Chinese National Arrested for Smuggling US Microchips

US federal agents arrested a Chinese citizen attempting to obtain hundreds of radiation-hardened microchips typically used in satellites and ballistic missile systems as he tried to leave the United States last year, according to court documents obtained by Quartz.

The bust, which had not been reported in the media until now, was the culmination of an elaborate international sting that stretched from China to Arizona, and included an undercover operation in Bangkok.

The made-to-order chip is manufactured and sold in the United States by Cobham, a multinational defense contractor headquartered in Britain. They cost $2,500 each, and the company only makes about 1,000 of them a year. They are made to withstand extreme temperatures, severe vibrations, and radiation exposure. Known as “rad-hard chips,” they require a license from the Department of Commerce to export, and sending the chips to China—as well as a small handful of other countries, including Russia—is banned outright. A commercial version of the same chip, with the same memory capacity but without the ability to survive in the harsh conditions of outer space, goes for about $60.

A 2011 attempt by the Chinese to obtain an earlier version of the same chip was also foiled by the Department of Homeland Security. But more than 100 of the 312 chips purchased by the suspect in that case remain missing.

In this latest case, authorities say Jian Fun Tso, who goes by Steven, emailed Cobham in January 2018 to ask about purchasing the microchips for a group of unidentified customers. He said the buyers intended to use the chips in a radar-assisted parking device for cars. Tso called the sales potential “huge.” According to prosecutors, Tso’s clients were based in China.

A Cobham representative told Tso that, although his managers would certainly love “huge” numbers, the chips he was inquiring about—aside from being illegal to ship to China—cost far more than anyone creating such a product would ever need to spend.

Nicholas Eftimiades, a veteran intelligence officer who held positions with the CIA, the Bureau of Diplomatic Security, and the Defense Intelligence Agency during his 34-year career, said the technology in radiation-hardened microchips is “very, very closely guarded.” He said Tso’s explanation of how his clients would use them was nothing short of “ridiculous.”

“That chip could only be used by a certain number of state institutions in China, all leading to the People’s Liberation Army,” Eftimiades told Quartz. “They’re trying to steal it in a covert manner, the likelihood is a military space program or missile program.” Court documents quote a Cobham official saying there was “absolutely no rational reason” for anyone to use the chip in an automotive application.

China, which maintains the most extensive intelligence apparatus in the world, has increased the size and scope of its efforts in recent years. Beijing’s attempts to acquire sensitive American technology target not just the US government and the defense industry, but major universities and research scientists as well.

Chinese hackers have already compromised dozens of critical US weapons systems. In 2018, Chinese hackers stole top-secret plans for a supersonic anti-ship missile the Navy was developing. Last fall, two Chinese diplomats living in the United States—one of whom authorities believe was in fact an undercover intelligence officer—were expelled from the country after attempting to get onto a secure Virginia military base. Authorities recently charged a Chinese-born tour guide in San Francisco with passing US secrets to China’s Ministry of State Security. And last month, two different Chinese nationals were caught surveilling the same Florida military base twice in two weeks.

“The Chinese have been eating our lunch since the eighties,” former CIA officer Robert Baer told Quartz. “Nearly every single scientific and technological breakthrough they’ve made is thanks to what they’ve ripped off from us. And it’s only getting worse. Chinese theft of our technology is up there with our worst national security threats.”

Tso tries again

According to court filings, Cobham—which in 2018 alone received eight requests from Chinese entities for the valuable microchips—reported Tso’s call to US counterintelligence.

Unable to get the chips from Cobham, Tso tried a US electronics distributor that acts as a reseller. This time, Tso left out the part about China being the chips’ ultimate destination.

The distributor emailed Tso a blank end user agreement to fill out. Tso returned it, listing the end user as an electrical engineer named “John Anderson” from Metech ICT, an automotive electronics company based in Liverpool, England. Like Cobham, the distributor found his request suspicious and referred him to an undercover agent with the Defense Criminal Investigative Service (DCIS).

