Hong Kong Celebrates China’s successfully put down US’s NED/CIA color revolution subversive activities at Tiananmen Square on June 4, 1989 in the name of fake freedom, democracy and human rights.

香港慶祝美國六四顏色革命顛覆活動失敗 Hong Kong Celebrates China’s successfully put down US’s NED/CIA color revolution subversive activities at Tiananmen Square on June 4, 1989 in the name of fake freedom, democracy and human rights.
https://vimeo.com/558642345
https://vimeo.com/557806591
美國加州舊金山世界日報, World Journal Newspaper San Francisco, June 4, 2021

《 六四你平反甚麼?》

睡覺前我想反駁另一位向我發訊息的朋友,不管你是黄是藍,對於本人來講都一樣,因爲大家都是香港人。

在對話中你只講歪理,但拿我沒法,最後你提醒我 “毋忘六四”。

OK,就這句話姐在此公開解構一下你的問題。

六四當年姐只有三歲,你的年紀跟我相差多少其實並不重要,而是你有親身經歷過六四嗎?你有去過大陸嗎?我想你沒有。

姐當年就在北京二環三環等胡同裡跟那幾十位老北京們談過這件事,他們都異口同聲的說當年的清場是必須的,事件的始末與發展跟你的認知是大相逕庭。

當年因為全國的大學生都湧進北京城内,導致北京城内的治安急劇惡化,有不少學生打砸搶燒,甚至有警察、士兵和勸阻的人被學生放火燒死,然後曝屍,你知道這些事嗎?

這些阿姨伯伯親眼目睹的事都不可信,西方媒體的造謠新聞才是真理嗎?我只能夠總結這樣說:一群人在相對無知之下所產生出來的結果。

再者,六四事件關你甚麼事?與閣下有甚麼家仇國恨?南京大屠殺你又不講?當年鬼子侵華,南京血腥屠殺了三十萬中國軍民,還有那些八年抗戰死去的先烈,如此血海深仇,今日你又不去日本向日皇討回公道?

如果你心中一直要糾結這些事,証明你是一名偏執狂,一種具有極度焦慮及恐懼特性的思考方式,且是一個經常非理性與妄想的人。

將這些無意義的純粹口號緊鎖自己,這種劃地爲牢綑綁自己的狭隘思維,會絶對防礙你人生路途的發展,甚至會帶給你與人交往的惡性因果,你須要改變自己對世界的無知。

既然平生不認中國人,為何每逢六四又格外思親,政棍年年今日揾老襯,時辰一到,然後開壇作法,來個集體失憶,大伙一起鬼上身是嗎?

六四當日,亦是悼念巴勒斯坦人被以色列屠殺的紀念日,死去成千上萬的巴勒斯坦人,你們又為何無動於衷?

說到底,就是你擺脫不了共產黨一直被妖魔化的催眠,而且像行屍走肉一樣,活在别人設計的世界之中。

中國最大的問題:就是他大國崛起,他的對手這輩子都要跟他扛下去,至死方休。而六四天安門事件,除了中共内部鬥争,亦涉及外部勢力渗透,推波助瀾組織而成的一場學生運動。

去揾份工做啦朋友,有時間返大陸行吓,睇吓而家祖國嘅進步,得閒睇多啲書,試吓多角度諗吓嘢,對你絶對有益無害。

詹珮宜

Why CPC strong leadership key to leading China over crucial test, en route to rejuvenation through 100 years

Why CPC strong leadership key to leading China over crucial test, en route to rejuvenation through 100 years by Yang Sheng, Chen Qingqing and Cao Siqi Jun 03 2021

A visitor looks at statues of earlier generations of revolutionaries at the site of the First National Congress of the CPC in Shanghai on Thursday when restoration at the site finished and it is reopened to the public as a museum.

Editor’s Note:

With the 100th anniversary of the founding of the Communist Party of China (CPC) less than a month away, the Global Times will publish a series of reports to decode why the CPC is the destined choice for the Chinese people, why it can rise above challenges and tests in a century, and what is its secret code to success in governing such a vast country and implementing effective economic policies that have created an economic miracle for China and the world.

The current series will be divided into two parts to explore how the CPC withstood storm after storm and overcame crisis after crisis and how firm leadership becomes the key to the CPC’s success. This is the first part of the current series, which focuses on how the CPC has overcome serious challenges and gone through tests one by one in the history. The second part, which will be published on Saturday, will start from the internal and external challenges the Party was faced with in the 1980s.

People take photos in front of the site of the First National Congress of the CPC in Shanghai on April 23, 2021.

The Communist Party of China (CPC) and the Chinese people are gearing up for grand celebrations for the 100th anniversary of the founding of the Party on July 1 – a truly remarkable milestone for the CPC and the over 1.4 billion Chinese people.

Around the world, political parties with more than 100 years’ history are not rare, but almost none could claim the achievements the CPC has made. Through a series of crucial tests and crises, the CPC has emerged even stronger and more confident, leading a torn-apart, poverty-stricken nation out of its darkest moments to a world-leading power today en route for a great national rejuvenation.

In the past 100 years, the CPC experienced several “darkest hours” in its centurial journey, including the Kuomintang (KMT)’s massacre of CPC members in the 1920s, the setback caused by the Cultural Revolution from the 1960s to 1970s, and the impact of Western ideology in the late 1980s.

Today, experts and scholars are trying to find out what is the key for the Party to overcome those challenges through wise decision-making and self-correction, to prevent a collapse and failure like other communist parties in some former socialist countries, and make China a powerful, successful and confident country that makes the West, which used to have unshakable confidence and supremacy, more and more anxious.

Before the founding of the People’s Republic of China (PRC) in 1949, also called the era of revolution, the CPC also experienced serious crises such as the April 12 Counter-revolutionary Coup (also known as the Shanghai massacre) in 1927 when the KMT regime killed thousands of CPC members, and the failure of the campaign against “encirclement and suppression” launched by the KMT regime in 1933. In these “darkest hours,” the CPC almost lost more than half of its strength and even risked almost being completely destroyed by the KMT regime.

Before the Zunyi Conference in 1935 which confirmed Mao Zedong’s military leadership of the Red Army, the Party didn’t have a strong leadership core, and the revolution suffered setbacks and tragedies. The Zunyi Conference brought a changeover for the CPC, and overturned the failing tendency.

This proved that the Party leadership with a strong core is essential to ensure the victory and prevent failure, said experts.

Analysts and scholars of Party history said that there are some key similarities or lessons that could be highlighted from these crises – some leaders or elites of the Party held wishful thinking and compromised their stance toward the enemies of the Party and the Chinese people; they blindly attached too much hope on the experiences and thoughts from other countries, and heavily relied on foreign advisors without self-developed ideas based on China’s unique national conditions; and the decision-making board was not united and leaders shared no consensus on the path of the revolution and made wrong judgments on China’s national condition.

