This Is Harmony OS From Huawei, China: It Connects Everything!

This Is Harmony OS From Huawei, China: It Connects Everything! 這是來自中國華為的鴻蒙操作系統:它連接一切!In the past two decades, China has lost the PC era and the mobile Internet era in terms of operating systems. Now, in the IoT era, it finally has the opportunity to outcompete other players. In the words of Wang Chenglu: If HarmonyOS succeeds, the next 20 years of the mobile industry will belong to China. Published on June 3 2021 過去20年,中國在操作系統方面已經失去了PC時代和移動互聯網時代。 現在,在物聯網時代,它終於有機會超越其他玩家。 用王成錄的話來說:鴻蒙OS成功了,下一個20年的移動產業將屬於中國. https://youtu.be/3ai49xcDDBg
https://vimeo.com/558790063
https://www.facebook.com/100036400039778/posts/504219987467998/?d=n

Video: Biological warfare? Drosophila melanogaster discovered by Chinese customs sent from US

Video: Biological warfare? Drosophila melanogaster discovered by Chinese customs sent from US. Drosophila melanogaster is a species of fly in the family Drosophilidae. The species is often referred to as the fruit fly, though its common name is more accurately the vinegar fly. Drosophila is a significant pest that attacks healthy fruit prior to harvest. As fruit integrity is compromised by oviposition and larval feeding, common vinegar flies (i.e., Drosophila melanogaster) may also oviposit in the damaged fruit.
藏在貼錯標籤的海運集裝箱內, 從美國寄到中國的黑腹果蠅被中國海關發現.
https://vimeo.com/558746438
https://youtu.be/VBiY30yT4II
https://www.facebook.com/100036400039778/posts/504165310806799/?d=n

Academic paper reveals Hong Kong student protesters were paid to be guinea pigs in bizarre experiment that may have gone wrong

Academic paper reveals Hong Kong student protesters were paid to be guinea pigs in bizarre experiment that may have gone wrong 學術論文揭示香港學生抗議者在可能出錯的奇怪實驗中被支付為豚鼠 Allegations that pro-democracy activists in Hong Kong have been paid for their activities have swirled for years but have always been strenuously rubbished by the Western media. Now, an academic study seems to confirm just that. 關於香港民主活動人士因其活動而獲得報酬的指控已經流傳多年,但一直被西方媒體極力抨擊。 現在,一項學術研究似乎證實了這一點. 3 Jun, 2021

By Kit Klarenberg, an investigative journalist exploring the role of intelligence services in shaping politics and perceptions. Follow him on Twitter @KitKlarenberg

https://www.rt.com/op-ed/525596-hong-kong-paid-protests/

Secreted in the depths of academic journal American Economic Review’s June edition is an absolutely extraordinary research paper, revealing that a team of Western scholars conducted a somewhat peculiar study analyzing why students attended protests in Hong Kong – and that participants were paid to do so.

The paper’s abstract notes that the academics set out to study “the causes of sustained participation in political movements.” In order to “identify the persistent effect of protest participation,” and the role of social networks in organizing and motivating protests and protesters, they “randomly indirectly [incentivized]” – that is, paid – 849 students at the University of Hong Kong to participate in an “antiauthoritarian protest” for two years running, in 2017 and 2018.

The protest in question was the annual July 1 march, which has been convened every year since 1997, the year of Hong Kong’s handover from the UK to China. The academics say the marches studied were “peaceful” and “modestly sized”, attracting around 50,000 citizens, and sought “to both achieve policy concessions and signal the strength of the movement.”

They found that “incentives” to attend a political protest increased and, indeed, sustained subsequent crowd sizes, “but only when a sufficient fraction of an individual’s social network [was] also incentivized to attend the initial protest.”

Essentially, while a greater turnout among the wider population at large would “affect a subject’s beliefs about the likelihood that a public good is produced or a government crackdown may occur,” the participation of an individual’s friends had “a large effect on the social utility derived from protest participation, the coordination costs of attending, and social image considerations.”

The academics are keen to emphasize that they aimed to encourage protest participation without “explicitly” paying for people to attend, but instead “[paid] for behavior conditional on turnout.” So, the 849 randomly selected students weren’t directly remunerated for going to a protest, but for “providing information that would help estimate crowd sizes at the protest.” Participants were recruited via an email that was sent to the university’s entire undergraduate body.

Once the protests ended, participants filled in an online survey, and were given an additional HK$350 ($45) – about 1% of an average monthly wage on the island – for their “time and effort.” The original sum received for attendance isn’t stated.

“Subjects … received an email the day before the July 1, 2017 march with detailed instructions on how to complete the task. Treated subjects would be able to use a secure link to upload the information we requested,” the paper records. “Subjects who upload[ed] all the requested information and complete[d] the protest participation reporting module would be eligible to receive the bonus payment.”

If all that sounds rather strange, it’s because it absolutely is. For one, the academics’ finding that offering financial inducements to people to attend protests promotes turnout, particularly if those people know one another, seems banal and self-evident – a fait accompli if ever there was one.

The academics explain their rationale for conducting the research in the paper’s introduction, noting that, while “political rights have historically often arisen from successful, long-running movements,” there is a lack of empirical investigation into “the causes of individuals’ sustained participation in political movements.”

That seems reasonable enough, until one considers that the same group of scholars has been publishing papers on this question annually for quite some time – and, on each occasion, University of Hong Kong students have been their guinea pigs.

In 2016, for instance, their research included “manipulating” subjects’ beliefs about the participation of others to gauge whether a perception of ‘missing out’ drove greater attendance. A day before the July 1 protest that year, paid participants were provided with “truthful information” about other attendees’ protest plans to see if there was a corresponding increase.

That experiment was funded by the National Bureau of Economic Research (NBER), which, in 2010, ranked as the second-most influential economic think tank in the US. Two of the academics involved in the research, Leonardo Bursztyn and David Y Yang, are “affiliated scholars” of the NBER.

The organization is funded by a number of US government agencies and charitable organizations, including the controversial Bill & Melinda Gates Foundation, which raises the obvious question of who or what ultimately benefited from this research, and to what purpose the findings were put.

The latter riddle gets more curious when one considers that in their 2020 study of protest participation, the academics note that, while the University of Hong Kong’s Science and Technology (HKUST) department’s institutional review board (IRB) – the body that formally vets biomedical and behavioral research involving humans – approved their first “experimental intervention” with students in 2017, that approval was rescinded two years later.

“The HKUST Human Participants Research Panel (HPRP) wrote to us requesting that we remove references to the HKUST IRB approval of our study, on the basis that the study went beyond what was approved in our proposal,” the paper states.

Detail of this alleged breach of academic ethics isn’t provided, and the academics “unambiguously” reject the charge, although it may be no coincidence that HKUST sought to distance itself from the study on November 28, 2019 – the same month the violent “siege” of the University of Hong Kong erupted. The strife began when students disrupted road and train traffic near the campus on November 11 to facilitate a general strike.

The authorities responded by firing pepper bullets at students and launching volleys of tear gas into the campus, precipitating almost a week of ever-escalating violence from activists. Within days, students had created an elaborate system of barricades to block roads and shield the entrances to the university’s halls of residence, set traps to puncture car tyres, stockpiled a large number of petrol bombs, and were routinely hurling bricks and tiles, and firing arrows from rooftops at the police.

It’s unclear how many, if any, of the students participating in these incendiary activities were initially roused to political action by being “randomly” selected for the academics’ numerous protest studies over the years, but HKUST’s attempted backpedaling suggests it’s a distinct possibility that at least some were.

Tiananmen 1989 Student Leader Chailing: “We are hoping for bloodshed” | Western MSM will never show this. To Succeed, US’s Color Revolution must see blood and Chailing failed to deliver.

Tiananmen 1989 Student Leader Chailing: “We are hoping for bloodshed” | Western MSM will never show this. To Succeed, US’s Color Revolution must see blood and Chailing failed to deliver. 天安門1989學生領袖柴玲:“我們希望流血” | 西方 MSM 永遠不會讓你看到。 想要成功, 美國在天安門的顏色革命必須見血. There is a lot of misinformation and Western-media-created myth surrounding the mainland Chinese student protests of 1989 which involved occupying Tiananmen Square. This is a raw interview with Tiananmen Square’s most radical/recognizable student leader, and Commander-in-Chief of the Defend Tiananmen Headquarters, Chailing. 圍繞 1989 年中國大陸學生佔領天安門廣場的抗議活動,有很多錯誤信息和西方媒體製造的神話。 這是對天安門廣場最激進/最知名的學生領袖、保衛天安門司令部總司令柴玲的原始採訪。published Jun 3, 2021
https://vimeo.com/558642345
https://youtu.be/nbEpfOPPay8
https://www.facebook.com/100036400039778/posts/504064437483553/?d=n

Western money hired students from Hong Kong University of Science and Technology. These University Students “white mice” participated in a so-called social experiment, they studied demonstration patterns as an excuse, but in fact incited riots

American Economic Review” sponsored by the American Economic Association revealed that Western money hired students from Hong Kong University of Science and Technology. These University Students “white mice” participated in a so-called social experiment, they studied demonstration patterns as an excuse, but in fact incited riots. . The so-called “scholars” in charge of the research come from the National Institute of Economic Research, Harvard University and Hong Kong University of Science and Technology. This so-called paper actually claimed that “protests are the source of Hong Kong’s stability”, which is exactly the same as Pelosi’s “violence is the beautiful scenery of Hong Kong”, and it is ironclad evidence that the West has instigated the Hong Kong version of the “color revolution”.

