Muslims across the world are shocked about the continued horrific news of Chinese concentration camps and clamp-down on the Uygher Muslims in the Xinjiang Province, something which is now getting significant global media coverage.

In August 2018 a United Nations panel revealed more than one million Uygher Muslims were estimated in detention in “counter-extremism centres”, and “another two million have been forced into so-called re-education camps for political and cultural indoctrination”. [1]

Since then and under the borrowed Western banner of ‘fighting terrorism’, more information of the Chinese oppression, torture, sexual violence, separation of parents from their children has been revealed by mostly Muslim media outlets to raise awareness of the plight of the Uygher Muslims. Large numbers of Muslims around the world have galvanised to raise their voices in support of their Uyghur brothers and sisters.

Western media outlets were relatively quiet on this matter, however, over the last two years they have raised the plight of the Uyghur Muslims putting pressure on China to respond.

In October 2020, the US and EU used the United Nations Human Rights Committee to criticise China over its policies on the Uyghur Muslims. This resulted in 43 countries signing the statement criticising China on the existence of re-education camps in Xinjiang.

The US has also warned its companies on doing business in Xinjiang and has also threatened to blacklist some Chinese companies. On 9 Nov 2021 the US Holocaust Memorial Museum said in a report it was “gravely concerned” that the Chinese government “may be committing genocide”. [2]

After years of inaction and dealing with the Chinese under normal political and diplomatic protocols, why is there now an awareness campaign and sudden pressure by Western countries and media on China? Have the US and UK suddenly grown a moral compass by which they seek to stop the oppression of the Uyghur Muslims in China? Whilst allowing the oppression and killing of Muslims in other places such as Palestine, Kashmir and Syria?

No-one is fooled by the West’s sudden criticism of China’s Xinjiang policy. It is now in their interest to try and expose the Chinese policy towards the Muslims in Xinjiang. What would this interest be? It is to contain China’s economic growth and political reach and halt China’s ambitions. Exposing China’s treatment of its citizens in one part of the west placing pressure on China in order to embarrass her globally as a nation that is authoritarian and undertakes Human Rights abuses.

The West’s audacity has no boundaries. On the one hand they expose regimes for doing what they themselves have done and somehow think the world will fall for their fake gestures. For example, occupying Iraq and Afghanistan: killing over a million people in Iraq and thousands in Afghanistan, allowing Palestine to be occupied and usurped every day and causing destabilisation across many countries. What type of moral high ground can the West claim whilst exposing the Chinese government?

What makes things even worse is the silence and in many cases the support of the Chinese government by the leaders in the Muslim world. For example, Imran Khan a few years ago said, “Frankly, I don’t know much about that.” More recently in June 2021 he refused to acknowledge and condemn the actions of the Chinese government by saying they have been “one of the greatest friends to us in our most difficult times,” and any conversations with Beijing on Xinjiang would happen “behind closed doors”. [3]

Crown Prince Mohamed bin Salman supported China’s right to undertake “anti-terrorism” and “de-extremism” measures [4]. In July 2021 President Erdogan of Turkey discussed with President of China Xi and talked about the potential for commercial and diplomatic ties [5] between the two countries instead of accounting and exposing the Chinese for what they have been doing.

China has a huge dependency for oil from the Middle East, billions of raw materials from Indonesia such as iron and steel – $7.53B and mineral fuels, oils, distillation products – $7.04B and many more billions worth of raw materials. [6]  These are all essential mineral;s for China’s export driven economy.

Similarly, China depends on Central Asia for trade and raw materials worth billions. In fact, the Belt and Road Initiative (BRI) through which China hopes to grow even more and dominate the region of the Middle East, Asia, parts of Europe and North Africa with its trade, goes right through this region. If China felt threatened in this initiative alone, it would think twice about the Uygher issue. China has for long realised its dependency on the world’s oceans is a major vulnerability and she has been searching for alternative supply routes to circumvent the Straits of Malacca which could be blockaded. Central Asia and Pakistan are the key alternatives for China and her dependency will only grow in the future placing these nations in a strong position if these choke points were cut. In leaked excerpts from unpublished documents that were put online in November 2021 this vulnerability was admitted by Xi Jinping: “In one 2014 speech covered by the leak, Xi argues that the belt and road initiative, his signature foreign policy project, requires a stable domestic security environment. He asserts that the entire country’s national security and the achievement of China’s major goals in the 21st century will be in jeopardy if the situation in southern Xinjiang is not brought under control.”

This clearly demonstrates if a few governments of the Muslim world took action by boycotting or stopping imports and exports to China and used their  strategic advanates of China, she would be extremely vulnerable







Stop House Demolition in Palestine

Stop House Demolition in Palestine

The non-profit organisation has acted as an extended arm of the Israeli state and enabled the dispossession of Palestinians with what many call ‘eco-colonialism’.

Roughly 75 percent of the forests and agricultural Jewish settlements developed under the Jewish National Fund (JNF) cover over 80 villages of pre-1948 Palestine. 

In the establishment of Israel, the military forces of the Zionist Movement destroyed over half of the villages of Mandate Palestine and uprooted close to 800,000 Palestinians from the country. Some were killed, others were expelled or internally displaced. 

While the JNF brands itself as Israel’s ecological organisation, it is widely criticised as being a greenwashing tool for the Israeli government, covering the crimes of dispossessing and expelling the Palestinian population through its “green” initiatives.

The organisation has over 150 forests under its management and boasts of having planted over 240 million trees since its founding in 1901. A vast majority of the trees, however, are non-native conifers not suitable for the country’s environment.

Here are just 20 of the parks and agricultural settlements of the JNF below, listing the Palestinian villages they were planted and built over along with the populations of the villages before 1948 and where they are located. 

1. Beit Elazari agricultural settlement

Built over: Palestinian village of Al-Maghar

Pre-1948 population: 2,018 Palestinian residents

Location:  Ramle Subdistrict 

2. Castel National Park in the Judean Mountains

Planted over: Palestinian village of Al-Qastal 

Pre-1948 population: 104 Palestinian residents

Location: Jerusalem Subdistrict

3. The agricultural settlements of Giv’ati, Azrikam, Emunim as well as the Zemorot Pond Nature Reserve

Built and planted over: Palestinian village of Bayt Daras 

Pre-1948 population: 3,190 Palestinian residents

Location: Gaza Subdistrict

4. Aminadav Forest 

Planted over: Palestinian village of Al-Walaja

Pre-1948 population: 2,041 Palestinian residents 

Location:  West Bank, Bethlehem Subdistrict

5. Agricultural area used by the settlements of Sde Nachum and Beyt ha-Shitta

Planted over: Palestinian village of Al-Murassas

Pre-1948 population: 534 Palestinian residents 

Location: Beisan Subdistrict

6. Ramot Naftali agricultural settlement 

Built over:  Palestinian villages of Qadas and Al-Nabi Yusha’.

Qadas population: 273 Palestinian residents

Al-Nabi Yusha’ population: 81 Palestinian residents

Location: Upper Galilee near the Lebanese border

7. Farmland used by the Yas’ur settlement

Planted over: Palestinian village of Al-Damun

Pre-1948 population: 1,520 Palestinian residents

Location: Akka Subdistrict (Acre)

8. Yas’ur agricultural settlement

Built over: Palestinian village of Al-Birwa

Pre-1948 population: 1, 694 Palestinian residents

Location: Akka Subdistrict (Acre)

READ MORE: Israel’s greenwashing: weaponising environmentalism on Palestinian lands

9. Ein Dor Grove

Planted over: Palestinian village of Indur

Pre-1948 population: 719 Palestinian residents

Location: Nazareth Subdistrict

10. Be’er Nahash well

Built over: Palestinian village of Dayr Nakhkhas

Pre-1948 population: 696 Palestinian residents

Location: Hebron Subdistrict

11. Kula Forest

Planted over: Palestinian village of Qula

Pre-1948 population: 1,172 Palestinian residents

Location: Ramle Subdistrict 

12. The agricultural settlements of ha-Solelim, Allon ha-Galil Hosha’aya and Chanton as well as Tsipori Grove

Built and planted over: Palestinian village of Saffuriyya

Pre-1948 population: 5,023 Palestinian residents 

Location: Nazareth Subdistrict 

13. Hodaya recreation area

Built over: Palestinian village of Julis

Pre-1948 population: 1,195 Palestinian residents

Location: Gaza Subdistrict

14. Biriyya Forest

Planted over: Palestinian villages of Fir’im, Ayn al-Zaytun, Ammuqa, Qabba’a and Mughr al-Khayt

Fir’im population: 858 Palestinian residents

Ayn al-Zaytun population: 951 Palestinian residents

Ammuqa population: 162 Palestinian residents

Qabba’a population: 534 Palestinian residents

Mughr al-Khayt: 568 Palestinian residents

Location: Safad Subdistrict

15. Beit Ha’emek agricultural settlement 

Built over: Palestinian village of Kuwaykat

Pre-1948 population: 1,218 Palestinian residents

Location: Akka Subdistrict (Acre)

16. Yehi’am Fortress National Park

Planted over: Palestinian village of Al-Ghabisiyya

Pre-1948 population: 1,438 Palestinian residents

Location:  Akka Subdistrict (Acre)

17. Ben Shemen Forest

Planted over: Palestinian villages of Jimzu, Dayr Abu Salama, Khirbat Zakariyya, Haditha, Khirbat al-Duhayriyya

Jimzu population: 1,752 Palestinian residents

Dayr Abu Salama population: 70 Palestinian residents

Khirbat Zakariyya land ownership: 4,538 dunams of land 

Haditha population: 882 Palestinian residents

Khirbat al-Duhayriyya population: 116 Palestinian residents

Location: Ramle Subdistrict

18. Bar’am Forest

Planted over: Palestinian village of Fara

Pre-1948 population: 320 Palestinian residents

Location: Safad Subdistrict

19. Mount Gilboa

Planted over: Palestinian villages of Nuris and Al-Mazar

Nuris population: 570 Palestinian residents

Al-Mazar population: 210 Palestinian residents

Location of Nuris: Jenin Subdistrict

Location of Al-Mazar: Haifa Subdistrict

20. Hakdoshim Forest

Planted over: Palestinian villages of Aqqur, Dayr ‘Amr, Bayt Umm al-Mays, Khirbat al-‘Umur and Kasla

Aqqur population: 46 Palestinian residents

Dayr ‘Amr population: 719 Palestinian residents 

Bayt Umm al-Mays population: 81 Palestinian residents

Khirbat al-’Umur population: 313 Palestinian residents

Kasla population: 325 Palestinian residents

Location: Jerusalem Subdistricts


Indonesia to accept dozens of Rohingya refugees stranded at sea

Indonesia to accept dozens of Rohingya refugees stranded at sea

Indonesia has announced it will allow a boat packed with Rohingya refugees, which had become stranded off its coast, to dock after calls from aid organisations to allow the vessel to seek refuge.

