Tag Archives: Chinese

U.S., Chinese foreign ministers hold first in person talks since October

NUSA DUA, Indonesia, July 9 (Reuters) – U.S. Secretary of State Antony Blinken and China’s Foreign Minister Wang Yi met on Saturday for the first in-person talks since October after attending a G20 summit where the top U.S. diplomat led efforts to pressure Russia over its war in Ukraine.

U.S. officials say Blinken’s meeting with Wang in Bali, Indonesia, including a morning session of talks and a working lunch, is aimed at keeping the difficult U.S. relationship with China stable and preventing it from veering inadvertently into conflict. read more

“There is no substitute for face to face … diplomacy, and in a relationship as complex and consequential as the one between the United States and China there is a lot to talk about,” Blinken told reporters at the beginning of the meeting.

Register now for FREE unlimited access to Reuters.com

Register

“We very much look forward to a productive and constructive conversation,” he said.

Blinken is expected to repeat warnings to China not to support Russia’s war in Ukraine and the two sides will address contentious issues that include Taiwan, China’s extensive South China Sea claims, its expansion of influence in the Pacific, human rights, and trade tariffs.

However, both sides share an interest in keeping the relationship stable and Blinken and U.S. officials say President Joe Biden and Chinese President Xi Jinping are expected to speak again in coming weeks, something Saturday’s meeting is likely to address.

“China and the United States are two major countries, so it is necessary for the two countries to maintain normal exchanges,” Wang told reporters.

“At the same time, we do need to talk together to ensure that this relationship will continue to move forward along the right track,” Wang said.

Daniel Russel, a top U.S. diplomat for East Asia under former President Barack Obama who has close contact with Biden administration officials, said he believed a key aim for the meeting would be to explore the possibility of an in-person meeting between Biden and Xi, their first as leaders, possibly on the sidelines of a G20 summit in Bali in November.

The United States calls China its main strategic rival and is concerned it might one day attempt to take over the self-ruled democratic island of Taiwan, just as Russia attacked Ukraine.

The top U.S. diplomat for East Asia, Daniel Kritenbrink, said on Tuesday he expected a “candid” exchange with Wang and said it would be another opportunity “to convey our expectations about what we would expect China to do and not to do in the context of Ukraine”.

Shortly before Russia’s Feb. 24 Ukraine invasion, Beijing and Moscow announced a “no limits” partnership. But U.S. officials have said they have not seen China evade tough U.S.-led sanctions on Russia or provide it with military equipment.

However, China has declined to condemn Russia’s actions and it has criticized the sweeping sanctions.

U.S. officials have warned of consequences, including sanctions, should China start offering material support for Russia’s war effort, which it calls a “special military operation” to degrade the Ukrainian military though Kyiv counters that it is an imperial-style land grab.

Despite their strategic rivalry, the world’s two largest economies remain major trading partners and Biden has been considering scrapping tariffs on a range of Chinese goods to curb surging U.S. inflation before the November midterm elections, with control of Congress in focus. read more

(This story has been refiled to edit headline to show first in person talks)

Register now for FREE unlimited access to Reuters.com

Register

Additional reporting by Ryan Woo in Beijing; Writing by Ed Davies; Editing by Christian Schmollinger, Robert Birsel

Our Standards: The Thomson Reuters Trust Principles.

Read original article here

U.S. tightens sanctions on Iran, targets Chinese, Emirati firms over oil

WASHINGTON, July 6 (Reuters) – The United States on Wednesday imposed sanctions on a network of Chinese, Emirati and other companies that it accused of helping to deliver and sell Iranian petroleum and petrochemical products to East Asia, pressuring Tehran as it seeks to revive the 2015 Iran nuclear deal.

The U.S. Treasury Department said in a statement the network of people and entities used a web of Gulf-based front companies to facilitate the delivery and sale of hundreds of millions of dollars in products from Iranian firms to China and elsewhere in East Asia.

Washington has increasingly targeted Chinese companies over the export of Iran’s petrochemicals as the prospects of reviving the nuclear pact have dimmed.

Register now for FREE unlimited access to Reuters.com

Register

In Doha last week, indirect talks between Tehran and Washington ended without a breakthrough over how to salvage the deal, under which Iran had reined in its atomic program. read more

Then-U.S. President Donald Trump abandoned the pact in 2018 and reimposed sanctions, spurring Iran – which says its program is for peaceful purposes – to begin violating the deal’s atomic limits.