【罪证曝光】美僱港千名大学生 当暴乱”白老鼠” 2021-06-03 08:04
(大公报记者 施文达、周扬、李斯达)美国经济学会主办的学术期刊《美国经济评论》(The American Economic Review),泄露西方资金僱请香港科大学生,当”白老鼠”参与一项所谓社会实验,美其名研究示威模式,实则煽惑暴乱。负责研究的所谓”学者”来自美国全国经济研究所、哈佛大学及香港科技大学等。这篇所谓论文竟称”抗议是香港稳定的源头”,这与佩洛西的”暴力是香港美丽风景线”如出一辙,是西方煽动港版”颜色革命”的铁证。

http://m.stnn.cc/pcarticle/863968

获取欧洲研究基金六百多万港元的张忆芹现身处澳洲。
科大回覆《大公报》指,涉事的科大副教授2019年9月离开科大,校方曾于2019年年底去信要求研究团队将”获科大批准”的声明从研究论文中移除。不过当中一名”学者”,现于澳洲New South Wales大学的前科大副教授张忆芹Y. Jane Zhang,依然在履历表称与科大合作关系至2022年。
《美国经济评论》最新一期(六月号),刊登了由芝加哥大学、哈佛大学、美国全国经济研究所(NBER)、慕尼黑大学、美国经济和政策研究中心(CEPR)、美国贾米尔贫穷行动实验室(J-PAL),以及香港科技大学的所谓学者,以做社会实验研究示威模式为名,不断用金钱诱推参加实验的逾千名科大生,参与2017年及2018年的7·1游行,并于2019年6月黑暴爆发时发表《持久政治参与:社会互动与政治运动的驱动力》的所谓论文,鼓吹持久参与游行才能影响”政治”运动。
这些所谓”学者”,包括美国全国经济研究所(NBER)的Leonardo Bursztyn及Noam Yuchtman、美国经济和政策研究中心(CEPR)的Davide Cantoni、现美国哈佛大学经济学助理教授David Y. Yang,以及香港科技大学Y. Jane Zhang(张忆芹)。
提供报酬予上街学生
五位学者首先于2015年开始,向于2017及2018年在香港科技大学就读(2018年7月毕业的除外)、年龄18岁以上的香港居民或内地学生发出数封个人倾向调查,得到10%至20%的回应后,于2017年6月再随机抽选约1100位学生参加”实验”。这批科大”白老鼠”分成两组人,一组是对照组,他们不会受到任何干预;另一组是实验组,2017年6月30日晚他们会收到一封邮件,内容是:”过去有许多同学会参加7·1游行,所以我们邀请部分同学明天帮我们更好地统计7·1游行的参与人数。我们希望你们能够积极参与,为科学做出贡献。在游行中,这仅仅花费五分钟。一旦你们上传了所有资料,我们会提供350元的报酬。”
研究结果称获得报酬的参加者令2017年的7·1游行人数增加了10个百分点。而这批获酬的科大生能够导致长期的政治参与,即是2018年的7·1游行参与率提高了五个百分点。研究结论在论文的首页已列明”一场政治抗议运动的参与度及持久性,并非由个人政治倾向或看法导致,而更多与个人同其他游行示威者的互动有关。游行示威为志趣相投的人提供了互动平台,包括社交网络平台在内,从而编织更加强大的社会纽带,为未来类似的游行示威活动吸引更多人持久参与”。
问卷提”港独” 倡报酬捐”众志”
而该研究更不断以额外奖金利诱科大生持续参与,包括2017的7·1游行及2018年的7·1游行,最终共有849名科大学生完成整个研究。
《大公报》发现,该研究计划的问卷内容涵盖是否参与游行、游行中的感受、游行效率等问题外,更渗入”港独”表态:”部分人在香港强烈支持『港独』,你认为这些『港独』支持者是否害怕公开表态?”
获酬的科大生可选择”经由香港科技大学的学生信息系统(SIS)直接存入”学生银行户口。若实验对象学生完成多个问卷调查,还可获得额外数百港元报酬。研究项目还建议学生可选择将报酬捐给”港独”组织”香港众志”。
据论文资料显示,该次研究由欧洲研究委员会(European Research Council)的财务拨款,获慕尼黑大学、史丹福大学、加州大学伯克莱分校及香港科技大学的授权。
研究负责人曾发表反中论文
与张忆芹撰写多篇研究论文的杨宇凡David Yang,现为哈佛大学经济学助理教授。《大公报》记者发现其”研究成果”多涉及社会抗争,其中一篇于2017年在英国伦敦政治经济学院网站上发表的反中论文,污蔑中国政府,并煽惑”港人的抗议达到威胁程度,就可抗衡北京”云云。

杨宇凡David Yang曾在推特发表”撑暴”言论,文章留言指”集体行动是展示人类力量的最壮观的一幕。”
煽惑港人作威胁性抗议
该篇于2017年10月在伦敦经济学院发表的反中论文《人民的力量?中国在香港政策的三元论》颠倒黑白,讹言惑众指”国安法带来社会不稳定”,又称”如果港人的抗议富有威胁性,能抗衡北京”,”能带来稳定”。
杨宇凡与张忆芹等人撰写一篇名为《作为战略手段的抗议:香港反独裁运动的实验性证据》的论文中,鼓励香港学生参加抗议活动,其结论为学生如果知道身边有更多人计划参与游行,那么他们参加游行的可能性更高。
此外,David活跃于社交平台推特,不时发表”撑暴”言论。如前年黑暴爆发当天,他分享”撑暴”文章并留言:”集体行动是展示人类力量的最壮观的一幕。”
美其名学术研究 实为煽惑动乱
前科大副教授张忆芹联同多间美国大学的学者,获欧洲研究委员会(European Research Council)资助该研究。有专家向《大公报》表示,外国所谓研究基金正是利用这些不知名”学者”急于发表论文的心态,资助其所谓的”学术研究”,”研究计划横跨2017至2018年,有连贯性,是否与2019年的暴乱有关?”
张忆芹在2011年至2019年出任科大社会科学系助理教授,2019年晋升副教授,科大高层表示,由助理教授升副教授须有足够分量和质量的学术研究发表,其研究资金来自海外亦十分常见,不过研究却牵涉敏感的政治、国家安全等议题,难免令人质疑研究项目的背后动机,”该论文有多位作者,主要是美国学者,该名科大副教授则为华人,研究内容为反独裁主义,研究对象为香港及其游行,哪会这么巧合?”
张忆芹获ERC资助逾63万欧元
张忆芹于2019年9月离开科大后,同年11月在澳洲新南威尔士大学出任副教授,新南威尔士大学资料显示,张忆芹获ERC资助金63万7500元欧元,称与科大的合作关系至2022年。《大公报》昨向科大查询,科大回覆指该教授已于2019年9月离开科大。所有涉及人类参与者的研究计划,均须经科大人类实验道德委员会审批,确保项目符合保护参与研究者的标准,有关安排与国际研究惯例一致。
科大要求移除”获科大批准”
科大表示,委员会于2019年10月接获有关一个研究项目的查询,该研究由一名前科大教授及来自其他大学的研究团队合作进行。经委员会调查后发现,有关研究计划的方法,与其当初向委员会递交审批申请时所述的不符,包括没有提及”引发参与游行”为研究中的一个重点项目,以及没有提及参与者所获的酬劳与参与游行直接挂钩,委员会于2019年底去信有关研究团队,表示其研究不获大学批准,并要求团队将”获科大批准”的声明从研究论文中移除。

A bill sponsored by Sen. Scott Wiener to legalize safe injection sites for legalized formerly illegal drugs in certain cities in California was passed by the Senate on Thursday.