Local officials in Aceh, a province on the western island of Sumatra, had said on Tuesday that they would provide the roughly 120 passengers on board with food, medicine and water, but would not allow them to seek refuge in the Southeast Asian country, despite international pleas to do so.

“Today, the Indonesian government decided, in the name of humanity, to give refuge to Rohingya refugees currently afloat on a boat near Biereun district, Aceh,” Armed Wijaya, an official at Indonesia’s chief security ministry, said in a statement on Wednesday.

“The decision was made after considering the emergency conditions the refugees are experiencing onboard the boat,” he said. Its passengers were mostly women and children, he added.

The stranded boat had been at risk of sinking within days, two fishermen told Reuters news agency on Wednesday.

“There were two places where the boat was leaking. There was [a] lot of water,” said Aditya Setiawan, one of the fishermen. In a video seen by Reuters, dozens of people appeared to be packed above and below the deck of the long, wooden skiff.

Al Jazeera’s Jessica Washington, reporting from the Indonesian capital Jakarta, said the decision to allow the refugees to land was “not entirely surprising”.

“In the past, Indonesia has accepted refugees that have arrived by water near Aceh. But it is worth noting that Indonesia is not a signatory to the UN convention on refugees and it is not seen as a destination for permanent resettlement,” Washington said.

The Rohingya are a Muslim ethnic minority group, more than 700,000 of whom fled persecution and violence in neighbouring Myanmar in August 2017.

Last year, hundreds of Rohingya who fled persecution in Buddhist-majority Myanmar arrived in Indonesia.

Rohingya Muslim refugees from Myanmar have for years sailed to countries such as Malaysia, Thailand and Indonesia between November and April when the seas are calm. Many have been turned away.

The United Nations High Commissioner for Refugees representative in Jakarta, Ann Maymann, told Al Jazeera that Indonesia’s decision to allow the refugees to disembark from the stricken boat was a victory for human rights and international law.

“We are extremely grateful to the Indonesian government … it is a decision that we have not seen other governments take with regard to other boats,” she said.

“It is an example for other countries to follow, both in the Asia Pacific region and also in other parts of the world where boats are being pushed back.”

Source :

“Your Family Will Suffer”: How China is Hacking, Surveilling, and Intimidating Uyghurs in Liberal Democracies

“Your Family Will Suffer”: How China is Hacking, Surveilling, and Intimidating Uyghurs in Liberal Democracies

I. Executive Summary

Since 2002, the People’s Republic of China (PRC) has engaged in an unparalleled campaign of transnational repression as part of its efforts to coerce and control Uyghurs living abroad. As a result, members of the Uyghur diaspora have experienced the long reach of China’s authoritarian state in the form of relentless harassment, intimidation, and coercion. This campaign of fear expanded dramatically in 2017 as China embarked on a policy course of mass repression and internment in the Uyghur Region.

This report expands on previous work on the China’s Transnational Repression of Uyghurs dataset, collected in partnership with the Uyghur Human Rights Project and the Oxus Society for Central Asian Affairs, adding 5,530 instances of stage 1 transnational repression spanning 19 years and 22 countries to the dataset. Cases of intimidation and harassment often go unreported, suggesting that the number of cases and number of Uyghurs facing this harassment may be much higher. The broad reach of China’s stage 1 transnational repression of Uyghurs, in tandem with instances of stage 2 and stage 3 repression, shows how the Chinese government has pursued, coerced, and intimidated Uyghurs living abroad, resulting in anxiety, fear, and depression.

We surveyed 72 Uyghurs living in diaspora communities in liberal democracies across North America, the Asia Pacific, and Europe, 95.8 % of whom reported feeling threatened and 73.5% of whom noted that they had experienced digital risks, threats, or other forms of online harassment. Members of Uyghur communities worldwide are interested in protecting themselves, with 89.7% of respondents expressing interest in increasing their security knowledge. However, many respondents did not feel that this protection would necessarily come from their home governments—44.1% felt that their host governments take the intimidation they face seriously, with only 20.5% feeling that the host governments would fix these issues.

Our report analyzes the survey data with a primary focus on how Uyghurs living in the democratic world continue to have their rights—guaranteed to them by democratic governments—violated by the Chinese government, and how state-aligned actors curtail the freedoms of Uyghurs, and potentially many others, through data collection, surveillance, intimidation, and harassment. China’s authoritarianism extends well beyond its borders. The party-state co-opts other countries and their corporations into its campaign of violence and intimidation against Uyghurs; no state or other actor has yet taken responsibility for their protection. Further, our findings suggest that non-Uyghurs are increasingly targeted by this campaign that threatens their freedoms and individual rights. We have also expanded the existing dataset on China’s Transnational Repression of Uyghurs by conducting a comprehensive review of open-source news reporting on the intimidation and harassment of Uyghurs living abroad. We further supplement this publicly available data with ten original interviews we conducted with Uyghurs around the world. Together, the information we have gathered and analyzed represents one of the most comprehensive examinations of Uyghur digital insecurity to date.

The response to this global reach must also be global. The Oxus Society and UHRP urge swift action on 13 recommendations to civil society and the private sector, national governments, and inter-governmental bodies, including:

  • Governments should strengthen safe havens for Uyghur refugee resettlement programs by increasing refugee admissions quotas, streamlining bureaucratic obstacles, streamlining procedures, and providing assistance in mitigating the impacts of digital harassment, including digital hygiene education programs; 
  • Governments should increase accountability by raising the cost to Chinese state agents of engaging in this transnational repression;
  • All actors should incorporate digital rights in action to protect discussions of human rights privacy and the protection of individuals’ identities.
  • The private sector should monitor digital threats on online platforms in all relevant languages, including Uyghur, Chinese, Turkish, and others, develop tools to identify state-actor harassment, and make secure communication platforms available in appropriate languages.

II. Introduction

In 2019, Nurgul Sawut, a Uyghur living in Australia, discovered that a botnet had targeted her Facebook account. This swarm of fake accounts, one of which mimicked her own sister’s profile, attacked her with a public smear campaign and infected her computer with malware. This malware—software that provides malicious actors with access to and control over a target’s electronic devices—has made its way onto Ms. Sawut’s phone twice. In one case, she could reset the device; in another, she had to discard her phone altogether. She has since begun to use encrypted email, avoided downloading WeChat onto her phone, and disconnected her Facebook account from any outside apps.

As Uyghurs become more frequent targets for state-backed intimidation, a two-tier model of citizenship is emerging in which a hostile foreign power is undermining the constitutional and political rights of Uyghur citizens in democratic countries.

In retribution for her defiance, Ms. Sawut believes Chinese security services arrested and detained members of her family who were living in the Xinjiang Uyghur Autonomous Region (XUAR).1 Then, in 2021, she learned that she was one of 10,000 people whose names appeared on a Chinese state list of “suspected terrorists,” a charge she claims doesn’t surprise her based on her activism.2 However, for many Uyghurs, such a charge comes as a warning—an indication that they are subject to additional Chinese surveillance abroad. Ms. Sawut, like many members of the Uyghur diaspora, has felt the reach of China’s coercive practices across sovereign borders.3

Today, an estimated 500,000 Uyghurs live in diaspora communities worldwide, with significant population centers in Central Asia, Turkey, Europe, the Asia Pacific, and North America. Our previous reporting has shown that these communities, particularly in authoritarian settings, are increasingly embattled as China pressures and cooperates with local security services to arrest Uyghurs and demand their deportations.4 Since 1997, 1,149 Uyghurs living abroad have been detained by their host governments at the request of Chinese security services, while a confirmed 427 Uyghurs have been deported or rendered back to China during that same period, with cases concentrated in Southeast Asia and the Middle East.5 Together, these individuals represent 1,548separate cases of transnational repression.6

While these forms of repression, which we have classified as stage 2 and stage 3, are occurring primarily in the Muslim world, Western democracies are also under siege with a spike in stage 1 repression—forms of intimidation that have not reached the level of arrest or deportation.7Altogether, our data suggest that 7,078 cases of transnational repression of Uyghurs have occurred worldwide. As Uyghurs become more frequent targets for state-backed intimidation, a two-tier model of citizenship is emerging in which a hostile foreign power is undermining the constitutional and political rights of Uyghur citizens in democratic countries. Of concern to policymakers and observers alike is how emerging technologies are accelerating Beijing’s capacity for transnational repression, with state actors and their proxies operating with impunity to surveil, harass, and intimidate using malware, botnets, and even tracking devices. Digital technology, in particular, has given the Chinese Communist Party (CCP) new tools to monitor the activities of diaspora communities and reduce the costs of extraterritorial political control, extending the reach of the Chinese state well beyond its borders.

This report explores the methods and extent to which China and its international proxies are engaged in a systematic campaign of surveillance and harassment of the Uyghur diaspora. Our work focuses primarily, though not exclusively, on democracies, which have long been seen as a haven beyond the reach of the Chinese government. However, as this report reveals, democracies are not the haven against the Chinese government’s intimidation and harassment that many observers have thought them to be. China’s efforts to control Uyghurs extend far beyond its borders. Its actions infringe on the rights of Uyghurs otherwise guaranteed by their democratic host states, including their rights to freedom of speech, freedom of assembly, and sometimes, even their freedom of travel and movement.8

Our data indicate that Chinese transnational repression may be one driving factor pushing the Uyghur diaspora toward political activism.

Unlike “counter-exiles” studies, which assess how autocracies repress political activism beyond their borders, our study finds that most targeted Uyghurs were not politically active before they were targeted. Some Uyghurs have remained apolitical after experiencing transnational repression, while others have been galvanized into action by China’s intimidation and harassment. For our analysis, we define “politically active” as giving testimony, being actively involved in a human rights organization, or speaking to media or going public—all before an instance of transnational repression. We note people who do not meet these criteria—or who became politically active after the Chinese government harassed or intimidated—as such. Our data indicate that Chinese transnational repression may be one driving factor pushing the Uyghur diaspora toward political activism.

Mass targeting based on ethnicity and culture has become the norm for Chinese security services. The extensive sweep of this campaign has instilled fear and uncertainty in the broader international Uyghur community, effectively disrupting the activities of more vocal and politically engaged individuals as well as those less politically inclined. This report seeks to assess the vulnerability of Uyghur diaspora communities in democratic states and to propose policy options to help mitigate the risks they face so as to guarantee Uyghur citizens and residents the same rights and freedoms as other diaspora communities.

Image 1. This chart shows the geographic distribution of the 5,530 cases of stage 1 transnational repression we recorded based on publicly available reporting and original interviews. It represents all cases collected worldwide 2001–2021. A large number of cases appear in Germany, the location of the World Uyghur Congress. Source: Oxus Society for Central Asian Affairs.
Image 2. This chart shows the methodological distribution of the 5,530 cases of stage 1 transnational repression we recorded. It represents all cases collected worldwide 2001–2021. Just over 50% of all recorded cases are cyberattacks. Source: Oxus Society for Central Asian Affairs.

