香港慶祝美國六四顏色革命顛覆活動失敗 Hong Kong Celebrates China’s successfully put down US’s NED/CIA color revolution subversive activities at Tiananmen Square on June 4, 1989 in the name of fake freedom, democracy and human rights. https://vimeo.com/558642345 https://vimeo.com/557806591 美國加州舊金山世界日報, World Journal Newspaper San Francisco, June 4, 2021
Why CPC strong leadership key to leading China over crucial test, en route to rejuvenation through 100 years by Yang Sheng, Chen Qingqing and Cao Siqi Jun 03 2021
A visitor looks at statues of earlier generations of revolutionaries at the site of the First National Congress of the CPC in Shanghai on Thursday when restoration at the site finished and it is reopened to the public as a museum.
Editor’s Note:
With the 100th anniversary of the founding of the Communist Party of China (CPC) less than a month away, the Global Times will publish a series of reports to decode why the CPC is the destined choice for the Chinese people, why it can rise above challenges and tests in a century, and what is its secret code to success in governing such a vast country and implementing effective economic policies that have created an economic miracle for China and the world.
The current series will be divided into two parts to explore how the CPC withstood storm after storm and overcame crisis after crisis and how firm leadership becomes the key to the CPC’s success. This is the first part of the current series, which focuses on how the CPC has overcome serious challenges and gone through tests one by one in the history. The second part, which will be published on Saturday, will start from the internal and external challenges the Party was faced with in the 1980s.
People take photos in front of the site of the First National Congress of the CPC in Shanghai on April 23, 2021.
The Communist Party of China (CPC) and the Chinese people are gearing up for grand celebrations for the 100th anniversary of the founding of the Party on July 1 – a truly remarkable milestone for the CPC and the over 1.4 billion Chinese people.
Around the world, political parties with more than 100 years’ history are not rare, but almost none could claim the achievements the CPC has made. Through a series of crucial tests and crises, the CPC has emerged even stronger and more confident, leading a torn-apart, poverty-stricken nation out of its darkest moments to a world-leading power today en route for a great national rejuvenation.
In the past 100 years, the CPC experienced several “darkest hours” in its centurial journey, including the Kuomintang (KMT)’s massacre of CPC members in the 1920s, the setback caused by the Cultural Revolution from the 1960s to 1970s, and the impact of Western ideology in the late 1980s.
Today, experts and scholars are trying to find out what is the key for the Party to overcome those challenges through wise decision-making and self-correction, to prevent a collapse and failure like other communist parties in some former socialist countries, and make China a powerful, successful and confident country that makes the West, which used to have unshakable confidence and supremacy, more and more anxious.
Before the founding of the People’s Republic of China (PRC) in 1949, also called the era of revolution, the CPC also experienced serious crises such as the April 12 Counter-revolutionary Coup (also known as the Shanghai massacre) in 1927 when the KMT regime killed thousands of CPC members, and the failure of the campaign against “encirclement and suppression” launched by the KMT regime in 1933. In these “darkest hours,” the CPC almost lost more than half of its strength and even risked almost being completely destroyed by the KMT regime.
Before the Zunyi Conference in 1935 which confirmed Mao Zedong’s military leadership of the Red Army, the Party didn’t have a strong leadership core, and the revolution suffered setbacks and tragedies. The Zunyi Conference brought a changeover for the CPC, and overturned the failing tendency.
This proved that the Party leadership with a strong core is essential to ensure the victory and prevent failure, said experts.
Analysts and scholars of Party history said that there are some key similarities or lessons that could be highlighted from these crises – some leaders or elites of the Party held wishful thinking and compromised their stance toward the enemies of the Party and the Chinese people; they blindly attached too much hope on the experiences and thoughts from other countries, and heavily relied on foreign advisors without self-developed ideas based on China’s unique national conditions; and the decision-making board was not united and leaders shared no consensus on the path of the revolution and made wrong judgments on China’s national condition.
These problems also occurred from time to time after 1949, and adding the huge external threats and complicated relations with the super powers during and after the Cold War, these problems have also brought some extreme difficulties and risks to the country and the Party after the PRC was established. “How did the CPC go through these ‘darkest hours’ and overcome the extreme challenges?” By answering this question, it can allow the foreigners interested in China and some Westerners who failed to understand the CPC decision-making and could not explain China’s development to learn a better way to deal with China and the CPC today, said Chinese experts, adding that this will also help people understand how and why the CPC will handle the challenges in the future.
According to experts on Party history and Chinese politics reached by the Global Times, there is one key reason why the CPC can always overcome those crises and find the correct direction of the path – the Party can always find its proper and strong core leadership to ensure the victories against the enemies and realize self-correction.
The Red Boat on South Lake in Jiaxing, East China’s Zhejiang Province where the first National Congress of the CPC was concluded after the discussions in Shanghai was interrupted.