A bill sponsored by Sen. Scott Wiener to legalize safe injection sites for legalized formerly illegal drugs in certain cities in California was passed by the Senate on Thursday. 真的是報應, 美國人的西人祖父對中國所做盡的壞事, 今天報應在他們的後代. Karma returns to hit US – some of the prominent AngloSaxon families sold opium to China with guns pointed at Beijing in the 1800s, made huge profits. Today in America, streets are filled with drug addicts with the approval of City, State and Federal Government. 美國自殘 Drugs could be found in Intermediate and high schools throughout America. Cocaine will probably be legalized soon. Imagine 1800s China drugs problems to replay in US in coming years and decades. I have a dozen or so Chinese clients’ children are already serious drug addicts. Drug problems does not care you are White, Black, Red or Yellow. If you are in US’s drug lala land, no one safe. 美國加州舊金山世界日報 World Journal Newspaper San Francisco, June 3 2021

China successfully launches new meteorological satellite, further boosts disaster event observation and response capability

China successfully launches new meteorological satellite, further boosts disaster event observation and response capability by Deng Xiaoci Jun 02 2021

China successfully launched the Fengyun-4B, the first operational satellite of a new generation of meteorological satellites in the geostationary orbit, via a Long March-3B carrier rocket from the Xichang Satellite Launch Center at 12:17 am Thursday in Southwest China’s Sichuan Province, according to the China National Space Administration (CNSA).

It will work together and construct a network with Fengyun-4A, in orbit to further strengthen China’s observation and response capability of small and medium scale disaster events and provide information security services for a range of sectors including meteorological, agricultural, aviation, marine and environmental protection, the CNSA said in a press release it sent to the Global Times.

The network will also be able to conduct dynamic monitoring and tracking of a variety of disaster elements including floods, cold fronts, droughts and sand storms. Its observation range covers Asia, the central Pacific Ocean and Indian Ocean regions, so that the network will also greatly improve China’s forecast accuracy of disaster weather including typhoons and storms, CNSA said.

It is equipped with a rapid imager, improving measurement resolution to 250 meters from the geostationary orbit [which is the highest in the world,] and accelerating scan imaging of the Earth.

Fengyun-4A, the scientific experiment satellite for the network, was launched on December 11, 2016.

According to the operator of the system, the China Meteorological Administration (CMA), there are eight satellites of the Fengyun family currently in orbit, and a total of 18 Fengyun satellites have been deployed.

The Fengyun satellite family has provided services for 118 countries and regions including 83 along the China-proposed Belt and Road Initiative, according to the CMA.

The Thursday mission also marked the 372nd flight of Long March rocket series. The China Academy of Launch Vehicle Technology (CALT), the developer of the Long March 3B, told the Global Times on Thursday that it would also kickstart a new round of intense launch schedules for the Long March 3A family.

The “Gold Medal Rocket” series will carry out 10 launches over seven months, at intervals of at least half a month, the academy said.

Video: Newsweek Magazine – Pentagon running ‘secret army of 60,000 around world’

Video: Newsweek Magazine – Pentagon running ‘secret army of 60,000 around world’ by Matt Mathers May 19, 2021

A secret army of around 60,000 is carrying out domestic and foreign operations for the Pentagon in a programme aimed at minimising threats to US security, it has been reported.

The force, said to be ten times the size of the CIA’s clandestine element, is made up of operatives working undercover, with some of them embedded in top companies around the world, according to Newsweek.

https://www.newsweek.com/exclusive-inside-militarys-secret-undercover-army-1591881

Perhaps that’s how the money was accounted for. https://finance.yahoo.com/news/pentagon-35-trillion-accounting-black-231154593.html

Agents in the “signature reduction” programme, developed by the Pentagon over the past 10 years, are engaged in online as well as real life assignments and are often soldiers, civilians and contractors who evade detection with false identities.

Newsweek reports that the secret army is carrying out its duties without the knowledge or consent of Congress.

North Korea, Russia and Iran are believed to be just some of the counties seen as hostile to the US where the agents are working. The agency has a reported budget of $900 million.

One intelligence officer, who is unnamed, says the army operates in “signature reduction”, although the term is not officially recognised by the Department of Defense. It is, however, used to define “measures that are taken to protect operations”.

Although some of the agents work in the shadows, Newsweek pointed to the case of Ryan Fogle as an example of when agents get caught.

Mr Fogle is an alleged CIA agent who was detained in Russia for allegedly trying to recruit a Russian intelligence officer.

Footage of Mr Fogle being berated by plain-clothes FSB interrogators was released to Russian television channels in May 2013, along with photographs and video footage of a bizarrely old-school array of spying tools, including two wigs, a compass, a map of Moscow and a stack of 500 Euro notes.

At the time, the state department confirmed one of its agents had been detained, but refused to be drawn on claims they were actively engaged in trying to recruit Russian operatives.

Newsweek’s investigation also revealed how a company based in North Carolina trains agents how to change their age and appearance using disguises and equips them with a silicone sleeve that allows them to alter their fingerprints.

According to Newsweek, up to 30,000 of the country’s signature reduction troops are operating around the world from Pakistan in the Middle East to West Africa in the south.

Inside the largest undercover force the world has ever known: the one created by the Pentagon, with tens of thousands of soldiers, civilians and contractors operating under false names, on the ground and in cyberspace. by TIMOTHY A. CLARY, Newsweek

The largest undercover force the world has ever known is the one created by the Pentagon over the past decade. Some 60,000 people now belong to this secret army, many working under masked identities and in low profile, all part of a broad program called “signature reduction.” The force, more than ten times the size of the clandestine elements of the CIA, carries out domestic and foreign assignments, both in military uniforms and under civilian cover, in real life and online, sometimes hiding in private businesses and consultancies, some of them household name companies.

The unprecedented shift has placed an ever greater number of soldiers, civilians, and contractors working under false identities, partly as a natural result in the growth of secret special forces but also as an intentional response to the challenges of traveling and operating in an increasingly transparent world. The explosion of Pentagon cyber warfare, moreover, has led to thousands of spies who carry out their day-to-day work in various made-up personas, the very type of nefarious operations the United States decries when Russian and Chinese spies do the same.

Newsweek’s exclusive report on this secret world is the result of a two-year investigation involving the examination of over 600 resumes and 1,000 job postings, dozens of Freedom of Information Act requests, and scores of interviews with participants and defense decision-makers. What emerges is a window into not just a little-known sector of the American military, but also a completely unregulated practice. No one knows the program’s total size, and the explosion of signature reduction has never been examined for its impact on military policies and culture. Congress has never held a hearing on the subject. And yet the military developing this gigantic clandestine force challenges U.S. laws, the Geneva Conventions, the code of military conduct and basic accountability.

The signature reduction effort engages some 130 private companies to administer the new clandestine world. Dozens of little known and secret government organizations support the program, doling out classified contracts and overseeing publicly unacknowledged operations. Altogether the companies pull in over $900 million annually to service the clandestine force—doing everything from creating false documentation and paying the bills (and taxes) of individuals operating under assumed names, to manufacturing disguises and other devices to thwart detection and identification, to building invisible devices to photograph and listen in on activity in the most remote corners of the Middle East and Africa.

Special operations forces constitute over half the entire signature reduction force, the shadow warriors who pursue terrorists in war zones from Pakistan to West Africa but also increasingly work in unacknowledged hot spots, including behind enemy lines in places like North Korea and Iran. Military intelligence specialists—collectors, counter-intelligence agents, even linguists—make up the second largest element: thousands deployed at any one time with some degree of “cover” to protect their true identities.

The newest and fastest growing group is the clandestine army that never leaves their keyboards. These are the cutting-edge cyber fighters and intelligence collectors who assume false personas online, employing “nonattribution” and “misattribution” techniques to hide the who and the where of their online presence while they search for high-value targets and collect what is called “publicly accessible information”—or even engage in campaigns to influence and manipulate social media. Hundreds work in and for the NSA, but over the past five years, every military intelligence and special operations unit has developed some kind of “web” operations cell that both collects intelligence and tends to the operational security of its very activities.

In the electronic era, a major task of signature reduction is keeping all of the organizations and people, even the automobiles and aircraft involved in the clandestine operations, masked. This protective effort entails everything from scrubbing the Internet of telltale signs of true identities to planting false information to protect missions and people. As standard unforgettable identification and biometrics have become worldwide norms, the signature reduction industry also works to figure out ways of spoofing and defeating everything from fingerprinting and facial recognition at border crossings, to ensuring that undercover operatives can enter and operate in the United States, manipulating official records to ensure that false identities match up.