Tso soon made contact with the undercover agent, who was stationed in Phoenix, Arizona. He sent the agent, who claimed to work for the distribution company, a purchase order for the chips. DCIS checked the information Tso provided for Metech ICT against the UK corporate registration database. No one named John Anderson worked there. The address Tso provided was for a restaurant he ran in Liverpool.

The undercover agent agreed to sell 200 chips to Tso, who said he planned to pick them up in the United States and personally take them back to the UK. Tso said he would wire the undercover agent 50% of the payment up front, and the remainder upon delivery, transferring his own money from Hong Kong to the UK and then on to the United States, claiming the nonexistent John Anderson would reimburse him later.

***

In what Eftimiades describes as a “whole of society approach,” the Chinese security services deploy overseas agents who range from trained intelligence officers to rank amateurs who engage in comically bad spycraft. Non-professional “freelance” operatives like Tso tend to do it for the money, and often become involved through personal networks.

It’s all part of a worldwide program to steal information that will increase Chinese power economically and politically, former CIA officer Joseph Wippl told Quartz. “It is not limited to the United States, although we are the priority No. 1 target,” he said.

To Bangkok and back

In November 2018, some 10 months after Tso’s original email to Cobham, the undercover agent met him at the Bangkok Intercontinental Hotel to finalize the deal.

Tso, who brought his wife to the rendezvous, asked the agent to provide him with a set of false invoices reflecting a total price of $10,000 for the $550,000 worth of chips, saying it would help him avoid any potential problems with customs if he were stopped.

That’s when Tso admitted the chips were ultimately destined for China. Tso also confided to the undercover agent that the money he sent from the UK had in fact originated in Hong Kong and China, and that Metech ICT was a front company he had set up.

As long as they were “both protected,” the agent told Tso this was fine. Tso called a female contact he referred to as “Big Sister,” who told the undercover agent she planned to meet Tso in the UK and hand-carry the chips from there to Hong Kong. “Other individuals” would transport the chips from Hong Kong to China, Big Sister said.

The following month, Tso wired a payment of $275,000 to the undercover agent’s bank account, which was $10,000 more than the actual balance due. Tso, who had given his customers a purposely inflated price, was planning to keep the extra money for himself and asked to be reimbursed when he arrived in Phoenix to pick up the chips.

***

On January 14, 2019, Tso flew from Liverpool to Philadelphia, where he boarded a connection to Phoenix. A day later, he met with the undercover agent, who gave Tso $10,000 in cash and a box he said contained the 200 radiation-hardened chips they had discussed. The agent reminded Tso that it would be illegal to bring the chips from the UK to China, to which Tso responded that he “hoped” the chips would stay in the UK but that “the less he knew about the ultimate end user, the better.”

The next day the undercover agent drove Tso to Phoenix’ Sky Harbor airport. He was intercepted by US Customs and Border Protection as he attempted to board his flight.

Tso pleaded guilty to conspiracy charges a year later, just before his trial was set to begin. He is scheduled to be sentenced April 13, and faces up to 20 years in prison and a $1 million fine.

Tso’s lawyer, Seth Apfel, declined to comment, as did the federal prosecutors handling the proceedings.

John Sipher, who spent 28 years in the CIA’s National Clandestine Service before retiring in 2014, told Quartz that the Tso case “mirrors dozens of other cases and is likely the tip of the iceberg.”

This time, Tso’s unlikely story for how the chips would be used gave away his intentions before it was too late, said Eftimiades. “When someone’s putting $200,000 out, not asking for financing, and they don’t know the [real] use of the chip, it becomes apparent very quickly that this is a lie.”

Harvard Arrests, Coronavirus and China, Related?

