Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Vimeo to be acquired by Bending Spoons for $1.38 billion

    September 10, 2025

    The ‘Final Fantasy Tactics’ Refresh Gives Its Class-War Story New Relevance

    September 10, 2025

    How the new AirPods Pro compare to the rest of Apple’s AirPods lineup

    September 10, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » China’s Surveillance State Is Selling Citizen Data as a Side Hustle
    Security

    China’s Surveillance State Is Selling Citizen Data as a Side Hustle

    News RoomBy News RoomDecember 3, 20243 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    As further evidence of government surveillance insiders moonlighting in the data broker market, the SpyCloud researchers point to a leak earlier this year of communications and documents from I-Soon, a cyberespionage contractor to the Ministry of Public Security and the Ministry of State Security. In one leaked chat conversation, one employee of the company suggests to another that “I am just hear here to sell qb,” and “sell some qb yourself.” The SpyCloud researchers interpret “qb” to mean “qíngbào,” or “intelligence.”

    Given that the average annual salary in China, even at a state-owned IT company, is only around $30,000, the promise—however credible or dubious—of making nearly a third of that daily in exchange for selling access to surveillance data represents a strong temptation, the SpyCloud researchers argue. “These are not necessarily masterminds,” says Johnson. “They’re people with opportunity and motive to make a little money on the side.”

    That some government insiders are in fact cashing in on their access to surveillance data is to be expected amid China’s perpetual struggle against corruption, says Dakota Cary, a China-focused policy and cybersecurity researcher at cybersecurity firm SentinelOne, who reviewed SpyCloud’s findings. Transparency International, for instance, ranks China 76th in the world out of 180 countries in its Corruption Index, well below every EU country other than Hungary—with which it tied—including Bulgaria and Romania. Corruption is “prevalent in the security services, in the military, in all parts of the government,” says Cary. “It’s a top-down cultural attitude in the current political climate. It’s not at all surprising that individuals with this kind of data are effectively renting out the access they have as part of their job.”

    In their research, SpyCloud’s analysts went so far as to attempt to use the Telegram-based data brokers to search for personal information on certain high-ranking officials of the Chinese Communist Party and the People’s Liberation Army, individual Chinese state-sponsored hackers who have been identified in US indictments, and the CEO of cybersecurity company I-Soon, Wu Haibo. The results of those queries included a grab bag of phone numbers, email addresses, bank card numbers, car registration records, and “hashed” passwords—passwords likely obtained through a data breach that are protected with a form of encryption but sometimes vulnerable to cracking—for those government officials and contractors.

    In some cases, the data brokers do at least claim to restrict searches to exclude celebrities or government officials. But the researchers say they were usually able to find a workaround. “You can always find another service that’s willing to do the search and get some documents on them,” says SpyCloud researcher Kyla Cardona.

    The result, as Cardona describes it, is an even more unexpected consequence of a system that collects such vast and centralized data on every citizen in the country: Not only does that surveillance data leak into private hands, it also leaks into the hands of those who are watching the watchers.

    “It’s a double-edged sword,” says Cardona. “This data is collected for them and by them. But it can also be used against them.”

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleWhat happened to Intel?
    Next Article Microsoft accuses FTC of leaking news of its antitrust investigation

    Related Posts

    Massive Leak Shows How a Chinese Company Is Exporting the Great Firewall to the World

    September 10, 2025

    ICE Has Spyware Now

    September 9, 2025

    US Congressman’s Brother Lands No-Bid Contract to Train DHS Snipers

    September 9, 2025

    No, Trump Can’t Legally Federalize US Elections

    September 6, 2025

    SSA Whistleblower’s Resignation Email Mysteriously Disappeared From Inboxes

    September 6, 2025

    Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn

    September 5, 2025
    Our Picks

    The ‘Final Fantasy Tactics’ Refresh Gives Its Class-War Story New Relevance

    September 10, 2025

    How the new AirPods Pro compare to the rest of Apple’s AirPods lineup

    September 10, 2025

    Massive Leak Shows How a Chinese Company Is Exporting the Great Firewall to the World

    September 10, 2025

    The United Arab Emirates Releases a Tiny But Powerful AI Model

    September 10, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    News

    Hands-on: Nvidia’s GeForce Now RTX 5080 is better and worse than I hoped

    By News RoomSeptember 10, 2025

    Today, Nvidia is soft-launching its latest gaming GPUs in the cloud — upgrading its $20-a-month…

    Nvidia’s latest GeForce driver is ready for Borderlands 4 and RTX Remix mods

    September 10, 2025

    Apple’s misunderstood crossbody iPhone strap might be the best I’ve seen

    September 10, 2025

    Real Estate Speculators Are Swooping In to Buy Disaster-Hit Homes

    September 10, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.