These problems also occurred from time to time after 1949, and adding the huge external threats and complicated relations with the super powers during and after the Cold War, these problems have also brought some extreme difficulties and risks to the country and the Party after the PRC was established. “How did the CPC go through these ‘darkest hours’ and overcome the extreme challenges?” By answering this question, it can allow the foreigners interested in China and some Westerners who failed to understand the CPC decision-making and could not explain China’s development to learn a better way to deal with China and the CPC today, said Chinese experts, adding that this will also help people understand how and why the CPC will handle the challenges in the future.

According to experts on Party history and Chinese politics reached by the Global Times, there is one key reason why the CPC can always overcome those crises and find the correct direction of the path – the Party can always find its proper and strong core leadership to ensure the victories against the enemies and realize self-correction.

The Red Boat on South Lake in Jiaxing, East China’s Zhejiang Province where the first National Congress of the CPC was concluded after the discussions in Shanghai was interrupted.

Fighting for autonomy

The first major life-and-death moment for the CPC after 1949 was the Cultural Revolution between 1966 and 1976. This incident caused the Party, China and people to suffer the most serious setbacks and losses since the founding of the PRC, and the economy was on the verge of collapse, said Luo Pinghan, a professor at the Party School of the Central Committee of CPC.

Apart from the internal chaos and difficulties, China was also facing serious external threats from both Soviet Union and the US. According to leaked documents from the Pentagon, in 1958, amid the second Taiwan Straits crisis, the US had planned to launch nuclear strikes against almost every major city in China to not only destroy the military and industrial targets but also to eliminate the Chinese population.

At the same time, the Sino-Soviet split also caused the relationship between China and the Soviet Union to intensify, and both sides even had a military conflict at the border in 1969. After the conflict, the Soviet Union also planned to launch nuclear strikes against China’s major military bases and cities, including the capital city Beijing, according to historical references.

Due to tensions with both the US and Soviet Union, not just being threatened militarily, China’s development faced huge difficulties due to the sanctions and pressure from both superpowers.

To ensure the security and autonomy of China under such a severe situation, the first generation of CPC leaders with Mao as the core had to be tough when dealing with the US and Soviet Union, said Jin Canrong, associate dean of the School of International Studies at the Renmin University of China.

“In this period, the most important mission for the CPC was to ensure the survival of the PRC, so from the 1950s to 1970s, China was assertive and determined to defend its hard-won independence and autonomy. The CPC needed to prevent the PRC from being controlled or bullied by others at all cost,” Jin said.

Thanks to the success in developing China’s own nuclear weapons and ballistic missiles in the 1960s, also known as the “Two Bombs, One Satellite” project, as well as the flexible decision-making and diplomatic efforts, and by leveraging the struggle between the US and Soviet Union, China successfully avoided and deterred a nuclear war with the two superpowers amid the Cold War, said experts.

” The ‘Three World Theory’ proposed by Mao proved to be relevant. As the core of the CPC and China’s leader at that time, Mao wisely used the confrontation between the US and Soviet Union to expand China’s influence and popularity in the third world,” Yang Xuedong, a professor of political science at Tsinghua University, told the Global Times.

After a series of diplomatic, political and military efforts, the PRC was recognized as “the only legitimate representative of China to the UN” in 1971 and also achieved the goal of normalization of China-US ties in 1972. Some analysts said the CPC is really good at seeking opportunity from the crisis, and even turn the crisis into an opportunity.

People look at a statue called “winning bugle” in Jinggangshan, the “cradle of the Chinese revolution,” in East China’s Jiangxi Province on April 23.

Inheritance and self-correction

While the danger of war with superpowers was avoided, China’s international influence was growing and in the field of strategic nuclear power, China achieved significant goals, but the internal problem of the Cultural Revolution still remained.

In 1976, the victory in smashing the “Gang of Four” lifted the Party and the country from the crisis, but the political, ideological, organizational, and economic chaos left over from the Cultural Revolution was still very dire, and it was not easy to get rid of such a predicament and start anew, Luo said.

In 1978, the Party led and supported discussion about “Practice is the sole criterion for testing the truth,” which was of great significance in bringing the country out of the chaos. The 3rd Plenary Session of the 11th Central Committee of the CPC fundamentally broke the binding shackles of the problems of left-leaning theories, corrected the Party’s guiding ideology, re-established the Marxist ideological, political, and organizational line, and eventually realized the Party’s successes since the founding of the PRC.

“This was a great turning point with far-reaching significance in history.” The Party earnestly corrected major historical wrongs, adopted a series of measures to rectify unjust and erroneous acts, and implemented various policies conducive to strengthening unity, mobilizing all positive elements, Luo noted.

In the transition period between the first generation of CPC leaders with Mao at its core and the second generation with Deng Xiaoping at the center, the CPC has avoided huge internal turbulence like what happened in the Soviet Union after former Soviet leader Joseph Stalin’s death as Nikita Khrushchev denied the contributions Stalin made to the Soviet Union.

The second generation of leadership inherited the first generation’s achievements and corrected its errors, rather than making no change, or replacing everything, and this remains the key reason why the CPC still exists and leads China in its march forward, while the Communist Party of the Soviet Union collapsed, said some observers.

The 6th Plenary Session of the 11th CPC Central Committee in 1981 passed the “Resolution on Certain Questions in the History of our Party since the Founding of the PRC”, which fundamentally denied the Cultural Revolution and its relevant ideals, but the resolution also successfully sought not to deny Mao and Mao Zedong Thought, and confirmed the guiding role of Mao Zedong Thought for the CPC.

“With the changes inside and outside China, it’s increasingly evident that the second generation of the CPC leadership with Deng at its core has political courage and foresight by implementing such correct and significant decisions,” Luo said.

This Is Harmony OS From Huawei, China: It Connects Everything!