One has to apply some critical thinking here. The money clue –> Unbeknownst to Harvard University beginning in 2011, Lieber became a “Strategic Scientist” at Wuhan University of Technology (WUT) in China and was a contractual participant in China’s Thousand Talents Plan from in or about 2012 to 2017. Wuhan is ground-zero for the virus. The United States along with the Center for Disease Control has offered substantial assistance to China providing expertise including microbiology, immunology and virology relating directly to the coronavirus.  but China refused. Hummm. The U.S. patent office has approved several patent applications relating to the virus, the most recent in 2008 from what appears to be from a team from Vanderbilt University.

A close friend found another interesting event recently held event from October 2019 that was hosted in New York by Johns Hopkins Center for Health Security, the World Economic Forum and the Bill and Melinda Gates Foundation called Event 201. 130 people attended to discuss pandemics. A good takeaway document discussing pandemic communications is found here. Note we are not getting all the real details from China as Beijing controls all media. Further, there will be false posts and articles in various forms in world media, so do your work.

5e2ef8505bc79c4a4842bf93 Useful map details and updates found here.

You be the judge.

 

Department of Justice
Office of Public Affairs

Tuesday, January 28, 2020

Harvard University Professor and Two Chinese Nationals Charged in Three Separate China Related Cases

The Department of Justice announced today that the Chair of Harvard University’s Chemistry and Chemical Biology Department and two Chinese nationals have been charged in connection with aiding the People’s Republic of China.

Dr. Charles Lieber, 60, Chair of the Department of Chemistry and Chemical Biology at Harvard University, was arrested this morning and charged by criminal complaint with one count of making a materially false, fictitious and fraudulent statement.  Lieber will appear this afternoon before Magistrate Judge Marianne B. Bowler in federal court in Boston, Massachusetts.

Yanqing Ye, 29, a Chinese national, was charged in an indictment today with one count each of visa fraud, making false statements, acting as an agent of a foreign government and conspiracy. Ye is currently in China.

Zaosong Zheng, 30, a Chinese national, was arrested on Dec. 10, 2019, at Boston’s Logan International Airport and charged by criminal complaint with attempting to smuggle 21 vials of biological research to China.  On Jan. 21, 2020, Zheng was indicted on one count of smuggling goods from the United States and one count of making false, fictitious or fraudulent statements.  He has been detained since Dec. 30, 2019.

Dr. Charles Lieber

According to court documents, since 2008, Dr. Lieber who has served as the Principal Investigator of the Lieber Research Group at Harvard University, which specialized in the area of nanoscience, has received more than $15,000,000 in grant funding from the National Institutes of Health (NIH) and Department of Defense (DOD).  These grants require the disclosure of significant foreign financial conflicts of interest, including financial support from foreign governments or foreign entities. Unbeknownst to Harvard University beginning in 2011, Lieber became a “Strategic Scientist” at Wuhan University of Technology (WUT) in China and was a contractual participant in China’s Thousand Talents Plan from in or about 2012 to 2017.  China’s Thousand Talents Plan is one of the most prominent Chinese Talent recruit plans that are designed to attract, recruit, and cultivate high-level scientific talent in furtherance of China’s scientific development, economic prosperity and national security.  These talent programs seek to lure Chinese overseas talent and foreign experts to bring their knowledge and experience to China and reward individuals for stealing proprietary information.  Under the terms of Lieber’s three-year Thousand Talents contract, WUT paid Lieber $50,000 USD per month, living expenses of up to 1,000,000 Chinese Yuan (approximately $158,000 USD at the time) and awarded him more than $1.5 million to establish a research lab at WUT.  In return, Lieber was obligated to work for WUT “not less than nine months a year” by “declaring international cooperation projects, cultivating young teachers and Ph.D. students, organizing international conference[s], applying for patents and publishing articles in the name of” WUT.

