{"id":91375,"date":"2025-11-25T12:00:00","date_gmt":"2025-11-25T09:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=91375"},"modified":"2025-12-04T06:47:01","modified_gmt":"2025-12-04T03:47:01","slug":"exporting-the-cudgel","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/exporting-the-cudgel\/","title":{"rendered":"\u00a0How China&#8217;s Next-Gen DPI Powers Global Digital Control"},"content":{"rendered":"<p>Leaked data confirm that Beijing has shifted from domestic censorship to the active export of control tools. Chinese contractors are delivering turnkey infrastructure to suppress dissent in <a href=\"https:\/\/forklog.com\/en\/news\/just-add-water-pakistan-between-a-crypto-dream-and-hard-reality\">Pakistan<\/a>, Ethiopia and <a href=\"https:\/\/forklog.com\/en\/news\/myanmars-digital-slavery-inside-the-scam%e2%80%91factory-network\">Myanmar<\/a>.<\/p>\n<p>The main takeaway from the recent leaks, however, is not political but personal: the vulnerability of every user\u2019s privacy to a new generation of deep packet inspection (<a href=\"https:\/\/ru.wikipedia.org\/wiki\/Deep_packet_inspection\" target=\"_blank\" rel=\"noopener\" title=\"\">DPI<\/a>).<\/p>\n<p>ForkLog examined the leaked documents of Chinese technology companies Geedge Networks and KnownSec.<\/p>\n<h2 class=\"wp-block-heading\">Anatomy of the leak<\/h2>\n<p>In the autumn two large troves entered the public domain. The first\u2014100,000 documents from <a href=\"https:\/\/interseclab.org\/research\/the-internet-coup\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Geedge Networks<\/a>, a firm specialising in network monitoring and censorship. The second\u201412,000 files from <a href=\"https:\/\/www.epochtimes.com\/gb\/25\/11\/13\/n14635466.htm\" target=\"_blank\" rel=\"noopener\" title=\"\">KnownSec<\/a>, which is linked to China\u2019s state security.<\/p>\n<p>The dump offers a rare look under the hood of the cyber\u2011surveillance industry. Where experts once merely suspected export versions of the Great Chinese Firewall, they now have technical specifications, architecture and named clients.<\/p>\n<p>Geedge Networks is not just an IT company. It is closely tied to MESA Lab (a state laboratory in China) and to Fang Binxing, often called the father of the Chinese firewall. The leaks show that tools honed for years on China\u2019s population have been packaged into a commercial product for overseas sale.<\/p>\n<h2 class=\"wp-block-heading\">The Great Firewall in a box<\/h2>\n<p>Geedge\u2019s flagship is the Tiangou Secure Gateway (TSG), a hardware\u2013software stack installed in ISPs\u2019 data centres. It can analyse, filter and block traffic at nationwide scale.<\/p>\n<p>Its architecture is modular and highly efficient:<\/p>\n<ol class=\"wp-block-list\">\n<li><strong>Cyber Narrator \u2014 a real-time monitoring system.<\/strong> It records every user action: visited sites, DNS queries, IP addresses, timestamps and data volumes. It is an activity log of an entire population.<\/li>\n<li><strong>TSG Galaxy \u2014 the analytics hub.<\/strong> Data from Cyber Narrator flow here. The system builds user profiles, detects patterns and social graphs.<\/li>\n<li><strong>Tiangou \u2014 the control console<\/strong>. It lets operators (intelligence or police personnel) add keywords to blacklists, and block domains and specific users.<\/li>\n<\/ol>\n<p>The system does not rely only on IP addresses. It uses DPI. If traffic is encrypted (HTTPS), it examines metadata and behavioural patterns to infer the type of information transmitted.<\/p>\n<h2 class=\"wp-block-heading\">The Myanmar case: technology against protest<\/h2>\n<p>The leak confirmed the geography of sales. China is exporting a turnkey model of state control. The documents list project codes for different countries:<\/p>\n<ol class=\"wp-block-list\">\n<li>K18\/K24 (Kazakhstan): active rollout;<\/li>\n<li>P19 (Pakistan): used to police social unrest;<\/li>\n<li>M22 (Myanmar): deployed to suppress protests after the 2021 military coup.<\/li>\n<\/ol>\n<p>The last case is the most telling\u2014confirming the role of Chinese technology in quelling civic discontent. After the coup, the new authorities faced the imperative of controlling the information space.<\/p>\n<p>Geedge documents confirm that the company supplied infrastructure to Myanmar\u2019s providers. The system simultaneously monitors 81 million internet connections.<\/p>\n<p>What the system does in Myanmar:<\/p>\n<ul class=\"wp-block-list\">\n<li>de\u2011anonymisation \u2014 identifying VPN users;<\/li>\n<li>tool blocking \u2014 internal records show Geedge identified and classified 281 popular VPN services (including ExpressVPN) and messengers such as <a href=\"https:\/\/forklog.com\/en\/news\/silicon-tanks-moxie-marlinspike-the-web3-skeptic-behind-signal\">Signal<\/a>;<\/li>\n<li>dynamic filtering \u2014 reports note a shift from \u201cmonitoring\u201d to \u201cactive blocking\u201d of virtually all circumvention tools within months.<\/li>\n<\/ul>\n<p>In Myanmar, Geedge equipment has been found in the data centres of the operator Frontiir and the company Investcom. This shows that dual\u2011use technologies are being embedded directly into civilian telecom infrastructure.<\/p>\n<h2 class=\"wp-block-heading\">Scam centres and the global threat<\/h2>\n<p>In parallel with state snooping, the threat from criminal groups exploiting the same grey zones is growing. The region abounds in scam centres\u2014closed compounds from which fraudsters target users worldwide.<\/p>\n<p>The United States has already begun to target this infrastructure, issuing a warrant to seize Starlink terminals used by scammers in Myanmar. Google, for its part, <a href=\"https:\/\/blog.google\/outreach-initiatives\/public-policy\/legal-action-and-legislation-fight-scammers\/\" target=\"_blank\" rel=\"noopener\" title=\"\">filed a lawsuit<\/a> against the operators of the Lighthouse platform engaged in phishing.