This Is Harmony OS From Huawei, China: It Connects Everything! 這是來自中國華為的鴻蒙操作系統:它連接一切!In the past two decades, China has lost the PC era and the mobile Internet era in terms of operating systems. Now, in the IoT era, it finally has the opportunity to outcompete other players. In the words of Wang Chenglu: If HarmonyOS succeeds, the next 20 years of the mobile industry will belong to China. Published on June 3 2021 過去20年,中國在操作系統方面已經失去了PC時代和移動互聯網時代。 現在,在物聯網時代,它終於有機會超越其他玩家。 用王成錄的話來說:鴻蒙OS成功了,下一個20年的移動產業將屬於中國. https://youtu.be/3ai49xcDDBg
https://vimeo.com/558790063
https://www.facebook.com/100036400039778/posts/504219987467998/?d=n

Video: Biological warfare? Drosophila melanogaster discovered by Chinese customs sent from US

Video: Biological warfare? Drosophila melanogaster discovered by Chinese customs sent from US. Drosophila melanogaster is a species of fly in the family Drosophilidae. The species is often referred to as the fruit fly, though its common name is more accurately the vinegar fly. Drosophila is a significant pest that attacks healthy fruit prior to harvest. As fruit integrity is compromised by oviposition and larval feeding, common vinegar flies (i.e., Drosophila melanogaster) may also oviposit in the damaged fruit.
藏在貼錯標籤的海運集裝箱內, 從美國寄到中國的黑腹果蠅被中國海關發現.
https://vimeo.com/558746438
https://youtu.be/VBiY30yT4II
https://www.facebook.com/100036400039778/posts/504165310806799/?d=n

Academic paper reveals Hong Kong student protesters were paid to be guinea pigs in bizarre experiment that may have gone wrong

Academic paper reveals Hong Kong student protesters were paid to be guinea pigs in bizarre experiment that may have gone wrong 學術論文揭示香港學生抗議者在可能出錯的奇怪實驗中被支付為豚鼠 Allegations that pro-democracy activists in Hong Kong have been paid for their activities have swirled for years but have always been strenuously rubbished by the Western media. Now, an academic study seems to confirm just that. 關於香港民主活動人士因其活動而獲得報酬的指控已經流傳多年,但一直被西方媒體極力抨擊。 現在,一項學術研究似乎證實了這一點. 3 Jun, 2021

By Kit Klarenberg, an investigative journalist exploring the role of intelligence services in shaping politics and perceptions. Follow him on Twitter @KitKlarenberg

https://www.rt.com/op-ed/525596-hong-kong-paid-protests/

Secreted in the depths of academic journal American Economic Review’s June edition is an absolutely extraordinary research paper, revealing that a team of Western scholars conducted a somewhat peculiar study analyzing why students attended protests in Hong Kong – and that participants were paid to do so.

The paper’s abstract notes that the academics set out to study “the causes of sustained participation in political movements.” In order to “identify the persistent effect of protest participation,” and the role of social networks in organizing and motivating protests and protesters, they “randomly indirectly [incentivized]” – that is, paid – 849 students at the University of Hong Kong to participate in an “antiauthoritarian protest” for two years running, in 2017 and 2018.

The protest in question was the annual July 1 march, which has been convened every year since 1997, the year of Hong Kong’s handover from the UK to China. The academics say the marches studied were “peaceful” and “modestly sized”, attracting around 50,000 citizens, and sought “to both achieve policy concessions and signal the strength of the movement.”

They found that “incentives” to attend a political protest increased and, indeed, sustained subsequent crowd sizes, “but only when a sufficient fraction of an individual’s social network [was] also incentivized to attend the initial protest.”

Essentially, while a greater turnout among the wider population at large would “affect a subject’s beliefs about the likelihood that a public good is produced or a government crackdown may occur,” the participation of an individual’s friends had “a large effect on the social utility derived from protest participation, the coordination costs of attending, and social image considerations.”

The academics are keen to emphasize that they aimed to encourage protest participation without “explicitly” paying for people to attend, but instead “[paid] for behavior conditional on turnout.” So, the 849 randomly selected students weren’t directly remunerated for going to a protest, but for “providing information that would help estimate crowd sizes at the protest.” Participants were recruited via an email that was sent to the university’s entire undergraduate body.

Once the protests ended, participants filled in an online survey, and were given an additional HK$350 ($45) – about 1% of an average monthly wage on the island – for their “time and effort.” The original sum received for attendance isn’t stated.

“Subjects … received an email the day before the July 1, 2017 march with detailed instructions on how to complete the task. Treated subjects would be able to use a secure link to upload the information we requested,” the paper records. “Subjects who upload[ed] all the requested information and complete[d] the protest participation reporting module would be eligible to receive the bonus payment.”

If all that sounds rather strange, it’s because it absolutely is. For one, the academics’ finding that offering financial inducements to people to attend protests promotes turnout, particularly if those people know one another, seems banal and self-evident – a fait accompli if ever there was one.

The academics explain their rationale for conducting the research in the paper’s introduction, noting that, while “political rights have historically often arisen from successful, long-running movements,” there is a lack of empirical investigation into “the causes of individuals’ sustained participation in political movements.”

That seems reasonable enough, until one considers that the same group of scholars has been publishing papers on this question annually for quite some time – and, on each occasion, University of Hong Kong students have been their guinea pigs.

In 2016, for instance, their research included “manipulating” subjects’ beliefs about the participation of others to gauge whether a perception of ‘missing out’ drove greater attendance. A day before the July 1 protest that year, paid participants were provided with “truthful information” about other attendees’ protest plans to see if there was a corresponding increase.

That experiment was funded by the National Bureau of Economic Research (NBER), which, in 2010, ranked as the second-most influential economic think tank in the US. Two of the academics involved in the research, Leonardo Bursztyn and David Y Yang, are “affiliated scholars” of the NBER.

The organization is funded by a number of US government agencies and charitable organizations, including the controversial Bill & Melinda Gates Foundation, which raises the obvious question of who or what ultimately benefited from this research, and to what purpose the findings were put.

The latter riddle gets more curious when one considers that in their 2020 study of protest participation, the academics note that, while the University of Hong Kong’s Science and Technology (HKUST) department’s institutional review board (IRB) – the body that formally vets biomedical and behavioral research involving humans – approved their first “experimental intervention” with students in 2017, that approval was rescinded two years later.

“The HKUST Human Participants Research Panel (HPRP) wrote to us requesting that we remove references to the HKUST IRB approval of our study, on the basis that the study went beyond what was approved in our proposal,” the paper states.

Detail of this alleged breach of academic ethics isn’t provided, and the academics “unambiguously” reject the charge, although it may be no coincidence that HKUST sought to distance itself from the study on November 28, 2019 – the same month the violent “siege” of the University of Hong Kong erupted. The strife began when students disrupted road and train traffic near the campus on November 11 to facilitate a general strike.

The authorities responded by firing pepper bullets at students and launching volleys of tear gas into the campus, precipitating almost a week of ever-escalating violence from activists. Within days, students had created an elaborate system of barricades to block roads and shield the entrances to the university’s halls of residence, set traps to puncture car tyres, stockpiled a large number of petrol bombs, and were routinely hurling bricks and tiles, and firing arrows from rooftops at the police.

It’s unclear how many, if any, of the students participating in these incendiary activities were initially roused to political action by being “randomly” selected for the academics’ numerous protest studies over the years, but HKUST’s attempted backpedaling suggests it’s a distinct possibility that at least some were.

Tiananmen 1989 Student Leader Chailing: “We are hoping for bloodshed” | Western MSM will never show this. To Succeed, US’s Color Revolution must see blood and Chailing failed to deliver.

