Case Study 10.1: The Uyghur Surveillance State — Technology, Ethnicity, and Human Rights
Overview
The surveillance architecture deployed in China's Xinjiang Autonomous Region against the Uyghur population represents the most technically sophisticated, ethnically targeted, and extensively documented case of what might be called "total surveillance" in the contemporary world. This case study examines the Xinjiang system in greater depth than the chapter's main text, drawing on the work of researchers who have accessed leaked government documents, satellite imagery, corporate records, and the testimonies of former residents. It situates Xinjiang within the chapter's framework of authoritarian surveillance and asks what this extreme case reveals about the trajectory of surveillance technology — and about what happens when surveillance systems are deployed without any of the democratic constraints that partially govern their use elsewhere.
Building the Architecture: The Post-2017 Escalation
While surveillance in Xinjiang predated 2017, the current system's core architecture was built rapidly following a wave of violence in 2014 and a significant internal policy decision in 2017 under then-Xinjiang Party Secretary Chen Quanguo. Chen had previously served in Tibet, where he had implemented a checkpoint and surveillance infrastructure; in Xinjiang, he implemented the same approach at dramatically larger scale with more advanced technology.
The speed of construction was observable through satellite imagery. Researchers at the Australian Strategic Policy Institute (ASPI) analyzed satellite images and identified more than 380 facilities that they characterized as detention centers — facilities that did not exist or were much smaller before 2017 and grew rapidly thereafter. The construction patterns showed enclosed compounds with security perimeters, guard towers, and internal security features inconsistent with ordinary educational or vocational facilities.
Simultaneously, contracts from Chinese security companies and technology suppliers revealed the procurement of equipment specifically designed for the Xinjiang system: police-facing monitoring apps, checkpoint hardware, camera systems with facial recognition, and the data integration platforms connecting them.
The Experience from Inside: Testimony and Documentation
The most human-level understanding of Xinjiang surveillance comes from the testimony of former residents who have left China — primarily Uyghurs who emigrated before 2017, family members who left after the system's intensification, or those who were abroad when the system was installed.
Former residents describe a life organized around surveillance points:
At home: Neighborhood informants file regular reports. Families are assigned "relatives" — Han Chinese government workers who stay with Uyghur families for periods and report on household practices (prayer, fasting during Ramadan, language spoken, media consumed).
On the street: Moving through neighborhoods requires passing through spaced checkpoints with biometric readers. Uyghur residents, but not Han residents, must stop and scan; Han residents typically pass through freely. The checkpoint experience is constant — every entrance to a neighborhood, every public building, every gas station and bank.
On the phone: The Jingjia app must be installed; its permissions include access to contacts, messages, call logs, and location. The Wi-Fi Probe — a separate piece of equipment sometimes encountered at checkpoints — can extract data from nearby phones without owner interaction.
At religious sites: Mosques are equipped with cameras and face-scanners at entrances. The practice of prayer and religious study has been restricted; attendance is monitored. Religious practice outside officially sanctioned contexts is treated as an indicator of extremism.
The QR code system: Each resident's "threat level" is encoded in a color-coded QR code. Green means largely free movement; yellow means restrictions and potential investigation; red means immediate police attention. The code can change based on IJOP flags that the individual may not know have been generated.
The Corporate Dimension
The Xinjiang surveillance architecture was not built by the state alone. It was built in significant part by Chinese technology companies — and the global business relationships of those companies connected Western capital and components to the system.
Hikvision and Dahua — the world's two largest video surveillance equipment companies — supplied cameras and integrated systems to Xinjiang authorities. Both companies were added to U.S. export control lists in 2019, and to U.S. sanction lists in subsequent years, based on their Xinjiang connections. Both companies had, prior to their blacklisting, received investment from Western pension funds and institutional investors.
SenseTime and Megvii (Face++) — Chinese AI companies whose facial recognition software powers aspects of the Xinjiang system — were also added to U.S. entity lists. Both had received investment from U.S. venture capital firms.
The component dimension: Western component manufacturers supplied chips, sensors, and other hardware that were incorporated into Xinjiang surveillance systems. Some of these supply chains were identified through ASPI's supply chain research; some manufacturers subsequently restricted sales to Chinese entities involved in Xinjiang surveillance.
The corporate dimension illustrates a dimension of authoritarian surveillance that is rarely foregrounded: the supply chains of authoritarian surveillance are often global, and the capital that finances authoritarian surveillance infrastructure has often flowed from democratic-country institutional investors seeking returns in Chinese technology markets.
International Legal Framework: What Applies?
The international legal framework for assessing Xinjiang surveillance involves several bodies of law:
International human rights law. The International Covenant on Civil and Political Rights (ICCPR), to which China is a signatory, protects freedom of religion, freedom of movement, freedom from arbitrary detention, and equality before the law. The UN Human Rights Committee has characterized mass arbitrary detention as incompatible with ICCPR obligations. China's position is that security necessity justifies derogations from these protections.