“While the United States is committed to achieving an agreement with Iran that seeks a mutual return to compliance with the (2015 nuclear deal), we will continue to use all our authorities to enforce sanctions on the sale of Iranian petroleum and petrochemicals,” Brian Nelson, the Treasury’s under secretary for terrorism and financial intelligence, said.

Among those designated by the Treasury Department was Iran-based Jam Petrochemical Company over accusations it exported petrochemical products to companies throughout East Asia, many of which were sold to a U.S.-sanctioned company for shipment to China.

Jam did not immediately respond to a request for comment.

Also targeted was United Arab Emirates-based Edgar Commercial Solutions FZE, which the Treasury said purchased and exported petrochemical products from sanctioned Iranian companies for shipment to China.

Washington said the firm used Hong Kong-based front company Lustro Industry Limited, also designated on Wednesday, to hide its role in bulk purchases of petrochemical products.

Ali Almutawa Petroleum and Petrochemical Trading L.L.C., accused of being a front company for Hong Kong-based Triliance Petrochemical Co. Ltd, was also targeted.

Reuters could not immediately reach Edgar Commercial Solutions FZE, Lustro Industry Limited and Ali Almutawa Petroleum and Petrochemical Trading L.L.C. for comment.

Chinese refineries over the past two years have been buying large amounts of Iranian oil despite U.S. sanctions on the country’s oil exports. Oil is the lifeblood of Iran’s economy and Chinese imports have helped keep Tehran afloat.

Brian O’Toole, a former Treasury official, said given Iran’s apparent hesitance to return to the nuclear deal, he expects Washington may lean more heavily on China, “because that was the clear point of leakage in the sanctions regime.”

“I think the message to Beijing is as long as Iran is not taking a return to the JCPOA terms seriously, you need to stop importing Iranian oil,” he said, referring to the Iran deal.

Wednesday’s move freezes U.S. assets of those designated and generally bars Americans from dealing with them. Those who deal with the targeted people and entities may also be hit with sanctions.

The U.S. State Department on Wednesday also targeted a Vietnamese company, Truong Phat Loc Shipping Trading JSC, and Singapore-based Everwin Ship Management Pte. Ltd., for engaging in the transport of Iranian petroleum products. Three Iran-based entities were also targeted in the action.

Register now for FREE unlimited access to Reuters.com

Register

Reporting by Daphne Psaledakis and Arshad Mohammed; Editing by Howard Goller and Alistair Bell

Our Standards: The Thomson Reuters Trust Principles.

Read original article here

Hackers claim they breached data on 1 billion Chinese residents from police

Hackers say they’ve breached the personal data of 1 billion Chinese citizens from a Shanghai police database and offered it for sale, a leak that, if confirmed, would be one of the largest such exposures in history.

In a post last week on an underground hacker forum, an anonymous poster or a group, advertised the availability of the data and released a sample, which purportedly contained 750,000 records. The asking price for the entire 23-terabyte database was 10 bitcoin, or about $200,000. The post has since been locked by the site.

The data included names, national identification and phone numbers, medical records, details from police reports and other information. Though the authenticity of the full database had not been confirmed, The Post’s review of some ID numbers appeared to track with information found on a government website.

The alleged hackers said there were several billion case reports — from thefts to fights to domestic violence, dated from the late 1990s to 2019 — and the records of 1 billion Chinese citizens. If authenticated, the database would cover more than 70 percent of China’s 1.4 billion residents. The personal information and reported incidents were contained in separate files.

Despite the scope, government were blocking victims from learning about the leak. On Weibo, a widely used Twitter-like platform in China, a keyword search for “data leak” or “Shanghai police database” failed to return any results related to the breach. One affected individual, in an interview with The Post, confirmed details of the record associated with them but had not known about the leak.

Analysis: Here are four big questions about the massive Shanghai police leak

The breach came after China’s Personal Information Protection Law took effect last year, which imposed stringent security safeguards on corporate and government entities that handle personal information. The law was passed after Chinese regulators ordered more than 40 companies to change their operations for violating data transfer rules, Reuters reported.

Kendra Schaefer, the head of tech policy research at China-focused research team Trivium China, said in a Twitter post Monday that the incident was the first major public breach by a government body under the new law. “So it’s unclear who holds who accountable,” she said. The Ministry of Public Security (MSP) would typically oversee cybercrime investigations.

“The records also allegedly contain details on case files of minors,” Schaefer said. “So that would be a violation of the Minor Protection Law.” She raised the possibility that the data contained information of celebrities or officials.