Tiananmen 1989 Student Leader Chailing: “We are hoping for bloodshed” | Western MSM will never show this. To Succeed, US’s Color Revolution must see blood and Chailing failed to deliver. 天安門1989學生領袖柴玲:“我們希望流血” | 西方 MSM 永遠不會讓你看到。 想要成功, 美國在天安門的顏色革命必須見血. There is a lot of misinformation and Western-media-created myth surrounding the mainland Chinese student protests of 1989 which involved occupying Tiananmen Square. This is a raw interview with Tiananmen Square’s most radical/recognizable student leader, and Commander-in-Chief of the Defend Tiananmen Headquarters, Chailing. 圍繞 1989 年中國大陸學生佔領天安門廣場的抗議活動,有很多錯誤信息和西方媒體製造的神話。 這是對天安門廣場最激進/最知名的學生領袖、保衛天安門司令部總司令柴玲的原始採訪。published Jun 3, 2021
https://vimeo.com/558642345
https://youtu.be/nbEpfOPPay8
https://www.facebook.com/100036400039778/posts/504064437483553/?d=n

Western money hired students from Hong Kong University of Science and Technology. These University Students “white mice” participated in a so-called social experiment, they studied demonstration patterns as an excuse, but in fact incited riots

American Economic Review” sponsored by the American Economic Association revealed that Western money hired students from Hong Kong University of Science and Technology. These University Students “white mice” participated in a so-called social experiment, they studied demonstration patterns as an excuse, but in fact incited riots. . The so-called “scholars” in charge of the research come from the National Institute of Economic Research, Harvard University and Hong Kong University of Science and Technology. This so-called paper actually claimed that “protests are the source of Hong Kong’s stability”, which is exactly the same as Pelosi’s “violence is the beautiful scenery of Hong Kong”, and it is ironclad evidence that the West has instigated the Hong Kong version of the “color revolution”.

【罪证曝光】美僱港千名大学生 当暴乱”白老鼠” 2021-06-03 08:04
(大公报记者 施文达、周扬、李斯达)美国经济学会主办的学术期刊《美国经济评论》(The American Economic Review),泄露西方资金僱请香港科大学生,当”白老鼠”参与一项所谓社会实验,美其名研究示威模式,实则煽惑暴乱。负责研究的所谓”学者”来自美国全国经济研究所、哈佛大学及香港科技大学等。这篇所谓论文竟称”抗议是香港稳定的源头”,这与佩洛西的”暴力是香港美丽风景线”如出一辙,是西方煽动港版”颜色革命”的铁证。

http://m.stnn.cc/pcarticle/863968

获取欧洲研究基金六百多万港元的张忆芹现身处澳洲。
科大回覆《大公报》指,涉事的科大副教授2019年9月离开科大,校方曾于2019年年底去信要求研究团队将”获科大批准”的声明从研究论文中移除。不过当中一名”学者”,现于澳洲New South Wales大学的前科大副教授张忆芹Y. Jane Zhang,依然在履历表称与科大合作关系至2022年。
《美国经济评论》最新一期(六月号),刊登了由芝加哥大学、哈佛大学、美国全国经济研究所(NBER)、慕尼黑大学、美国经济和政策研究中心(CEPR)、美国贾米尔贫穷行动实验室(J-PAL),以及香港科技大学的所谓学者,以做社会实验研究示威模式为名,不断用金钱诱推参加实验的逾千名科大生,参与2017年及2018年的7·1游行,并于2019年6月黑暴爆发时发表《持久政治参与:社会互动与政治运动的驱动力》的所谓论文,鼓吹持久参与游行才能影响”政治”运动。
这些所谓”学者”,包括美国全国经济研究所(NBER)的Leonardo Bursztyn及Noam Yuchtman、美国经济和政策研究中心(CEPR)的Davide Cantoni、现美国哈佛大学经济学助理教授David Y. Yang,以及香港科技大学Y. Jane Zhang(张忆芹)。
提供报酬予上街学生
五位学者首先于2015年开始,向于2017及2018年在香港科技大学就读(2018年7月毕业的除外)、年龄18岁以上的香港居民或内地学生发出数封个人倾向调查,得到10%至20%的回应后,于2017年6月再随机抽选约1100位学生参加”实验”。这批科大”白老鼠”分成两组人,一组是对照组,他们不会受到任何干预;另一组是实验组,2017年6月30日晚他们会收到一封邮件,内容是:”过去有许多同学会参加7·1游行,所以我们邀请部分同学明天帮我们更好地统计7·1游行的参与人数。我们希望你们能够积极参与,为科学做出贡献。在游行中,这仅仅花费五分钟。一旦你们上传了所有资料,我们会提供350元的报酬。”
研究结果称获得报酬的参加者令2017年的7·1游行人数增加了10个百分点。而这批获酬的科大生能够导致长期的政治参与,即是2018年的7·1游行参与率提高了五个百分点。研究结论在论文的首页已列明”一场政治抗议运动的参与度及持久性,并非由个人政治倾向或看法导致,而更多与个人同其他游行示威者的互动有关。游行示威为志趣相投的人提供了互动平台,包括社交网络平台在内,从而编织更加强大的社会纽带,为未来类似的游行示威活动吸引更多人持久参与”。
问卷提”港独” 倡报酬捐”众志”
而该研究更不断以额外奖金利诱科大生持续参与,包括2017的7·1游行及2018年的7·1游行,最终共有849名科大学生完成整个研究。
《大公报》发现,该研究计划的问卷内容涵盖是否参与游行、游行中的感受、游行效率等问题外,更渗入”港独”表态:”部分人在香港强烈支持『港独』,你认为这些『港独』支持者是否害怕公开表态?”
获酬的科大生可选择”经由香港科技大学的学生信息系统(SIS)直接存入”学生银行户口。若实验对象学生完成多个问卷调查,还可获得额外数百港元报酬。研究项目还建议学生可选择将报酬捐给”港独”组织”香港众志”。
据论文资料显示,该次研究由欧洲研究委员会(European Research Council)的财务拨款,获慕尼黑大学、史丹福大学、加州大学伯克莱分校及香港科技大学的授权。
研究负责人曾发表反中论文
与张忆芹撰写多篇研究论文的杨宇凡David Yang,现为哈佛大学经济学助理教授。《大公报》记者发现其”研究成果”多涉及社会抗争,其中一篇于2017年在英国伦敦政治经济学院网站上发表的反中论文,污蔑中国政府,并煽惑”港人的抗议达到威胁程度,就可抗衡北京”云云。

