The Integrated Joint Operations Platform: the heart of mass surveillance in Xinjiang
This repository includes the press release and the 68-page Human Rights Watch (HRW) report, “China’s Algorithms of Repression: Reverse Engineering a Xinjiang Police Mass Surveillance App.” It also includes translations of the press release and the report’s summary and recommendations in Arabic, Bahasa Indonesian, Chinese, French, Spanish, Turkish, Uyghur. In addition, it includes the digital forensic artifacts discovered or developed during the course of the 2018-2019 HRW investigation reported in ”China’s Algorithms of Repression” (available at: https://www.hrw.org/node/329384).
If you have questions about the report, the IJOP android application, or the decompiled code excerpts published here, please write us at firstname.lastname@example.org .
All HRW documents (including the text of the original report in English, and the translations of the summary) in this repository are provided under Creative Commons Attribution-NonCommercial-NoDerivs 3.0 United States (CC BY-NC-ND 3.0 US) which is available in full here and summarized here. The Creative Commons License referred to here is perpetual for the duration of the applicable copyright of the work.
Forensic Artifacts: This repository contains selections of code decompiled from the IJOP android application, which may be further updated. Selections that were included were those identified as relevant to the 2018-2019 HRW investigation reported in China’s Algorithms of Repression report.
Redactions: All decompiled code that is released will be reviewed the research team and HRWs Information Security team to redact any API-keys, usernames, passwords or other authenticating information. All redactions will be noted in the redaction log.
APK Hashes: HRW does not have plans to release the full application (APK) as it can be freely downloaded by the public from existing websites. If you would like to verify that the application you downloaded is the same as the application that analyzed by the HRW research team you can compare it to the following hashes
Source Code: The decompiled code was extracted from the original APK using jadx using the following command.
jadx -d source_code yitihualianhezuozhanpingtai_downcc.apk You can view the full list of decompiled code contained in the application in the file-tree.