data and AI, according to three industry experts interviewed for this story.<\/p>\n<p data-testid=\"paragraph-9\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">According to government documents, some of the software&#8217;s users, such as schools, wanted to monitor unfamiliar faces outside their compounds.<\/p>\n<p data-testid=\"paragraph-10\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">The majority, such as police units in southwestern Sichuan province&#8217;s Ngawa prefecture, mainly populated by Tibetans, ordered it for more explicit security purposes. The Ngawa tender describes the software as being for &#8220;maintaining political security, social stability and peace among the people.&#8221;<\/p>\n<p data-testid=\"paragraph-11\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">Ngawa&#8217;s department of public security did not respond to requests for comment.<\/p>\n<p data-testid=\"paragraph-12\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">Beijing says its monitoring is crucial to combating crime and has been key to its efforts to fight the spread of COVID-19. Human rights activists such as Human Rights Watch say that the country is building a surveillance state that infringes on privacy and unfairly targets certain groups, such the Uyghur Muslim minority.<\/p>\n<p data-testid=\"paragraph-13\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">The Reuters review shows that local authorities across the country, including in highly populated districts of Beijing and underdeveloped provinces like Gansu, have opened at least 50 tenders in the four years since the first patent application, 32 of which were opened for bidding in 2021. Twenty-two tech companies, including Sensetime, Huawei, Megvii, Cloudwalk, Dahua, and the cloud division of Baidu, now offer such software, according to a Reuters review.<\/p>\n<p data-testid=\"paragraph-14\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">Sensetime declined to comment. Megvii, Cloudwalk, Dahua, and the cloud division of Baidu did not respond to requests for comment.<\/p>\n<p data-testid=\"paragraph-15\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">Huawei said in a statement that a partner had developed the one person, one file application in its smart city platform. The company declined to comment on the patent applications.<\/p>\n<p data-testid=\"paragraph-16\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">&#8220;Huawei does not develop or sell applications that target any specific group of people,&#8221; the company said.<\/p>\n<p data-testid=\"paragraph-17\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">The documents Reuters reviewed span 22 of China&#8217;s 31 main administrative divisions, and all levels of provincial government, from regional public security departments to Party offices for a single neighbourhood.<\/p>\n<p data-testid=\"paragraph-18\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">The new systems aim to make sense of the giant troves of data such entities collect, using complex algorithms and machine learning to create customised files for individuals, according to the government tenders. The files update themselves automatically as the software sorts data.<\/p>\n<p data-testid=\"paragraph-19\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">A wide range of challenges can complicate implementation, however. Bureaucracy and even cost can create a fragmented and disjointed nationwide network, three AI and surveillance experts told Reuters.<\/p>\n<p data-testid=\"paragraph-20\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">Reuters found announcements for successful bids for more than half of the 50 procurement documents analysed, with values between a few million yuan and close to 200 million yuan.<\/p>\n<p data-testid=\"paragraph-21\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">SYSTEM UPGRADE<\/p>\n<p data-testid=\"paragraph-22\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">China blanketed its cities with surveillance cameras in a 2015-2020 campaign it described as &#8220;sharp eyes&#8221; and is striving to do the same across rural areas. The development and adoption of the &#8220;one person, one file&#8221; software began around the same time.<\/p>\n<p data-testid=\"paragraph-23\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">Ohlberg, the researcher, said the earliest mention she had seen of one person, one file was from 2016, in a 200-page surveillance feasibility study by Shawan county in Xinjiang, for acquiring a computer system that could \u201cautomatically identify and investigate key persons involved in terrorism and (threatening social) stability.\u201d A Shawan county official declined to comment.<\/p>\n<p data-testid=\"paragraph-24\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">In 2016, China&#8217;s domestic security chief at the time, Meng Jianzhu, wrote in a state-run journal that big data was the key to finding crime patterns and trends. Two years later, the system was referenced in a speech to industry executives given by Li Ziqing, then-director of the Research Center for Biometrics and Security Technology of the state-run Chinese Academy of Sciences. Li also was chief scientist at AuthenMetric, a Beijing-based facial recognition company. Neither the research centre nor AuthenMetric responded to requests for comment.<\/p>\n<p data-testid=\"paragraph-25\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">&#8220;The ultimate core technology of big data\u2019s (application to) security is one person, one file,&#8221; Li said in the 2018 speech at an AI forum in Shenzhen, according to a transcript of the speech published by local media and shared on AuthenMetric\u2019s WeChat public account.