In the released sample data set, certain information was associated with individuals listed under the “seven categories of key people,” a reference to individuals monitored by MSP for suspected criminal activity.

State departments, the Shanghai government and the Shanghai police department did not respond to requests for comment.

However, it’s also possible the files had been online before the law became effective — it only received public attention after the alleged hacker released it online. Cybersecurity researcher Vinny Troia told CNN that he was made aware of the database in January on a public site, which was opened in April 2021, meaning anyone could have accessed the database since then.

There’s also speculation government staff accidentally included the credentials necessary to access the database in a blog post on the Chinese Software Developer Network, a forum for developers to share code. Changpeng Zhao, the chief executive of the cryptocurrency exchange Binance, referenced the theory in a tweet on Monday. He said that the company had “already stepped up verifications” for users who were potentially affected.

The unnamed poster claimed that the database was hosted by AliCloud, a subsidiary of Chinese e-commerce giant Alibaba Group. Cloud providers affiliated with big tech companies, like AliCloud, typically built the digital infrastructure for government agencies.

Alibaba Group did not respond to the request for comment.

But Shawn Chang, the chief executive of security solution provider HardenedVault found the theory unconvincing. “Shanghai is a city [with] 250 million population. AliCloud is unlikely [to use] one key for the whole police system,” he said. He added that the breach could be elsewhere, such as with centralized key management services that failed to go through the authentication process.

Web security consultant Troy Hunt said that the anonymity of the person who offered the sale, as well as the size of the database, raised questions over its accuracy. The solicitation of a large payout also raises the possibility the claim has been exaggerated or falsified, he added.

But the data was also strong “because it is a very unique class of information,” Hunt said. Unlike self-reported names and phone numbers while filling out a form online — which were seen in other data breaches — it was police reports that “would only really be in one place.”

It’s no secret that government entities in China have poorly managed data systems. “The problem with Chinese government is that they collect all citizens’ data on public service platforms, which had serious consequences once the data was leaked,” Chang said. “Anywhere you go, you have to submit your information. But there is not a systematic way to manage those data. Private companies are also bad at managing data, but are better than the government.”

Earlier this year, a researcher obtained a cache of documents from Xinjiang Police, which detailed draconian surveillance and reeducation practices in the region and shed lights on Beijing’s crackdown on the Uyghur population.



Read original article here

Hacker Offers to Sell Chinese Police Database in Potential Breach

In what may be one of the largest known breaches of Chinese personal data, a hacker has offered to sell a Shanghai police database that could contain information on perhaps one billion Chinese citizens.

The unidentified hacker, who goes by the name ChinaDan, posted in an online forum last week that the database for sale included terabytes of information on a billion Chinese. The scale of the leak could not be verified. The New York Times confirmed parts of a sample of 750,000 records that the hacker released to prove the authenticity of the data.

The hacker, who joined the online forum last month, is selling the data for 10 Bitcoin, or about $200,000. The individual or group did not provide details on how the data was obtained. The Times reached out to the hacker via an email on the post, though it could not be delivered as the address seemed to be incorrect.

The hacker’s offer of the Shanghai police database highlights a dichotomy in China: Although the country has been at the forefront of collecting masses of information on its citizens, it has been less successful in securing and safeguarding that data.

Over the years, authorities in China have become expert at amassing digital and biological information on people’s daily activities and social connections. They parse social media posts, collect biometric data, track phones, record video using police cameras and sift through what they obtain to find patterns and aberrations. A Times investigation last month revealed that the appetite of Chinese authorities for regular citizens’ information has only expanded in recent years.

But even as Beijing’s appetite for surveillance has ramped up, authorities have appeared to leave the resulting databases open to the public or left them vulnerable with relatively weak safeguards. In recent years, The Times has reviewed other databases used by the police in China.

China’s government has worked to tighten controls over a leaky data industry that has fed internet fraud. Yet the focus of the enforcement has often centered on tech companies, while authorities appear to be exempt from strict rules and penalties aimed at securing information at internet firms.

Yaqiu Wang, a senior China researcher at Human Rights Watch, said if the government doesn’t protect its citizens’ data, there are no consequences. In Chinese law, “there is vague language about state data handlers having responsibility to ensure the security of the data. But ultimately, there is no mechanism to hold government agencies responsible for a data leak,” she said.

Last year, for example, Beijing cracked down on Didi, China’s equivalent of Uber, after its listing effort on the New York Stock Exchange, citing the risk that sensitive personal information could be exposed. But when local authorities in the Chinese province of Henan misused data from a Covid-19 app to block protesters last month, officials were largely spared from severe penalties.

