PropertyValue
?:author
?:datePublished
  • 2022-05-25 (xsd:date)
?:headline
  • he said.That is misleading.Publication of the Xinjiang Police Files came after a months-long effort to investigate and authenticate the leaked materials by a research team at the Washington-based Victims of Communism Memorial Foundation (VCMF), where Zenz is a senior fellow, and the media consortium.According to Zenz, the files were obtained by an individual who gained access to the internal police computer networks of two predominantly Uyghur and Kazakh counties in Xinjiang: Konasheher (Shufu) and Tekes (Tekesi)."The leaker (en)
?:inLanguage
?:itemReviewed
?:mentions
?:reviewBody
  • On May 24, a new trove of documents and photographs came to light that further details alleged human rights abuses in China’s mass-detention program targeting ethnic Uyghurs in Xinjiang.The cache of documents, dubbed the Xinjiang Police Files, were hacked from police computer servers in Xinjiang, where Beijing’s persecution of Uyghurs and other Muslim minority groups has been called a crime against humanity by international human rights organizations.The hacked files, received by Xinjiang-focused researcher Adrian Zenz, include thousands of photographs of people incarcerated in internment camps, as well as classified government documents that include those describing a shoot-to-kill policy for detainees who try to escape.In sum, the documents and photos, some of which show detainees bound during interrogation or guarded by figures in tactical gear, refute China’s claims that its detention centers are benign re-education facilities.The leak coincided with this week’s visit to Xinjian by U.N. human rights chief Michelle Bachelet. At a press briefing, the Chinese Foreign Ministry spokesman was asked to confirm whether the files were legitimate content from Chinese police servers."Instead (en)
?:reviewRating
rdf:type
?:url