<\/p>\n<p data-testid=\"paragraph-26\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">The Party&#8217;s Political and Legal Affairs Commission, which Meng led in 2016, declined to comment. Meng could not be reached for comment. Li did not respond to a request for comment.<\/p>\n<p data-testid=\"paragraph-27\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">The industry developed quickly. By 2021, Huawei, Sensetime, and 26 other Chinese tech companies had filed patent applications with the World Intellectual Property Organization for file archiving and image clustering algorithms.<\/p>\n<p data-testid=\"paragraph-28\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">A 2021 Huawei patent application for a &#8220;person database partitioning method and device&#8221; that mentioned one person, one file said that &#8220;as smart cameras become more popular in the future, the number of captured facial images in a city will grow to trillions per year\u201d.<\/p>\n<p data-testid=\"paragraph-29\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">SAFE CITIES<\/p>\n<p data-testid=\"paragraph-30\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">The 50 tenders Reuters analysed give varying amounts of detail on how the software would be used.<\/p>\n<p data-testid=\"paragraph-31\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">Some mentioned &#8220;one person, one file&#8221; as a single entry on a list of needed items for surveillance systems. Others gave detailed descriptions.<\/p>\n<p data-testid=\"paragraph-32\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">Nine of the tenders indicated the software would be used with facial recognition technology that could, the documents specified, identify whether a passerby was Uyghur, connecting to early warning systems for the police and creating archives of Uyghur faces.<\/p>\n<p data-testid=\"paragraph-33\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">One tender published in February 2020 by a Party organ responsible for an area in the southeastern island province of Hainan, for instance, sought a database of Uyghur and Tibetan residents to facilitate \u201cfinding the information of persons involved in terrorism.\u201d<\/p>\n<p data-testid=\"paragraph-34\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">The Hainan authorities did not respond to a request for comment.<\/p>\n<p data-testid=\"paragraph-35\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">More than a dozen tenders mention the need to combat terrorism and \u201cmaintain stability\u201d, a catch-all term that human rights activists say is often used to mean repressing dissent.<\/p>\n<p data-testid=\"paragraph-36\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">At least four of the tenders said the software should be able to pull information from the individual&#8217;s social media accounts. Half of the tenders said the software would be used to compile and analyse personal details such as relatives, social circles, vehicle records, marriage status, and shopping habits.<\/p>\n<div class=\"registration-prompt__container__ia3bM registration-prompt__inline__1zdn0 article-body__element__OOj6H\">\n<div class=\"registration-prompt__text-content__1_ijH\">\n<h5 class=\"text__text__1FZLe text__white__3r45t text__medium__1kbOh text__heading_5__2krbj heading__base__2T28j heading__heading_5__2A2g- registration-prompt__heading__1zL6F\">Register now for FREE unlimited access to Reuters.com<\/h5>\n<p><button class=\"button__button__2Ecqi button__secondary__18moI button__round__1nYLA text-button__container__3q3zX registration-prompt__button-text__2ySbK\" type=\"button\"><\/p>\n<p><span class=\"text__text__1FZLe text__inherit-color__3208F text__bold__2-8Kc text__default__UPMUu text-button__medium__113uZ\">Register<\/span><\/p>\n<p><\/button><\/div>\n<\/div>\n<p><span class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__default__UPMUu sign-off__text__328ww\">Reporting by Eduardo Baptista. Editing by Gerry Doyle and Brenda Goh<\/span><\/p>\n<p class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__large__nEccO body__base__22dCE body__large_body__FV5_X article-body__element__OOj6H\">Our Standards: <a href=\"https:\/\/www.thomsonreuters.com\/en\/about-us\/trust-principles.html\" target=\"_blank\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__medium__1kbOh text__large__nEccO link__underline_default__2prE_\" rel=\"noopener\">The Thomson Reuters Trust Principles.<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33309\/China-Uses-AI-Software-To-Improve-Its-Surveillance-Capabilities.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":46109,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8672],"class_list":["post-46108","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentprivacychinaspyware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>China Uses AI Software To Improve Its Surveillance Capabilities 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/china-uses-ai-software-to-improve-its-surveillance-capabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"China Uses AI Software To Improve Its Surveillance Capabilities 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/china-uses-ai-software-to-improve-its-surveillance-capabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-08T14:04:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.reuters.com\/resizer\/1NS7R8mfbX33Ag_uv8qL3As8Ko4=\/1200x628\/smart\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/OVM7TPNDPBO4TB3L3ZKTVSE7BY.