Just as biometrics and “Real ID” are the enemies of clandestine work, so too is the “digital exhaust” of online life. One major concern of counter-terrorism work in the ISIS age is that military families are also vulnerable—another reason, participants say, to operate under false identities. The abundance of online information about individuals (together with some spectacular foreign hacks) has enabled foreign intelligence services to better unmask fake identities of American spies. Signature reduction is thus at the center of not only counter-terrorism but is part of the Pentagon’s shift towards great power competition with Russia and China—competition, influence, and disruption “below the level of armed conflict,” or what the military calls warfare in the “Gray Zone,” a space “in the peace-conflict continuum.”

One recently retired senior officer responsible for overseeing signature reduction and super-secret “special access programs” that shield them from scrutiny and compromise says that no one is fully aware of the extent of the program, nor has much consideration been given to the implications for the military institution. “Everything from the status of the Geneva Conventions—were a soldier operating under false identity to be captured by an enemy—to Congressional oversight is problematic,” he says. He worries that the desire to become more invisible to the enemy not just obscures what the United States is doing around the world but also makes it more difficult to bring conflicts to a close. “Most people haven’t even heard of the term signature reduction let alone what it creates,” he says. The officer spoke on condition of anonymity because he is discussing highly classified matters.

The secret life of Jonathan Darby

Every morning at 10:00 a.m., Jonathan Darby embarks on his weekly rounds of mail call. Darby is not his real name, but it is also not the fake name on his Missouri driver’s license that he uses to conduct his work. And the government car he drives, one of a fleet of over 200,000 federal vehicles owned by the General Services Administration, is also not registered in his real or his fake name, and nor are his magnetically attached Maryland state license plates really for his car, nor are they traceable back to him or his organization. Where Darby works and the locations he visits are also classified.

Darby’s retired from the Army, and he asks that neither his real nor his cover name be used. He served for 20 years in counterintelligence, including two African assignments where he operated in low profile in Ethiopia and Sudan, masquerading as an expat businessman. Now he works for a Maryland-based signature reduction contractor that he asked Newsweek not to identify.

As Darby makes his rounds to some 40 or so post offices and storefront mailbox stores in the DC Metropolitan area, he picks up a trunk full of letters and packages, mailing a similar number from rural addresses. Back at the office, he sorts through the take, delivering bills to the finance people and processing dozens of personal and business letters mailed from scores of overseas locations. But his main task is logging and forwarding the signature reduction “mechanisms” as they are called, passports and State driver’s licenses for people who don’t exist, and other papers—bills, tax documents, organization membership cards—that form the foundation of fake identities.

To register and double-check the authenticity of his daily take, Darby logs into two databases, one the Travel and Identity Document database, the intelligence community’s repository of examples of 300,000 genuine, counterfeit and altered foreign passports and visas; and the other the Cover Acquisition Management System, a super-secret register of false identities where the “mechanisms” used by clandestine operators are logged. For false identities traveling overseas, Darby and his colleagues also have to alter databases of U.S. immigration and customs to ensure that those performing illicit activities can return to the United States unmolested.

For identity verification, Darby’s unit works with secret offices at Homeland Security and the State Department as well as almost all 50 states in enrolling authentic “mechanisms” under false names. A rare picture into this world came in April 2013 when an enterprising reporter at Northwest Public Broadcasting did a story suggesting the scale of this secret program. His report revealed that the state of Washington alone had provided hundreds of valid state driver licenses in fictitious names to the federal government. The existence of the “confidential driver license program,” as it was called, was unknown even to the governor.

Before the Internet, Darby says—before a local cop or a border guard was connected to central databases in real time—all an operative needed to be “undercover” was an ID with a genuine photo. These days, however, especially for those operating under deep cover, the so-called “legend” behind an identity has to match more than just a made-up name. Darby calls it “due diligence”: the creation of this trail of fake existence. Fake birthplaces and home addresses have to be carefully researched, fake email lives and social media accounts have to be created. And those existences need to have corresponding “friends.” Almost every individual unit that operates clandestinely—special operations, intelligence collections, or cyber—has a signature reduction section, mostly operated by small contractors, conducting due diligence. There they adhere to what Darby calls the six principles of signature reduction: credibility, compatibility, realism, supportability, verity and compliance.

Compliance is a big one, Darby says, especially because of the world that 9/11 created, where checkpoints are common and nefarious activity is more closely scrutinized. To keep someone covert for real, and to do so for any period of time, requires a time consuming dance that not only has to tend to someone’s operational identity but also maintain their real life back home. As Darby explains it, this includes clandestine bill paying but also working with banks and credit card security departments to look the other way as they search for identity fraud or money laundering. And then, signature reduction technicians need to ensure that real credit scores are maintained—and even real taxes and Social Security payments are kept up to date—so that people can go back to their dormant lives when their signature reduction assignments cease.

Darby’s unit, originally called the Operational Planning and Travel Intelligence Center, is responsible for overseeing much of this (and to do so it operates the Pentagon’s largest military finance office), but documentation—as important as it is—is only one piece of the puzzle. Other organizations are responsible for designing and manufacturing the custom disguises and “biometric defeat” elements to facilitate travel. Darby says this is where all the Special Access Programs are. SAPs, the most secret category of government information, protect the methods used—and the clandestine capabilities that exist—to manipulate foreign systems to get around seemingly foolproof safeguards including fingerprinting and facial recognition.

‘Signature reduction’ is a term of art

Numerous signature reduction SAPs, programs with names like Hurricane Fan, Island Hopper and Peanut Chocolate, are administered by a shadowy world of secret organizations that service the clandestine army—the Defense Programs Support Activity, Joint Field Support Center, Army Field Support Center, Personnel Resources Development Office, Office of Military Support, Project Cardinals, and the Special Program Office.

Befitting how secret this world is, there is no unclassified definition of signature reduction. The Defense Intelligence Agency—which operates the Defense Clandestine Service and the Defense Cover Office—says that signature reduction is a term of art, one that “individuals might use to … describe operational security (OPSEC) measures for a variety of activities and operations.” In response to Newsweek queries that point out that dozens of people have used the term to refer to this world, DIA suggests that perhaps the Pentagon can help. But the responsible person there, identified as a DOD spokesperson, says only that “as it relates to HUMINT operations”—meaning human intelligence— signature reduction “is not an official term” and that it is used to describe “measures taken to protect operations.”

Another senior former intelligence official, someone who ran an entire agency and asks not to be named because he is not authorized to speak about clandestine operations, says that signature reduction exists in a “twilight” between covert and undercover. The former, defined in law, is subject to presidential approval and officially belongs to the CIA’s National Clandestine Service. The latter connotes strictly law enforcement efforts undertaken by people with a badge. And then there is the Witness Protection Program, administered by the U.S. Marshals Service of the Justice Department, which tends to the fake identities and lives of people who have been resettled in exchange for their cooperation with prosecutors and intelligence agencies.

The military doesn’t conduct covert operations, the senior former official says, and military personnel don’t fight undercover. That is, except when they do, either because individuals are assigned—”sheep dipped”—to the CIA, or because certain military organizations, particularly those of the Joint Special Operations Command, operate like the CIA, often alongside them in covert status, where people who depend on each other for their lives don’t know each other’s real names. Then there are an increasing number of government investigators—military, FBI, homeland security and even state officials—who are not undercover per se but who avail themselves of signature reduction status like fake IDs and fake license plates when they work domestically, particularly when they are engaged in extreme vetting of American citizens of Arab, South Asian, and increasingly African background, who have applied for security clearances.

‘Get Smart’?

In May 2013, in an almost comical incident more reminiscent of “Get Smart” than skilled spying, Moscow ordered a U.S. embassy “third secretary” by the name of Ryan Fogle to leave the country, releasing photos of Fogle wearing an ill-fitting blond wig and carrying an odd collection of seemingly amateurish paraphernalia—four pairs of sunglasses, a street map, a compass, a flashlight, a Swiss Army knife and a cell phone—so old, one article said, it looked like it had “been on this earth for at least a decade.”

The international news media had a field day, many retired CIA people decrying the decline of tradecraft, most of the commentary opining how we’d moved on from the old world of wigs and fake rocks, a reference to Great Britain admitting just a year earlier that indeed it was the owner of a fake rock and its hidden communications device, another discovery of Russian intelligence in Moscow.

Six years later, another espionage case hit the news, this time when a jury sent former American military intelligence officer Kevin Patrick Mallory to 20 years in prison for conspiring to sell secrets to China. There was nothing particularly unique about the Mallory case, the prosecution making its own show of presenting the jury with a collection of wigs and fake mustaches looking like Halloween costumes, the whole thing seemingly another funny episode of clumsy disguise.

And yet, says Brenda Connolly (not her real name), one would be naïve to laugh too hard, for both cases provide a peek into the new tricks of the trade and the extreme secrecy that hides them. Connolly started her engineering career at the Directorate of Science and Technology at the CIA and now works for a small defense contractor that produces the gizmos—think “Q” in the James Bond movies, she says—for signature reduction operations.