The complaint alleges that in 2018 and 2019, Lieber lied about his involvement in the Thousand Talents Plan and affiliation with WUT.  On or about, April 24, 2018, during an interview with investigators, Lieber stated that he was never asked to participate in the Thousand Talents Program, but he “wasn’t sure” how China categorized him.  In November 2018, NIH inquired of Harvard whether Lieber had failed to disclose his then-suspected relationship with WUT and China’s Thousand Talents Plan.  Lieber caused Harvard to falsely tell NIH that Lieber “had no formal association with WUT” after 2012, that “WUT continued to falsely exaggerate” his involvement with WUT in subsequent years, and that Lieber “is not and has never been a participant in” China’s Thousand Talents Plan.

Yanqing Ye

According to the indictment, Ye is a Lieutenant of the People’s Liberation Army (PLA), the armed forces of the People’s Republic of China and member of the Chinese Communist Party (CCP).  On her J-1 visa application, Ye falsely identified herself as a “student” and lied about her ongoing military service at the National University of Defense Technology (NUDT), a top military academy directed by the CCP.  It is further alleged that while studying at Boston University’s (BU) Department of Physics, Chemistry and Biomedical Engineering from October 2017 to April 2019, Ye continued to work as a PLA Lieutenant completing numerous assignments from PLA officers such as conducting research, assessing U.S. military websites and sending U.S. documents and information to China.

According to court documents, on April 20, 2019, federal officers interviewed Ye at Boston’s Logan International Airport. During the interview, it is alleged that Ye falsely claimed that she had minimal contact with two NUDT professors who were high-ranking PLA officers.  However, a search of Ye’s electronic devices demonstrated that at the direction of one NUDT professor, who was a PLA Colonel, Ye had accessed U.S. military websites, researched U.S. military projects and compiled information for the PLA on two U.S. scientists with expertise in robotics and computer science.  Furthermore, a review of a WeChat conversation revealed that Ye and the other PLA official from NUDT were collaborating on a research paper about a risk assessment model designed to decipher data for military applications.  During the interview, Ye admitted that she held the rank of Lieutenant in the PLA and admitted she was a member of the CCP.

Zaosong Zheng

In August 2018, Zheng entered the United States on a J-1 visa and conducted cancer-cell research at Beth Israel Deaconess Medical Center in Boston from Sept. 4, 2018, to Dec. 9, 2019. It is alleged that on Dec. 9, 2019, Zheng stole 21 vials of biological research and attempted to smuggle them out of the United States aboard a flight destined for China.  Federal officers at Logan Airport discovered the vials hidden in a sock inside one of Zheng’s bags, and not properly packaged.  It is alleged that initially, Zheng lied to officers about the contents of his luggage, but later admitted he had stolen the vials from a lab at Beth Israel.  Zheng stated that he intended to bring the vials to China to use them to conduct research in his own laboratory and publish the results under his own name.

The charge of making false, fictitious and fraudulent statements provides for a sentence of up to five years in prison, three years of supervised release and a fine of $250,000.  The charge of visa fraud provides for a sentence of up to 10 years in prison, three years of supervised release and a fine of $250,000.  The charge of acting as an agent of a foreign government provides for a sentence of up to 10 years in prison, three years of supervised release and a fine of $250,000. The charge of conspiracy provides for a sentence of up to five years in prison, three years of supervised release and a fine of $250,000.  The charge of smuggling goods from the United States provides for a sentence of up to 10 years in prison, three years of supervised release and a fine of $250,000.  Sentences are imposed by a federal district court judge based upon the U.S. Sentencing Guidelines and other statutory factors.

Assistant Attorney General for National Security John C. Demers, United States Attorney Andrew E. Lelling; Special Agent in Charge of the FBI Boston Field Division Joseph R. Bonavolonta; Michael Denning, Director of Field Operations, U.S. Customs and Border Protection, Boston Field Office; Leigh-Alistair Barzey, Special Agent in Charge of the Defense Criminal Investigative Service, Northeast Field Office; Philip Coyne, Special Agent in Charge of the U.S. Department of Health and Human Services, Office of Inspector General; and William Higgins, Special Agent in Charge of the U.S. Department of Commerce, Office of Export Enforcement, Boston Field Office made the announcement. Assistant U.S. Attorneys B. Stephanie Siegmann, Jason Casey and Benjamin Tolkoff of Lelling’s National Security Unit are prosecuting these cases with the assistance of trial attorneys William Mackie and David Aaron at the National Security Division’s Counterintelligence and Export Control Section.