When smaller leaks have been reported by so-called white-hat hackers, who search out and report vulnerabilities, Chinese regulators have warned local authorities to better protect the data. Even so, ensuring discipline has been difficult, with the responsibility to protect the data often falling on local officials who have little experience overseeing data security.

Despite this, the public in China often expresses confidence in authorities’ handling of data and typically considers private companies less trustworthy. Government leaks are often censored. News of the Shanghai police breach has also been mostly censored, with China’s state-run media not reporting it.

“In this Shanghai police case, who is supposed to investigate it?” said Ms. Wang of Human Rights Watch. “It’s the Shanghai police itself.”

In the hacker’s online post, samples of the Shanghai database were provided. In one sample, the personal information of 250,000 Chinese citizens — such as name, sex, address, government-issued ID number and birth year — was included. In some cases, the individuals’ profession, marital status, ethnicity and education level, along with whether the person was labeled a “key person” by the country’s public security ministry, could also be found.

Another sample set included police case records, which included records of reported crimes, as well as personal information like phone numbers and IDs. The cases dated from as early as 1997 until 2019. The other sample set contained information that appeared to be individuals’ partial mobile phone numbers and addresses.

When a Times reporter called the phone numbers of people whose information was in the sample data of police records, four people confirmed the details. Four others confirmed their names before hanging up. None of the people contacted said they had any previous knowledge about the data leak.

In one case, the data provided the name of a man and said that, in 2019, he reported to the police a scam in which he paid about $400 for cigarettes that turned out to be moldy. The individual, reached by phone, confirmed the details described in the leaked data.

Shanghai’s public security bureau declined to respond to questions about the hacker’s claim. Calls to the Cybersecurity Administration of China went unanswered on Tuesday.

On Chinese social media platforms, like Weibo and the communication app WeChat, posts, articles and hashtags about the data leak have been removed. On Weibo, accounts of users who posted or shared related information have been suspended, and others who talked about it have said online that they had been asked to visit the police station for a chat.

Read original article here

More Chinese cities impose COVID lockdowns as ‘clusters’ spread

NEWYou can now listen to Fox News articles!

The Chinese government is expanding its COVID-19 lockdown measures as more clusters of cases were discovered in the country’s eastern region.

Officials in the city of Wuxi have closed down in-person dining and many other indoor activities. Authorities are also encouraging residents to work from home and not leave the city, according to Reuters.

Officials say roughly 40 asymptomatic cases were diagnosed in the city this weekend.

That potential outbreak comes as the Anhui province has also reported nearly 300 cases, according to Reuters.

INSIDE A SHANGHAI MASS QUARANTINE CENTER: NO SHOWERS, LIGHTS ON 24/7

FILE PHOTO: A medical worker in a protective suit collects a swab sample from a chef for nucleic acid testing, during lockdown, amid the coronavirus disease (COVID-19) pandemic, in Shanghai, China, May 13, 2022. 
(REUTERS/Aly Song/File Photo)

A woman in a protective suit stands on a street during lockdown, amid the coronavirus disease (COVID-19) pandemic, in Shanghai, China, May 26, 2022. 
(REUTERS/Aly Song)

SHANGHAI TO LIFT ‘UNREASONABLE’ CURBS ON FIRMS, BEIJING EASES RESTRICTIONS

China’s “zero COVID” approach to the pandemic means even small outbreaks result in widespread lockdowns. The policy has led to unrest in Shanghai, where lockdowns lasted for months and access to food and other daily goods became severely strained.

Government officials touted that Shanghai was COVID-free in early June, but hundreds of thousands of residents remained in lockdown nevertheless.

CLICK HERE TO GET THE FOX NEWS APP

Authorities in Shanghai say the city suffered more than 500,000 cases between April and the end of May.

Read original article here

Chinese spacecraft acquires images of entire planet of Mars

BEIJING, June 29 (Reuters) – An uncrewed Chinese spacecraft has acquired imagery data covering all of Mars, including visuals of its south pole, after circling the planet more than 1,300 times since early last year, state media reported on Wednesday.

China’s Tianwen-1 successfully reached the Red Planet in February 2021 on the country’s inaugural mission there. A robotic rover has since been deployed on the surface as an orbiter surveyed the planet from space.

Among the images taken from space were China’s first photographs of the Martian south pole, where almost all of the planet’s water resources are locked.