III. Methodology

China’s transnational repression tactics have proven highly effective in causing Uyghurs around the world to self-censor and be more cautious in their approach to anything that may be perceived as political activism. As China’s surveillance dragnet expands overseas, it is becoming more difficult to conduct interviews with people willing to identify themselves by name for fear of repercussions and retaliation. In addition, tangible threats to family members back home make public testimony a high-risk endeavor that individuals in the Uyghur diaspora must contemplate before making media statements.

This report builds on the China’s Transnational Repression of Uyghurs Dataset created by the authors for the Oxus Society for Central Asian Affairs (Oxus) in collaboration with the Uyghur Human Rights Project (UHRP). The China’s Transnational Repression of Uyghurs Dataset contains incidents of transnational repression conducted by the People’s Republic of China to target Uyghur citizens from the XUAR since 1997, when the first cases of detention and rendition were recorded.9 We use a three-stage model of transnational repression adopted by the Central Asia Political Exiles (CAPE) database in order to evaluate the different cases recorded in our full dataset:

Image 3. CAPE methodology for evaluating transnational repression as outlined by Saipira Furstenberg, John Heathershaw, Edward Lemon, David Lewis, and Alexander Cooley. Source: Central Asia Political Exiles database.

Following CAPE, we measured the degree of transnational repression on a 3-point ordinal scale according to these three stages. We then assigned each case a score between 1 and 3, with 3 representing the most severe form of transnational repression: deportation to China. Our June 2021 report focused on stages 2 and 3 of this ordinal scale,10 and we found that many individual cases include forms of repression across different stages. Therefore, the current report focuses exclusively on stage 1 to offer a complete record of the ongoing nature of this phenomenon.

We have coded each case according to a particular typology of attack (outlined below). We then logged each instance, separated by time and/or geography, even of a previously targeted individual, separately. For example, in 2019 Mehmet Tohti experienced a variety of harassment and intimidation, including unknown vehicles parked outside his house and people knocking on his door asking for information about his activities, both of which fit into a category of Intimidation outlined below.11 In 2016, Mehmet had called a distant relative who was then detained immediately after the phone call.12 The time separating these events and different strategies deployed by the Chinese government led us to enter them as two separate instances in the dataset.

We have divided the dataset into two broad categories. The first category consists of Full Entries, which document the cases of individuals with known identities and histories. We have called the second category Anonymous Cases, which refers to individuals or groups of Uyghurs whose names are not publicly available. Anonymous cases may have been part of larger public attacks on Uyghurs where we can only account for the number of affected individuals but cannot independently identify them or add further context beyond the available reporting. Our upper estimate of cases is a combination of Full Entries and Anonymous cases.

The stage 1 data, like the data for stages 2 and 3 from our July 2020 report, represents cases worldwide. However, our analysis in the current report focuses on Europe, the Asia Pacific region, and North America. Traditionally perceived as refugee havens and bulwarks of liberal values on the international stage, these regions have long been thought to be beyond the reach of authoritarianism. However, our findings suggest otherwise: Uyghurs living in these regions of the world remain targets of China’s ongoing campaign of intimidation, coercion, and harassment.

We conducted ten interviews with Uyghurs in Washington, D.C., USA; Adelaide, Australia; Toronto, Canada; Tokyo, Japan; Oslo, Norway; and Munich, Germany, to gain more background into the particular situation of Uyghurs residing in key target cities with significant diaspora populations. We also conducted three interviews with cybersecurity experts and engineers working with Uyghur NGOs around the world.

Additionally, we ran two surveys to assess the degree of vulnerability for Uyghur diaspora members regarding cyber-attacks. We sent out our first survey in English to Uyghur diaspora communities in North America. We then translated our second survey into Uyghur to ensure that only those identifying as Uyghurs could respond. We distributed this survey among several Uyghur communities in Japan, Australia, and Europe. While not exhaustive, the data we gathered from these surveys offer critical insight into the vulnerabilities of Uyghur diaspora communities.

IV. Assessing Threat Vulnerability in the Uyghur Diaspora: Survey Results

The threat of targeted surveillance and other intrusions puts activists under pressure to effectively protect their contacts and communications. Not only do activists have to stay up to date with the rapidly evolving methods of attack and deception, but they also make daily security decisions knowing they are up against resourceful state actors. Moreover, the complexity of today’s digital tools and platforms further complicates their understanding of the technical underpinnings of the threats they might be facing. As a result, activists often feel uncertain in choosing the right tools and layers of protection.

As a case study of these more significant trends, we requested that members of Uyghur diaspora communities in the United States, Australia, Europe, and Japan participate in a small survey focused on their digital safety and security practices to assess Uyghur communities’ vulnerabilities. Of the 72 people we surveyed:

  • 95.8% of respondents felt that they faced unique digital threats; and
  • 73.5% of those respondents reported experiencing “digital risks, threats, or forms of surveillance.”

Uyghurs in the diaspora have sought to protect themselves in response to these threats:

  • 51.5% of respondents felt that they knew where to access internet resources to help them make good security decisions; and
  • 73.2% of respondents felt that they could implement new tools and techniques for information security into their lives.

However, respondents felt that the Uyghur community is underprepared with regards to their digital security and hygiene:

  • Only 33.8% thought that they knew who to contact when asking for advice from a security expert;
  • 50% felt that they had not been sufficiently trained in digital security; and
  • 89.7% expressed interest in increasing their security knowledge and skills.

Some governments have made it easier for people living inside their borders to report such incidents. For example, a U.S. Federal Bureau of Investigation counterintelligence bulletin noted that Uyghurs facing harassment could call the FBI tip line and report about what had taken place.13 However, there is clearly still work to be done:

  • 41.2% of respondents surveyed felt that they did not know how to report a security incident, while 29.5% felt that they did (the other 29.4% did not reply either way);
  • 30.9% do not feel comfortable reporting security issues, even if they are unsure about them, while 39.7% do (an additional 29.4% of respondents did not indicate either way); and
  • only 44.1% of respondents felt that their host government or police would take their case seriously, while 20.5% felt that the security problems they faced would be fixed.

Watering hole attack: When attackers make a fake website that looks like a website their target audience might visit but contains malware

Phishing attack: Counterfeit communications (email, message, etc.) that appear to come from a reliable source but can compromise an individual or organization’s accounts or personal data (e.g., by coaxing targets into giving an attacker their username and password), give an outsider access to compromise networks or systems, or hold computer networks ransom (i.e., ransomware). Phishing attacks can also be used to download malware onto a target’s devices.

Spear phishing attack: A subset of phishing that targets specific individuals rather than a group. Attackers often tailor these emails and messages to their specific targets, using content and linguistic cues to encourage their target to compromise their account, or to click on a link or download a file containing malware.

Chinese hackers are targeting Uyghurs abroad beyond the organizational level. Increasingly, individual Uyghurs, even those who are not politically active, are being attacked worldwide. Critically, the Chinese government has targeted Uyghurs online through social media and cyber campaigns and through malware and backdoors in smartphone software to collect data and spy on them. These efforts are part of an encompassing campaign. Since 2017, China has expanded its surveillance and information collection, both domestically and abroad, in lockstep with the so-called People’s War on Terror. Using hackers rather than the more “traditional” spies and informants reduces the cost of this data collection. Although it is difficult to implicate the Chinese state in such attacks directly, the fact that the attacks target Uyghurs suggests they are at the very least serving government interests.

Targeting the communications of dissidents and human rights groups can put their contacts in China at risk. After a number of Yahoo accounts were hacked in 2010, World Uyghur Congress spokesperson Dilshat Raxit reported that he was unable to reach some of his contacts inside China with whom he had communicated via email in the past. In some cases, private companies double down by failing to inform their customers, as in 2015 when former Microsoft employees revealed that the company had decided not to tell the hackers’ targets, many of them Uyghurs, that their email accounts had been compromised. 14

Starting in 2012, the Chinese government could trigger access to a backdoor in Android operating systems through hidden malware that allowed an outside user to record calls, turn on a phone’s microphone, export photos, share phone location, and download conversations on chat apps. Websites commonly used by Uyghurs were corrupted with malware that could siphon data from an iPhone. These efforts, as noted above, would become part of China’s dragnet that collects big data on its citizens—both domestically and abroad. In 2015, the Chinese government began seizing the phones of Uyghurs living in the XUAR, only to return them with spyware installed or return an entirely different phone. The unique serial number of each phone was noted and paired with the increasingly ubiquitous cameras and hardware on the streets of the Uyghur Region, ensuring near-constant state surveillance. Uyghurs were arrested and detained for owning more than one phone, not having a phone, disposing of a phone, or having a phone that was “too old.” 15

In July 2019, the Guardian revealed that Chinese border guards at the Irkeshtam border crossing were downloading spyware onto travelers’ phones and taking data from them, including emails, texts, contacts, and information about the smartphones themselves, as well as scanning for banned content, including material on fasting during Ramadan and the Dalai Lama. 16 The Chinese government’s efforts to surveil and track people—even foreign travelers—in the XUAR begins at the border, irrespective of nationality. The information they obtain aids police efforts to construct a database of Uyghurs residing beyond China’s borders.

These efforts were coupled with four types of surveillance ware distributed via app and news site starting in 2013 with shared command and control (C2) infrastructure as well as root malware, suggesting a shared point of origin. Lookout analysts note that the shared naming conventions, coding techniques, infrastructure, and shared targets among these tools indicate that this surveillance ware is Chinese in origin. For example, DoubleAgent and GoldenEagle were also used to target Tibetans; logging statements of at least one in the family of malware are in Chinese. Furthermore, researchers at the tech firm Lookout were able to peer inside these codes and analyze their IP origins to understand where they had originated: Beijing. This array of surveillance ware was used in hundreds of fake apps tailored to a Uyghur audience. These apps mimicked VPNs and other sites, including Radio Free Asia, and were introduced to sites already frequented by Uyghurs and Tibetans. Analysts have since sorted the malware into four major groups: SilkBean, Double Agent, CarbonSteal, and GoldenEagle. All were designed to collect data from smartphones and exfiltrate it to a single external command and control center. Hackers used these four types of malware to target Uyghur populations in the Uyghur Region as well as in Afghanistan, Egypt, France, Indonesia, Iran, Kazakhstan, Kuwait, Malaysia, Pakistan, Saudi Arabia, Syria, Turkey, and Uzbekistan—countries on the IJOP list.17

Name of MalwareCapabilities
SilkBeanAllowed an external actor to execute over 70 commands remotely once an app was downloaded, often from a third-party Android app store. Two application package names—com.uyghur.hunter.islamapk and—speak to how this malware was used to target Uyghurs explicitly.
DoubleAgentCopied data unencrypted from a variety of apps, including WhatsApp, Skype, and Telegram. Additionally, DoubleAgent had a direct command and control center overlap with SilkBean.
CarbonStealAllowed an external actor to record phone calls and sounds around the infected device, as well as copy SMS and MMS messages, call logs, installed apps, and data about their installation; track location; log when the device was turned on and off; and upload additional apps and capabilities. Analysts believe CarbonSteal is still active and evolving.
GoldenEagleAllowed an external actor to copy contact information, information about installed apps, caller history, documents found in external storage, and text messages. An external actor could also take screenshots and photos, record calls, record audio in the environment of the phone, track the phone’s location, and possibly gain further access to the phone’s software, allowing that actor to install further malware.

