China Has a Database on Americans, Built From Stolen Data

Commentary

Recent comments from Rep. Chris Stewart (R-Utah) support what The Epoch Times reported more than three years ago, in the article “You’re on File: Exclusive Inside Story on China’s Database of Americans,” published Feb. 26, 2016: The Chinese regime has built a database on Americans, and it is using that database for espionage.

Included in this database are the estimated 23 million records of U.S. federal employees, stolen by Chinese hackers from the Office of Personnel Management (OPM). The FBI revealed the cyberattack on June 4, 2015.

“They can run through those 23 million names in a heartbeat and connect dots in a heartbeat,” Stewart said at a meeting of the Committee on the Present Danger: China, according to The Washington Free Beacon. Stewart, a former U.S. Air Force B-1 bomber pilot, is a member of the House Permanent Select Committee on Intelligence.

“Have we seen evidence that they’ve done that? Absolutely,” he said.

In 2016, an insider in China revealed to The Epoch Times that he helped build a database for the Chinese Communist Party (CCP) that it’s now using to store and use data stolen on Americans. He said this includes the OPM data, and information from other CCP breaches.

Included in the OPM data are evaluations of federal employees for security clearances, which often includes sensitive personal information that a regime such as the CCP could use for blackmail, or other purposes.

According to the insider, the CCP database on Americans is similar in use to its Social Credit System that tracks data on each Chinese citizen, based on almost every trackable element of their lives—including their daily behavior, their connections, and their political stances—and assigns them a score that determines their level of freedom in society.

According to the insider, Chinese spy agencies finished building their system for the database around July 2013.

During the construction of the database system, the CCP brought in a small group of independent software developers from the United States, who worked with Chinese agencies to build and implement the system.

Among the agencies involved, he said, was the 61 Research Institute. The little-known department was under the CCP military’s General Staff Department, Third Department that used to run many of its cyberattack operations (the infamous Unit 61398 was under the Third Department, for example). The CCP has since restructured these operations under its Strategic Support Force.

Another inside source, who formerly worked in a CCP spy agency, revealed details about the 61 Research Institute to The Epoch Times in September 2015. He disclosed that the man in charge of the 61 Research Institute was Maj. Gen. Wang Jianxin, son of Wang Zheng, who was a pioneer of the Chinese Communist Party’s signals intelligence operations under Mao Zedong.

Another son of Wang Zheng was the lieutenant general of the deputy secretary of the CCP Central Guard Bureau, the official guards that protect the Chinese regime’s top leaders at Zhongnanhai. His nephew is Wang Lei Lei, the CEO of one of the top finance companies in China.

The source alleged that, in China, “This family, they control all the communications.”

Recently revealed information helped confirm those claims. It wasn’t until September 2018 that the U.S. government officially confirmed that China was behind the OPM breach. The confirmation was made by White House national security adviser John Bolton.

The source who had disclosed the details on the database on Americans also revealed that, in addition to the 61 Research Institute, various CCP police forces were involved in the program, as well as about six branches of the secret police.

He said the software used by the CCP for the database was originally a big data analytics program for “smart cities.” Among its capabilities were tools to track massive amounts of people, display large records of personal data, and track family members, relations, and background information. Among its key features was its display of data in nodes, which could be sorted and viewed in relation to other data, events, or time frames.

Joshua Philipp is a senior investigative reporter for The Epoch Times.

Views expressed in this article are the opinions of the author and do not necessarily reflect the views of The Epoch Times.

The very fabric of America is under attack …

Our freedoms, our republic, and our constitutional rights have become contested terrain. The Epoch Times, a media committed to truthful, responsible journalism, is a rare bastion of hope and stability in these testing times.

While other media may twist the facts to serve political agendas, we deliver stories while upholding our responsibility to society.

We’ve reported truthfully on the current U.S. administration from the start. We reported on the real possibility of a Trump victory in 2016. We’ve led reporting on the Chinese communist threat since 2000; we have been exposing communist thought in our government, schools, universities, popular culture, and media; and we, like no other media, are rigorously investigating and exposing the unscrupulous agents working to subvert our society.

Stand with us in advancing a truly independent and truthful media—the way a free press was intended to be, as a cornerstone of the Republic. Your contribution allows us to continue piercing through the surface narratives of mainstream media, and provide you with a full picture.

Epoch Times editor-in-chief Jasper Fakkert urges you to support our independent media. We are asking you to help us raise $1 million to support our unique and truthful content.

Every contribution counts, big or small. We sincerely thank you for your continued support and encouragement in these critical times. The Epoch Times is published by The Epoch Times Association, Inc., a 501(c)(3) nonprofit.

Read more at The Epoch Times.

IT'S Time to level up

It's Time to Level Up

BlackOps Partners is committed to protecting your information. Your information will be used in accordance with the applicable data privacy law, our internal policies and our privacy policy. Your information may be stored and processed by BlackOps and its affiliates in countries outside your country of residence, but wherever your information is processed, we will handle it with the same care and respect for your privacy.