杨宇凡David Yang曾在推特发表”撑暴”言论,文章留言指”集体行动是展示人类力量的最壮观的一幕。”
煽惑港人作威胁性抗议
该篇于2017年10月在伦敦经济学院发表的反中论文《人民的力量?中国在香港政策的三元论》颠倒黑白,讹言惑众指”国安法带来社会不稳定”,又称”如果港人的抗议富有威胁性,能抗衡北京”,”能带来稳定”。
杨宇凡与张忆芹等人撰写一篇名为《作为战略手段的抗议:香港反独裁运动的实验性证据》的论文中,鼓励香港学生参加抗议活动,其结论为学生如果知道身边有更多人计划参与游行,那么他们参加游行的可能性更高。
此外,David活跃于社交平台推特,不时发表”撑暴”言论。如前年黑暴爆发当天,他分享”撑暴”文章并留言:”集体行动是展示人类力量的最壮观的一幕。”
美其名学术研究 实为煽惑动乱
前科大副教授张忆芹联同多间美国大学的学者,获欧洲研究委员会(European Research Council)资助该研究。有专家向《大公报》表示,外国所谓研究基金正是利用这些不知名”学者”急于发表论文的心态,资助其所谓的”学术研究”,”研究计划横跨2017至2018年,有连贯性,是否与2019年的暴乱有关?”
张忆芹在2011年至2019年出任科大社会科学系助理教授,2019年晋升副教授,科大高层表示,由助理教授升副教授须有足够分量和质量的学术研究发表,其研究资金来自海外亦十分常见,不过研究却牵涉敏感的政治、国家安全等议题,难免令人质疑研究项目的背后动机,”该论文有多位作者,主要是美国学者,该名科大副教授则为华人,研究内容为反独裁主义,研究对象为香港及其游行,哪会这么巧合?”
张忆芹获ERC资助逾63万欧元
张忆芹于2019年9月离开科大后,同年11月在澳洲新南威尔士大学出任副教授,新南威尔士大学资料显示,张忆芹获ERC资助金63万7500元欧元,称与科大的合作关系至2022年。《大公报》昨向科大查询,科大回覆指该教授已于2019年9月离开科大。所有涉及人类参与者的研究计划,均须经科大人类实验道德委员会审批,确保项目符合保护参与研究者的标准,有关安排与国际研究惯例一致。
科大要求移除”获科大批准”
科大表示,委员会于2019年10月接获有关一个研究项目的查询,该研究由一名前科大教授及来自其他大学的研究团队合作进行。经委员会调查后发现,有关研究计划的方法,与其当初向委员会递交审批申请时所述的不符,包括没有提及”引发参与游行”为研究中的一个重点项目,以及没有提及参与者所获的酬劳与参与游行直接挂钩,委员会于2019年底去信有关研究团队,表示其研究不获大学批准,并要求团队将”获科大批准”的声明从研究论文中移除。

A bill sponsored by Sen. Scott Wiener to legalize safe injection sites for legalized formerly illegal drugs in certain cities in California was passed by the Senate on Thursday.

A bill sponsored by Sen. Scott Wiener to legalize safe injection sites for legalized formerly illegal drugs in certain cities in California was passed by the Senate on Thursday. 真的是報應, 美國人的西人祖父對中國所做盡的壞事, 今天報應在他們的後代. Karma returns to hit US – some of the prominent AngloSaxon families sold opium to China with guns pointed at Beijing in the 1800s, made huge profits. Today in America, streets are filled with drug addicts with the approval of City, State and Federal Government. 美國自殘 Drugs could be found in Intermediate and high schools throughout America. Cocaine will probably be legalized soon. Imagine 1800s China drugs problems to replay in US in coming years and decades. I have a dozen or so Chinese clients’ children are already serious drug addicts. Drug problems does not care you are White, Black, Red or Yellow. If you are in US’s drug lala land, no one safe. 美國加州舊金山世界日報 World Journal Newspaper San Francisco, June 3 2021

China successfully launches new meteorological satellite, further boosts disaster event observation and response capability

China successfully launches new meteorological satellite, further boosts disaster event observation and response capability by Deng Xiaoci Jun 02 2021

China successfully launched the Fengyun-4B, the first operational satellite of a new generation of meteorological satellites in the geostationary orbit, via a Long March-3B carrier rocket from the Xichang Satellite Launch Center at 12:17 am Thursday in Southwest China’s Sichuan Province, according to the China National Space Administration (CNSA).

It will work together and construct a network with Fengyun-4A, in orbit to further strengthen China’s observation and response capability of small and medium scale disaster events and provide information security services for a range of sectors including meteorological, agricultural, aviation, marine and environmental protection, the CNSA said in a press release it sent to the Global Times.

The network will also be able to conduct dynamic monitoring and tracking of a variety of disaster elements including floods, cold fronts, droughts and sand storms. Its observation range covers Asia, the central Pacific Ocean and Indian Ocean regions, so that the network will also greatly improve China’s forecast accuracy of disaster weather including typhoons and storms, CNSA said.

It is equipped with a rapid imager, improving measurement resolution to 250 meters from the geostationary orbit [which is the highest in the world,] and accelerating scan imaging of the Earth.

Fengyun-4A, the scientific experiment satellite for the network, was launched on December 11, 2016.

According to the operator of the system, the China Meteorological Administration (CMA), there are eight satellites of the Fengyun family currently in orbit, and a total of 18 Fengyun satellites have been deployed.

The Fengyun satellite family has provided services for 118 countries and regions including 83 along the China-proposed Belt and Road Initiative, according to the CMA.

The Thursday mission also marked the 372nd flight of Long March rocket series. The China Academy of Launch Vehicle Technology (CALT), the developer of the Long March 3B, told the Global Times on Thursday that it would also kickstart a new round of intense launch schedules for the Long March 3A family.

The “Gold Medal Rocket” series will carry out 10 launches over seven months, at intervals of at least half a month, the academy said.

Video: Newsweek Magazine – Pentagon running ‘secret army of 60,000 around world’

Video: Newsweek Magazine – Pentagon running ‘secret army of 60,000 around world’ by Matt Mathers May 19, 2021

A secret army of around 60,000 is carrying out domestic and foreign operations for the Pentagon in a programme aimed at minimising threats to US security, it has been reported.

The force, said to be ten times the size of the CIA’s clandestine element, is made up of operatives working undercover, with some of them embedded in top companies around the world, according to Newsweek.

https://www.newsweek.com/exclusive-inside-militarys-secret-undercover-army-1591881

Perhaps that’s how the money was accounted for. https://finance.yahoo.com/news/pentagon-35-trillion-accounting-black-231154593.html

Agents in the “signature reduction” programme, developed by the Pentagon over the past 10 years, are engaged in online as well as real life assignments and are often soldiers, civilians and contractors who evade detection with false identities.

Newsweek reports that the secret army is carrying out its duties without the knowledge or consent of Congress.

North Korea, Russia and Iran are believed to be just some of the counties seen as hostile to the US where the agents are working. The agency has a reported budget of $900 million.

One intelligence officer, who is unnamed, says the army operates in “signature reduction”, although the term is not officially recognised by the Department of Defense. It is, however, used to define “measures that are taken to protect operations”.