Table 1: Types of malware used in cyberattacks against Uyghurs. Most have been attributed to users in China. Source: Lookout.

Chinese government-adjacent hackers’ use of websites to host and disseminate malware has had other notable cases: in 2019 Lookout uncovered that Chinese hackers had created a site called Syrian News to target Uyghurs in Syria. They also created similar apps explicitly targeting Uyghurs living in Afghanistan, Kuwait, Indonesia, Malaysia, Pakistan, and Turkey, in an effort to collect data on them.Apps were available in Uyghur, English, Arabic, Chinese, Turkish, Pashto, Farsi, Malay, Indonesian, Uzbek, Urdu, and Hindi. 18

In 2018, a Chinese group of hackers “discovered” a backdoor hack into the iPhone at the Tianfu Cup in China. This hack, called “Chaos,” allowed an iPhone to be taken over remotely after visiting a webpage embedded with malware. In January 2019, Apple offered a fix. However, research into the hack later in 2019 revealed that the backdoor hack—and similar hacks to the Android operating system—had been in use since at least 2018, meaning that the personal iPhones of Uyghurs were vulnerable to government exploitation for more than a year. 19 In August 2019, Google revealed five “exploit chains” for iPhones, one of which replicated Chaos and was initiated by government-adjacent hackers. 20 In September 2019, Reuters reported that Chinese government-affiliated hackers had exploited weaknesses in Central and South Asian telecommunications companies in Kazakhstan, Turkey, India, Thailand, and Malaysia. These hackers analyzed the user data and call records they collected to search for “high-value individuals,” including Uyghurs abroad. These data points allowed these hackers to gain insight into who Uyghurs living abroad contact and where they are connecting from—potentially dangerous information for both Uyghurs living abroad and their families in the Uyghur Region. 21

In 2019, cybersecurity firm Volexity discovered 11 compromised websites providing news, resources, and other content in Uyghur. All of these websites were behind the Great Firewall, leaving only Uyghurs living abroad to access them. These websites included Uyghur Academy, Turkistan TimesUighur Times (in English, Mandarin, and Uyghur), and East Turkistan Education and Solidarity Association, among others. Volexity also revealed that hackers used fake Google applications and plug-ins to steal emails and contact information and that they had created a series of “doppelganger domains” for real websites, including Google. 22

In May 2021, cybersecurity experts uncovered a plot targeting Uyghurs in Pakistan. The activities involved sending malicious documents by email falsely using the names and logos of the United Nations and United Nations High Commissioner for Refugees. They also set up a fake human rights foundation website called the “Turkic Culture and Heritage Foundation,” which tricked people into installing a backdoor to the Windows software running on their computers and gave hackers access to their data. 23 Evidence suggests that Uyghurs living in Pakistan and the Uyghur Region were the primary targets; additional details point to the same operations directed at Uyghurs living in Turkey and Malaysia. According to researchers, these phishing attempts continue as of their reporting. 24

Image 4. Map of cyberattacks on Uyghurs worldwide (2002-2021). This map shows the geographic distribution of the 2,774 cases of cyberattacks in the dataset. Please note that the map does not include the telecoms hacking incidents in Kazakhstan and Pakistan, as there were no detailed numbers of incidents reported in international media. Source: Oxus Society for Central Asian Affairs.

V. Chinese Government Methods of Stage 1 Transnational Repression

China’s government has worked to coerce and control Uyghur diaspora communities through a variety of methods. We have identified a total of ten forms of China’s stage 1 repression of diaspora Uyghurs:

Assets frozen or seizedInstances of an individual or group of individuals whose assets have been seized by the Chinese government either in the Uyghur Region or by a host state acting on behalf of the Chinese government.
Call to return homeInstances of an individual or group of individuals summoned directly by Chinese government representatives or by their family who Chinese government representatives are coercing to demand their return.
Cyberattacks and malwareInstances of an individual or group of individuals targeted online using botnets, malware, spyware, email phishing attempts, DDoS, or other forms of cyberattack.
Intelligence and data gatheringInstances of an individual or group of individuals asked to pass personal information about themselves to the Chinese government.
Intimidation, including active surveillance and threatsInstances of an individual or group of individuals facing repeated contact from Chinese officials in the XUAR or the local embassy/consulate or from family members coerced by Chinese officials via WeChat; having unsolicited packages sent from the Uyghur Region to their home address in their host country; being followed in their host countries by unknown individuals or unmarked vehicles; being photographed at protests; etc.
Recruitment as informantsInstances of individuals being asked to pass information about others to the Chinese government over an extended period.
Restrictions on movement and legal status via passport controlInstances of an individual or group of individuals being given illegal one-way travel documents, instead of having their passports or other government documentation renewed, that restrict their right to free movement or denying passport renewals. 25
Restrictions on free speech and assembly, including attacks on journalists or public speakersInstances of an individual or group of individuals subjected to harassment, intimidation, and surveillance such that they are unable to exercise their right to free speech and freedom of assembly.
Smear campaignsInstances of an individual or group of individuals subjected to Chinese government smear campaigns meant to discredit them as individuals and cast doubt on their claims of human rights violations in the Uyghur Region. These forms of attacks increasingly overlap with state-media production and dissemination of “proof-of-life” videos. 26
Use of proxies and threatsInstances of an individual’s family members, friends, colleagues, or other close associates being threatened with or are arrested or detained in the Uyghur Region.

Table 2: Descriptions of the ten types of attack we have observed across the cases in our dataset. Source: Oxus Society for Central Asian Affairs.

VI. Regional Cases of Transnational Repression

Transnational repression is on the rise globally as a strategy for authoritarian rulers to control the information space and silence external activists. 27 China has emerged as the world’s most egregious perpetrator of the practice. 28 According to the combined stage 1, stage 2, and stage 3 data from previous datasets produced by the Oxus Society for Central Asian Affairs and UHRP, the Chinese state and state-adjacent actors have perpetrated at least 7,078 separate instances of transnational repression across 46 separate countries in 6 regions. Democracies are also struggling with transnational repression within their borders, albeit with the less extreme form of repression we have characterized as stage 1. The Chinese government’s methods of transnational repression erode legal norms and defy the constitutional rights of many Uyghurs living in liberal democracies, who are guaranteed the right to freedom of speech and the right to peacefully protest. Uyghurs have had those rights repressed by the heavy hand of a foreign power seeking to control and silence them.

The Chinese government’s methods of transnational repression erode legal norms and defy the constitutional rights of many Uyghurs living in liberal democracies, who are guaranteed the right to freedom of speech and the right to peacefully protest.


Europe has for over three decades been home to Uyghur diaspora communities and is a sanctuary for Uyghurs fleeing from repression in the XUAR. In March 2021, the EU placed sanctions on CCP officials for the first time since the Tiananmen Square protest in 1989. 29 However, despite these sanctions, only Germany (2018) 30 and Sweden (2019) have made explicit assurances that they will not deport Uyghurs back to China. 31 Further, Sweden has declared Uyghurs to be part of a “persecuted group,” a term that makes the process of claiming asylum status much more straightforward. 32 Germany, one of the most prominent havens for Uyghur refugees fleeing to Europe, reported a two-fold increase in the number of Chinese citizens claiming refugee status in 2020—the most recent peak in an upward trend spanning the last three years. 33 Further details regarding the exact number of Uyghur refugees throughout Europe are unavailable, as governments do not generally disaggregate their immigration data based on ethnicity.

But Uyghurs in Europe still face the long arm of China’s ongoing campaign of transnational repression. Many report facing harassment and intimidation, coercion to commit espionage, and social media surveillance campaigns. Our dataset includes 50 cases of Uyghurs who have come forward about their harassment and a higher estimate of 3,040 cases of China’s efforts to coerce and silence them across national borders.

Image 5. This chart shows the geographic distribution of the 3,040 cases of stage 1 transnational repression recorded in Europe. As previously noted, a preponderance of cases occurred in Germany due to continued cyberattacks against the World Uyghur Congress. Source: Oxus Society for Central Asian Affairs.

While Chinese-state intimidation within Europe’s borders has increased in recent years, it has occurred since 2007. According to public reporting, Germany’s Office for the Protection of the Constitution (BfV) was aware of Chinese efforts to monitor Uyghur activities on German soil starting in that year. For example, a Chinese diplomat in Munich, Ji Wumin, left the country before he could be expelled after people reportedly observed him meeting on numerous occasions with individuals who passed him information about the city’s Uyghur community. 34 Later, in 2011, German federal prosecutors also announced espionage charges against a 64-year-old identified only as “L” (in accordance with local privacy laws). 35 Federal prosecutors were pressing similar charges against a Chinese national of Uyghur origin. Prosecutors alleged that the men had passed the information on Munich’s Uyghur community to Chinese intelligence between April 2008 and October 2009. Another Uyghur, who chose to remain anonymous at the time of the Guardian’s reporting, was asked to take photos of Uyghurs celebrating Eid in Germany, and to hand over the names of any recent arrivals. 36

Germany has been a prime target for Chinese intimidation, intelligence collection, and cyberattacks abroad due to the size of the Uyghur emigré population there. The country is also home to Uyghur advocacy organizations, including the World Uyghur Congress. The WUC, long associated with now-former President Rebiya Kadeer, has been advocating for the rights and freedoms of those in the Uyghur Region. In response, Beijing has labeled the NGO a “terrorist organization” and has committed acts of transnational repression against the organization’s staff for decades. 37

In 2009, a case involving a Uyghur in Sweden showed the Chinese Party-state’s growing confidence in its ability to build intelligence networks abroad. Naturalized Swedish citizen Barbur Mehsut was arrested on charges relating to “unlawful acquisition and distribution of information relating to individuals for the benefit of a foreign power,” for which he had received monetary compensation as well as a visa for his daughter and a job for his wife. He was eventually sentenced to sixteen months’ imprisonment. Mehsut had attended meetings of the World Uyghur Congress in the United States in May 2009. He reportedly passed the information on Uyghur activists’ activities, health, and finances in Sweden, Norway, Germany, and the United States to Zhou Lulu, a press officer at the Chinese Embassy in Stockholm, and People’s Daily Sweden correspondent Lei Da. Chinese agents charged Babur Mehsut with gathering information on Adil Hakim, 38 one of the “Guantanamo 22” Uyghurs who had been held as a “non-enemy combatant” at Guantanamo Bay and was applying for asylum in Sweden at the time. 39 Mr. Barbur told police that the Chinese state was concerned that were it to be approved, Mr. Adil’s case would set a precedent for more Uyghurs to settle in Sweden as asylum seekers. The Uyghur spy had contacted Hakim and passed details of his case to Chinese authorities, and they even met him at the airport on his arrival from Albania.