The details contained in the charging documents are allegations. The defendants are presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law.

These case are part of the Department of Justice’s China Initiative, which reflects the strategic priority of countering Chinese national security threats and reinforces the President’s overall national security strategy. In addition to identifying and prosecuting those engaged in trade secret theft, hacking and economic espionage, the initiative will increase efforts to protect our critical infrastructure against external threats including foreign direct investment, supply chain threats and the foreign agents seeking to influence the American public and policymakers without proper registration.

 

Daily Gas Pump Prices are Based on the Strait of Hormuz

Experts said Iranian officials are trying to demonstrate to the U.S. and its allies that the Islamic Republic is able to push back and gain leverage against the Trump administration’s “maximum pressure” policy, which intensified after President Trump pulled the U.S. out of the landmark nuclear deal in May 2018 and reimposed crippling sanctions, making it difficult for Iran to export oil, the foundation of the country’s economy.

China, Russia and leading Western European countries have sought ways around the U.S. sanctions, but it has been difficult to bypass them.

“The message that Iran is sending is that it is capable of making international waters unsafe not just for the U.S., but for international trade,” said Reza H. Akbari, a program manager and Iran expert at the Institute for War and Peace Reporting.

These are the reasons for oil tanker seizures and attacks by Iranian limpet mines.

Tensions between the West and Iran bubbled to a historic height in recent days after the assassination of top Iranian military commander Qassem Soleimani and Tehran bombed two Iraqi bases that housed US troops.

They have sparked fears of wider US-Iran attacks in the greater region, which could take place in and around the Strait of Hormuz, a narrow body of water linking the Persian Gulf to the Gulf of Oman, which feeds into Arabian Sea and the rest of the world.

strait of hormuz jan 2020

A satellite image of marine traffic passing through the Strait of Hormuz as on January 9, 2020.MarineTraffic.com

While Iran’s leaders claim to have “concluded” their revenge for Soleimani’s death — and President Donald Trump appears to believe them — many regional experts and diplomatic sources say Iran could unleash other modes of attack, which include unleashing allied militias to disrupt the Middle East.

One strategy could include Iran closing the Strait of Hormuz, which would stop oil tanker traffic, disrupt global oil supply, and send prices shooting up.

Here’s what you need to know about this valuable strait.

Some 21 million barrels of crude and refined oil pass through the strait every day, the EIA said, citing 2018 statistics.

That’s about one-third of the world’s sea-traded oil, or $1.2 billion worth of oil a day, at current oil prices. The majority of Saudi Arabia’s crude exports pass through the Strait of Hormuz, meaning much of the oil-dependent economy’s wealth is situated there. Saudi state-backed oil tanker Bahri temporarily suspended its shipments through the strait after Iran’s missile strikes in Iran, the Financial Times reported.

Last June Iran shot down a US drone flying near the strait, and a month later a US warship — USS Boxer — also shot down an Iranian drone in the same area.

Shortly after Iran’s drone attack, President Donald Trump questioned the US’ presence in the region, and called on China, Japan, and other countries to protect their own ships passing through the Strait of Hormuz.

Trump noted that much of China and Japan’s oil flow through the strait, and added: “So why are we protecting the shipping lanes for other countries (many years) for zero compensation.”

While a large proportion — 76% — of oil flowing through the chokepoint does end up in Asian countries, the US still imports more than 30 million barrels of oil a month from countries in the Middle East, Business Insider has reported, citing the EIA.