That “ancient” Nokia phone carried by Ryan Fogle, she says, was nothing of the sort, the innocuous outsides concealing what she calls a “covert communications” device inside. Similarly, entered in evidence in Mallory case was a Samsung phone given to him by Chinese intelligence that was so sophisticated that even when the FBI cloned it electronically, they could not find a hidden partition used to store secrets and one that Mallory ultimately had to reveal to them.

Lost in the spy-vs-spy theater of both cases were other clues of modern signature reduction, Connolly says. Fogle also carried an RFID shield, a radio frequency identification blocking pouch intended to prevent electronic tracking. And Mallory had vials of fake blood provided by China; Connolly would not reveal what it would be used for.

Like many people in this world, Connolly is a connoisseur and curator. She can talk for hours about the broadcasts that used to go out from the Soviet Union—but also were transmitted from Warrenton, Virginia—female voices reciting random numbers and passages from books that agents around the world would pick up on their shortwave radios and match to prearranged codes.

But then Internet cafes and online backdoors became the clandestine channels of choice for covert communications, largely replacing shortwave—until the surveillance technologies (especially in autocratic countries) caught up and intelligence agencies acquired an ability not only to detect and intercept internet activity but also to intercept every keystroke of activity on a remote keyboard. That ushered in today’s world of covert communications or COVCOMM, as insiders call it. These are very special encryption devices seen in the Fogle and Mallory cases, but also dozens of different “burst mode” transmitters and receivers secreted in everyday objects like fake rocks. All an agent or operator needs to activate communications with these COVCOMMs in some cases is to simply walk by a target receiver (a building or fake rock) and the clandestine messages are encrypted and transmitted back to special watch centers.

“And who do you think implants those devices?” Connolly asks rhetorically. “Military guys, special ops guys working to support even more secretive operations.” Connolly talks about heated fabrics that make soldiers invisible to thermal detection, electric motorcycles that can silently operate in the roughest terrain, even how tens of feet of wires are sown into “native” clothing, the South Asian shalwar kameez, the soldiers themselves then becoming walking receivers, able to intercept nearby low-power radios and even cell phone signals.

Fake hands, fake faces

Wigs. Covert communications devices. Fake rocks. In our world of electronic everything, where everything becomes a matter of record, where you can’t enter a parking garage without the license plate being recorded, where you can’t check in for a flight or a hotel without a government issued ID, where you can’t use a credit card without the location being captured, how can biometrics can be defeated? How can someone get past fingerprint readers?

In 99 out of 100 cases, the answer is: there is no need to. Most signature reduction soldiers travel under real names, exchanging operational identities only once on the ground where they operate. Or they infiltrate across borders in places like Pakistan and Yemen, conducting the most dangerous missions. These signature reduction missions are the most highly sensitive and involve “close in” intelligence collection or the use of miniaturized enemy tracking devices, each existing in their own special access programs—missions that are so sensitive they have to be personally approved by the Secretary of Defense.

For the one percent, though, for those who have to make it through passport control under false identities, there are various biometrics defeat systems, some physical and some electronic. One such program was alluded to in a little noticed document dump published by Wikileaks in early 2017 and called “Vault 7”: over 8,000 classified CIA tools used in the covert world of electronic spying and hacking. It is called ExpressLane, where U.S. intelligence has embedded malware into foreign biometrics and watchlist systems, allowing American cyber spies to steal foreign data.

An IT wizard working for Wikileaks in Berlin says the code with ExpressLane suggests that the United States can manipulate these databases. “Imagine for a moment that someone is going through passport control,” he says, hesitant to use his real name because of fear of indictment in the United States. “NSA or the CIA is tasked to corrupt—change—the data on the day the covert asset goes through. And then switch it back. It’s not impossible.”

Another source pointed to a small rural North Carolina company in the signature reduction industry, mostly in the clandestine collection and communications field. In the workshop and training facility where they teach operators how to fabricate secret listening devices into everyday objects, they are at the cutting edge, or so their promotional materials say, a repository for molding and casting, special painting, and sophisticated aging techniques.

This quiet company can transform any object, including a person, as they do in Hollywood, a “silicon face appliance” sculpted to perfectly alter someone’s looks. They can age, change gender, and “increase body mass,” as one classified contract says. And they can change fingerprints using a silicon sleeve that so snugly fits over a real hand it can’t be detected, embedding altered fingerprints and even impregnated with the oils found in real skin. Asked whether the appliance is effective, one source, who has gone through the training, laughs. “If I tell you, I’ll have to kill you.”

In real life, identity theft (mostly by criminals’ intent on profit) remains an epidemic that affects everyone, but for those in the intelligence and counter-terrorism worlds, the enemy is also actively engaged in efforts to compromise personal information. In 2015, the Islamic State posted the names, photos and addresses of over 1,300 U.S. military personnel, instructing supporters to target and kill the identified individuals. The FBI said that the release was followed by suspected Russian hackers who masqueraded as members of ISIS and threatened military families through Facebook. “We know everything about you, your husband and your children,” one menacing message said.

Counterintelligence and OPSEC officials began a large-scale effort to inform those affected but also to warn military personnel and their families to better protect their personal information on social media. The next year, ISIS released 8,318 target names: the largest-ever release until it was topped by 8,785 names in 2017.

It was revealed that military personnel sharing location information in their fitness devices were apparently revealing the locations of sensitive operations merely by jogging and sharing their data. “The rapid development of new and innovative information technologies enhances the quality of our lives but also poses potential challenges to operational security and force protection,” U.S. Central Command said in a statement at the time to the Washington Post.

Then came the DNA scare, when Adm. John Richardson, then chief of naval operations, warned military personnel and their families to stop using at-home ancestry DNA test kits. “Be careful who you send your DNA to,” Richardson said, warning that scientific advancements would be able to exploit the information, creating more and more targeted biological weapons in the future. And indeed in 2019, the Pentagon officially advised military personnel to steer clear of popular DNA services. “Exposing sensitive genetic information to outside parties poses personal and operational risks to Service members,” said the memo, first reported by Yahoo news.

“We’re still in the infancy of our transparent world,” says the retired senior officer, cautioning against imagining that there is some “identity gap” similar to the “bomber gap” of the Cold War. “We’re winning this war, including on the cyber side, even if secrecy about what we are doing makes the media portrayal of the Russians again look like they are ten feet tall.”

He admits that processing big data in the future will likely further impinge on everyone’s clandestine operations, but he says the benefits to society, even narrowly in just making terrorist activity and travel that much more difficult, outweigh the difficulties created for military operational security. The officer calls the secrecy legitimate but says that the Defense Department leadership has dropped the ball in recognizing the big picture. The military services should be asking more questions about the ethics, propriety and even legality of soldiers being turned into spies and assassins, and what this means for the future.

Still, the world of signature reduction keeps growing: evidence, says the retired officer, that modern life is not as transparent as most of us think.

Asian Time: Biden’s China obsession could be the undoing of America – Collaboration with China has been good for the US and its people in the past, and should be again

Asian Time: Biden’s China obsession could be the undoing of America – Collaboration with China has been good for the US and its people in the past, and should be again By George Koo JUNE 2, 2021

Secretary of State Tony Blinken’s approach to competing with China is to recruit and reorganize former US allies to band together against China.

It’s hard to tell if US President Joe Biden’s position on China is his true conviction or he’s just going along with the heavy anti-China sentiment in Washington, but his China team has made it official now: no more engagement with China, just competition from here on.

Biden’s China obsession could be the undoing of America

The nature of competition the Biden team has in mind, mind you, is not your gentlemanly sort of sporting contest where my one-upping you will incentivize your one-upping me, and we both in the end are better for competing.

No, all indications point to all-out, below-the-belt, eye-gouging, anything-goes tactics to attack the other party, namely China. Two ongoing developments point to this conclusion.

Winding its way through the US Congress is the so-called Strategic Competition Act of 2021. It has not been enacted as yet, so we don’t quite know all the provisions. My understanding is that as much as $300 million has been allocated to blacken China’s image around the world.

In this era of fake news, assassination of one’s character (or a country’s reputation) via innuendo, exaggeration and even outright lies is easy to do. August members of the US mainstream media, such as The New York Times or The Washington Post, are not above purveying or contributing misinformation, sometimes with malice of aforethought and sometimes simply being too lazy to authenticate questionable sources.

Consistent with all this is Biden’s recent call to reopen an investigation into whether the virus that causes Covid-19 could have originated in a research lab in Wuhan, China. The task force was given 90 days to report its findings.