Convention Against Torture (CAT). Testimony from former detainees has described physical abuse, sleep deprivation, and psychological coercion in detention facilities. The UN Committee Against Torture has raised concerns based on this testimony; China disputes the testimony.
Genocide Convention. Several governments, including the United States, Canada, the Netherlands, and the United Kingdom's parliament, have characterized Chinese treatment of Uyghurs as genocide under the 1948 Genocide Convention. The Convention's Article 2 defines genocide to include "measures intended to prevent births" and "forcibly transferring children of the group to another group" — both of which have been documented in Xinjiang, in addition to mass detention. China denies that its actions meet the genocide definition.
The UN High Commissioner for Human Rights Assessment (2022). After years of delay, the UN Human Rights Office released an assessment concluding that "serious human rights violations have been committed in the XUAR [Xinjiang Uyghur Autonomous Region]" and that these "may constitute international crimes, in particular crimes against humanity."
What This Case Tells Us About Surveillance Technology
The Xinjiang case provides a uniquely comprehensive view of what surveillance technology can accomplish when deployed without any democratic constraint against a specific population. Several observations emerge from this examination:
Technology amplifies existing power asymmetries. The Uyghur population in Xinjiang was already subject to political and legal discrimination before the advanced surveillance system was built. The surveillance technology did not create the power asymmetry — it amplified and systematized it, enabling management of an ethnic minority population at a scale and efficiency that earlier repressive systems could not achieve.
Integration is the key capability. Individual surveillance components — cameras, databases, phone monitoring — are used in many contexts. What makes Xinjiang distinctive is the integration: IJOP connects all of these streams, enabling algorithmic analysis that can identify flagged individuals from any of multiple data sources simultaneously. The integration is the surveillance advance, not any single technology.
"Security" justifications for surveillance are infinitely expandable. The Chinese government's justification for Xinjiang surveillance is counterterrorism and stability maintenance. These justifications are applied to surveillance of religious practice, family relationships, movement, and cultural expression — things that are not security threats by any reasonable analysis. The surveillance apparatus expands to fill the definition of "security threat" provided by those who control it.
The suppression of counter-surveillance is essential to authoritarian surveillance function. In democratic contexts, surveillance programs are revealed by journalists, contested by civil society, and challenged in courts. In Xinjiang, journalists and researchers are denied access; former residents who speak about their experience face pressure on family members remaining in China; the organizations capable of mounting legal challenges do not exist within the surveillance perimeter.
Discussion Questions
-
The corporate dimension of Xinjiang surveillance — Chinese technology companies whose products power the system, Western investors who financed those companies, Western component manufacturers whose chips are incorporated into surveillance hardware — creates a complex ethical landscape. What responsibilities, if any, do Western investors, component manufacturers, and technology companies have regarding the ultimate uses of the products and capital they supply? What does "responsible investment" mean in this context?
-
The international legal characterization of China's treatment of Uyghurs ranges from "serious human rights violations" (UN Human Rights Office) to "genocide" (multiple national governments). What are the legal and political implications of the different characterizations? Does the appropriate legal characterization matter for the policy responses available? What prevents the international community from acting on the UN's conclusion that international crimes have been committed?
-
The chapter's main text describes the Xinjiang surveillance architecture using the language of surveillance studies: IJOP as a panoptic system, the checkpoint infrastructure as a form of social sorting, the QR code as a visibility asymmetry tool. Apply these analytical frameworks to the material in this case study. Do they adequately capture what the Xinjiang system is doing? What concepts, if any, does the system require that surveillance studies' existing vocabulary cannot provide?
-
Former Uyghur residents describe a daily life organized around surveillance points — where to go, what to carry, what app to have installed, what color QR code to be displaying. This is a different experience of surveillance than the ambient awareness Jordan has on their campus walk. What is the difference? Is it quantitative (more intense surveillance) or qualitative (a different kind of surveillance relationship between individual and state)?
-
The case study notes that the Uyghur population faced political discrimination before the advanced surveillance system was built, and that the surveillance amplified existing power asymmetries. Does this change the analysis of the surveillance technology's role? Is the surveillance system the cause of harm in Xinjiang, or is it a particularly powerful instrument of harm whose causes are political?
-
If Western governments — including the United States — were to adopt emergency legislation in response to a major terrorist attack that included: (a) mandatory biometric registration of all members of a specific religious group; (b) algorithmic risk scoring based on religious practice and association; (c) travel restrictions triggered by algorithmic flags. At what point would this differ from Xinjiang's system? What specific features of Xinjiang's architecture would not (yet) be present? What institutional constraints would need to be already weakened for such legislation to pass?
Case Study 10.1 | Chapter 10: Authoritarianism and Total Surveillance | Part 2: State Surveillance