Fighting for autonomy
The first major life-and-death moment for the CPC after 1949 was the Cultural Revolution between 1966 and 1976. This incident caused the Party, China and people to suffer the most serious setbacks and losses since the founding of the PRC, and the economy was on the verge of collapse, said Luo Pinghan, a professor at the Party School of the Central Committee of CPC.
Apart from the internal chaos and difficulties, China was also facing serious external threats from both Soviet Union and the US. According to leaked documents from the Pentagon, in 1958, amid the second Taiwan Straits crisis, the US had planned to launch nuclear strikes against almost every major city in China to not only destroy the military and industrial targets but also to eliminate the Chinese population.
At the same time, the Sino-Soviet split also caused the relationship between China and the Soviet Union to intensify, and both sides even had a military conflict at the border in 1969. After the conflict, the Soviet Union also planned to launch nuclear strikes against China’s major military bases and cities, including the capital city Beijing, according to historical references.
Due to tensions with both the US and Soviet Union, not just being threatened militarily, China’s development faced huge difficulties due to the sanctions and pressure from both superpowers.
To ensure the security and autonomy of China under such a severe situation, the first generation of CPC leaders with Mao as the core had to be tough when dealing with the US and Soviet Union, said Jin Canrong, associate dean of the School of International Studies at the Renmin University of China.
“In this period, the most important mission for the CPC was to ensure the survival of the PRC, so from the 1950s to 1970s, China was assertive and determined to defend its hard-won independence and autonomy. The CPC needed to prevent the PRC from being controlled or bullied by others at all cost,” Jin said.
Thanks to the success in developing China’s own nuclear weapons and ballistic missiles in the 1960s, also known as the “Two Bombs, One Satellite” project, as well as the flexible decision-making and diplomatic efforts, and by leveraging the struggle between the US and Soviet Union, China successfully avoided and deterred a nuclear war with the two superpowers amid the Cold War, said experts.
” The ‘Three World Theory’ proposed by Mao proved to be relevant. As the core of the CPC and China’s leader at that time, Mao wisely used the confrontation between the US and Soviet Union to expand China’s influence and popularity in the third world,” Yang Xuedong, a professor of political science at Tsinghua University, told the Global Times.
After a series of diplomatic, political and military efforts, the PRC was recognized as “the only legitimate representative of China to the UN” in 1971 and also achieved the goal of normalization of China-US ties in 1972. Some analysts said the CPC is really good at seeking opportunity from the crisis, and even turn the crisis into an opportunity.
People look at a statue called “winning bugle” in Jinggangshan, the “cradle of the Chinese revolution,” in East China’s Jiangxi Province on April 23.
Inheritance and self-correction
While the danger of war with superpowers was avoided, China’s international influence was growing and in the field of strategic nuclear power, China achieved significant goals, but the internal problem of the Cultural Revolution still remained.
In 1976, the victory in smashing the “Gang of Four” lifted the Party and the country from the crisis, but the political, ideological, organizational, and economic chaos left over from the Cultural Revolution was still very dire, and it was not easy to get rid of such a predicament and start anew, Luo said.
In 1978, the Party led and supported discussion about “Practice is the sole criterion for testing the truth,” which was of great significance in bringing the country out of the chaos. The 3rd Plenary Session of the 11th Central Committee of the CPC fundamentally broke the binding shackles of the problems of left-leaning theories, corrected the Party’s guiding ideology, re-established the Marxist ideological, political, and organizational line, and eventually realized the Party’s successes since the founding of the PRC.
“This was a great turning point with far-reaching significance in history.” The Party earnestly corrected major historical wrongs, adopted a series of measures to rectify unjust and erroneous acts, and implemented various policies conducive to strengthening unity, mobilizing all positive elements, Luo noted.
In the transition period between the first generation of CPC leaders with Mao at its core and the second generation with Deng Xiaoping at the center, the CPC has avoided huge internal turbulence like what happened in the Soviet Union after former Soviet leader Joseph Stalin’s death as Nikita Khrushchev denied the contributions Stalin made to the Soviet Union.
The second generation of leadership inherited the first generation’s achievements and corrected its errors, rather than making no change, or replacing everything, and this remains the key reason why the CPC still exists and leads China in its march forward, while the Communist Party of the Soviet Union collapsed, said some observers.
The 6th Plenary Session of the 11th CPC Central Committee in 1981 passed the “Resolution on Certain Questions in the History of our Party since the Founding of the PRC”, which fundamentally denied the Cultural Revolution and its relevant ideals, but the resolution also successfully sought not to deny Mao and Mao Zedong Thought, and confirmed the guiding role of Mao Zedong Thought for the CPC.
“With the changes inside and outside China, it’s increasingly evident that the second generation of the CPC leadership with Deng at its core has political courage and foresight by implementing such correct and significant decisions,” Luo said.