Although some of the agents work in the shadows, Newsweek pointed to the case of Ryan Fogle as an example of when agents get caught.

Mr Fogle is an alleged CIA agent who was detained in Russia for allegedly trying to recruit a Russian intelligence officer.

Footage of Mr Fogle being berated by plain-clothes FSB interrogators was released to Russian television channels in May 2013, along with photographs and video footage of a bizarrely old-school array of spying tools, including two wigs, a compass, a map of Moscow and a stack of 500 Euro notes.

At the time, the state department confirmed one of its agents had been detained, but refused to be drawn on claims they were actively engaged in trying to recruit Russian operatives.

Newsweek’s investigation also revealed how a company based in North Carolina trains agents how to change their age and appearance using disguises and equips them with a silicone sleeve that allows them to alter their fingerprints.

According to Newsweek, up to 30,000 of the country’s signature reduction troops are operating around the world from Pakistan in the Middle East to West Africa in the south.

Inside the largest undercover force the world has ever known: the one created by the Pentagon, with tens of thousands of soldiers, civilians and contractors operating under false names, on the ground and in cyberspace. by TIMOTHY A. CLARY, Newsweek

The largest undercover force the world has ever known is the one created by the Pentagon over the past decade. Some 60,000 people now belong to this secret army, many working under masked identities and in low profile, all part of a broad program called “signature reduction.” The force, more than ten times the size of the clandestine elements of the CIA, carries out domestic and foreign assignments, both in military uniforms and under civilian cover, in real life and online, sometimes hiding in private businesses and consultancies, some of them household name companies.

The unprecedented shift has placed an ever greater number of soldiers, civilians, and contractors working under false identities, partly as a natural result in the growth of secret special forces but also as an intentional response to the challenges of traveling and operating in an increasingly transparent world. The explosion of Pentagon cyber warfare, moreover, has led to thousands of spies who carry out their day-to-day work in various made-up personas, the very type of nefarious operations the United States decries when Russian and Chinese spies do the same.

Newsweek’s exclusive report on this secret world is the result of a two-year investigation involving the examination of over 600 resumes and 1,000 job postings, dozens of Freedom of Information Act requests, and scores of interviews with participants and defense decision-makers. What emerges is a window into not just a little-known sector of the American military, but also a completely unregulated practice. No one knows the program’s total size, and the explosion of signature reduction has never been examined for its impact on military policies and culture. Congress has never held a hearing on the subject. And yet the military developing this gigantic clandestine force challenges U.S. laws, the Geneva Conventions, the code of military conduct and basic accountability.

The signature reduction effort engages some 130 private companies to administer the new clandestine world. Dozens of little known and secret government organizations support the program, doling out classified contracts and overseeing publicly unacknowledged operations. Altogether the companies pull in over $900 million annually to service the clandestine force—doing everything from creating false documentation and paying the bills (and taxes) of individuals operating under assumed names, to manufacturing disguises and other devices to thwart detection and identification, to building invisible devices to photograph and listen in on activity in the most remote corners of the Middle East and Africa.

Special operations forces constitute over half the entire signature reduction force, the shadow warriors who pursue terrorists in war zones from Pakistan to West Africa but also increasingly work in unacknowledged hot spots, including behind enemy lines in places like North Korea and Iran. Military intelligence specialists—collectors, counter-intelligence agents, even linguists—make up the second largest element: thousands deployed at any one time with some degree of “cover” to protect their true identities.

The newest and fastest growing group is the clandestine army that never leaves their keyboards. These are the cutting-edge cyber fighters and intelligence collectors who assume false personas online, employing “nonattribution” and “misattribution” techniques to hide the who and the where of their online presence while they search for high-value targets and collect what is called “publicly accessible information”—or even engage in campaigns to influence and manipulate social media. Hundreds work in and for the NSA, but over the past five years, every military intelligence and special operations unit has developed some kind of “web” operations cell that both collects intelligence and tends to the operational security of its very activities.

In the electronic era, a major task of signature reduction is keeping all of the organizations and people, even the automobiles and aircraft involved in the clandestine operations, masked. This protective effort entails everything from scrubbing the Internet of telltale signs of true identities to planting false information to protect missions and people. As standard unforgettable identification and biometrics have become worldwide norms, the signature reduction industry also works to figure out ways of spoofing and defeating everything from fingerprinting and facial recognition at border crossings, to ensuring that undercover operatives can enter and operate in the United States, manipulating official records to ensure that false identities match up.

Just as biometrics and “Real ID” are the enemies of clandestine work, so too is the “digital exhaust” of online life. One major concern of counter-terrorism work in the ISIS age is that military families are also vulnerable—another reason, participants say, to operate under false identities. The abundance of online information about individuals (together with some spectacular foreign hacks) has enabled foreign intelligence services to better unmask fake identities of American spies. Signature reduction is thus at the center of not only counter-terrorism but is part of the Pentagon’s shift towards great power competition with Russia and China—competition, influence, and disruption “below the level of armed conflict,” or what the military calls warfare in the “Gray Zone,” a space “in the peace-conflict continuum.”

One recently retired senior officer responsible for overseeing signature reduction and super-secret “special access programs” that shield them from scrutiny and compromise says that no one is fully aware of the extent of the program, nor has much consideration been given to the implications for the military institution. “Everything from the status of the Geneva Conventions—were a soldier operating under false identity to be captured by an enemy—to Congressional oversight is problematic,” he says. He worries that the desire to become more invisible to the enemy not just obscures what the United States is doing around the world but also makes it more difficult to bring conflicts to a close. “Most people haven’t even heard of the term signature reduction let alone what it creates,” he says. The officer spoke on condition of anonymity because he is discussing highly classified matters.

The secret life of Jonathan Darby

Every morning at 10:00 a.m., Jonathan Darby embarks on his weekly rounds of mail call. Darby is not his real name, but it is also not the fake name on his Missouri driver’s license that he uses to conduct his work. And the government car he drives, one of a fleet of over 200,000 federal vehicles owned by the General Services Administration, is also not registered in his real or his fake name, and nor are his magnetically attached Maryland state license plates really for his car, nor are they traceable back to him or his organization. Where Darby works and the locations he visits are also classified.

Darby’s retired from the Army, and he asks that neither his real nor his cover name be used. He served for 20 years in counterintelligence, including two African assignments where he operated in low profile in Ethiopia and Sudan, masquerading as an expat businessman. Now he works for a Maryland-based signature reduction contractor that he asked Newsweek not to identify.

As Darby makes his rounds to some 40 or so post offices and storefront mailbox stores in the DC Metropolitan area, he picks up a trunk full of letters and packages, mailing a similar number from rural addresses. Back at the office, he sorts through the take, delivering bills to the finance people and processing dozens of personal and business letters mailed from scores of overseas locations. But his main task is logging and forwarding the signature reduction “mechanisms” as they are called, passports and State driver’s licenses for people who don’t exist, and other papers—bills, tax documents, organization membership cards—that form the foundation of fake identities.

