enquencher
FULL MEMBER
- Joined
- Nov 30, 2010
- Messages
- 1,077
- Reaction score
- -36
- Country
- Location
Researcher finds one of the databases used to track Uyghur Muslim population in Xinjiang.
By Catalin Cimpanu for Zero Day | February 14, 2019 -- 18:17 GMT (23:47 IST) | Topic: Security
One of the facial recognition databases that the Chinese government is using to track the Uyghur Muslim population in the Xinjiang region has been left open on the internet for months, a Dutch security researcher told ZDNet.
The database belongs to a Chinese company named SenseNets, which according to its website provides video-based crowd analysis and facial recognition technology.
Yesterday, Victor Gevers, a well-known security researcher that made a name for himself in the past few years by finding leaky MongoDB databases did what he does best and found one of SenseNets' MongoDB databases that had been left exposed online without authentication.
Gevers told ZDNet that the database contained information on 2,565724 users, along with a stream of GPS coordinates that came in at a rapid pace.
The user data wasn't just benign usernames, but highly detailed and highly sensitive information that someone would usually find on an ID card, Gevers said. The researcher saw user profiles with information such as names, ID card numbers, ID card issue date, ID card expiration date, sex, nationality, home addresses, dates of birth, photos, and employer.
For each user, there was also a list of GPS coordinates, locations where that user had been seen.
The database also contained a list of "trackers" and associated GPS coordinates. Based on the company's website, these trackers appear to be the locations of public cameras from where video had been captured and was being analyzed.
Some of the descriptive names associated with the "trackers" contained terms such as "mosque," "hotel," "police station," "internet cafe," "restaurant," and other places where public cameras would normally be found.
The location of some of the SenseNets trackers
Image: Victor Gevers
Gevers told ZDNet that these coordinates were all located in China's Xinjiang province, the home of China's Uyghur Muslim minority population.
The company did not respond to a request for comment before this article's publication.
The most common conclusion is that SenseNets is a government contractor, helping authorities track the Muslim minority, rather than a private company selling its product to another private entity. Otherwise, it would be hard to explain how SenseNets has access to ID card information and camera feeds from police stations and other government buildings.
Gevers said he now regrets helping the company secure its oppression tool.
https://www.zdnet.com/google-amp/ar...ng-facial-recognition-database-exposed-online
By Catalin Cimpanu for Zero Day | February 14, 2019 -- 18:17 GMT (23:47 IST) | Topic: Security
One of the facial recognition databases that the Chinese government is using to track the Uyghur Muslim population in the Xinjiang region has been left open on the internet for months, a Dutch security researcher told ZDNet.
The database belongs to a Chinese company named SenseNets, which according to its website provides video-based crowd analysis and facial recognition technology.
Yesterday, Victor Gevers, a well-known security researcher that made a name for himself in the past few years by finding leaky MongoDB databases did what he does best and found one of SenseNets' MongoDB databases that had been left exposed online without authentication.
Gevers told ZDNet that the database contained information on 2,565724 users, along with a stream of GPS coordinates that came in at a rapid pace.
The user data wasn't just benign usernames, but highly detailed and highly sensitive information that someone would usually find on an ID card, Gevers said. The researcher saw user profiles with information such as names, ID card numbers, ID card issue date, ID card expiration date, sex, nationality, home addresses, dates of birth, photos, and employer.
For each user, there was also a list of GPS coordinates, locations where that user had been seen.
The database also contained a list of "trackers" and associated GPS coordinates. Based on the company's website, these trackers appear to be the locations of public cameras from where video had been captured and was being analyzed.
Some of the descriptive names associated with the "trackers" contained terms such as "mosque," "hotel," "police station," "internet cafe," "restaurant," and other places where public cameras would normally be found.
The location of some of the SenseNets trackers
Image: Victor Gevers
Gevers told ZDNet that these coordinates were all located in China's Xinjiang province, the home of China's Uyghur Muslim minority population.
The company did not respond to a request for comment before this article's publication.
The most common conclusion is that SenseNets is a government contractor, helping authorities track the Muslim minority, rather than a private company selling its product to another private entity. Otherwise, it would be hard to explain how SenseNets has access to ID card information and camera feeds from police stations and other government buildings.
Gevers said he now regrets helping the company secure its oppression tool.
https://www.zdnet.com/google-amp/ar...ng-facial-recognition-database-exposed-online