This Is Harmony OS From Huawei, China: It Connects Everything! 這是來自中國華為的鴻蒙操作系統:它連接一切!In the past two decades, China has lost the PC era and the mobile Internet era in terms of operating systems. Now, in the IoT era, it finally has the opportunity to outcompete other players. In the words of Wang Chenglu: If HarmonyOS succeeds, the next 20 years of the mobile industry will belong to China. Published on June 3 2021 過去20年,中國在操作系統方面已經失去了PC時代和移動互聯網時代。 現在,在物聯網時代,它終於有機會超越其他玩家。 用王成錄的話來說:鴻蒙OS成功了,下一個20年的移動產業將屬於中國. https://youtu.be/3ai49xcDDBg https://vimeo.com/558790063 https://www.facebook.com/100036400039778/posts/504219987467998/?d=n
Video: Biological warfare? Drosophila melanogaster discovered by Chinese customs sent from US. Drosophila melanogaster is a species of fly in the family Drosophilidae. The species is often referred to as the fruit fly, though its common name is more accurately the vinegar fly. Drosophila is a significant pest that attacks healthy fruit prior to harvest. As fruit integrity is compromised by oviposition and larval feeding, common vinegar flies (i.e., Drosophila melanogaster) may also oviposit in the damaged fruit. 藏在貼錯標籤的海運集裝箱內, 從美國寄到中國的黑腹果蠅被中國海關發現. https://vimeo.com/558746438 https://youtu.be/VBiY30yT4II https://www.facebook.com/100036400039778/posts/504165310806799/?d=n
Academic paper reveals Hong Kong student protesters were paid to be guinea pigs in bizarre experiment that may have gone wrong 學術論文揭示香港學生抗議者在可能出錯的奇怪實驗中被支付為豚鼠 Allegations that pro-democracy activists in Hong Kong have been paid for their activities have swirled for years but have always been strenuously rubbished by the Western media. Now, an academic study seems to confirm just that. 關於香港民主活動人士因其活動而獲得報酬的指控已經流傳多年,但一直被西方媒體極力抨擊。 現在,一項學術研究似乎證實了這一點. 3 Jun, 2021
By Kit Klarenberg, an investigative journalist exploring the role of intelligence services in shaping politics and perceptions. Follow him on Twitter @KitKlarenberg
Secreted in the depths of academic journal American Economic Review’s June edition is an absolutely extraordinary research paper, revealing that a team of Western scholars conducted a somewhat peculiar study analyzing why students attended protests in Hong Kong – and that participants were paid to do so.
The paper’s abstract notes that the academics set out to study “the causes of sustained participation in political movements.” In order to “identify the persistent effect of protest participation,” and the role of social networks in organizing and motivating protests and protesters, they “randomly indirectly [incentivized]” – that is, paid – 849 students at the University of Hong Kong to participate in an “antiauthoritarian protest” for two years running, in 2017 and 2018.
The protest in question was the annual July 1 march, which has been convened every year since 1997, the year of Hong Kong’s handover from the UK to China. The academics say the marches studied were “peaceful” and “modestly sized”, attracting around 50,000 citizens, and sought “to both achieve policy concessions and signal the strength of the movement.”
They found that “incentives” to attend a political protest increased and, indeed, sustained subsequent crowd sizes, “but only when a sufficient fraction of an individual’s social network [was] also incentivized to attend the initial protest.”
Essentially, while a greater turnout among the wider population at large would “affect a subject’s beliefs about the likelihood that a public good is produced or a government crackdown may occur,” the participation of an individual’s friends had “a large effect on the social utility derived from protest participation, the coordination costs of attending, and social image considerations.”
The academics are keen to emphasize that they aimed to encourage protest participation without “explicitly” paying for people to attend, but instead “[paid] for behavior conditional on turnout.” So, the 849 randomly selected students weren’t directly remunerated for going to a protest, but for “providing information that would help estimate crowd sizes at the protest.” Participants were recruited via an email that was sent to the university’s entire undergraduate body.
Once the protests ended, participants filled in an online survey, and were given an additional HK$350 ($45) – about 1% of an average monthly wage on the island – for their “time and effort.” The original sum received for attendance isn’t stated.
“Subjects … received an email the day before the July 1, 2017 march with detailed instructions on how to complete the task. Treated subjects would be able to use a secure link to upload the information we requested,” the paper records. “Subjects who upload[ed] all the requested information and complete[d] the protest participation reporting module would be eligible to receive the bonus payment.”
If all that sounds rather strange, it’s because it absolutely is. For one, the academics’ finding that offering financial inducements to people to attend protests promotes turnout, particularly if those people know one another, seems banal and self-evident – a fait accompli if ever there was one.
The academics explain their rationale for conducting the research in the paper’s introduction, noting that, while “political rights have historically often arisen from successful, long-running movements,” there is a lack of empirical investigation into “the causes of individuals’ sustained participation in political movements.”
That seems reasonable enough, until one considers that the same group of scholars has been publishing papers on this question annually for quite some time – and, on each occasion, University of Hong Kong students have been their guinea pigs.