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-uses-ai-software-to-improve-its-surveillance-capabilities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-uses-ai-software-to-improve-its-surveillance-capabilities\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"China Uses AI Software To Improve Its Surveillance Capabilities\",\"datePublished\":\"2022-04-08T14:04:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-uses-ai-software-to-improve-its-surveillance-capabilities\\\/\"},\"wordCount\":1356,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-uses-ai-software-to-improve-its-surveillance-capabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/china-uses-ai-software-to-improve-its-surveillance-capabilities.jpg\",\"keywords\":[\"headline,government,privacy,china,spyware\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-uses-ai-software-to-improve-its-surveillance-capabilities\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-uses-ai-software-to-improve-its-surveillance-capabilities\\\/\",\"name\":\"China Uses AI Software To Improve Its Surveillance Capabilities 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-uses-ai-software-to-improve-its-surveillance-capabilities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-uses-ai-software-to-improve-its-surveillance-capabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/china-uses-ai-software-to-improve-its-surveillance-capabilities.jpg\",\"datePublished\":\"2022-04-08T14:04:09+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-uses-ai-software-to-improve-its-surveillance-capabilities\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-uses-ai-software-to-improve-its-surveillance-capabilities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-uses-ai-software-to-improve-its-surveillance-capabilities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/china-uses-ai-software-to-improve-its-surveillance-capabilities.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/china-uses-ai-software-to-improve-its-surveillance-capabilities.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-uses-ai-software-to-improve-its-surveillance-capabilities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,privacy,china,spyware\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentprivacychinaspyware\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"China Uses AI Software To Improve Its Surveillance Capabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"China Uses AI Software To Improve Its Surveillance Capabilities 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/china-uses-ai-software-to-improve-its-surveillance-capabilities\/","og_locale":"en_US","og_type":"article","og_title":"China Uses AI Software To Improve Its Surveillance Capabilities 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/china-uses-ai-software-to-improve-its-surveillance-capabilities\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-04-08T14:04:09+00:00","og_image":[{"url":"https:\/\/www.reuters.com\/resizer\/1NS7R8mfbX33Ag_uv8qL3As8Ko4=\/1200x628\/smart\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/OVM7TPNDPBO4TB3L3ZKTVSE7BY.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/china-uses-ai-software-to-improve-its-surveillance-capabilities\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/china-uses-ai-software-to-improve-its-surveillance-capabilities\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"China Uses AI Software To Improve Its Surveillance Capabilities","datePublished":"2022-04-08T14:04:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/china-uses-ai-software-to-improve-its-surveillance-capabilities\/"},"wordCount":1356,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/china-uses-ai-software-to-improve-its-surveillance-capabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/china-uses-ai-software-to-improve-its-surveillance-capabilities.jpg","keywords":["headline,government,privacy,china,spyware"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/china-uses-ai-software-to-improve-its-surveillance-capabilities\/","url":"https:\/\/www.threatshub.org\/blog\/china-uses-ai-software-to-improve-its-surveillance-capabilities\/","name":"China Uses AI Software To Improve Its Surveillance Capabilities 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/china-uses-ai-software-to-improve-its-surveillance-capabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/china-uses-ai-software-to-improve-its-surveillance-capabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/china-uses-ai-software-to-improve-its-surveillance-capabilities.jpg","datePublished":"2022-04-08T14:04:09+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/china-uses-ai-software-to-improve-its-surveillance-capabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/china-uses-ai-software-to-improve-its-surveillance-capabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/china-uses-ai-software-to-improve-its-surveillance-capabilities\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/china-uses-ai-software-to-improve-its-surveillance-capabilities.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/china-uses-ai-software-to-improve-its-surveillance-capabilities.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/china-uses-ai-software-to-improve-its-surveillance-capabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,privacy,china,spyware","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentprivacychinaspyware\/"},{"@type":"ListItem","position":3,"name":"China Uses AI Software To Improve Its Surveillance Capabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46108"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46108\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/46109"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}