As China has escalated its surveillance of Uyghurs in the XUAR and abroad, instances of transnational repression in Europe have been on the rise. Halmurat Harri, a Uyghur activist and Finnish citizen, has said that authorities detained his father in 2018 in response to Mr. Halmurat’s protest against his mother’s 2017 arrest and his continued activism in Europe. Both of his parents were later released and put under house arrest. 40 Other Uyghurs living in Finland have further reported being surveilled and photographed at protests, information the Chinese government then uses to target their relatives at home. 41 France has also seen its Uyghur community targeted and threatened in recent years. Police officers from local stations in the XUAR have been writing to Uyghurs in France over WeChat requesting home, school, work addresses, photos, scans of their ID cards, and those of their spouse, as well as their marriage certificate, if the couple got married in France. 42 Family members back home in the XUAR have also been used as a form of coercion; four such cases occurred in France between 2017 and 2018 alone. In 2019, Gulnahar (pseudonym) and Adili (pseudonym) reported they were contacted by Chinese government officials seeking information about members of the Uyghur diaspora. 43 A year earlier, in 2018, two other French Uyghurs, Mariem (pseudonym) and Nijat (pseudonym), had reported similar instances of harassment. 44

But Uyghurs in Europe still face the long arm of China’s ongoing campaign of transnational repression. Many report facing harassment and intimidation, coercion to commit espionage, and social media surveillance campaigns.

Since 2019, Netherlands-based activist Abdurehim Gheni has been the regular target of surveillance and intimidation by unknown individuals he believes to be Chinese. He was photographed and threatened during protests in Amsterdam and smeared and discredited by people trying to shout over him. He has also faced harassment and received death threats over the phone. Gheni reported this to the Dutch police, who have taken more proactive steps for his protection by establishing police presence at his protests, and giving him a direct line to contact the police as needed. 45 Uyghurs living in Belgium have reported receiving distressing phone calls from family members and Chinese authorities seeking information about themselves and the Uyghur diaspora community and being followed from protests by a consular car with blacked-out windows. 46 Belgian security services have worked to inform Uyghurs of the dangers of following through with the claims made by the local Chinese Embassy concerning the need to pick up documents or packages at the Embassy. However, the Belgian government has not been able to prevent Uyghurs living there from being harassed.

Norway has also seen an increase in fear among its small Uyghur community of 2,500 people. In October 2019, at least 30 Uyghurs in the country alerted Uyghur advocacy groups that they had been receiving automated calls from the Chinese Embassy despite being Norwegian citizens. 47 In an interview with us, Norway-based activist Abduweli Ayup noted that he has been the direct target of China’s security services since his 2019 move there from Turkey, saying, “In [January 2020], I received a call over Facebook Messenger warning me to stop discussing the leaked Qaraqash List.” He went on: “Later that year, I received another call over Messenger requesting my cell phone number, along with information about the Uyghur community in Bergen, which I refused to provide.” The activist told us he has also received death threats. 48

China’s transnational repression in Europe has also targeted municipal and national governments in at least several cases. The German city of Weimar announced in June 2017 that it had awarded its annual human rights prize to imprisoned Uyghur professor Ilham Tohti. The city’s web pages for the award were repeatedly attacked following the announcement, and content related to the award was deleted. France has also been a target in China’s campaign to control the narrative about the human rights abuses in the Uyghur Region: in February 2019, an academic conference on the XUAR in Strasbourg, France, was interrupted by two individuals, later determined to be Chinese consular officials in plainclothes. The officials sought to discredit the panelists and disseminate propaganda to spread doubt about the veracity of the claims made. 49

Abdujelil Emet, a Uyghur activist, World Uyghur Congress volunteer, and imam living in Germany, has faced harassment from Chinese officials first-hand. In 2019, he received a surprise phone call from his sister in the Uyghur Region two days after sitting in on the Bundestag hearing on human rights. Mr. Abdujelil had never given his German phone number to family in the Uyghur Region out of a sense of caution. When he answered his phone, his sister praised the Communist Party and her quality of life in the XUAR. She then shared the news that their brother had died. Throughout the conversation, Abdujelil heard whispers growing in the background. When he demanded to know their source, a Chinese official took the phone and suggested that Abdujelil cease his activism in Germany. The official added that Abdujelil needed to “think of his family” in the XUAR. This was a thinly veiled threat: Abdujelil should cease his activism in Germany lest his family face the consequences. In response, Abdujelil told the officer that should anything happen to his family, he would only become a more vocal advocate for the human rights of Uyghurs, and therefore a more significant problem for the Chinese government. 50

In June 2021, Politico Europe revealed that the Lisbon City Hall had shared the personal information of dissidents and activists with repressive regimes worldwide as part of its “standard operating procedure.” To hold a protest, activists and dissidents had to register with the city and hand over their personal information, which was then shared. Since 2011, this practice included sharing Uyghurs’ information with the Chinese government that then allowed the Chinese government to go after the families of those who had arranged protests in Lisbon, according to the local branch of Amnesty International. In a country that has long prided itself as a refugee haven, this news throws the substance of that protection into question. Further, it undermines the rights these Uyghurs have to free speech and assembly, as well as to protection from intimidation and harassment, as Portuguese and EU refugees and citizens. 51

Asia Pacific

Australia and New Zealand, like many other liberal democracies, have been destinations for Uyghurs seeking to escape the reach of the Chinese government and its campaign of harassment and intimidation. However, our data reveal that the safe havens offered by Australia and New Zealand are under threat. Our dataset includes 18 confirmed cases of named individuals and an upper estimate of 60 cases of Uyghurs living in Australia and New Zealand who the Chinese government has targeted. Likewise, Japan provides only limited security to Uyghurs living on its soil, some of whom face continued harassment by the Chinese state. Our dataset contains four such named cases and an upper estimate of 21 cases.

Image 6. This chart shows the geographic distribution of the 81 stage 1 transnational repression cases recorded in the Asia Pacific region. Source: Oxus Society for Central Asian Affairs.

Australia is currently home to an estimated 3,000 Uyghurs. The Australian government has expressed concern over the Chinese monitoring of Uyghurs on Australian soil for over a decade. In 2006, the Australian Department of Foreign Affairs and Trade stated: “It is likely that Chinese authorities seek to monitor Uyghur groups in Australia and obtain information on their membership and supporters […]. In pursuing information, Chinese authorities would not necessarily exclude sources who do not have a political profile.” 52 Several Uyghurs in the country have spoken with a parliamentary commission about the intimidation and harassment that they have faced, with many citing safety concerns. 53Community members report forms of pressure such as WeChat calls from their families with government officials present and calls from family members urging them not to become politically active. Uyghurs in Australia also report that they were asked to hand over their information. Some complied to protect their families back home, but after providing initial information, they were asked to provide more. 54

An Australian Chinese embassy defector named Chen Yonglin claimed in 2005 that the embassy had cultivated 1,000 informants and agents in Australia. Such pressure is still routinely applied.

Chinese state security officials first reached out to Dawud (pseudonym) in September 2017, demanding that he either return or explain why he had not already done so. Dawud sent them proof of employment in Australia, where he had settled with his family, but state security officials emailed back to demand more: they wanted photographs of his life in Australia, including photos of his family and their passports. 55 Eldana Abbas, a Uyghur activist and interpreter living in Australia, reported receiving calls from the Chinese Embassy in Canberra and being photographed by individuals and groups of people during their activities. 56 An Australian Chinese embassy defector named Chen Yonglin claimed in 2005 that the embassy had cultivated 1,000 informants and agents in Australia. 57 Such pressure is still routinely applied.

Image 7. This chart shows the methods of stage 1 transnational repression deployed by the Chinese government against Uyghurs living on Australian soil. Source: Oxus Society for Central Asian Affairs.

Uyghurs in New Zealand have also found themselves subject to monitoring from Beijing. Shawdun Abul-Gopur left the XUAR in 2010 for New Zealand, leaving his family behind. 58 Later that year, the Chinese government demanded his return before the calls eventually stopped—but only briefly. Five years later, in 2016, his mother called him, pressing him for information about his life in New Zealand. Mr. Shawdun refused to provide her with any. He then began to receive calls from representatives of the Chinese Embassy, who threatened his family in the Uyghur Region and requested that he come to pick up a package at the Embassy. “We can find you. We are in New Zealand,” the caller reminded him. 59 Due to a subsequent lack of response, he believes his 78-year-old mother and three brothers were detained. They have since been released, but he hasn’t been able to contact them since 2016. 60

As in other parts of the world, a dramatic spike in the targeting of Uyghurs in the Asia Pacific coincided with the start of the mass internment campaign in the Uyghur Region in 2017. In 2018, Halmat Rozi’s family members in the XUAR were detained for traveling abroad to visit him in Japan. Mr. Halmat, who had moved to Japan for graduate school and stayed there after graduation, reached out to his family, who told him not to be in touch again. The 47-year-old Uyghur began to attend demonstrations raising awareness of the plight of his and others’ families and joined the local Japan Uyghur Association. 61 In May 2020, Halmat received a phone call from his brother and another unidentified individual asking for details about protests, whether Halmat had been in contact with Rebiya Kadeer, and whether Halmat could provide information on the Japan Uyghur Association. 62His brother encouraged him to cooperate. A few weeks later, he received another call from a member of the state security services again demanding information about protests in Japan. This time Halmat contacted a local TV station, which decided to report his story. 63 To cut off representatives of the state security services, Halmat deleted the app they used to call him, which also cut all contact with his family—a reality that weighs heavily on him. 64 Halmat’s story has played a critical role in raising awareness and political visibility of the human rights abuses in the XUAR and the long reach of the Chinese government.