In 2016, for instance, their research included “manipulating” subjects’ beliefs about the participation of others to gauge whether a perception of ‘missing out’ drove greater attendance. A day before the July 1 protest that year, paid participants were provided with “truthful information” about other attendees’ protest plans to see if there was a corresponding increase.
That experiment was funded by the National Bureau of Economic Research (NBER), which, in 2010, ranked as the second-most influential economic think tank in the US. Two of the academics involved in the research, Leonardo Bursztyn and David Y Yang, are “affiliated scholars” of the NBER.
The organization is funded by a number of US government agencies and charitable organizations, including the controversial Bill & Melinda Gates Foundation, which raises the obvious question of who or what ultimately benefited from this research, and to what purpose the findings were put.
The latter riddle gets more curious when one considers that in their 2020 study of protest participation, the academics note that, while the University of Hong Kong’s Science and Technology (HKUST) department’s institutional review board (IRB) – the body that formally vets biomedical and behavioral research involving humans – approved their first “experimental intervention” with students in 2017, that approval was rescinded two years later.
“The HKUST Human Participants Research Panel (HPRP) wrote to us requesting that we remove references to the HKUST IRB approval of our study, on the basis that the study went beyond what was approved in our proposal,” the paper states.
Detail of this alleged breach of academic ethics isn’t provided, and the academics “unambiguously” reject the charge, although it may be no coincidence that HKUST sought to distance itself from the study on November 28, 2019 – the same month the violent “siege” of the University of Hong Kong erupted. The strife began when students disrupted road and train traffic near the campus on November 11 to facilitate a general strike.
The authorities responded by firing pepper bullets at students and launching volleys of tear gas into the campus, precipitating almost a week of ever-escalating violence from activists. Within days, students had created an elaborate system of barricades to block roads and shield the entrances to the university’s halls of residence, set traps to puncture car tyres, stockpiled a large number of petrol bombs, and were routinely hurling bricks and tiles, and firing arrows from rooftops at the police.
It’s unclear how many, if any, of the students participating in these incendiary activities were initially roused to political action by being “randomly” selected for the academics’ numerous protest studies over the years, but HKUST’s attempted backpedaling suggests it’s a distinct possibility that at least some were.
Tiananmen 1989 Student Leader Chailing: “We are hoping for bloodshed” | Western MSM will never show this. To Succeed, US’s Color Revolution must see blood and Chailing failed to deliver. 天安門1989學生領袖柴玲:“我們希望流血” | 西方 MSM 永遠不會讓你看到。 想要成功, 美國在天安門的顏色革命必須見血. There is a lot of misinformation and Western-media-created myth surrounding the mainland Chinese student protests of 1989 which involved occupying Tiananmen Square. This is a raw interview with Tiananmen Square’s most radical/recognizable student leader, and Commander-in-Chief of the Defend Tiananmen Headquarters, Chailing. 圍繞 1989 年中國大陸學生佔領天安門廣場的抗議活動,有很多錯誤信息和西方媒體製造的神話。 這是對天安門廣場最激進/最知名的學生領袖、保衛天安門司令部總司令柴玲的原始採訪。published Jun 3, 2021 https://vimeo.com/558642345 https://youtu.be/nbEpfOPPay8 https://www.facebook.com/100036400039778/posts/504064437483553/?d=n
American Economic Review” sponsored by the American Economic Association revealed that Western money hired students from Hong Kong University of Science and Technology. These University Students “white mice” participated in a so-called social experiment, they studied demonstration patterns as an excuse, but in fact incited riots. . The so-called “scholars” in charge of the research come from the National Institute of Economic Research, Harvard University and Hong Kong University of Science and Technology. This so-called paper actually claimed that “protests are the source of Hong Kong’s stability”, which is exactly the same as Pelosi’s “violence is the beautiful scenery of Hong Kong”, and it is ironclad evidence that the West has instigated the Hong Kong version of the “color revolution”.
