hong kong protests in june

Hong Kong Protesters Take Down ‘Smart Lamps’ Amid Growing Fears of Chinese Surveillance Tech

The pro-democracy demonstrators have used several tactics to avoid being identified through facial recognition technology, including masks and laser pointers.

As conflicts between Hong Kong protesters and police have escalated into violence in recent days, pro-democracy activists are not only fighting for universal suffrage and an end to police brutality. They are fighting to protect their identities amid fears that the Hong Kong police force, and the Chinese government that oversees it, will use facial recognition technology to find and arrest protesters. 


Last Saturday, those concerns came to a head when a group of protesters targeted “smart lamps” that the local government says are used to collect data on traffic, weather and air quality. There are about 50 smart lampposts installed around the city, all of which have cameras and sensors, CNN reported


Although the Hong Kong government maintains that the lampposts do not have facial recognition software, demonstrators attempted to tear down and dismantle some of them during a night that turned violent, with police firing tear gas cannisters at protesters. Thirty-two people were arrested for weapons possession, assault of police and unlawful assembly, according to CNN. 


The activists have been vitally concerned about privacy and surveillance since protests in Hong Kong broke out in earnest in June. In the 12 weeks since, many protesters have attempted to thwart facial recognition technology regularly deployed by the Chinese government through homemade masks that obscure their faces if they are caught on camera. 


Their techniques include medical and gas masks paired with goggles, which sometimes are taped over with reflective tape. Umbrellas are used to provide coverage for people who are drawing graffiti or other activities illegal in Hong Kong. 


“People tend to experiment a lot in protest movements,” Gavin Grindon, an academic who curated a 2014 exhibition on objects used in protests, told CNN. “It’s often the simple solution -- the quick solution -- that’s the elegant and effective one.” 


A protester told CNN that she was afraid of being arrested for crimes she did not commit if she was identified on video surveillance footage: “We need to hide ourselves so if we get caught on camera, we’re safe.” 


The protesters are also attempting to hide their digital identities from authorities as well. Most organizing takes place on the app Telegram, which uses encrypted communication, and demonstrators typically use single-way subway tickets and new SIM cards rather than tying those products to their real names, CNN reported. 


In recent weeks, activists have also employed laser pointers to confuse facial recognition software and fry lenses. Hong Kong authorities and opthamologists worry that the lasers could cause permanent damage to the eyes of officers and protesters. 

 

"Pointing at eyes, the beam can cause permanent blindness; flashing at skin, it can cause burns since the energy is high. When harassing eyes, it can lead to blurry vision for a while," Chow Pak-chin, an ophthalmology specialist told CBC News.

 

 

 

The clashes between demonstrators and law enforcement do not seem to be on the road to de-escalation: police drew guns and used water cannons on Sunday night as activists blocked streets and others threw bricks at officers.

Featured

  • Ransomware Attacks Rise for the First Time in Six Months

    Ransomware attacks have risen for the first time in six months, increasing by 28% month-on-month to 421 attacks. While overall attack volume remained below 500, the uptick may signal a renewed escalation heading into the year’s most active period for cyber criminals. Read Now

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.