Halmat’s case is not unique. In an interview with us, another Japanese Uyghur who requested anonymity to protect his identity revealed some of the methods by which China’s security services obtain information from informants. In May 2019, Yusup (pseudonym) began receiving WeChat messages from a man who claimed to know one of his relatives in Xinjiang and claimed to be looking for advice on study abroad programs in Japan. Within a few weeks, however, the man revealed himself to be an agent of the Xinjiang Public Security Bureau. “If you can provide me with information on Uyghur activists, I can help [your relative],” he wrote. Yusup was instructed to attend an annual Uyghur gathering in Tokyo and provide photographs of Erkin Sidick, a Uyghur engineer at NASA and international activist who planned to visit the event. When Yusup declined, the agent changed his tone in his response, reportedly saying, “Your family will suffer. Remember that I am your friend, and I want to help you and your family.” 65

The following months caused great strain on Yusup and his wife. “We didn’t want our families to suffer, but we also didn’t want to betray our people,” he told us. “My wife blamed me for all of it and said that I had placed our families in great danger. It all weighed heavily on me.” Throughout 2020, the agent asked Yusup to transcribe posts from Japanese social media concerning Uyghur activism in Tokyo. After fulfilling his requests initially, Yusup attempted to reject the work. Still, the agent instructed him to quit his job and said he would receive a monthly salary for his services to “national security.” When Yusup refused to accept payment for his transcription, the officer insisted that his family be paid on his behalf instead. Yusup again refused but later received a message over WeChat of a family member receiving payment from a Chinese security officer: “Remember that I am your friend. I am protecting your family.” After that, the agent began sending increasingly sensitive information regarding professionals in Japan whom they wanted him to monitor. Most of the work involved translating blog posts by these individuals and noting their participation at protests and who was sponsoring their activism. The listed professionals also included a Japanese national. Yusup informed Japan’s intelligence community after China began monitoring the Japanese citizen, fearing that he was being coerced into committing a criminal offense. In response, one of Yusup’s relatives sent a message denouncing him, which Yusup believes was obtained by security services using force. 66 Finally, after over two years of contact with the intelligence officer, Yusup shut down his WeChat account in February 2021, making the agonizing decision not to contact his own family again. 67

Japan, home to a Uyghur diaspora of approximately 3,000 people, has yet to take any concrete action condemning the actions of the Chinese government or to protect the Uyghurs living on its soil, even as Japanese public opinion turns against the PRC. However, Halmat’s demands for political and legislative action similar to those taken by Western countries have not gone unheard: as of early 2021, the Japanese government began debating sanctions similar to the Global Magnitsky Act. 68

In the past, the Chinese government has also attempted to block Uyghur activism in the Asia Pacific by protesting events held by Uyghur activists and allies and by harassing Uyghurs in the diaspora community. The Australian Jewish Association, a staunch advocate of Uyghur rights and freedoms in Australia, hosted an event on December 2, 2020, with Ramila Chanisheff, the President of the Australia Uyghur Tangritagh Women’s Association. During the event, unknown hackers entered the event and disseminated “obscene, abusive messages” on screen, working to discredit Chanisheff and her statement. 69

In March 2018, thousands of Uyghurs staged a protest in Canberra against Chinese government discrimination; it was the largest ever Uyghur-led demonstration in Australia. The rally was held in tandem with others around the world, including in Sydney, Adelaide, New York, and Istanbul. 70Hours after the protest ended, Uyghurs in the diaspora community, including teenagers who had been born in Australia, started to receive harassing calls, video chats, and messages. 71 Uyghurs in Australia have nevertheless continued to protest despite the Chinese government’s alleged attempts to intimidate them into silence. Uyghurs in Adelaide, home to one of the largest Uyghur diaspora communities in Australia at approximately 170 families, have raised concerns over the construction of a new Chinese consulate in their neighborhood. While the Chinese consulate has always had a presence in Adelaide, this new building—considered by the local community to be a potential surveillance outpost—suggests a more permanent and substantial presence. This consulate is the fifth consulate set up by the Chinese government and the fourth largest in Australia.

Uyghurs in the Adelaide diaspora community note that they have received several calls from the Chinese embassy and consulates in Australia and have expressed their concerns about an additional outpost so close to them. As a result, Uyghurs, Tibetans, and other groups who have felt the long reach of the Chinese government first-hand have staged multiple protests outside the Adelaide consulate. 72 In an interview with us, Uyghur Australian citizen Zulfiya Abdulla said many members of the Adelaide community have received calls from relatives in the Uyghur Region telling them to cease their protests, suggesting they are being monitored: “Neighbors have told me that family members [in the XUAR] have said ‘stop going to the mosque [in Adelaide],’ showing that we are being watched here.” She says that she does not feel worried about herself because of her Australian citizenship but fears for her family. “My daughter is running for a seat in parliament, and I worry that she will become a target for harassment,” she said, giving an indicator of the potential chill on political activity provoked by China’s transnational repression. 73

New Zealand, like Japan and Australia, has yet to take any explicit actions to protect Uyghurs living in its territory, beyond denouncing the “severe human rights abuses in the Xinjiang Uyghur Autonomous Region.” 74 The country’s immigration system also leaves Uyghurs vulnerable. Similar to the system in the United States, New Zealand’s asylum system operates on a three-year cycle of refugee quotas. Would-be asylees must be recognized internationally as refugees and “referred to [the] New Zealand [government] by UNHCR.” Further, these refugees are examined based on: “[Immigration New Zealand] policy, credibility, settlement, security, immigration risk, and health.” After a five-week “reception program,” these refugees become permanent residents of New Zealand. 75 Others may apply for asylum in New Zealand—a process that takes six months as of writing. This immigration process in New Zealand has left some Uyghurs who reside in the country on temporary visas until their asylum claims are processed—a state of legal limbo in which they are unable to get long-term employment or government documentation. 76

North America

On January 19, 2021, the United States declared the human rights violations in the Uyghur Region to be genocide. Canada soon followed suit with its declaration on February 22, 2021. These declarations have drawn greater attention to the issue and galvanized further calls to action among liberal democracies that have followed suit, including the Netherlands (declared March 1, 2021) and the UK (announced April 22, 2021), among others. However, Uyghurs living in Canada and the United States must still confront the Chinese government’s efforts to control and silence them across sovereign borders daily. Our dataset contains 64 named cases and an upper estimate of 130 cases of individuals who have experienced Chinese transnational repression while living in the United States and Canada.

Image 8. This chart shows the methods of stage 1 transnational repression deployed by the Chinese government against Uyghurs living on Canadian soil. Source: Oxus Society for Central Asian Affairs.

According to a confidential report submitted to the Canadian government in 2018, the Chinese government’s intimidation and harassment of diaspora communities has become commonplace. This intimidation seems to be working, with many dissidents ceasing their activities on Canadian soil—to the concern of the Canadian government. 77 Dilnur Enwer arrived in Canada in January 2019 and applied for asylum. A resident of Montreal, she reported receiving calls from unidentified people and the Chinese embassy repeatedly since her arrival, requesting that she go to the Chinese Embassy to pick up an “important document.” Before she lost communication with family in the Uyghur Region, one of her relatives warned her that she would be caught by the Embassy and sent back to the XUAR. 78

Image 10. Full Entries by Political Activity (2002–2021). This chart represents the political activities of the 186 Full Entries incidents recorded in the dataset. More detailed information about the incidents in question allowed us to determine when and how Uyghurs decided to become politically active (including speaking to the press). Source: Oxus Society for Central Asian Affairs.

The Uyghur American community, primarily centered in the Northern Virginia suburbs of Washington, D.C., numbers around 10,000 people total. Many D.C.-area Uyghurs say that they undergo harassment and intimidation daily, including receiving threats by text, chat apps including WeChat, voicemail, calls, email, or third-party messages. 79 During some of these interactions, Chinese officials have reportedly requested passport information and other details and information on future protests and organizing activity from Uyghurs living in the United States. Many Uyghur community members in and around D.C. often wear masks and sunglasses to obscure their faces and hide their identities from people taking photos when they attend protests in the United States. 80

Uyghurs in other parts of the United States have faced pressure, as well. In 2018, Gulruy Asqar began to receive calls from the Chinese consulate in Houston. These phone calls started with a recorded message concerning a vital document she supposedly needed to submit to the consulate. A Chinese person would then answer and ask for her details. Asqar refused each time until finally, she told embassy staff that she was a U.S. citizen and “did not care about their document.” The calls stopped. Then calls from a Chinese mail delivery company began—another attempt, she suspects, to collect her personal information. 81

Uyghurs living in Canada and the United States must still confront the Chinese government’s efforts to control and silence them across sovereign borders daily.

Chinese state agents increasingly use family members in the Uyghur Region as proxies to pressure Uyghur communities. Kuzzat Altay, the President of the Uyghur American Association, started an entrepreneurship network in 2018 for the Uyghur diaspora community in Fairfax, Virginia. 82However, most of the 25 members left the network after they received calls from their family members in the Uyghur Region urging them to leave the group. 83 Sometimes repression occurs in response to political activity. In September 2018, Rushan Abbas spoke about the human rights abuses in the Uyghur Region at a think-tank event in Washington. Days later, her sister Gulshan was detained in the XUAR. Rushan sees this as a retaliatory act meant to silence her. 84 She went on to found Campaign for Uyghurs, a D.C.-based advocacy organization where she currently serves as executive director.

The Covid-19 pandemic necessitated that many events about the Uyghur crisis be moved to an online format. Some of these events were “zoom-bombed” by unknown entrants who worked to disrupt the event by attempting to discredit speakers and even prevent them from speaking further. In November 2020, students at Brandeis organized an event on the oppression of Uyghurs in XUAR with activist Rayhan Asat and several scholars. Ms. Asat told us that university offices received threatening template emails from Chinese Students and Scholars Association members before the event. During the event itself, some participants selected pictures of Xi Jinping and other prominent CCP leaders to use in place of their live video. One user played the national anthem during one speaker’s remarks. Ms. Asat reported that participants hijacked her screen-share during her presentation and wrote crude, harassing terms across her slides and images of her imprisoned brother, Ekpar Asat. 85“We’re up against a very powerful government, and we need universities to stand by us,” she said in an interview with us. “These campuses are some of the last remaining platforms we have left, and China is doing everything in its power to close them off to us.” 86

Uyghurs living in Canada have also reported attempts by the Chinese government to coerce them into committing espionage. A Uyghur speaking to the Globe and Mail on the condition of anonymity in 2015 said that Chinese security services used a variety of threats to coerce him into committing espionage in Canada and reporting back to the Chinese government over the course of his visits to the XUAR. Another Uyghur Canadian, Quttapay (pseudonym), was approached by two state security officers at a train station in the Uyghur Region, who then tried to recruit him. They were unsuccessful, and Quttapay was given 48 hours to leave the country. Bekkri (pseudonym) and Yusup (pseudonym), Uyghurs living in Canada, told the Canadian press that they had to ensure that they had the right combination of documents to leave China. Before they left, the Chinese police offered to issue them the necessary passports—a rarity for Uyghurs—only if they were willing to commit espionage abroad. Bekkri found another way to secure a passport; Yusup managed to talk his way out of committing espionage for the moment but was left with a warning from the security services: “We are patient.” 87

The Facebook phishing scheme that targeted Uyghurs worldwide included Canadian and U.S. citizens. Facebook Canada planned to notify the “fewer than 20” people in Canada who were targeted. Facebook said the operation used a variety of techniques to reach the people they were targeting. The company said the hackers set up Facebook accounts where they posed as “journalists, students, human rights advocates or members of the Uyghur community to build trust with people they targeted and trick them into clicking on malicious links.” Facebook said that they also set up malicious websites that looked like popular Uyghur or Turkish news sites and launched “watering hole attacks” to infect visitors to legitimate websites, Facebook said. Facebook added that the hackers also set up fake third-party stores with Uyghur-themed apps that contained malware. These stores included applications such as a keyboard app, prayer app, and dictionary app.