Register now for FREE unlimited access to Reuters.com

Register

In 2018, an orbiting probe operated by the European Space Agency had discovered water under the ice of the planet’s south pole. read more

Locating subsurface water is key to determining the planet’s potential for life, as well as providing a permanent resource for any human exploration there.

Other Tianwen-1 images include photographs of the 4,000-kilometre (2,485-mile) long canyon Valles Marineris, and impact craters of highlands in the north of Mars known as Arabia Terra.

Tianwen-1 also sent back high-resolution imagery of the edge of the vast Maunder crater, as well as a top-down view of the 18,000-metre (59,055-foot) Ascraeus Mons, a large shield volcano first detected by NASA’s Mariner 9 spacecraft more than five decades ago.

Register now for FREE unlimited access to Reuters.com

Register

Reporting by Ryan Woo. Editing by Gerry Doyle

Our Standards: The Thomson Reuters Trust Principles.

Read original article here

Chinese spacecraft acquires images of entire planet of Mars

BEIJING (Reuters) – An uncrewed Chinese spacecraft has acquired imagery data covering all of Mars, including visuals of its south pole, after circling the planet more than 1,300 times since early last year, state media reported on Wednesday.

China’s Tianwen-1 successfully reached the Red Planet in February 2021 on the country’s inaugural mission there. A robotic rover has since been deployed on the surface as an orbiter surveyed the planet from space.

Among the images taken from space were China’s first photographs of the Martian south pole, where almost all of the planet’s water resources are locked.

In 2018, an orbiting probe operated by the European Space Agency had discovered water under the ice of the planet’s south pole.

Locating subsurface water is key to determining the planet’s potential for life, as well as providing a permanent resource for any human exploration there.

Other Tianwen-1 images include photographs of the 4,000-kilometre (2,485-mile) long canyon Valles Marineris, and impact craters of highlands in the north of Mars known as Arabia Terra.

Tianwen-1 also sent back high-resolution imagery of the edge of the vast Maunder crater, as well as a top-down view of the 18,000-metre (59,055-foot) Ascraeus Mons, a large shield volcano first detected by NASA’s Mariner 9 spacecraft more than five decades ago.

(Reporting by Ryan Woo. Editing by Gerry Doyle)

Read original article here

Chinese father breaks down after son he tutored daily for a year scores a 6/100 on math exam

A Chinese father who reportedly tutored his son daily for a year went viral for bursting into tears after his son scored six out of 100 points on a math exam.

The child’s parents from Zhengzhou, Henan Province, received his test score on June 23. Upon learning that their son had only received six points for his final math test, the father burst into tears, as seen in a video posted to Weibo by Qilu Evening News.

“I don’t care anymore, my efforts are wasted, let him struggle by himself!” the father reportedly said.

He can be seen crying in a bedroom and wiping his eyes, while his wife can be heard laughing in the background.

More from NextShark: Chinese student cyberbullied for ‘showing off’ by buying classmates $7,600 worth of chocolates

The man purportedly tutored his child until midnight every day for the past year. His disappointment also stems from his son’s inconsistent test results. The child’s scores had ranged from 40-50 points to 80-90 points in previous examinations, according to his mother.

The video went viral on Weibo, with many netizens sympathizing with the father’s parenting struggles. However, others argued that the child’s score was a reflection of the father’s inability to teach math. Some viewers also suggested that the father’s late-night tutoring may have affected his son’s ability to pay attention at school.

“Teaching the child in the middle of the night every day, but the child needs a lot of rest to have a good mental state and perform well,” one commenter said. “The more stressed my daughter was when she was a child, the more unable her brain was to think, so she would be fine to let her play.”

More from NextShark: US is ‘better off with fewer Asians, less Asian immigration,’ says tenured UPenn professor

 

Featured Image via Weibo

More from NextShark: China denies using Uyghur torchbearer to deflect alleged abuses, says accusations part of ‘smear campaign’

Enjoy this content? Read more from NextShark!

Taiwan says full invasion by China would be very difficult

Read original article here

Chinese child-trafficking victim posts video in wedding dress to find birth parents before ceremony

A Chinese child-trafficking victim went viral for posting a video of herself in a wedding dress asking for the public’s help to find her birth parents before she gets married.

Bai Xuefang, 24, says in the video that she was abducted at the age of 3 or 4 years old and sold to her current adoptive family by traffickers for 1,000 yuan (approximately $149).

Bai began looking for her biological parents in 2015 after she learned the truth about her origin. In her latest effort to find her parents, she recorded a video of herself wearing a traditional Chinese wedding gown on June 19 in the hopes that they can attend her wedding ceremony.