Biden to revisit origin of Covid

A definitive investigation leading to conclusive understanding of the origin of Covid-19 is a good thing, important to protecting the future health of the world. Provided, of course, that the work is above-board, science-based and conducted by a scientifically qualified team of people of impeccable honesty and integrity.

A team of investigators that includes the likes of a Peter Navarro or Mike Pompeo would not pass the smell test. Furthermore, to be completely comprehensive, some of the other speculations besides the Wuhan lab theory deserve to be included in the investigation.

For instance, the biological laboratories at Fort Detrick in Maryland were shut down by the US Centers for Disease Control and Prevention for violations of safe practices more than six months before the outbreak in Wuhan.

Around that time there were unexplained deaths caused by respiratory failures. A full account was never made public, but the issue was swept under the carpet by blaming the fatalities on excessive vaping, that is, inhalation of fruit-flavored smoke.

There were also reports in cyberspace that there was evidence of the coronavirus being found in European sewage systems, again months before the Wuhan outbreak. What happened to all those rumors? If the Biden task force is not just for the purpose of pinning the blame on China, but to perform a thorough and credible investigation, 90 days may not be enough.

Secretary of State Tony Blinken’s approach to competing with China is to recruit and reorganize former allies to band together against China. These former allies were offended and turned off by former president Donald Trump and his go-it-alone approach. But what does Blinken have to offer to entice the allies to join the fray?

A recent tally indicates that 165 countries now consider China their No 1 trading partner, as compared with 13 countries that regard the US as their No 1 trading partner. More than 100 countries are participants of China’s Belt and Road Initiative in more than 2,600 projects with a total value of US$3.7 trillion. As his only counter, Blinken goes around the world warning the countries to beware of debt traps.

Obviously, the US does not have the ability to compete with China when it comes to doing business via trade or provide assistance in erecting infrastructure. Countries are asked to choose sides with no clear idea of the benefits of aligning with the US.

The only alternative is to slander China and turn world opinion against Beijing.

The US as ‘model of democracy’

Thus Blinken has to trot out the usual tropes, that China is not democratic, has no human rights etc, ad nauseam. All of the prospective allies are urged to be freedom-loving democracies like America.

So how does the US stack up as a “model” democracy? Let’s count the ways.

The losing candidate of the last presidential election, Donald Trump, still claims to have won. Members of his political party, the Republicans, have gone to great lengths to shield him from going to jail, even for violating the statutes of the US constitution.

As part of the debacle, the Republican Party at the state level is busy devising ways to deny certain citizens the right to vote. In its view, democracy is not for everybody in America and winning by hook or crook is everything.

Mass shootings in America have become a nearly daily occurrence. In America, the right to carry an assault weapon is an human right more important than a human life.

The US with just 4.4% of the world’s population has 22% of world’s prison population, far and away the most of any country. China with about 4.5 times the US population has fewer people incarcerated, and yet we Americans accuse China of abusing human rights.

Furthermore, the US prisons house a disproportionate share of black and brown people.

Young children torn away from their refugee parents at the southern border, and still unaccounted for, is yet another blot on our human-rights record.

Because of concerted efforts by the central and local governments, China has lifted all of its people out of poverty. In America, conditions in the ghettos have not changed much and they are still mostly populated by black and brown people. One out of eight Americans lives below the poverty line.

Government officials in China are given rotating assignments and graded on their performance. They get promoted if they show they are capable of taking on increasing responsibility. In the US, the most important requirement for those aspiring to public office is to be able to raise a lot of money, or be already wealthy.
By any objective measure, would any potential allies find the US a worthy model of democracy to follow? Blinken has a tough sell ahead of him.

The Biden administration is also planning to compete with China by investing in and subsidizing the development of new technologies. The Endless Frontier Act, surprisingly enough, has bipartisan support for dedicating $120 billion to focus on artificial intelligence, superconductors and robotics.

Biden bets $52 billion on semiconductors

Supposedly, Biden will throw $52 billion at the American semiconductor industry to build new manufacturing facilities in the US, known as fabs. I am doubtful that this will work.

The US used to be the world’s leading maker of semiconductor chips. But as the design of the chips became more complex, the cost of the fabs increased geometrically, and soon Silicon Valley companies gave up manufacturing and just concentrated on designing proprietary chips, relying largely on Taiwan Semiconductor Manufacturing Corporation to make them.

Today, Intel is the only US company that still owns fabs, and it has publicly admitted that they are two to three generations behind TSMC’s. Morris Chang, founding chairman of TSMC, has openly questioned whether US companies would still have engineers with the experience and skills needed to run a state-of-the-art fab.

China also does not own state-of-the-art fabs because the US will not allow the sale of advanced manufacturing equipment to China. Therefore, regardless of whether the $52 billion will be well spent, China will not catch up for some time.

But if Beijing needs skilled engineers to run an advanced fab, it can always recruit from Taiwan to supplement its own staff. Many are already working in China.

To attain the most advanced fab, China will need to buy lithographic machines from ASML, based in Netherlands. Already, Peter Wennink, chief executive of ASML, is fretting that the US export control measures will prevent his company from selling the most advanced machines to China, each with a $1 billion+ price tag.

The loss of the China market would mean the loss of more than one-third of ASML’s revenue, and therefore funds for further research and development, necessary in order to maintain the company’s technological lead. Wennink is worried that the export restriction will force China to develop its own technology and soon not only ASML will lose a major customer but will face a new competitor.

You’d have to wonder how long the European company will go along with the Washington ban on exports to China.

Another aspect of disengaging China is to discourage the enrollment of STEM (science, technology, engineering and mathematics) graduates from that country in US universities. US Senator Tom Cotton, for one, thinks Chinese students are here just to steal American knowhow.

But without the infusion of the best and brightest international students – and students from China make up more than one-third of them – elite schools such as the Massachusetts Institute of Technology (MIT) would wither and shrivel if they had only America’s own graduates, trained by a faltering K-12 system, to draw from.

One anecdotal story will illustrate my point. At a recent international math competition among high-school students, the US team beat the team from China for first place. But the “upset” win can be attributed to the fact that every member of the US team was ethnic Chinese, students whose parents had immigrated to the US from China.

The quality of China’s universities is improving; many are already among the world’s top 50 schools. China’s elite schools may not yet on par with their US counterparts but Beijing believes in investing in human capital. If its graduate students can’t come to the US, they can go elsewhere, or simply stay home and learn from the best professors recruited from around the world.

The loser in the long run would be the US.

Engagement has been good for America

All along, we Americans have been acting like the 40+ years of engagement has been a one-way boon for China at our expense. That’s hardly the case.

Collaboration enabled Apple to “design in California and assemble in China,” a strategy so successful that the company is now worth more than $2 trillion. Had Apple designed and assembled in the US, the high costs would have limited its sales and stunted the profitability and growth of the company.

With much fanfare, Trump announced that Foxconn, which had been the principal assembler of Apple products, would build a big plant in Wisconsin. He chalked that win up to his “persuasive” personality. Yet the plant has not materialized because the labor rates of China are just too far apart from those of the US. Even Trump can’t wring water out of a rock.

And that was at the high end. On the low end of the economy, low-cost imports filled the shelves of Walmart and American consumers continued to enjoy their standard of living and not face rising prices. As much as 60% of China’s trade surplus with the US was due to goods made by American companies in China.

Because China’s economy grew at a remarkable rate, doubling every eight to 10 years, American companies that initially went there to source their products began to expand their investments in order to participate in the Asian country’s growing middle class as the size of China’s market became comparable to their home market.

America’s leading technology companies soon saw the wisdom of designing in China for the world. They set up R&D centers to take advantage of the technical talents in China, which produces eight times the number of STEM university graduates as the US.

Sadly, our leaders in Washington only know that might makes right and we have the strongest military in the world. They are banking on the premise that we can outcompete with China on the basis that we can wreak more death and destruction.

Otherwise, disengaging and competing with China will be at best a mutually diminishing outcome. It won’t help Washington solve our deteriorating infrastructure, failing school system, deaths by random shootings, and widening gap in income between the super-rich and the have-nots.

We need leaders with the vision and political courage to see and tell the American people what’s good for America and that competing with China is not the way. In fact, as we continue on the Biden trajectory, we could be on a downward spiral that spells the end of the American empire.

Dr George Koo recently retired from a global advisory services firm where he advised clients on their China strategies and business operations. Educated at MIT, Stevens Institute and Santa Clara University, he is the founder and former managing director of International Strategic Alliances. He is currently a board member of Freschfield’s, a novel green building platform.

The following is translated using Google-translate.