<\/p>\n<p>Yet the combination of weak legal protections and a powerful technical base (supplied from abroad) creates ideal conditions for cybercrime.<\/p>\n<h2 class=\"wp-block-heading\">KnownSec: espionage and cyberweapons<\/h2>\n<p>If Geedge handles \u201cdefence\u201d (censorship), the KnownSec leak reveals offensive capabilities. The documents describe tools for hacking and remote access to devices running Windows, Linux, Android and iOS.<\/p>\n<p>Key findings:<\/p>\n<ol class=\"wp-block-list\">\n<li><strong>Scale of thefts.<\/strong> Hackers claimed to have stolen 95 GB of data from India\u2019s immigration service and 3 TB of call records from South Korea\u2019s LG U Plus. Target lists include organisations in 80 countries.<\/li>\n<li><strong>Tooling. <\/strong>Tools were found to extract chats from Telegram and Signal on compromised Android devices.<\/li>\n<li><strong>Hardware hacks.<\/strong> \u201cTrojan\u201d power banks are mentioned that exfiltrate data from a smartphone when it is plugged in to charge.<\/li>\n<li><strong>Use of AI. <\/strong>Attackers used language models (including Anthropic\u2019s Claude) to write malware and analyse stolen data, circumventing safeguards in neural networks.<\/li>\n<\/ol>\n<h2 class=\"wp-block-heading\">Feedback loop: tested abroad<\/h2>\n<p>The technologies are not only sold\u2014their overseas use feeds back into China to strengthen domestic control. The leaks indicate that Geedge applies lessons from Pakistan and Myanmar to upgrade surveillance systems in Xinjiang and other provinces.<\/p>\n<p>The documents describe the following experimental features:<\/p>\n<ul class=\"wp-block-list\">\n<li>social scoring \u2014 assigning each user a reliability rating. The baseline is 550 points. If the score fails to rise (for example, without providing biometrics), internet access is restricted;<\/li>\n<li>geofencing \u2014 creating virtual boundaries for specific users based on cell\u2011tower data.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">Takeaways for everyone<\/h2>\n<p>News of Chinese cyber\u2011arms exports may seem remote to users outside Myanmar or Pakistan. Yet the leaks puncture several popular myths about digital security:<\/p>\n<ol class=\"wp-block-list\">\n<li><strong>HTTPS and encryption are no panacea. <\/strong>Modern DPI systems like Tiangou can effectively analyse encrypted traffic. Even if they cannot read packet contents, they mine metadata\u2014sizes, request frequency, timing\u2014to identify VPN, Tor or messenger use with high confidence.<\/li>\n<li><strong>A VPN does not make you invisible.<\/strong> Systems such as Cyber Narrator aim not merely to block VPNs but to flag users. The very act of reaching for circumvention tools becomes a trigger that places a user in a \u201csuspicious\u201d group. In Myanmar this led to targeted hunting of those who used particular apps.<\/li>\n<li><strong>Behavioural analysis trumps keywords. <\/strong>Systems have evolved from keyword spotting to building graphs of relationships. Algorithms analyse whom you talk to, which groups you join and how you move. The leak showed plans for a \u201creputation rating\u201d that would automate access blocks based on a blend of behavioural factors rather than a single infraction.<\/li>\n<li><strong>The hardware threat is real. <\/strong>The episode with \u201cspy power banks\u201d is a reminder that danger does not always stem from code. Plugging a device into untrusted chargers or public USB ports carries a real risk of physical compromise.<\/li>\n<\/ol>\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n<p>The KnownSec and Geedge Networks leaks confirm the existence of a global market for \u201cdigital authoritarianism\u201d. China is offering regimes not just equipment but methods of control.<\/p>\n<p>For ordinary users the message is clear: the era of easy circumvention is ending. It is giving way to a contest with algorithms that can spot anomalies in encrypted traffic and assemble a profile from side\u2011channels. Privacy now demands not merely installing an app, but understanding the traces every action leaves online.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For China, the well-oiled supply of control tools to Myanmar, Pakistan and Ethiopia has become a mutually beneficial partnership.<\/p>\n","protected":false},"author":1,"featured_media":91376,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"How and why Beijing helps authoritarian regimes control the internet","creation_source":"ai_translated","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[1144],"tags":[39,133,286],"class_list":["post-91375","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-longreads","tag-censorship","tag-china","tag-society"],"aioseo_notices":[],"amp_enabled":true,"views":"158","promo_type":"1","layout_type":"1","short_excerpt":"How and why Beijing helps authoritarian regimes control the internet","is_update":"0","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/91375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=91375"}],"version-history":[{"count":3,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/91375\/revisions"}],"predecessor-version":[{"id":91747,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/91375\/revisions\/91747"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/91376"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=91375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=91375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=91375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}