Feeds

Nortel helping China to overhaul state surveillance architecture

Human rights activists cry foul

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

Human rights activists have launched an attack on Nortel Networks, accusing it of contributing to human rights violations in China by helping the country overhaul its ageing surveillance technologies.

The "Great Firewall of China", which controls content entering the country, is failing, largely due to the increased volume of Internet traffic in China, so the Chinese are looking to build a more sophisticated system involving content filtration, and the monitoring of individual users.

That's one of the main conclusion in a report by The International Centre of Human Rights & Democratic Development (ICHRDD) which states: "Old style censorship is being replaced with a massive, ubiquitous architecture of surveillance: the Golden Shield."

"Ultimately the aim is to integrate a gigantic online database with an all-encompassing surveillance network - incorporating speech and face recognition, closed-circuit television, smart cards, credit records, and Internet surveillance technologies," it adds.

Many other Western firms are also involved in the development of China's state security apparatus but Nortel, which like the human rights group, is based in Canada, has come in for particular criticism in ICHRDD's report. Among the Nortel projects singled out for criticism are:


  • Nortel's joint research with Tsinghua University on speech recognition technology, for the purpose of automated surveillance of telephone conversations
  • The Canadian firm's support for FBI plans to develop a common standard to intercept telephone communications, known as CALEA, in conjunction with technology transfer through its joint venture, Guangdong Nortel (GDNT)
  • The promotion of JungleMUX which allows video surveillance data to be transported from remote cameras back to a centralized surveillance point at the Chinese Ministry of Public Security (MPS)
  • The deployment of Nortel's "Personal Internet" suite in Shanghai, "greatly enhancing the ability of Internet service providers to track the communications of individual users"
  • A US$10 million project, involving Nortel, to build a citywide fibre-optic broadband network in Shanghai (OPTera) enabling central authorities to monitor subscribers at the "edge" of the network, principally through the Shasta 5000 firewall.
  • Nortel's integration of face recognition and voice recognition technology in collaboration with AcSys Biometrics, a subsidiary of Canadian firm NEXUS


Nortel is no stranger to controversy with its Personal Internet technology, which was criticised on its announcement in February by consumers activists and anti-junk mail campaigners, and has rejected ICHRDD criticism.

"Nortel Networks categorically rejects in the strongest possible terms the notion that we are collaborating with any government to repress the human rights or democracy of its citizens," a statement by Nortel said.

"Nortel Networks is a longstanding supplier of advanced telecommunications products and technology in China where we have a broad range of customers. Nortel Networks sells the same range of products and solutions in China as we do elsewhere."

This response cut little ice with ICHRDD which believes Nortel's technology will be used to clamp down on political dissent.

On September 28, four Chinese citizens were tried for subversion for participating in an on-line pro democracy forum. The four are but the most recent of several arrests in recent years for Internet-related crimes.

Pacific rim leaders are expected to announce an "anti-terrorism" pact at the APEC summit this week which human rights advocates fear could be used to excuse increased crackdowns on Internet privacy and human rights, particularly in authoritarian states such as China. ®

Related Stories

Nortel helps stalk you on line

External Links

Nortel technology threatens human rights in China (press release by ICHRDD)
China's Golden Shield: Corporations and the Developement of Surveillance Technology in the People's Republic of China (report by ICHRDD)

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.