【罪证曝光】美僱港千名大学生 当暴乱”白老鼠” 2021-06-03 08:04 (大公报记者 施文达、周扬、李斯达)美国经济学会主办的学术期刊《美国经济评论》(The American Economic Review),泄露西方资金僱请香港科大学生,当”白老鼠”参与一项所谓社会实验,美其名研究示威模式,实则煽惑暴乱。负责研究的所谓”学者”来自美国全国经济研究所、哈佛大学及香港科技大学等。这篇所谓论文竟称”抗议是香港稳定的源头”,这与佩洛西的”暴力是香港美丽风景线”如出一辙,是西方煽动港版”颜色革命”的铁证。
A bill sponsored by Sen. Scott Wiener to legalize safe injection sites for legalized formerly illegal drugs in certain cities in California was passed by the Senate on Thursday. 真的是報應, 美國人的西人祖父對中國所做盡的壞事, 今天報應在他們的後代. Karma returns to hit US – some of the prominent AngloSaxon families sold opium to China with guns pointed at Beijing in the 1800s, made huge profits. Today in America, streets are filled with drug addicts with the approval of City, State and Federal Government. 美國自殘 Drugs could be found in Intermediate and high schools throughout America. Cocaine will probably be legalized soon. Imagine 1800s China drugs problems to replay in US in coming years and decades. I have a dozen or so Chinese clients’ children are already serious drug addicts. Drug problems does not care you are White, Black, Red or Yellow. If you are in US’s drug lala land, no one safe. 美國加州舊金山世界日報 World Journal Newspaper San Francisco, June 3 2021
China successfully launches new meteorological satellite, further boosts disaster event observation and response capability by Deng Xiaoci Jun 02 2021
China successfully launched the Fengyun-4B, the first operational satellite of a new generation of meteorological satellites in the geostationary orbit, via a Long March-3B carrier rocket from the Xichang Satellite Launch Center at 12:17 am Thursday in Southwest China’s Sichuan Province, according to the China National Space Administration (CNSA).
It will work together and construct a network with Fengyun-4A, in orbit to further strengthen China’s observation and response capability of small and medium scale disaster events and provide information security services for a range of sectors including meteorological, agricultural, aviation, marine and environmental protection, the CNSA said in a press release it sent to the Global Times.
The network will also be able to conduct dynamic monitoring and tracking of a variety of disaster elements including floods, cold fronts, droughts and sand storms. Its observation range covers Asia, the central Pacific Ocean and Indian Ocean regions, so that the network will also greatly improve China’s forecast accuracy of disaster weather including typhoons and storms, CNSA said.
It is equipped with a rapid imager, improving measurement resolution to 250 meters from the geostationary orbit [which is the highest in the world,] and accelerating scan imaging of the Earth.
Fengyun-4A, the scientific experiment satellite for the network, was launched on December 11, 2016.
According to the operator of the system, the China Meteorological Administration (CMA), there are eight satellites of the Fengyun family currently in orbit, and a total of 18 Fengyun satellites have been deployed.
The Fengyun satellite family has provided services for 118 countries and regions including 83 along the China-proposed Belt and Road Initiative, according to the CMA.
The Thursday mission also marked the 372nd flight of Long March rocket series. The China Academy of Launch Vehicle Technology (CALT), the developer of the Long March 3B, told the Global Times on Thursday that it would also kickstart a new round of intense launch schedules for the Long March 3A family.
The “Gold Medal Rocket” series will carry out 10 launches over seven months, at intervals of at least half a month, the academy said.
Video: Newsweek Magazine – Pentagon running ‘secret army of 60,000 around world’ by Matt Mathers May 19, 2021
A secret army of around 60,000 is carrying out domestic and foreign operations for the Pentagon in a programme aimed at minimising threats to US security, it has been reported.
The force, said to be ten times the size of the CIA’s clandestine element, is made up of operatives working undercover, with some of them embedded in top companies around the world, according to Newsweek.
Agents in the “signature reduction” programme, developed by the Pentagon over the past 10 years, are engaged in online as well as real life assignments and are often soldiers, civilians and contractors who evade detection with false identities.
Newsweek reports that the secret army is carrying out its duties without the knowledge or consent of Congress.
North Korea, Russia and Iran are believed to be just some of the counties seen as hostile to the US where the agents are working. The agency has a reported budget of $900 million.
One intelligence officer, who is unnamed, says the army operates in “signature reduction”, although the term is not officially recognised by the Department of Defense. It is, however, used to define “measures that are taken to protect operations”.
Although some of the agents work in the shadows, Newsweek pointed to the case of Ryan Fogle as an example of when agents get caught.
Mr Fogle is an alleged CIA agent who was detained in Russia for allegedly trying to recruit a Russian intelligence officer.
Footage of Mr Fogle being berated by plain-clothes FSB interrogators was released to Russian television channels in May 2013, along with photographs and video footage of a bizarrely old-school array of spying tools, including two wigs, a compass, a map of Moscow and a stack of 500 Euro notes.
At the time, the state department confirmed one of its agents had been detained, but refused to be drawn on claims they were actively engaged in trying to recruit Russian operatives.
Newsweek’s investigation also revealed how a company based in North Carolina trains agents how to change their age and appearance using disguises and equips them with a silicone sleeve that allows them to alter their fingerprints.
According to Newsweek, up to 30,000 of the country’s signature reduction troops are operating around the world from Pakistan in the Middle East to West Africa in the south.
Inside the largest undercover force the world has ever known: the one created by the Pentagon, with tens of thousands of soldiers, civilians and contractors operating under false names, on the ground and in cyberspace. by TIMOTHY A. CLARY, Newsweek
The largest undercover force the world has ever known is the one created by the Pentagon over the past decade. Some 60,000 people now belong to this secret army, many working under masked identities and in low profile, all part of a broad program called “signature reduction.” The force, more than ten times the size of the clandestine elements of the CIA, carries out domestic and foreign assignments, both in military uniforms and under civilian cover, in real life and online, sometimes hiding in private businesses and consultancies, some of them household name companies.
