Skip to content
Documents and forensic artifacts from 2018-2019 HRW investigation reported in ”China’s Algorithms of Repression” (available at:
Branch: master
Clone or download

Latest commit


Type Name Latest commit message Commit time
Failed to load latest commit information.
report Added reports May 2, 2019
source_code Initial Commit May 2, 2019 Update May 2, 2019
file_tree.txt Initial Commit May 2, 2019 Initial Commit May 2, 2019

The Integrated Joint Operations Platform: the heart of mass surveillance in Xinjiang

This repository includes the press release and the 68-page Human Rights Watch (HRW) report, “China’s Algorithms of Repression: Reverse Engineering a Xinjiang Police Mass Surveillance App.” It also includes translations of the press release and the report’s summary and recommendations in Arabic, Bahasa Indonesian, Chinese, French, Spanish, Turkish, Uyghur. In addition, it includes the digital forensic artifacts discovered or developed during the course of the 2018-2019 HRW investigation reported in ”China’s Algorithms of Repression” (available at:

If you have questions about the report, the IJOP android application, or the decompiled code excerpts published here, please write us at .


Type Language Link
Full report English
Report summary and recommendations Arabic
Report summary and recommendations Bahasa
Report summary and recommendations French
Report summary and recommendations Spanish
Report summary and recommendations Uyghur
Report summary and recommendations Turkish
Report summary and recommendations Chinese
Press release English
Press release Arabic
Press release Chinese
Press release German
Press release Bahasa Indonesian
Press release French
Press release Spanish
Press release Turkish


All HRW documents (including the text of the original report in English, and the translations of the summary) in this repository are provided under Creative Commons Attribution-NonCommercial-NoDerivs 3.0 United States (CC BY-NC-ND 3.0 US) which is available in full here and summarized here. The Creative Commons License referred to here is perpetual for the duration of the applicable copyright of the work.

Technical Information

Forensic Artifacts: This repository contains selections of code decompiled from the IJOP android application, which may be further updated. Selections that were included were those identified as relevant to the 2018-2019 HRW investigation reported in China’s Algorithms of Repression report.

Redactions: All decompiled code that is released will be reviewed the research team and HRWs Information Security team to redact any API-keys, usernames, passwords or other authenticating information. All redactions will be noted in the redaction log.

APK Hashes: HRW does not have plans to release the full application (APK) as it can be freely downloaded by the public from existing websites. If you would like to verify that the application you downloaded is the same as the application that analyzed by the HRW research team you can compare it to the following hashes

Hash Type Hash Filename
md5sum c0d0eb41dee70910eee1dc8f468051db yitihualianhezuozhanpingtai_downcc.apk
sha1sum 861d574183889de45543143149c0145032c02302 yitihualianhezuozhanpingtai_downcc.apk
sha256sum 7171fbde943355f18dc7585acc08e7b9c5fffd02ab8fc6870c6fafd1665ec186 yitihualianhezuozhanpingtai_downcc.apk

Source Code: The decompiled code was extracted from the original APK using jadx using the following command. jadx -d source_code yitihualianhezuozhanpingtai_downcc.apk You can view the full list of decompiled code contained in the application in the file-tree.


You can’t perform that action at this time.