To register and double-check the authenticity of his daily take, Darby logs into two databases, one the Travel and Identity Document database, the intelligence community’s repository of examples of 300,000 genuine, counterfeit and altered foreign passports and visas; and the other the Cover Acquisition Management System, a super-secret register of false identities where the “mechanisms” used by clandestine operators are logged. For false identities traveling overseas, Darby and his colleagues also have to alter databases of U.S. immigration and customs to ensure that those performing illicit activities can return to the United States unmolested.

For identity verification, Darby’s unit works with secret offices at Homeland Security and the State Department as well as almost all 50 states in enrolling authentic “mechanisms” under false names. A rare picture into this world came in April 2013 when an enterprising reporter at Northwest Public Broadcasting did a story suggesting the scale of this secret program. His report revealed that the state of Washington alone had provided hundreds of valid state driver licenses in fictitious names to the federal government. The existence of the “confidential driver license program,” as it was called, was unknown even to the governor.

Before the Internet, Darby says—before a local cop or a border guard was connected to central databases in real time—all an operative needed to be “undercover” was an ID with a genuine photo. These days, however, especially for those operating under deep cover, the so-called “legend” behind an identity has to match more than just a made-up name. Darby calls it “due diligence”: the creation of this trail of fake existence. Fake birthplaces and home addresses have to be carefully researched, fake email lives and social media accounts have to be created. And those existences need to have corresponding “friends.” Almost every individual unit that operates clandestinely—special operations, intelligence collections, or cyber—has a signature reduction section, mostly operated by small contractors, conducting due diligence. There they adhere to what Darby calls the six principles of signature reduction: credibility, compatibility, realism, supportability, verity and compliance.

Compliance is a big one, Darby says, especially because of the world that 9/11 created, where checkpoints are common and nefarious activity is more closely scrutinized. To keep someone covert for real, and to do so for any period of time, requires a time consuming dance that not only has to tend to someone’s operational identity but also maintain their real life back home. As Darby explains it, this includes clandestine bill paying but also working with banks and credit card security departments to look the other way as they search for identity fraud or money laundering. And then, signature reduction technicians need to ensure that real credit scores are maintained—and even real taxes and Social Security payments are kept up to date—so that people can go back to their dormant lives when their signature reduction assignments cease.

Darby’s unit, originally called the Operational Planning and Travel Intelligence Center, is responsible for overseeing much of this (and to do so it operates the Pentagon’s largest military finance office), but documentation—as important as it is—is only one piece of the puzzle. Other organizations are responsible for designing and manufacturing the custom disguises and “biometric defeat” elements to facilitate travel. Darby says this is where all the Special Access Programs are. SAPs, the most secret category of government information, protect the methods used—and the clandestine capabilities that exist—to manipulate foreign systems to get around seemingly foolproof safeguards including fingerprinting and facial recognition.

‘Signature reduction’ is a term of art

Numerous signature reduction SAPs, programs with names like Hurricane Fan, Island Hopper and Peanut Chocolate, are administered by a shadowy world of secret organizations that service the clandestine army—the Defense Programs Support Activity, Joint Field Support Center, Army Field Support Center, Personnel Resources Development Office, Office of Military Support, Project Cardinals, and the Special Program Office.

Befitting how secret this world is, there is no unclassified definition of signature reduction. The Defense Intelligence Agency—which operates the Defense Clandestine Service and the Defense Cover Office—says that signature reduction is a term of art, one that “individuals might use to … describe operational security (OPSEC) measures for a variety of activities and operations.” In response to Newsweek queries that point out that dozens of people have used the term to refer to this world, DIA suggests that perhaps the Pentagon can help. But the responsible person there, identified as a DOD spokesperson, says only that “as it relates to HUMINT operations”—meaning human intelligence— signature reduction “is not an official term” and that it is used to describe “measures taken to protect operations.”

Another senior former intelligence official, someone who ran an entire agency and asks not to be named because he is not authorized to speak about clandestine operations, says that signature reduction exists in a “twilight” between covert and undercover. The former, defined in law, is subject to presidential approval and officially belongs to the CIA’s National Clandestine Service. The latter connotes strictly law enforcement efforts undertaken by people with a badge. And then there is the Witness Protection Program, administered by the U.S. Marshals Service of the Justice Department, which tends to the fake identities and lives of people who have been resettled in exchange for their cooperation with prosecutors and intelligence agencies.

The military doesn’t conduct covert operations, the senior former official says, and military personnel don’t fight undercover. That is, except when they do, either because individuals are assigned—”sheep dipped”—to the CIA, or because certain military organizations, particularly those of the Joint Special Operations Command, operate like the CIA, often alongside them in covert status, where people who depend on each other for their lives don’t know each other’s real names. Then there are an increasing number of government investigators—military, FBI, homeland security and even state officials—who are not undercover per se but who avail themselves of signature reduction status like fake IDs and fake license plates when they work domestically, particularly when they are engaged in extreme vetting of American citizens of Arab, South Asian, and increasingly African background, who have applied for security clearances.

‘Get Smart’?

In May 2013, in an almost comical incident more reminiscent of “Get Smart” than skilled spying, Moscow ordered a U.S. embassy “third secretary” by the name of Ryan Fogle to leave the country, releasing photos of Fogle wearing an ill-fitting blond wig and carrying an odd collection of seemingly amateurish paraphernalia—four pairs of sunglasses, a street map, a compass, a flashlight, a Swiss Army knife and a cell phone—so old, one article said, it looked like it had “been on this earth for at least a decade.”

The international news media had a field day, many retired CIA people decrying the decline of tradecraft, most of the commentary opining how we’d moved on from the old world of wigs and fake rocks, a reference to Great Britain admitting just a year earlier that indeed it was the owner of a fake rock and its hidden communications device, another discovery of Russian intelligence in Moscow.

Six years later, another espionage case hit the news, this time when a jury sent former American military intelligence officer Kevin Patrick Mallory to 20 years in prison for conspiring to sell secrets to China. There was nothing particularly unique about the Mallory case, the prosecution making its own show of presenting the jury with a collection of wigs and fake mustaches looking like Halloween costumes, the whole thing seemingly another funny episode of clumsy disguise.

And yet, says Brenda Connolly (not her real name), one would be naïve to laugh too hard, for both cases provide a peek into the new tricks of the trade and the extreme secrecy that hides them. Connolly started her engineering career at the Directorate of Science and Technology at the CIA and now works for a small defense contractor that produces the gizmos—think “Q” in the James Bond movies, she says—for signature reduction operations.