The unprecedented shift has placed an ever greater number of soldiers, civilians, and contractors working under false identities, partly as a natural result in the growth of secret special forces but also as an intentional response to the challenges of traveling and operating in an increasingly transparent world. The explosion of Pentagon cyber warfare, moreover, has led to thousands of spies who carry out their day-to-day work in various made-up personas, the very type of nefarious operations the United States decries when Russian and Chinese spies do the same.
Newsweek’s exclusive report on this secret world is the result of a two-year investigation involving the examination of over 600 resumes and 1,000 job postings, dozens of Freedom of Information Act requests, and scores of interviews with participants and defense decision-makers. What emerges is a window into not just a little-known sector of the American military, but also a completely unregulated practice. No one knows the program’s total size, and the explosion of signature reduction has never been examined for its impact on military policies and culture. Congress has never held a hearing on the subject. And yet the military developing this gigantic clandestine force challenges U.S. laws, the Geneva Conventions, the code of military conduct and basic accountability.
The signature reduction effort engages some 130 private companies to administer the new clandestine world. Dozens of little known and secret government organizations support the program, doling out classified contracts and overseeing publicly unacknowledged operations. Altogether the companies pull in over $900 million annually to service the clandestine force—doing everything from creating false documentation and paying the bills (and taxes) of individuals operating under assumed names, to manufacturing disguises and other devices to thwart detection and identification, to building invisible devices to photograph and listen in on activity in the most remote corners of the Middle East and Africa.
Special operations forces constitute over half the entire signature reduction force, the shadow warriors who pursue terrorists in war zones from Pakistan to West Africa but also increasingly work in unacknowledged hot spots, including behind enemy lines in places like North Korea and Iran. Military intelligence specialists—collectors, counter-intelligence agents, even linguists—make up the second largest element: thousands deployed at any one time with some degree of “cover” to protect their true identities.
The newest and fastest growing group is the clandestine army that never leaves their keyboards. These are the cutting-edge cyber fighters and intelligence collectors who assume false personas online, employing “nonattribution” and “misattribution” techniques to hide the who and the where of their online presence while they search for high-value targets and collect what is called “publicly accessible information”—or even engage in campaigns to influence and manipulate social media. Hundreds work in and for the NSA, but over the past five years, every military intelligence and special operations unit has developed some kind of “web” operations cell that both collects intelligence and tends to the operational security of its very activities.
In the electronic era, a major task of signature reduction is keeping all of the organizations and people, even the automobiles and aircraft involved in the clandestine operations, masked. This protective effort entails everything from scrubbing the Internet of telltale signs of true identities to planting false information to protect missions and people. As standard unforgettable identification and biometrics have become worldwide norms, the signature reduction industry also works to figure out ways of spoofing and defeating everything from fingerprinting and facial recognition at border crossings, to ensuring that undercover operatives can enter and operate in the United States, manipulating official records to ensure that false identities match up.
Just as biometrics and “Real ID” are the enemies of clandestine work, so too is the “digital exhaust” of online life. One major concern of counter-terrorism work in the ISIS age is that military families are also vulnerable—another reason, participants say, to operate under false identities. The abundance of online information about individuals (together with some spectacular foreign hacks) has enabled foreign intelligence services to better unmask fake identities of American spies. Signature reduction is thus at the center of not only counter-terrorism but is part of the Pentagon’s shift towards great power competition with Russia and China—competition, influence, and disruption “below the level of armed conflict,” or what the military calls warfare in the “Gray Zone,” a space “in the peace-conflict continuum.”
One recently retired senior officer responsible for overseeing signature reduction and super-secret “special access programs” that shield them from scrutiny and compromise says that no one is fully aware of the extent of the program, nor has much consideration been given to the implications for the military institution. “Everything from the status of the Geneva Conventions—were a soldier operating under false identity to be captured by an enemy—to Congressional oversight is problematic,” he says. He worries that the desire to become more invisible to the enemy not just obscures what the United States is doing around the world but also makes it more difficult to bring conflicts to a close. “Most people haven’t even heard of the term signature reduction let alone what it creates,” he says. The officer spoke on condition of anonymity because he is discussing highly classified matters.
The secret life of Jonathan Darby
Every morning at 10:00 a.m., Jonathan Darby embarks on his weekly rounds of mail call. Darby is not his real name, but it is also not the fake name on his Missouri driver’s license that he uses to conduct his work. And the government car he drives, one of a fleet of over 200,000 federal vehicles owned by the General Services Administration, is also not registered in his real or his fake name, and nor are his magnetically attached Maryland state license plates really for his car, nor are they traceable back to him or his organization. Where Darby works and the locations he visits are also classified.