That’s about $1.7 billion worth of oil, and 10% of the US’s total oil imports per month.

Iranian leaders, who have also vowed retaliation for the death of Soleimani, have threatened to close down the strait multiple times in the past.

If Iran followed through with these threats, it would likely cause huge disruption to the global oil trade. As the strait is so narrow, any sort of interference in tanker traffic could decrease the world’s oil supply, and send prices shooting up.

Global oil prices have proven vulnerable to tensions between Iran and the West before. After the Trump administration said in April 2019 it would stop providing sanctions waivers to countries who purchase Iranian oil, prices rose to their highest level since November the year before, Axios reported.

How likely is Iran to shut down the strait?

Iran is more likely to disrupt traffic in the Strait of Hormuz than to engage in an all-out conventional war with the US, which is much stronger militarily.

But doing so comes with high costs to Iran.

To close down the entire strait, Iran would have to place at least 1,000 mines with submarines and surface craft along the chokepoint, security researcher Caitlin Talmadge posited in a 2009 MIT study. Such an effort could take weeks, the study added. (taken in part from here)

Locked Shields Versus Iran

Since the death of several Iranian warlords including Qassim Soleimani, the United States has dispatched more military personnel to the Middle East. The Patriot missile batteries scattered in the region including in Bahrain are now at the ready. When it comes to cyber operations inside Iran, little is being discussed as a means of retribution against the United States. Iran does have cyber warfare capabilities and does use them.

It has been mentioned in recent days that President Trump has been quite measured in responding to Iran’s various attacks including striking Saudi oil fields, hitting oil tankers and shooting down one of the drones operated by the United States. In fact, the United States did respond directly after the downing of our drone by inserting an effective cyber-attack against Iran’s weapons systems by targeting the controls of the missile systems.

APT33 phishing Read details from Security Affairs.

Iran has an estimated 100,000 volunteer cyber trained operatives that has been expanding for the last ten years led by the Basij, a paramilitary network. The cyber unit known for controlling the Iranian missile launchers is Sepehr 110 is a large target of the United States and Israel. Iran also mobilizes cyber criminals and proxy networks including another one known as OilRig.

In 2018, the United States charged 9 Iranians (Mabna Hackers) for conducting massive cyber theft, wire fraud and identity theft that affected hundreds of universities, companies and other proprietary entities.

Due to a more global cyber threat by Iran known to collaborate with North Korea, China and Russia, NATO has been quite aggressive in cyber defense operations via the Cooperative Cyber Defense Center of Excellence applying the Locked Shields Program.

Not too be lost in the cyber threat conditions, Iran also uses their cyber team to blast out propaganda using social media platforms. If this sounds quite familiar, it is. The Russian propaganda operations manual is also being used by Iran. The bots and trolls are at work in Europe to keep France, Britain and Germany connected to the Iranian nuclear deal and to maintain trade operations with Iran including diplomatic operations. There are fake Iranian and Russian accounts still today all over Twitter and Facebook for which Europe is slow to respond if at all.

Meet APT33, which the West calls the Iranian hacking crew(s), the other slang name is Elfin. APT33 is not only hacking, but it is performing cyber-espionage as well. There are many outside government organizations researching and decoding Iran’s cyber operations that cooperate with inside U.S. government cyber operations located across the globe that also cooperate with NATO.

Recorded Future is one such non-government pro-active cyber operation working on Iran. These include attributions of cyber attacks by Iran against Saudi Arabia as well as the West by decoding phishing campaigns, relationships, malware and webshells and security breeches.

Recent published results include in part:

Nasr Institute and Kavosh Redux

In our previous report, “Iran’s Hacker Hierarchy Exposed,” we concluded that the exposure of one APT33 contractor, the Nasr Institute, by FireEye in 2017, along with our intelligence on the composition and motivations of the Iranian hacker community, pointed to a tiered structure within Iran’s state-sponsored offensive cyber program. We assessed that many Iranian state-sponsored operations were directed by the Iranian Revolutionary Guard Corps (IRGC) or the Ministry of Intelligence and Security (MOIS).

