June 16, 2023
3 mins read

Surveillance: Chinese police access chat records with ID cards

Eyewitnesses supported the claim that Chinese police have employed technology to extract comprehensive information from individuals’ mobile phones during routine checks…reports Asian Lite News

Chinese authorities, particularly the police associated with the Chinese Communist Party (CCP), utilise individuals’ ID cards to gain access to their chat records as part of their extensive surveillance practices enabled by big data, revealed a recent report of Radio Free Asia on June 14.

The report cited an incident where a netizen, while travelling on a ferry at Haikou Xinhai Port on June 6, was subjected to a random check by customs and the police. It was disclosed that his WeChat chat history could be accessed only using his ID number, even if the conversations had been deleted. The report further highlighted that implementing ID cards containing embedded chips nationwide, which took place twenty years ago, was promoted to facilitate travel and enhance privacy protection.

However, people were unaware that this would eventually lead to a situation where their entire personal information, including assets, real estate holdings, hotel records, consumption history, and chat records, could be easily obtained through their ID cards. This expansion of surveillance is referred to as the “new strategic direction of deep stability maintenance.”

Eyewitnesses supported the claim that Chinese police have employed technology to extract comprehensive information from individuals’ mobile phones during routine checks. The police can instantly access details such as registered names associated with mobile numbers, WeChat group affiliations, and chat histories.

China has heavily invested in constructing a vast database and collecting personal information from various sources, rendering it virtually impossible to evade surveillance. The report quoted an eyewitness who experienced his Telegram account being compromised by an unidentified individual. This person conversed with the eyewitness, even going so far as to mimic the voice of a renowned writer, Li Chengpeng, from Sichuan.

A former public security officer from mainland China revealed that police could exploit iCloud big data to track individuals and covertly download user data within a 500-meter radius at high speeds. These monitoring techniques have been extensively deployed in recent years, particularly in sensitive regions such as Xinjiang and Tibet.

Another eyewitness reported receiving a phone call warning from the police after disclosing personal information, including their name and province, overseas. The police were able to identify the individual through cross-referencing big data.

The police even possessed knowledge of the eyewitness’s comments made in a specific WeChat group on a particular day, as well as blocked messages sent to a specific account on another specific day.

This revelation left the eyewitness astonished and frightened. The police cautioned against publishing any information deemed unfavourable to the party, the government, or the country’s leaders, threatening potential arrest as a consequence.

In a video released last year, Ah Hao, a Taiwanese network security programmer, discovered an encrypted WeChat log file within the WeChat database on his personal computer. Despite WeChat being in silent mode, the file continued to be updated every few minutes, adding approximately 30KB of data per minute.

Hao speculated that WeChat itself might conduct this ongoing data upload. To prevent unauthorised access, he personally modified the relevant encrypted data stored on his computer. However, most users lack the technical expertise to undertake such modifications.

Arthur Herman, a senior fellow at the Hudson Institute and director of the Quantum Alliance Initiative, voiced his concerns in a Forbes Magazine editorial published in February. He warned readers to pay close attention to WeChat and its parent company, Tencent, which he perceives as “another social media Trojan horse” employed by the Chinese Communist Party.

Herman highlighted that Chinese users are fully aware that every word they utter, and every picture they post on WeChat are subject to government monitoring and censorship. (ANI)

ALSO READ: Belt and Road wanes as China shifts focus

Previous Story

China not to change stance on Lankan debt restructuring

Next Story

‘Talks not over’: Dar pins hopes on IMF loan

Latest from -Top News

No Talks Till Terror Ends: India to Pakistan

The MEA’s strong response came at a time when Pakistan, pushed on the backfoot by India’s decisive Operation Sindoor, has suddenly started talking about its intent on having peace talks with India….reports

BNP ramps up poll demand

Chief Adviser Yunus had earlier promised elections in December 2025, but the timeline has since been pushed back first to February 2026 and then to June 2026, fuelling suspicion and dissatisfaction among

Saudi backs India’s strategic outreach

In a series of engagements, the Indian delegation met Saudi Arabia’s Minister of State Adel Al-Jubeir and other senior officials. A high-profile Indian all-party parliamentary delegation, led by BJP MP Baijayant Jay

India clears stealth fighter project

New execution model paves way for private sector involvement in India’s ambitious stealth aircraft programme; Army showcases next-gen drone warfare systems. In a landmark decision bolstering India’s defence self-reliance, Defence Minister Rajnath

ASEAN lauds India’s firm stance on terrorism

The ASEAN Secretary-General reaffirmed the bloc’s resolve to deepen collaboration with India—a comprehensive strategic partner—in security and counter-terrorism efforts. The Indian all-party Parliamentary delegation, led by Janata Dal (United) MP Sanjay Jha,
Go toTop

Don't Miss

IMF Optimistic on India, Cautious on China

The Fund had raised its growth forecast for India for

Xi Jinping’s Af-Pak predicament deepens

The PLA will increasingly have to bear the burden of