Darby’s retired from the Army, and he asks that neither his real nor his cover name be used. He served for 20 years in counterintelligence, including two African assignments where he operated in low profile in Ethiopia and Sudan, masquerading as an expat businessman. Now he works for a Maryland-based signature reduction contractor that he asked Newsweek not to identify.
As Darby makes his rounds to some 40 or so post offices and storefront mailbox stores in the DC Metropolitan area, he picks up a trunk full of letters and packages, mailing a similar number from rural addresses. Back at the office, he sorts through the take, delivering bills to the finance people and processing dozens of personal and business letters mailed from scores of overseas locations. But his main task is logging and forwarding the signature reduction “mechanisms” as they are called, passports and State driver’s licenses for people who don’t exist, and other papers—bills, tax documents, organization membership cards—that form the foundation of fake identities.
To register and double-check the authenticity of his daily take, Darby logs into two databases, one the Travel and Identity Document database, the intelligence community’s repository of examples of 300,000 genuine, counterfeit and altered foreign passports and visas; and the other the Cover Acquisition Management System, a super-secret register of false identities where the “mechanisms” used by clandestine operators are logged. For false identities traveling overseas, Darby and his colleagues also have to alter databases of U.S. immigration and customs to ensure that those performing illicit activities can return to the United States unmolested.
For identity verification, Darby’s unit works with secret offices at Homeland Security and the State Department as well as almost all 50 states in enrolling authentic “mechanisms” under false names. A rare picture into this world came in April 2013 when an enterprising reporter at Northwest Public Broadcasting did a story suggesting the scale of this secret program. His report revealed that the state of Washington alone had provided hundreds of valid state driver licenses in fictitious names to the federal government. The existence of the “confidential driver license program,” as it was called, was unknown even to the governor.
Before the Internet, Darby says—before a local cop or a border guard was connected to central databases in real time—all an operative needed to be “undercover” was an ID with a genuine photo. These days, however, especially for those operating under deep cover, the so-called “legend” behind an identity has to match more than just a made-up name. Darby calls it “due diligence”: the creation of this trail of fake existence. Fake birthplaces and home addresses have to be carefully researched, fake email lives and social media accounts have to be created. And those existences need to have corresponding “friends.” Almost every individual unit that operates clandestinely—special operations, intelligence collections, or cyber—has a signature reduction section, mostly operated by small contractors, conducting due diligence. There they adhere to what Darby calls the six principles of signature reduction: credibility, compatibility, realism, supportability, verity and compliance.
Compliance is a big one, Darby says, especially because of the world that 9/11 created, where checkpoints are common and nefarious activity is more closely scrutinized. To keep someone covert for real, and to do so for any period of time, requires a time consuming dance that not only has to tend to someone’s operational identity but also maintain their real life back home. As Darby explains it, this includes clandestine bill paying but also working with banks and credit card security departments to look the other way as they search for identity fraud or money laundering. And then, signature reduction technicians need to ensure that real credit scores are maintained—and even real taxes and Social Security payments are kept up to date—so that people can go back to their dormant lives when their signature reduction assignments cease.
Darby’s unit, originally called the Operational Planning and Travel Intelligence Center, is responsible for overseeing much of this (and to do so it operates the Pentagon’s largest military finance office), but documentation—as important as it is—is only one piece of the puzzle. Other organizations are responsible for designing and manufacturing the custom disguises and “biometric defeat” elements to facilitate travel. Darby says this is where all the Special Access Programs are. SAPs, the most secret category of government information, protect the methods used—and the clandestine capabilities that exist—to manipulate foreign systems to get around seemingly foolproof safeguards including fingerprinting and facial recognition.
‘Signature reduction’ is a term of art
Numerous signature reduction SAPs, programs with names like Hurricane Fan, Island Hopper and Peanut Chocolate, are administered by a shadowy world of secret organizations that service the clandestine army—the Defense Programs Support Activity, Joint Field Support Center, Army Field Support Center, Personnel Resources Development Office, Office of Military Support, Project Cardinals, and the Special Program Office.
Befitting how secret this world is, there is no unclassified definition of signature reduction. The Defense Intelligence Agency—which operates the Defense Clandestine Service and the Defense Cover Office—says that signature reduction is a term of art, one that “individuals might use to … describe operational security (OPSEC) measures for a variety of activities and operations.” In response to Newsweek queries that point out that dozens of people have used the term to refer to this world, DIA suggests that perhaps the Pentagon can help. But the responsible person there, identified as a DOD spokesperson, says only that “as it relates to HUMINT operations”—meaning human intelligence— signature reduction “is not an official term” and that it is used to describe “measures taken to protect operations.”
Another senior former intelligence official, someone who ran an entire agency and asks not to be named because he is not authorized to speak about clandestine operations, says that signature reduction exists in a “twilight” between covert and undercover. The former, defined in law, is subject to presidential approval and officially belongs to the CIA’s National Clandestine Service. The latter connotes strictly law enforcement efforts undertaken by people with a badge. And then there is the Witness Protection Program, administered by the U.S. Marshals Service of the Justice Department, which tends to the fake identities and lives of people who have been resettled in exchange for their cooperation with prosecutors and intelligence agencies.