拜登對中國的痴迷可能會毀掉美國 – 過去與中國的合作對美國及其人民有益,現在應該再次出現 作者:GEORGE KOO 2021 年 6 月 2 日

國務卿托尼·布林肯與中國競爭的方法是招募和重組美國的前盟友,聯合起來對抗中國。

很難說美國總統喬拜登對中國的立場是他的真實信念,還是他只是順應了華盛頓強烈的反華情緒,但他的中國團隊現在已經正式表態:不再與中國接觸,只是競爭。在這裡。

請注意,拜登團隊所考慮的競爭性質並不是那種紳士式的體育比賽,在這種比賽中,我對你的支持會激勵你對我的支持,最終我們都更適合競爭。

不,所有跡像都表明,全力以赴,不帶腰帶,挖眼,不擇手段地攻擊對方,即中國。兩個正在進行的發展表明了這一結論。

繞過美國國會的是所謂的 2021 年戰略競爭法。 它尚未頒布,因此我們不太了解所有條款。我的理解是,多達3億美元已被用於在世界範圍內抹黑中國的形象。

在這個假新聞氾濫的時代,通過影射、誇張甚至徹頭徹尾的謊言來暗殺一個人的性格(或一個國家的聲譽)很容易做到。美國主流媒體的 August 成員,例如《紐約時報》或《華盛頓郵報》,並不擅長提供或提供錯誤信息,有時出於深謀遠慮的惡意,有時只是懶得核實可疑消息來源。

與所有這些一致的是拜登最近呼籲重新調查導致 Covid-19 的病毒是否可能起源於中國武漢的一個研究實驗室。工作組有 90 天的時間報告其調查​​結果。

拜登重新審視Covid的起源

最終調查導致對 Covid-19 起源的最終了解是一件好事,對保護世界未來的健康很重要。當然,前提是這項工作是光明正大的、以科學為基礎的,並且由一支由科學合格、誠實正直的人組成的團隊進行。

包括 Peter Navarro 或 Mike Pompeo 在內的一組調查人員不會通過氣味測試。此外,為了完全全面,除了武漢實驗室理論之外,其他一些推測也值得納入調查。

例如,馬里蘭州德特里克堡的生物實驗室在武漢爆發前六個多月就因違反安全規範而被美國疾病控制與預防中心關閉。

大約在那個時候,由於呼吸衰竭導致無法解釋的死亡。從未公開過完整的說明,但通過將死亡歸咎於過度吸電子煙,即吸入水果味的煙霧,這個問題被掩蓋了。

網絡空間也有報導稱,在武漢爆發前幾個月,有證據表明在歐洲污水系統中發現了冠狀病毒。所有這些謠言是怎麼回事?如果拜登專案組不僅僅是為了將責任推到中國身上,而是為了進行徹底可信的調查,90天可能還不夠。

國務卿托尼·布林肯(Tony Blinken)與中國競爭的方法是招募和重組前盟友,聯合起來對抗中國。這些前盟友被前總統唐納德特朗普及其單打獨鬥的做法冒犯和拒之門外。但是布林肯必須提供什麼來吸引盟友加入戰鬥?

最近的一項統計表明,現在有 165 個國家將中國視為第一大貿易夥伴,而 13 個國家將美國視為第一大貿易夥伴。 100多個國家參與了中國“一帶一路”倡議的2600多個項目,總價值3.7萬億美元。作為他唯一的反擊者,布林肯在世界各地警告各國提防債務陷阱。

顯然,在通過貿易開展業務或在建設基礎設施方面提供幫助方面,美國沒有能力與中國競爭。要求各國在不清楚與美國結盟的好處的情況下選邊站。

唯一的選擇是誹謗中國,讓世界輿論反對北京。

美國是“民主的典範”

因此,Blinken 不得不說出通常的比喻,即中國不民主,沒有人權等,令人作嘔。所有潛在的盟友都被敦促成為像美國這樣熱愛自由的民主國家。

那麼,美國是如何成為“模範”民主的呢?讓我們數一數。

上屆總統選舉的失敗候選人唐納德特朗普仍然聲稱獲勝。他的政黨共和黨成員竭盡全力保護他免於入獄,即使他違反了美國憲法的規定。

作為失敗的一部分,州一級的共和黨正忙於想方設法剝奪某些公民的投票權。在它看來,民主並不適合美國的每個人,靠鉤子或騙子取勝就是一切。

美國的大規模槍擊事件幾乎每天都在發生。在美國,攜帶攻擊性武器的權利是一項比人的生命更重要的人權。

僅佔世界人口 4.4% 的美國,卻擁有世界上 22% 的監獄人口,在所有國家中遙遙領先。人口大約是美國4.5倍的中國,被監禁的人更少,而我們美國人卻指責中國侵犯人權。

此外,美國監獄關押著不成比例的黑人和棕色人種。

年幼的孩子在南部邊境與他們的難民父母分開,仍然下落不明,這是我們人權記錄上的又一個污點。

在中央和地方政府的共同努力下,中國實現了全民脫貧。在美國,貧民窟的情況沒有太大變化,他們仍然主要由黑人和棕色人種居住。八分之一的美國人生活在貧困線以下。

中國的政府官員輪流分配任務,並根據他們的表現進行評分。如果他們表明他們有能力承擔越來越多的責任,他們就會得到提升。在美國,對於那些有志於公職的人來說,最重要的要求是能夠籌集到大量資金,或者已經很富有。

以任何客觀衡量標準,任何潛在的盟友會認為美國是值得效仿的民主模式嗎?布林肯在他面前有一個艱難的賣點。

拜登政府還計劃通過投資和補貼新技術的開發來與中國競爭。令人驚訝的是,《無盡前沿法案》得到了兩黨的支持,將 1200 億美元用於專注於人工智能、超導體和機器人技術。

拜登在半導體上押注 520 億美元

據稱,拜登將向美國半導體行業投入 520 億美元,在美國建立新的製造設施,即晶圓廠。我懷疑這是否有效。

美國曾經是世界領先的半導體芯片製造商。但隨著芯片設計變得越來越複雜,晶圓廠的成本呈幾何級數增長,很快矽谷公司放棄製造,只專注於設計專有芯片,主要依賴台積電製造。

今天,英特爾是唯一一家仍然擁有晶圓廠的美國公司,它公開承認比台積電落後兩到三代。台積電創始主席莫里斯·張(Morris Chang)公開質疑美國公司是否仍然擁有擁有運營最先進晶圓廠所需經驗和技能的工程師。

中國也沒有最先進的晶圓廠,因為美國不允許向中國出售先進的製造設備。因此,不管這520億美元花得是否合理,中國在一段時間內都趕不上。

但如果北京需要熟練的工程師來運營先進的晶圓廠,它總是可以從台灣招聘來補充自己的員工。許多人已經在中國工作。

為了獲得最先進的晶圓廠,中國需要從位於荷蘭的 ASML 購買光刻機。 ASML 的首席執行官 Peter Wennink 已經擔心美國的出口管制措施將阻止他的公司向中國出售最先進的機器,每台機器的價格都超過 10 億美元。

失去中國市場將意味著損失超過三分之一的 ASML 收入,因此需要進一步研發資金,以保持公司的技術領先地位。 Wennink 擔心出口限制將迫使中國開發自己的技術,很快不僅 ASML 將失去一個主要客戶,而且將面臨一個新的競爭對手。

你不得不想知道這家歐洲公司會在華盛頓對中國出口的禁令中堅持多久。

與中國脫離接觸的另一個方面是阻止來自該國的 STEM(科學、技術、工程和數學)畢業生進入美國大學。一方面,美國參議員湯姆·科頓認為中國學生來這裡只是為了竊取美國的專業知識。

但如果沒有最優秀、最聰明的國際學生的注入——其中來自中國的學生佔三分之一以上——麻省理工學院(MIT)等精英學校如果只有美國自己的畢業生,就會枯萎和萎縮,由搖搖欲墜的 K-12 系統訓練,從中吸取教訓。

一個軼事可以說明我的觀點。在最近的一次國際高中生數學競賽中,美國隊擊敗了中國隊獲得了第一名。但這次“心煩意亂”的勝利可以歸因於美國隊的每個成員都是華裔,他們的父母都是從中國移民到美國的學生。

中國大學的質量在提高;許多學校已經躋身世界前 50 名學校之列。中國的精英學校可能還不能與美國的精英學校相提並論,但北京相信投資於人力資本。如果它的研究生不能來美國,他們可以去其他地方,或者乾脆呆在家裡向從世界各地招聘的最好的教授學習。

從長遠來看,輸家將是美國。

接觸對美國有利

一直以來,我們美國人一直表現得好像 40 多年的接觸對中國來說是一種單方面的恩惠,而以我們為代價。事實並非如此。

合作使蘋果公司能夠“在加利福尼亞設計,在中國組裝”,這一戰略非常成功,公司現在價值超過 2 萬億美元。如果蘋果在美國設計和組裝,高昂的成本將限制其銷售並阻礙公司的盈利能力和增長。

