Police Location App Used By Hong Kong Protesters Deleted

Apple has removed an app that protesters in Hong Kong have used to track police movements and tear gas use, saying the app violated its rules. The company said the app, HKmap.live, had "been used in ways that endanger law enforcement and residents". 

China’s state media had accused Apple of endorsing and protecting “rioters” in Hong Kong’s increasingly violent protests by listing an app on its app store that tracks the movement of police in the city. The condemnation, by the People’s Daily, a Chinese Communist party mouthpiece, appears to be China’s latest move to pressure foreign companies to toe the line. 

The app HKmap.live, which crowd-sources the location of police and anti-government protesters, was approved by Apple on 4 October and went on its App Store a day later. 

The app displays hotspots on a map of the city that is continuously updated as users report incidents, hence allowing protesters to avoid police.

The headline of the People’s Daily commentary carried by its official microblog on Wednesday 9th October said: “Protecting rioters – Has Apple thought clearly about this?.... Allowing the ‘poisonous’ app to flourish is a betrayal of the Chinese people’s feelings.”

The HKmap.live is reportedly the most downloaded app under the travel category in the iOS App Store for Hong Kong. Without specifically naming the app, the People’s Daily commentary said it allowed “Hong Kong rioters to openly commit crime while openly escaping arrests”. 

It said Apple’s approval of the app made it an “accomplice” in the protests because it “blatantly protects and endorses the rioters”. It questioned what the company’s intentions were.

It also criticised Apple for allowing Glory to Hong Kong, an unofficial anthem frequently sung by protesters during the ongoing anti-government movement, to be available for download in the Apple music store.

Peoples Daily:     Straits Times:        Guardian:            BBC:    

You Might Also Read: 

The Apps That Map Violence:

 

« USA and Britain Agree To Share Crime Data
Google Creates Video Tools To Fight Deepfakes »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Frazer-Nash Consultancy

Frazer-Nash Consultancy

Frazer-Nash is a leading engineering, systems and technology company. Areas of expertise include information security and cyber security.

DoD Cyber Crime Center (DC3)

DoD Cyber Crime Center (DC3)

DC3 is a US Department of Defense (DoD) center of excellence for Digital and Multimedia forensics.

OPSWAT

OPSWAT

OPSWAT is a software company that provides solutions to secure and manage IT infrastructure.

Cradlepoint

Cradlepoint

With Cradlepoint customers leverage the speed and economics of wired and wireless Internet broadband for branch, mobile, and IoT networks while maintaining end-to-end visibility, security and control.

Intrusion

Intrusion

Intrusion provides IT professionals with the most robust tool set available for performing in-depth research and analysis of network traffic.

Coursera

Coursera

Coursera provides universal access to the world’s best education, partnering with top universities and organizations to offer courses online. Subject areas include Computer Security & Networks.

Ioetec

Ioetec

Ioetec's mission is to connect users to their IoT devices securely, ensuring these devices remain safe to use in our increasingly connected world.

TechRate

TechRate

Techrate is an analytics agency focused on blockchain technology and engineering. Or expertise includes security and technical audits of projects.

ISARR

ISARR

The ISARR software platform - your bespoke Risk, Resilience & Security Management solution. Simple, cost effective and adaptable, now and into the future.

SecureAge Technology

SecureAge Technology

We’re a rapidly growing cybersecurity company with an 18-year history of ZERO Data breaches. Our security solutions place security and usability on equal footing. Learn more about our technology.

Coralogix

Coralogix

Coralogix are rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing.

SE Ventures

SE Ventures

SE Ventures provides capital to big ideas and bold entrepreneurs who can benefit from Schneider Electric's deep domain expertise, R&D assets, and global customer base.

Performance Technologies

Performance Technologies

As a leading IT Solutions Provider in Greece, Performance Technologies delivers reliable, long life solutions, ensuring continuous availability of business-critical services and information.

CLEAR

CLEAR

With more than 17 million members and a growing network of partners across the world, CLEAR's identity platform is transforming the way people live, work, and travel.

Identifid

Identifid

Identifid offers a suite of fraud prevention and identity authentication solutions to businesses and governments using the latest advances in AI, vision processing, and biometric recognition.

Offenso Hackers Academy

Offenso Hackers Academy

At Offenso we focus on cyber security training focused on producing cyber security professionals with a wide range of abilities to counter threats from the internet and cloud to a business.