That “ancient” Nokia phone carried by Ryan Fogle, she says, was nothing of the sort, the innocuous outsides concealing what she calls a “covert communications” device inside. Similarly, entered in evidence in Mallory case was a Samsung phone given to him by Chinese intelligence that was so sophisticated that even when the FBI cloned it electronically, they could not find a hidden partition used to store secrets and one that Mallory ultimately had to reveal to them.

Lost in the spy-vs-spy theater of both cases were other clues of modern signature reduction, Connolly says. Fogle also carried an RFID shield, a radio frequency identification blocking pouch intended to prevent electronic tracking. And Mallory had vials of fake blood provided by China; Connolly would not reveal what it would be used for.

Like many people in this world, Connolly is a connoisseur and curator. She can talk for hours about the broadcasts that used to go out from the Soviet Union—but also were transmitted from Warrenton, Virginia—female voices reciting random numbers and passages from books that agents around the world would pick up on their shortwave radios and match to prearranged codes.

But then Internet cafes and online backdoors became the clandestine channels of choice for covert communications, largely replacing shortwave—until the surveillance technologies (especially in autocratic countries) caught up and intelligence agencies acquired an ability not only to detect and intercept internet activity but also to intercept every keystroke of activity on a remote keyboard. That ushered in today’s world of covert communications or COVCOMM, as insiders call it. These are very special encryption devices seen in the Fogle and Mallory cases, but also dozens of different “burst mode” transmitters and receivers secreted in everyday objects like fake rocks. All an agent or operator needs to activate communications with these COVCOMMs in some cases is to simply walk by a target receiver (a building or fake rock) and the clandestine messages are encrypted and transmitted back to special watch centers.

“And who do you think implants those devices?” Connolly asks rhetorically. “Military guys, special ops guys working to support even more secretive operations.” Connolly talks about heated fabrics that make soldiers invisible to thermal detection, electric motorcycles that can silently operate in the roughest terrain, even how tens of feet of wires are sown into “native” clothing, the South Asian shalwar kameez, the soldiers themselves then becoming walking receivers, able to intercept nearby low-power radios and even cell phone signals.

Fake hands, fake faces

Wigs. Covert communications devices. Fake rocks. In our world of electronic everything, where everything becomes a matter of record, where you can’t enter a parking garage without the license plate being recorded, where you can’t check in for a flight or a hotel without a government issued ID, where you can’t use a credit card without the location being captured, how can biometrics can be defeated? How can someone get past fingerprint readers?

In 99 out of 100 cases, the answer is: there is no need to. Most signature reduction soldiers travel under real names, exchanging operational identities only once on the ground where they operate. Or they infiltrate across borders in places like Pakistan and Yemen, conducting the most dangerous missions. These signature reduction missions are the most highly sensitive and involve “close in” intelligence collection or the use of miniaturized enemy tracking devices, each existing in their own special access programs—missions that are so sensitive they have to be personally approved by the Secretary of Defense.

For the one percent, though, for those who have to make it through passport control under false identities, there are various biometrics defeat systems, some physical and some electronic. One such program was alluded to in a little noticed document dump published by Wikileaks in early 2017 and called “Vault 7”: over 8,000 classified CIA tools used in the covert world of electronic spying and hacking. It is called ExpressLane, where U.S. intelligence has embedded malware into foreign biometrics and watchlist systems, allowing American cyber spies to steal foreign data.

An IT wizard working for Wikileaks in Berlin says the code with ExpressLane suggests that the United States can manipulate these databases. “Imagine for a moment that someone is going through passport control,” he says, hesitant to use his real name because of fear of indictment in the United States. “NSA or the CIA is tasked to corrupt—change—the data on the day the covert asset goes through. And then switch it back. It’s not impossible.”

Another source pointed to a small rural North Carolina company in the signature reduction industry, mostly in the clandestine collection and communications field. In the workshop and training facility where they teach operators how to fabricate secret listening devices into everyday objects, they are at the cutting edge, or so their promotional materials say, a repository for molding and casting, special painting, and sophisticated aging techniques.

This quiet company can transform any object, including a person, as they do in Hollywood, a “silicon face appliance” sculpted to perfectly alter someone’s looks. They can age, change gender, and “increase body mass,” as one classified contract says. And they can change fingerprints using a silicon sleeve that so snugly fits over a real hand it can’t be detected, embedding altered fingerprints and even impregnated with the oils found in real skin. Asked whether the appliance is effective, one source, who has gone through the training, laughs. “If I tell you, I’ll have to kill you.”

In real life, identity theft (mostly by criminals’ intent on profit) remains an epidemic that affects everyone, but for those in the intelligence and counter-terrorism worlds, the enemy is also actively engaged in efforts to compromise personal information. In 2015, the Islamic State posted the names, photos and addresses of over 1,300 U.S. military personnel, instructing supporters to target and kill the identified individuals. The FBI said that the release was followed by suspected Russian hackers who masqueraded as members of ISIS and threatened military families through Facebook. “We know everything about you, your husband and your children,” one menacing message said.

Counterintelligence and OPSEC officials began a large-scale effort to inform those affected but also to warn military personnel and their families to better protect their personal information on social media. The next year, ISIS released 8,318 target names: the largest-ever release until it was topped by 8,785 names in 2017.

It was revealed that military personnel sharing location information in their fitness devices were apparently revealing the locations of sensitive operations merely by jogging and sharing their data. “The rapid development of new and innovative information technologies enhances the quality of our lives but also poses potential challenges to operational security and force protection,” U.S. Central Command said in a statement at the time to the Washington Post.

Then came the DNA scare, when Adm. John Richardson, then chief of naval operations, warned military personnel and their families to stop using at-home ancestry DNA test kits. “Be careful who you send your DNA to,” Richardson said, warning that scientific advancements would be able to exploit the information, creating more and more targeted biological weapons in the future. And indeed in 2019, the Pentagon officially advised military personnel to steer clear of popular DNA services. “Exposing sensitive genetic information to outside parties poses personal and operational risks to Service members,” said the memo, first reported by Yahoo news.

“We’re still in the infancy of our transparent world,” says the retired senior officer, cautioning against imagining that there is some “identity gap” similar to the “bomber gap” of the Cold War. “We’re winning this war, including on the cyber side, even if secrecy about what we are doing makes the media portrayal of the Russians again look like they are ten feet tall.”

He admits that processing big data in the future will likely further impinge on everyone’s clandestine operations, but he says the benefits to society, even narrowly in just making terrorist activity and travel that much more difficult, outweigh the difficulties created for military operational security. The officer calls the secrecy legitimate but says that the Defense Department leadership has dropped the ball in recognizing the big picture. The military services should be asking more questions about the ethics, propriety and even legality of soldiers being turned into spies and assassins, and what this means for the future.

Still, the world of signature reduction keeps growing: evidence, says the retired officer, that modern life is not as transparent as most of us think.