Mehmet Tohti, executive director of the Uyghur Rights Advocacy Project, said Chinese authorities have long targeted Canada’s 2,000-member Uyghur community. Members of the Canadian parliament are calling on Prime Minister Justin Trudeau to implement laws that would protect Canadians online. 88 In a letter to lawmakers, Bill Blair, Minister of Public Safety in Canada, said that “foreign states, including the PRC, attempt to threaten and intimidate individuals around the world, including in Canada, through various state entities and non-state proxies.” 89

The UIGHUR Act of 2019 and Uyghur Human Rights Policy Act of 2020 seek to sanction CCP officials responsible for the genocide in the XUAR, as well as to protect Uyghur Americans from China’s campaign of intimidation and harassment. 90 While effective at the former—the U.S. Treasury Department has placed several rounds of sanctions on various CCP officials in the XUAR through these acts and the Global Magnitsky Act—it is unclear if these Acts have helped protect the Uyghur diaspora community from the malign influence of the Chinese government. 91 The 2020 Uyghur Human Rights Act requires that relevant agencies of the U.S. government report to Congress on their efforts to protect the Uyghur community in the U.S. In August 2021, the FBI released an unclassified counterintelligence bulletin on the transnational repression of Uyghurs living in the United States, noting the intent of the Chinese government to “silence dissent, issue instructions, collect information, and compel compliance,” and mentioning specific cases of Uyghurs in the United States who are facing harassment and coercion from overseas. 92 While the U.S. government and responding agencies have sought to educate the public on cybersecurity and created avenues for individuals and groups to report incidents, there is much work to be done in bridging the gap between these resources and vulnerable communities. 93 Confronting China’s harassment remains a more significant gap still.

VII. Welcome to the Machine: Digital Authoritarianism in the Uyghur Region and Beyond

In 2020, Chinese President and Party General Secretary Xi Jinping gave a series of speeches announcing his ambition to achieve A.I. supremacy by the end of the decade. In a competition billed by international media as “the new space race,” China has sought to compete with leading research nations and turn itself into a global hub for A.I. innovation. 94 The CCP has established a number of partnerships with private companies and start-ups to achieve this goal by any means necessary, including recruiting top computer scientists from the United States. 95 These goals, as pointed out in a recent Atlantic article, may also serve to empower China’s security services, arming them with A.I.-powered algorithms designed to anticipate dissent and counteract protests wherever they may occur. This technology, combined with the hundreds of millions of cameras that already exist across the Chinese mainland, could potentially allow the state to identify an individual and pair that information with data in one of several police databases that contain biometric information, travel records, purchases, call records, family, friends, and associates, etc. Computer algorithms designed to assess people and their loyalty and to look for threats will eventually be able to conduct “risk” assessments, assign people a status accordingly, and, if need be, target people for arrest prior to a crime being committed. 96 This effort to “predictively police” the population of China has profound implications for Uyghurs and other Turkic Muslim-majority peoples living in the XUAR, where these very methods have been pioneered.

Three types of facial recognition software and A.I. algorithms in use by the Chinese government since 2018 claim to identify “Uyghur”-coded physical traits. Chinese companies Yitu, Megvii, Sensetime, and Cloud Walk have worked to improve their algorithms to recognize Uyghur features; in 2018, tech-giant Hikvision noted on its website that its facial recognition cameras could recognize gender, as well as whether targets were Uyghur. 97 Chinese company iFlytek, meanwhile, boasted it had helped “solve crimes” in the XUAR using its voice-recognition technology that can “read” the Uyghur language. This same company is helping the Chinese government build a voice and speech-pattern database. 98Some of these companies, along with tech giant Huawei, have become the target of U.S. sanctions due to their role in implementing the surveillance state in the Uyghur Region. 99

Crucially, many of the emerging technologies used to create this surveillance state are being sold to China by Western actors, often despite attempts by Western governments to curtail those sales.

A 2021 article by the BBC reported that facial recognition technology designed to read emotions had also been tested in detention centers in the Uyghur Region. These cameras are meant to read “negative” or “anxious” emotions to “prejudge” the subject. 100 This reading of emotions, also known as “automated affect recognition,” is far from accurate in most cases. However, it relies on categorizing emotions without consideration for social, cultural, and individual factors that impact facial expressions and expressions of emotion. A U.S. Transportation Security Administration program relying on similar technology to spot people “likely to commit terrorism” after the events of September 11, 2001, yielded no results. 101 This technology, based on pseudoscience, acts as yet another data point for the persecution of Uyghurs on arbitrary grounds. Increasingly, these companies are implementing international smart-city programs along the Digital Silk Road, including in Central Asia and Pakistan—significant hubs for transnational repression of the Uyghurs. 102

Crucially, many of the emerging technologies used to create this surveillance state are being sold to China by Western actors, often despite attempts by Western governments to curtail those sales. According to a June 2021 New York Times report, two U.S. companies, Promega and Thermo Fisher, have continued to sell DNA equipment to companies in China that then resell the technology to the police in the Uyghur Region. While DNA collection is standard for certain groups in China (e.g., in criminal cases, for migrant workers, etc.), in the Uyghur Region this data collection is much more far-reaching, extending to nearly the entire population. 103

These technologies allow the XUAR Public Security Bureau (PSB) to collect and sequence thousands of unique blood samples and DNA samples collected by local police at stations across the Uyghur Region, where residents were summoned to for a “check-up” in a program eventually called “Physicals for All.” 104 This information, collected along with details including height, weight, fingerprints, and face and voice recordings, was then added to databases used to surveil, track, and model the behaviors of Uyghurs. According to journalists citing the Chinese press, the program collected the data of more than 36 million individuals across the XUAR. 105 This case is only the most recent in a series that reveals how the Chinese state appropriates and exploits Western technology to commit human rights violations against Uyghurs.

The same technologies are being used against Uyghurs overseas. In 2018, Ahmad Talip, a Uyghur living in Dubai, noted that he was forced to provide a blood sample during arbitrary imprisonment. 106 Talip’s claim fits into a larger pattern in which China’s intelligence services collect data on Uyghurs living abroad. This new “ID card system,” like that in the Uyghur Region, requires detailed information on subjects, including their DNA, and then uses that information to monitor Uyghur communities abroad.

Party cadres have explicitly requested information from Uyghurs residing in the United States and elsewhere so as to feed data into this dataset. In 2018, Barna (pseudonym) received a message from her mother, asking her to send over images of the license plate on her car as well as her bank card number, photo ID, and phone number, reportedly so that they could be added to the database behind a new system of Chinese state ID cards. This database and these ID cards are meant to include Uyghurs living abroad. Barna chose to lie about having a card or bank account in the United States, denying that she had either, but sent an image of her photo ID to her mother out of concern for her mother’s safety—she understood from the tone of her messages that Chinese officials had coerced her mother. 107

Jevlan Shirmemmet, 108 who left the XUAR to study in Turkey, gave the BBC a recording of a call he received a few weeks after he made a post on social media about the arrest of his family in the Uyghur Region. The caller, who said he was from the Chinese embassy in Ankara, told Jevlan to “write down everyone you’ve been in contact with since you left Xinjiang,” and send an email “describing your activities,” so that “the mainland might reconsider your family’s situation.” Mustafa Aksu, another Uyghur who previously lived in Turkey but now lives in the United States, showed the BBC messages from an old school friend who had become a police officer and attempted to pressure Mr. Mustafa to provide information on the activities of Uyghur activists in Turkey. 109

This internationalization of government repression has accelerated dramatically since 2017, mainly due to algorithmic surveillance. In the XUAR, police stations feed data into a powerful database known as the Integrated Joint Operating System (IJOP). 110 The IJOP categorizes Uyghurs as suspicious for any contact with people in 26 blacklisted countries, along with a host of other possible reasons. 111People who have traveled to, have family members living in, or otherwise communicate with people in the 26 countries have been interrogated, detained, or imprisoned. Increasingly, the borders of China’s advanced surveillance system are blurred, with intelligence gathering and harassment on the rise worldwide.

New troves of information further suggest that liberal democracies are catching the security state’s eye. In March 2021, the Shanghai Public Security Bureau (PSB), a regional police station, was hacked, and 1.1 million surveillance records were leaked. One of the revelations from this trove of documents was an unprotected database with the codename “Uyghur Terrorist,” which was part of an open-source database to which security agencies worldwide had access. The presence of this platform is just a tiny glimpse into the enormous scope of China’s international campaign against Uyghurs. The database contains records of thousands of Uyghur “suspected terrorists” who have been detained, questioned, and/or monitored by the PSB. The inclusion of these “suspected terrorists” seems to have been based on far-reaching claims since more than 400 individuals in the database flagged for in-person examination were minors, some of whom were as young as five years old. 112 The database also included the information of more than 5,000 foreigners—who were flagged simply for having traveled to Shanghai—for further monitoring. At least three Uyghur Australians were on the list, including two citizens—Nurgul Sawut and Maimaitaji Kasimu 113 —and an anonymous permanent resident whose mother was reportedly threatened with detention after he attended a protest. Several Uyghur community leaders in Australia have also been blacklisted as “terrorists” otherwise. 114 The Shanghai List stands as further evidence that they are targets of the Chinese government.

China’s drive to intimidate, harass, and control Uyghurs has increased in the last five years, in correlation with China’s activities in the Uyghur Region and its efforts to return or arrest Uyghurs living abroad. In particular, the Chinese government has focused its efforts on cyberattacks, a form of stage 1 transnational repression, with a recorded 2,774 cases, and intimidation, including phone calls, direct threats, and surveillance, with a recorded 526 cases in our dataset. In addition, the government has primarily focused stage 1 repression efforts on Uyghurs living in liberal democracies, with 3,040 recorded cases in Europe, 81 in the Asia Pacific, and an additional 130 in North America.

VIII. Cyberspace: The Next Frontier for Transnational Repression

Modern communications technology has rapidly expanded the reach of China’s security services, created new methods and tactics for gaining information on Uyghurs residing overseas, and expanded opportunities for crowdsourcing intimidation. Increasingly, the Chinese state is using a combination of botnets and targeted disinformation campaigns to raise the stakes for individual Uyghurs speaking out about the abuse they face. These sustained attacks also undermine organizations’ capacity to operate due to the high costs required for computer engineers to protect their infrastructure, allowing malicious actors to effectively “price out” civil society.

