Feeds

Cisco drives epic Chinese surveillance network, says report

Half million Big Brother cams

Choosing a cloud hosting partner with confidence

Cisco and other western companies are reportedly working with the Chinese government to install a network of one half-million surveillance cameras in the rapidly growing commercial and industrial metropolis, Chongqing.

Citing people familiar with the deal, The Wall Street Journal reports (subscription required) that Cisco will supply the networking equipment the massive surveillance system.

The government of Chongqing – a city on the Yangtze river of between 12 and 32 million souls, depending on how you extend the metropolitain outline – declined the WSJ's request for comment. So did the country's Ministry of Public Security and State Council Information Office.

Little has been published in the West about the surveillance-camera network, dubbed "Peaceful Chongqing". However, a notice on Chongqing Currents, a city-news site, reports that a Peaceful Chongqing "mobilization and deployment meeting" was held this March. The goal of the surveillance project is described as being to make Chongqing "a city with good security, harmonious peace and safety for investment, and to provide stable society for promotion of the harmonious urban and rural development."

Network-surveillance infographic

The Wall Street Journal's low-tech explanation of high-tech surveillance networks such as "Peaceful Chongqing"

Perhaps interestingly – and perhaps not – Google's link to the original Peaceful Chongqing reference in Chongqing Currents now merely turns up a Chinese-language 404-error page. The reference to "good security, harmonious peace and safety for investment" is from a Google-cached version.

It's against US law to provide the Chinese government with crime-control products, due to legislation passed soon after the uprising that the world came to know as Tiananmen Square was crushed by Chinese troops. A more far-reaching and punative bill, "The United States-China Act of 1991", was passed by the House and Senate, but vetoed by then-President George H. W. Bush.

The difficulty with the law that did make it past Dubya's daddy's desk is, of course, determining what it covers and what it doesn't. While the WSJ notes that, for example, fingerprinting equipment clearly falls under the law's strictures, networking equipment in support of a web of 500,000 surveillance cameras that train their cyclopian eyes on the public is a different matter.

Cisco, which first established Chinese operations in 1994 and now has over 3,000 employees in the country, flatly denies that the company has stepped over the line in the Middle Kingdom. "Cisco does not supply equipment to China that is customized in any way to facilitate ... surveillance of users," wrote Cisco general counsel Mark Chandler in a post entitled "Cisco Supports Freedom of Expression, an Open Internet and Human Rights" on the company blog last month.

Chandler's stand is entirely plausible – even though "customized" is a bit of a wiggle word. That said, a repressive government with a history and practice of suppressing dissent and monitoring its citizens' behavior can turn even as seemingly innocuous an item as a Cat6 patch panel into a supporting player in Big Brother's telescreen future.

Peaceful Chongqing is schedule to go live "over the next two to three years," the WSJ reports. ®

Remote control for virtualized desktops

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.