特朗普大張旗鼓地宣布,曾是蘋果產品主要組裝商的富士康將在威斯康星州建一座大工廠。他將這一勝利歸結為他“有說服力”的個性。然而,該工廠並未實現,因為中國的勞動力水平與美國相差太遠。即使是特朗普也無法從岩石中擰出水來。

那是在高端。在經濟的低端,低成本的進口商品擺滿了沃爾瑪的貨架,美國消費者繼續享受他們的生活水平,而不是面臨價格上漲。中國對美貿易順差的 60% 來自美國公司在中國生產的商品。

由於中國經濟以驚人的速度增長,每 8 到 10 年翻一番,最初到那裡採購產品的美國公司開始擴大投資,以參與亞洲國家不斷壯大的中產階級,因為中國市場的規模變得可比到他們的國內市場。

美國領先的科技公司很快就看到了在中國為世界設計的智慧。他們設立研發中心以利用中國的技術人才,中國的 STEM 大學畢業生人數是美國的 8 倍。

可悲的是,我們在華盛頓的領導人只知道這可能是對的,我們擁有世界上最強大的軍隊。他們寄希望於這樣一個前提,即我們可以在我們可以造成更多死亡和破壞的基礎上戰勝中國。

否則,與中國脫離接觸和競爭充其量只是一種相互抵消的結果。它無助於華盛頓解決我們日益惡化的基礎設施、失敗的學校系統、隨機槍擊造成的死亡以及超級富豪和無產者之間不斷擴大的收入差距問題。

我們需要有遠見和政治勇氣的領導人,能夠看到並告訴美國人民什麼對美國有利,與中國競爭不是辦法。事實上,隨著我們繼續沿著拜登的軌跡前進,我們可能會陷入一個螺旋式下降,這意味著美國帝國的終結。

George Koo 博士最近從一家全球諮詢服務公司退休,他在該公司就客戶的中國戰略和業務運營提供諮詢。他在麻省理工學院、史蒂文斯研究所和聖克拉拉大學接受教育,是國際戰略聯盟的創始人和前任董事總經理。他目前是新型綠色建築平台 Freschfield’s 的董事會成員。

Business Insider: Suspicions mount that the coronavirus was spreading in China and Europe as early as October, following a WHO investigation

Business Insider: Suspicions mount that the coronavirus was spreading in China and Europe as early as October, following a WHO investigation by Aylin Woodward Feb 10, 2021, 5:52 PM

A growing body of evidence suggests the coronavirus was spreading globally months before the first cases in a Wuhan market captured global attention last December.

https://www.businessinsider.com/coronavirus-circulated-europe-china-before-wuhan-outbreak-2020-12

The World Health Organization sent an international team to China in January to investigate the virus’ origins and when it started circulating.

The team assessed medical records from more than 230 clinics across Hubei — the province where Wuhan is located — to look for clues. More than 90 patients in the province were hospitalized with pneumonia or coronavirus-like symptoms in October and November 2019, the Wall Street Journal reported Wednesday.

This finding lends credence to other research from China that shows people were getting sick in Wuhan in November and early December. One analysis, based on satellite images of Wuhan hospitals and online searches for COVID-19 symptoms in the area, suggested the virus may have started circulating there as early as late summer.

A study from Milan’s National Cancer Institute also found that four of Italy’s coronavirus cases dated back to October 2019. Another study suggests the virus reached the US’ West Coast in December 2019.

Although pinpointing the exact date of the virus’ first jump from animals to people is impossible without more data, these findings suggest the pandemic’s December anniversary is arbitrary.

The virus was spreading in Wuhan before the December

Wuhan public-health officials initially told the WHO about a mysterious illness that would later be named the novel coronavirus on December 31, 2019.

But government records show China’s first coronavirus case happened on November 17, 2019, according to an investigation by the South China Morning Post.

According to the SCMP, Chinese medical experts pinpointed 60 coronavirus cases from November and December by reanalyzing samples taken from patients seen during that time. That analysis showed that a 55-year-old from Hubei was the first known case of COVID-19 in the world, though the disease hadn’t been identified at that time.

Prior to the January WHO investigation, Chinese authorities worked to sample blood from 92 people in Hubei who were hospitalized with coronavirus-like symptoms prior to the start of the pandemic.

They sampled blood from two-thirds of those patients that to check for coronavirus-specific antibodies, which would indicate the patients had previously been infected with the virus. All of the samples tested negative for those antibodies, the Wall Street Journal reported.

The remaining one-third of those 92 patients had either died or refused to participate in antibody testing.

The negative results may not mean those people didn’t have COVID-19. Antibody levels do decrease over time, particularly after mild cases. But those patients were also hospitalized, suggesting a more severe illness.

“Antibodies do clear. The levels go down, but less so in cases of severe infection,” Marion Koopmans, a virologist on the WHO team, told the Wall Street Journal. “From what we know about serology, out of 92 cases you would at least have some positives.”

A study from researchers at Harvard University did find more people were visiting Wuhan hospitals in the latter half of 2019. The study authors used satellite imagery of the city to measure traffic to six city hospitals. They saw an uptick starting in August 2019, which peaked six months later. This timeline coincided with an increase in online search traffic for terms like “diarrhea” and “cough.”

The Wuhan market was not the origin of the pandemic

Wuhan lockdown

Among the 41 coronavirus cases, Wuhan first reported, many were people who visited or worked at the city’s Huanan Seafood Wholesale Market.

But according to an April report, 13 of the 41 original cases had no link to the market — which suggests the market wasn’t the origin site of the pandemic.

The WHO team confirmed the virus didn’t make its initial jump from animals to humans at the Huanan market. Evidence suggests the virus was circulating elsewhere in Wuhan before the market outbreak happened, Liang Wannian, a member of China’s National Health Commission who assisted with the WHO investigation, said in a press conference Tuesday.

A May investigation also led the Chinese Center for Disease Control and Prevention to rule the market out as the origin place of the outbreak. That’s because none of the animals there tested positive for the virus.

Most likely, the market was simply the site of an early superspreader event, with one sick person infecting an atypically large number of others. Superspreader events around the world have created clusters of infections that cropped up almost overnight.

Research suggests the virus was in Italy in the fall of 2019

Italy recorded its first official coronavirus case in Lombardy on February 21, 2020. Yet a recent study found coronavirus antibodies in blood samples collected from 23 Italians in September 2019 and 27 in October 2019.

“Our results indicate that SARS-CoV-2 circulated in Italy earlier than the first official COVID-19 cases were diagnosed in Lombardy, even long before the first official reports from the Chinese authorities, casting new light on the onset and spread of the COVID-19 pandemic,” the authors wrote. (SARS-CoV-2 is the clinical name of the virus.)

A study conducted by Rome’s Department of Environment and Health supports that conclusion: Researchers found the coronavirus’ genetic material in sewage samples from Milan and Turin dating back to December 18, 2019.

Spain and France also found clues that the virus was circulating in 2019

In May, doctors at a Paris hospital discovered that patients they’d treated for pneumonia on December 27, 2019, had been sick with COVID-19. France didn’t record its first official case until January 24, however.

Barcelona, Spain, COVID-19 coronavirus August 31 2020

In Spain, meanwhile, researchers from the University of Barcelona found evidence of the coronavirus in city sewage samples collected in mid-January 2020, six weeks before the country’s first official case.

Surprisingly, a sewage sample collected on March 12, 2019, also tested positive for traces of the coronavirus. But testing wastewater isn’t a perfect way to detect outbreaks, as Claire Crossan wrote in The Conversation. So it’s possible that the March sample had been contaminated during the study.

By December 2019, the virus had reached the US

Research in the US, too, offers evidence that the virus had gone global before humanity even knew it existed.

The US recorded its first coronavirus case on January 20, 2020. But according to one study, the virus had reached the Pacific Northwest at least a month earlier. Blood samples collected by the American Red Cross in nine states, including California, Oregon, and Washington, showed that some Americans had coronavirus antibodies as early as December 13, 2019.

Detroit tests for antibodies

Antibodies are an imperfect measure of the outbreak since some research suggests our immune systems can create antibodies that recognize the new coronavirus in response to some common colds. Antibody tests can also yield false positives.

Yet in the past, scientists successfully used retrospective antibody studies to trace the origins of SARS and Middle East respiratory syndrome (MERS) — both coronaviruses. Virologists found antibodies specific to SARS in civet cats, and antibodies specific to MERS in camels, which is how they determined those to be each virus’ animal progenitor.

Further examination of blood samples taken in 2019 could be the best way to find out when this pandemic really began.

Design a site like this with WordPress.com
Get started