Increasingly, the Chinese state is using a combination of botnets and targeted disinformation campaigns to raise the stakes for individual Uyghurs speaking out about the abuse they face.

China’s rising cyber capabilities have gained the attention of prominent Western officials and political commentators in recent months. In March 2021, Microsoft blamed China for starting a “free-for-all” in which numerous hackers used the Microsoft Exchange email program to break into organizations around the world. 115 In July 2021, the United States government accused China’s Ministry of State Security (MSS) and its affiliated hackers of attacking and compromising more than 100,000 Microsoft Exchange servers worldwide. 116 Analysts have also linked several high-profile spyware campaigns to the People’s Liberation Army (PLA) over the past decade. 117 China’s hacking ecosystem more broadly appears to be expanding beyond state actors to include private for-hire actors and nationalist individuals, who hack on behalf of the Chinese government. 118

According to the 2018 Internet Development Statistics Report, China’s cybercriminal underground was worth more than US$15 billion, nearly twice the size of its information security industry. The same Chinese-language source also shows that China’s cybercrime is growing at a rate of more than 30 percent per year, with an estimated 400,000 people working in underground cybercriminal networks. 119 These cybercriminal networks often feed into state power. For example, the cybersecurity firm FireEye reported that a group of state-sponsored hackers in China ran activities for personal gain while undertaking spying operations for the Chinese government in 14 different countries since 2012. In its 2019 report, the company stated that the hacking group APT41 was different from other China-based groups tracked by security firms in that it used non-public malware typically reserved for espionage to profit off attacks on video game developers. 120

Such networks have also targeted human rights groups and journalists. Chinese spyware campaigns have expanded beyond China’s borders and toward think tanks, government agencies, human rights groups, and law firms around the globe. 121 Chinese government denials of hacking activity often have an air of plausibility because many of the organizations they target lack sophisticated network security, as well as the fact that individual hackers, motivated by patriotism or simple mischief, can take action without the need for state encouragement. Further, attribution remains a lingering challenge in the field of cybersecurity, as actors can mask their identities, origins, and code to evade or misdirect attribution. 122 Uyghur advocacy groups remain especially exposed. The World Uyghur Congress (WUC), in particular, has been subject to regular DDoS attacks and phishing schemes. The table below outlines the attacks and harassment against the WUC:

2011Beginning on June 28, 2011, the World Uyghur Congress experienced a significant Distributed Denial of Service (DDoS) attack to disrupt commemoration events for the second anniversary of the 2009 unrest in Ürümchi. WUC staff created an alternative WordPress site to ensure its events could continue but had to shut that site down after it too faced DDoS attacks. These DDoS attacks forced the WUC website to remain entirely shut down until July 11, nearly one week after the anniversary. In addition to attacks on websites, WUC officers were inundated with spam emails and incoming calls from unidentified numbers to disrupt communications. 123
2012In advance of its 2012 Executive Committee meeting, the World Uyghur Congress was one of 10 organizations whose websites were crippled by a virus. WUC servers were also “forced to distribute fake emails targeting activists from related organizations.” 124
2013In a phishing campaign that lasted at least four years (2009–2013), WUC employees received thousands of emails from compromised email addresses and addresses that otherwise looked familiar. These messages also leveraged familiar themes, languages, and topics to facilitate downloading malware onto WUC devices. 125
2013Uyghurs involved in advocacy against the Chinese government, including contacts at the WUC, became the victims of a spear phishing campaign designed to install malware on Androids after they received an email sent from the hacked account of a high-level Tibetan activist. The email, concerning details of a WUC conference, was sent to the recipient’s entire contact list with an attached file containing malware that would steal and export information from infected devices to an external command and control. Researchers at Kaspersky Labs traced the export to a C2 server located in Beijing. 126
2019The World Uyghur Congress Facebook page was attacked by the Diba Central Army, a Chinese nationalist group that has attacked other pages in the past. The WUC page was bombarded with thousands of images—watermarked with the logo of the Diba Central Army—of idyllic life in Xinjiang and posts decrying Uyghurs for being “terrorists.” 127

Table 3: Table of cyberattacks on the World Uyghur Congress between 2011 and 2019. Source: Oxus Society for Central Asian Affairs and World Uyghur Congress.

Muhemmedeli Niyaz, web developer at WUC since 2016, spoke with us about his work securing the organization’s website. He noted:

“The main attacks are DDoS, and these usually occur when we host important events or release reports. The website won’t open on those days, and we need to work around the clock to keep it online. In more recent years, we have had our Uyghur language YouTube channel hacked to remove content and our organization’s Twitter account.”

The WUC has also faced phishing attacks that used malware sent through bad links and attachments. Niyaz noted that “these activities place substantial financial burdens on WUC, which has a limited budget.” 128

In 2012 and 2013, researchers at Kaspersky further analyzed the attacks against the World Uyghur Congress, discovering that Uyghur Mac OS X users were vulnerable to malware. Once installed, the malware exploited a backdoor in the Mac OS X operating system that allowed an external command and control center to take control of the device. Analysts successfully decoded the C2 location, which they noted as Lanzhou, China. 129 They further noted that this advanced persistent threat (APT) was intensifying as of their reporting. 130

Two WUC volunteers reported receiving 1,493 suspicious emails over four years. Of those, 1,116 contained malware attachments. These emails, analyzed in a 2014 Usenix Symposium report “A Look at Targeted Attacks Through the Lens of an NGO,” were found to be socially engineered to entice specific individuals into installing malware through the use of familiar names (including compromised email accounts), messages, themes, languages (often the native language of the recipient), and tone. In addition, a reported 84% of the emails were sent from an impersonated sender. Taken together, this email campaign suggests that hackers targeting Uyghur activists focus on socially engineering messages to ensure their receipt so that unwitting recipients will open and download the malicious attachments and install malware onto their computers. 131

Uyghur activists, employees of human rights organizations, and many others who have spoken out about the genocide in the Uyghur Region have become the targets of Chinese government accounts, Chinese bots, and Chinese disinformation, all of which continue to escalate as of the writing of this report.

“Communities @ Risk,” a 2014 report by the Toronto University-based Citizen Lab, characterized Chinese cyberespionage as persistent, adaptive, and technically unsophisticated but with a high level of social engineering. These phishing schemes and malware packages were of low quality. Still, the attackers went to substantial and persistent lengths to hide their nature: the hackers often embedded the packages in emails made to look like they were coming from known contacts, even from within the organization. Once downloaded, the malware would allow a third party to read keystrokes, download files, and turn on the webcam and microphone of any infected device. The report further underscored that civil-society organizations are particularly vulnerable to this sort of attack, as they have fewer resources to defend themselves than government or commercial-sector actors. As the report notes, these efforts extend the reach of the state into supposed “safe havens.” 132Organizations such as the WUC remain vulnerable to Chinese espionage efforts.

IX. Botnets and Coordinated Social Media Campaigns

Uyghur activists, employees of human rights organizations, and many others who have spoken out about the genocide in the Uyghur Region have become the targets of Chinese government accounts, Chinese bots, and Chinese disinformation, all of which continue to escalate as of the writing of this report. 133 This campaign, waged across social media accounts on Twitter, YouTube, Facebook, and TikTok, seeks to distract from human rights abuses and instead refocus international attention towards positive narratives and outright disinformation. The social media campaign about Xinjiang is the most extensive global propaganda campaign on a single theme that China researchers have seen in the last 25 years, according to University of Canterbury professor Anne-Marie Brady, and is becoming more “dogmatic . . . and aggressive.” 134 Researchers at ASPI analyzed this campaign, showing how Chinese government and “fringe media” content is disseminated, shared, and re-shared thousands of times across hundreds of accounts on Twitter and Facebook in a push to discredit statistics and factual information about the human rights abuses in the XUAR, discredit Western media and human rights organizations, and assert Chinese government claims. Several organizations funded by the Xinjiang Audio-Video Publishing House under the United Front Work Department have made videos of Uyghurs who have been “re-educated” and “rehabilitated” back into the society, including footage extolling the virtues of the CCP in XUAR. 135

In 2019, Chinese government-aligned trolls attacked the Talk to East Turkestan Facebook page, run by Arslan Hidayat. Within an hour, Hidayat’s page had received over 1,400 comments promoting sanitized images of Xinjiang and decrying all Uyghurs for being “terrorists” and “no different than ISIS.” The hacker group, Diba Central Army, is thought to be part of China’s 50 Cent Army of trolls. 136 These trolls—whom many observers suspect to be government employees in a variety of positions and departments—are leveraged by the Chinese government to promote Chinese state narratives and propaganda; to cheerlead fellow trolls, bots, diplomats, and nationalist “netizens”; and to distract from stories that might be dangerous to the government. 137

In 2021, Reuters revealed that Chinese hackers had used Facebook to target Uyghurs abroad. Using fake accounts, the group of hackers infiltrated Uyghur groups online and developed trust with them before sharing links to fake and corrupted sites embedded with malware. Once an individual in the group clicked on these links, the links downloaded malware onto that individual’s platform. Part of a group called Evil Eye, these hackers also developed websites specifically tailored to a Uyghur audience meant to look like Android apps that had malware connected to them. Nearly 500 Uyghurs from Turkey, Kazakhstan, the United States, Australia, Canada, and Syria were targeted in this campaign. In response, Facebook removed the group of hackers from the website and blocked all of the corrupted and fake domains. 138 However, Facebook continued to allow China to run advertisements on its platform that denied the genocide in the Uyghur Region. 139

Facebook appears to have knowledge of Chinese government-led targeting of Uyghurs on its platform. In October 2021, Facebook whistleblower Frances Haugen noted in her testimony to the Senate Commerce Committee’s Subcommittee on Consumer Protection, Product Safety, and Data Security that the Chinese government regularly used Facebook as a tool by the Chinese government to surveil Uyghurs around the world. She noted that Facebook is aware of this and other espionage activities, but that the counterespionage team has been consistently understaffed by the company. 140

Uyghurs abroad are a vulnerable population whose members have relied on technology to maintain contact with home while attempting to establish new lives abroad, leaving them open to intimidation, harassment, and coercion by the Chinese state.

In contrast to Facebook, Twitter has sought to push back on China’s use of its platform as a tool of harassment. Twitter listed some accounts as foreign state actors and permanently banned them from the website: in 2020, the company de-platformed 23,750 core accounts that generated content to be retweeted, as well as an additional 150,000 accounts run by bots and trolls. 141

The near-constant harassment, intimidation, and coercion outlined in this section have a devastating effect on Uyghurs individually, as well as in diaspora communities. However, data we collected suggests that this pressure placed on Uyghurs by the Chinese government galvanized a response: 34.4% of the Uyghurs we surveyed—a majority of our respondents—have begun to speak out afterfacing the Chinese government’s coercion and harassment. This indicates that Chinese transnational repression drives some Uyghurs towards political activism rather than coercing them into silence.

Source :