“As I am soon to marry, I hope that my biological parents can be present at my wedding ceremony,” Bai says in the video. “I’m also hoping that people who see the video will be able to help me find my biological parents.”

More from NextShark: Future Olympian vibes: Adorable 4-year-old Chinese girl snowboards and skis like a pro in viral video

Bai, who is from Baoding, Hebei, holds a photograph of herself as a 3-year-old child in the recording so that her biological parents will recognize her if they see the video.

“I found out the truth about my origins when I was 11 years old and often quarreled with my adoptive parents,” Bai says. “They also frequently beat and verbally abused me.”

The victim has no recollection of her birth family and has traveled across China in search of them. Bai started working at the age of 17. She currently runs a mobile crepe stall, in which she posts information about her biological parents in hopes that customers can help her search.

More from NextShark: TikTok Star Nina Mc Lin Called Out for Using the N-Word in Video

Bai and her supportive fiancé hope to be reunited with her biological parents soon. Some viewers of Bai’s video were moved to tears by her determination. Others have also shared similar experiences online.

Child abductions have been an ongoing problem in China. In a 2011 report, the Chinese government estimated fewer than 10,000 children are kidnapped each year; however, the U.S. State Department believes the number to be closer to 20,000.

China’s Ministry of Public Security launched a campaign to tackle the issue of women and child-trafficking in March when a video of a mentally-ill woman chained in a shed by her husband went viral.

More from NextShark: Man who biked thousands of miles looking for kidnapped son and inspired Andy Lau movie reunite after 24 years

 

Featured Image via D视频

More from NextShark: Boston man allegedly harasses Asian women dancing to K-pop for ‘communism’ and mask wearing

Read original article here

Victims of Tangshan restaurant attack recovering from injuries, Chinese police say

The assault, which took place in the early hours of June 10, saw several women repeatedly kicked and punched by a group of men. It sent shock waves across China after surveillance footage of the incident was leaked online.

A day after the attack, the Tangshan police issued a statement saying two women were hospitalized with “non-life-threatening injuries” and were in “stable condition.” No other information was provided. The victims, as well as their friends and family, have also remained silent.

On Tuesday, 11 days after the assault, and 10 days after the initial statement, the public security department of Hebei province, where Tangshan is located, released a second, lengthier statement, saying two of the women, aged 31 and 29, were “hospitalized in the general ward for treatment, and their conditions have improved.” The other two victims, aged 24 and 29, did not need hospitalization, it added.

According to a forensic report cited by the police, the hospitalized women suffered “second-degree minor injuries,” while the other two had “slight injuries.”

The 10 day information black hole had given rise to repeated allegations the leaked surveillance video captured only part of the attack, and the violence continued off camera in a nearby alleyway — claims CNN cannot independently verify.

In an apparent attempt to refute such rumors, the Hebei police said in the statement Tuesday the suspects fled the scene at 2.47 a.m. — seven minutes after the assault started; and at 2.55 a.m., the four victims were sent to hospital by ambulance. Local police officers arrived at the restaurant at 3.09 a.m., about half an hour after receiving a call from the public at the start of the attack, according to the statement.

But the statement was met with incredulity online, with many criticizing authorities’ handling of the case. A related hashtag on Weibo was viewed 450 million times within hours.

“So there are no pictures or videos. Journalists are not allowed to interview (the victims), and only you yourself can release information,” said one user on Weibo, China’s Twitter-like platform, referencing the lack of access provided to journalists.

“A city with no credibility — do we dare to trust the injury report? And how reliable is this police statement?” the user added.

Following the attack, Chinese authorities have sought to stifle discussions around gender-based violence and shift the focus to local gang violence.

State media reports have largely focused on the swift police action in arresting the suspects, and the two-week “thunderstorm” campaign announced by Tangshan authorities to crack down on organized crime. Photos and videos of police officers — some armed with guns — standing guard behind customers at outdoor barbeque restaurants, similar to the one where the incident took place, flooded social media.

In the statement Tuesday, the police said four of the suspects had traveled to Tangshan from eastern Jiangsu province three days before the attack to conspire with the other five to “carry out illegal online gambling and money laundering activities.” Several of them had criminal records, for offenses ranging from illegal detainment to intentional harming of others, the statement added.

Police authorities have also launched an internal investigation into whether the local police station had failed to respond in time, and whether they violated any laws and regulations when enforcing the law. A deputy head at the local police station had been suspended, the statement said. ​

Read original article here

The Ultimate News Site