According to a sensitive Insikt Group source who provided information for previous research, these organizations employed a mid-level tier of ideologically aligned task managers responsible for the compartmentalized tasking of over 50 contracting organizations, who conducted activities such as vulnerability research, exploit development, reconnaissance, and the conducting of network intrusions or attacks. Each of these discrete components, in developing an offensive cyber capability, were purposefully assigned to different contracting groups to protect the integrity of overarching operations and to ensure the IRGC and/or MOIS retained control of operations and mitigated the risk from rogue hackers. Read more here in detail from a published summary of 6 months ago.

China’s Prison Labor Camps Proven

Primer:

The United States gives foreign aid to China. Actually, that is against the law. Hello Pelosi and Schiff. Oh but wait, it is all justified as money to counter those abuses. Anyone trust that actually or has anyone followed that money?

It is packaged this way: U.S. foreign assistance efforts in the PRC aim to promote human rights, democracy, and the rule of law; support sustainable livelihoods, cultural preservation, and environmental protection in Tibetan areas; and further U.S. interests through programs that address environmental problems and pandemic diseases in China. The United States Congress has played a leading role in determining program priorities and funding levels for these objectives. These programs constitute an important component of U.S. human rights policy toward China. Among major bilateral aid donors to China, the United States is the largest provider of nongovernmental and civil society programming, according to data compiled by the Organization for Economic Cooperation and Development.

Based on what abuses Beijing is applying to the freedom fighters in Hong Kong coupled with that of the prison labor camps (500 of them) of the Uighurs, having a trade agreement between the United States and China is an arguable quest at best or is it?

Uyghur Turk exposes torture in Chinese prison

The Uighur internment camps are actually prison labor camps for the Chinese Belt Road Initiative.

A classified blueprint leaked to a consortium of news organizations shows the camps are instead precisely what former detainees have described: Forced ideological and behavioral re-education centers run in secret.

The classified documents lay out the Chinese government’s deliberate strategy to lock up ethnic minorities even before they commit a crime, to rewire their thoughts and the language they speak.

The papers also show how Beijing is pioneering a new form of social control using data and artificial intelligence. Drawing on data collected by mass surveillance technology, computers issued the names of tens of thousands of people for interrogation or detention in just one week.

The documents were given to the International Consortium of Investigative Journalists by an anonymous source. The ICIJ verified them by examining state media reports and public notices from the time, consulting experts, cross-checking signatures and confirming the contents with former camp employees and detainees.

They consist of a notice with guidelines for the camps, four bulletins on how to use technology to target people, and a court case sentencing a Uighur Communist Party member to 10 years in prison for telling colleagues not to say dirty words, watch porn or eat without praying.

The documents were issued to rank-and-file officials by the powerful Xinjiang Communist Party Political and Legal Affairs Commission, the region’s top authority overseeing police, courts and state security. Much more detail here from Associated Press.

After bloody race riots rocked China’s far west a decade ago, the ruling Communist Party turned to a rare figure in their ranks to restore order: a Han Chinese official fluent in Uighur, the language of the local Turkic Muslim minority.

Now, newly revealed, confidential documents show that the official, Zhu Hailun, played a key role in planning and executing a campaign that has swept up a million or more Uighurs into detention camps.

Published in 2017, the documents were signed by Zhu, as then-head of the powerful Political and Legal Affairs Commission of the Communist Party in the Xinjiang region. A Uighur linguist recognized Zhu’s signature scrawled atop some of the documents from his time working as a translator in Kashgar, when Zhu was the city’s top official.

“When I saw them, I knew they were important,” said the linguist, Abduweli Ayup, who now lives in exile. “He’s a guy who wants to control power in his hands. Everything.”

Zhu, 61, did not respond to repeated requests for comment.

