Permanent URL (ark):
    https://n2t.net/ark:/76271/23/267 content_copy
    APA (7)ChicagoMLA content_copy
    . (1970, January 1). Translation of “Clarify ‘Operation 9.13’ Crime-related Questions”. Cadre Materials, Xinjiang Documentation Project Archive, Arts Digital Collections, University of British Columbia, Vancouver. https://n2t.net/ark:/76271/23/267 . Translation of “Clarify ‘Operation 9.13’ Crime-related Questions”. Cadre Materials, Xinjiang Documentation Project Archive, Arts Digital Collections, University of British Columbia, Vancouver. January 1, 1970. https://n2t.net/ark:/76271/23/267 . Translation of “Clarify ‘Operation 9.13’ Crime-related Questions”. Cadre Materials, Xinjiang Documentation Project Archive, Arts Digital Collections, University of British Columbia, Vancouver. 1 Jan. 1970. n2t.net/ark:/76271/23/267
  • Title: Translation of “Clarify ‘Operation 9.13’ Crime-related Questions”
  • Description: Operation 9.13, a surveillance campaign, provides authorities access to information about a people suspected of accessing “problematic” content and software, including their “phone’s unique identifier (IMEI number), base station information that can be used to track the movement of the phone user, where this person can generally be found, and whether the person has removed ‘unlawful software’ from the phone.”
  • Publisher: Xinjiang Uyghur Autonomous Region Internal Document
  • Language: English
  • Format: PDF
  • Source: Kahar, Poskam County, Kashgar Prefecture
  • Subject: Cadre Training Materials
  • Keywords: Cadre | data collection | fanghuiju | fanghuiju (访惠聚) campaign | re-education | surveillance
  • Item Type: Document
  • Collection: Cadre Materials
  • Notes: Translated into English by the Xinjiang Documentation project.
    • Additional Details
    • Description: Operation 9.13, a surveillance campaign, provides authorities access to information about a people suspected of accessing “problematic” content and software, including their “phone’s unique identifier (IMEI number), base station information that can be used to track the movement of the phone user, where this person can generally be found, and whether the person has removed ‘unlawful software’ from the phone.”