Long before the crackdown and despite his intimate familiarity with local culture, Zhu was more hated than loved among the Uighurs he ruled.

He was born in 1958 in rural Jiangsu on China’s coast. In his teens, during China’s tumultuous Cultural Revolution, Zhu was sent to Kargilik county, deep in the Uighur heartland in Xinjiang. He never left.

Zhu joined the Party in 1980 and moved up Xinjiang’s bureaucracy, helming hotspot cities. By the 90s, he was so fluent in Uighur that he corrected his own translators during meetings.

“If you didn’t see him, you’d never imagine he’s Han Chinese. When he spoke Uighur, he really spoke just like a Uighur, since he grew up with them,” said a Uighur businessman living in exile in Turkey, who declined to be named out of fear of retribution.

The businessman first heard of Zhu from a Uighur friend who dealt with the official while doing business. His friend was impressed, describing Zhu as “very capable” — a Han Chinese bureaucrat the Uighurs could work with. But after years of observing Zhu oversee crackdowns and arrests, the businessman soon came to a different conclusion.

“He’s a crafty fox. The really cunning sort, the kind that plays with your brain,” he said. “He was a key character for the Communist Party’s policies to control Southern Xinjiang.”

Ayup, the linguist, met Zhu in 1998, when he came to inspect his township. He was notorious for ordering 3 a.m. raids of Uighur homes, and farmers would sing a popular folk song called ‘Zhu Hailun is coming’ to poke fun at his hard and unyielding nature.

“He gave orders like farmers were soldiers. All of us were his soldiers,” Ayup said. “Han Chinese controlled our homeland. We knew we needed to stay in our place.”

Months after a July 5, 2009 riot left hundreds dead in the region’s capital of Urumqi, Zhu was tapped to replace the city’s chief. Beijing almost always flew in officials from other provinces for the job, in part as training for higher posts. But central officials on a fact-finding mission in Urumqi concluded that Zhu, seen as tougher than his predecessor, needed to take charge.

“They were super unhappy,” said a Uighur former cadre who declined to be named out of fear of retribution. “It had never happened before, but because locals said he was outstanding at maintaining stability, he was snatched up and installed as Urumqi Party Secretary.”

Upon appointment, Zhu spent three days holed up in the city’s police command, vowing to tighten the government’s grip. Police swept through Uighur neighborhoods, brandishing rifles and rounding up hundreds for trial. Tens of thousands of surveillance cameras were installed.

But instead of healing ethnic divisions, the crackdown hardened them. Matters came to a head in April 2014, when Chinese President Xi Jinping came to Xinjiang on a state visit. Just hours after his departure, bombs tore through an Urumqi train station, killing three and injuring 79.

Xi vowed to clamp down even harder.

In 2016, Beijing appointed a new leader for Xinjiang — Chen Quanguo. Chen, whose first name means “whole country”, had built a reputation as a hard-hitting official who pioneered digital surveillance tactics in Tibet.

Zhu was his right-hand man. Appointed head of the region’s security and legal apparatus, Zhu laid the groundwork for an all-seeing state surveillance system that could automatically identify targets for arrest. He crisscrossed the region to inspect internment centers, police stations, checkpoints and other components of an emerging surveillance and detention apparatus.

After Chen’s arrival, Uighurs began disappearing by the thousands. The leaked documents show that Zhu directed mass arrests, signing off on notices ordering police to use digital surveillance to investigate people for having visited foreign countries, using certain mobile applications, or being related to “suspicious persons”. State television shows that Zhu continued on his relentless tour of Xinjiang’s camps, checkpoints, and police stations, personally guiding the mass detention campaign.

Zhu stepped down last year after turning 60, in line with traditional practice for Communist Party cadres of Zhu’s rank. Chen remains in his post.

“Chen Quanguo came in the name of the Party,” said the Uighur businessman. “Zhu knows how to implement, who to capture, what to do.”