The military doesn’t conduct covert operations, the senior former official says, and military personnel don’t fight undercover. That is, except when they do, either because individuals are assigned—”sheep dipped”—to the CIA, or because certain military organizations, particularly those of the Joint Special Operations Command, operate like the CIA, often alongside them in covert status, where people who depend on each other for their lives don’t know each other’s real names. Then there are an increasing number of government investigators—military, FBI, homeland security and even state officials—who are not undercover per se but who avail themselves of signature reduction status like fake IDs and fake license plates when they work domestically, particularly when they are engaged in extreme vetting of American citizens of Arab, South Asian, and increasingly African background, who have applied for security clearances.
‘Get Smart’?
In May 2013, in an almost comical incident more reminiscent of “Get Smart” than skilled spying, Moscow ordered a U.S. embassy “third secretary” by the name of Ryan Fogle to leave the country, releasing photos of Fogle wearing an ill-fitting blond wig and carrying an odd collection of seemingly amateurish paraphernalia—four pairs of sunglasses, a street map, a compass, a flashlight, a Swiss Army knife and a cell phone—so old, one article said, it looked like it had “been on this earth for at least a decade.”
The international news media had a field day, many retired CIA people decrying the decline of tradecraft, most of the commentary opining how we’d moved on from the old world of wigs and fake rocks, a reference to Great Britain admitting just a year earlier that indeed it was the owner of a fake rock and its hidden communications device, another discovery of Russian intelligence in Moscow.
Six years later, another espionage case hit the news, this time when a jury sent former American military intelligence officer Kevin Patrick Mallory to 20 years in prison for conspiring to sell secrets to China. There was nothing particularly unique about the Mallory case, the prosecution making its own show of presenting the jury with a collection of wigs and fake mustaches looking like Halloween costumes, the whole thing seemingly another funny episode of clumsy disguise.
And yet, says Brenda Connolly (not her real name), one would be naïve to laugh too hard, for both cases provide a peek into the new tricks of the trade and the extreme secrecy that hides them. Connolly started her engineering career at the Directorate of Science and Technology at the CIA and now works for a small defense contractor that produces the gizmos—think “Q” in the James Bond movies, she says—for signature reduction operations.
That “ancient” Nokia phone carried by Ryan Fogle, she says, was nothing of the sort, the innocuous outsides concealing what she calls a “covert communications” device inside. Similarly, entered in evidence in Mallory case was a Samsung phone given to him by Chinese intelligence that was so sophisticated that even when the FBI cloned it electronically, they could not find a hidden partition used to store secrets and one that Mallory ultimately had to reveal to them.
Lost in the spy-vs-spy theater of both cases were other clues of modern signature reduction, Connolly says. Fogle also carried an RFID shield, a radio frequency identification blocking pouch intended to prevent electronic tracking. And Mallory had vials of fake blood provided by China; Connolly would not reveal what it would be used for.
Like many people in this world, Connolly is a connoisseur and curator. She can talk for hours about the broadcasts that used to go out from the Soviet Union—but also were transmitted from Warrenton, Virginia—female voices reciting random numbers and passages from books that agents around the world would pick up on their shortwave radios and match to prearranged codes.
But then Internet cafes and online backdoors became the clandestine channels of choice for covert communications, largely replacing shortwave—until the surveillance technologies (especially in autocratic countries) caught up and intelligence agencies acquired an ability not only to detect and intercept internet activity but also to intercept every keystroke of activity on a remote keyboard. That ushered in today’s world of covert communications or COVCOMM, as insiders call it. These are very special encryption devices seen in the Fogle and Mallory cases, but also dozens of different “burst mode” transmitters and receivers secreted in everyday objects like fake rocks. All an agent or operator needs to activate communications with these COVCOMMs in some cases is to simply walk by a target receiver (a building or fake rock) and the clandestine messages are encrypted and transmitted back to special watch centers.
“And who do you think implants those devices?” Connolly asks rhetorically. “Military guys, special ops guys working to support even more secretive operations.” Connolly talks about heated fabrics that make soldiers invisible to thermal detection, electric motorcycles that can silently operate in the roughest terrain, even how tens of feet of wires are sown into “native” clothing, the South Asian shalwar kameez, the soldiers themselves then becoming walking receivers, able to intercept nearby low-power radios and even cell phone signals.
Fake hands, fake faces
Wigs. Covert communications devices. Fake rocks. In our world of electronic everything, where everything becomes a matter of record, where you can’t enter a parking garage without the license plate being recorded, where you can’t check in for a flight or a hotel without a government issued ID, where you can’t use a credit card without the location being captured, how can biometrics can be defeated? How can someone get past fingerprint readers?
In 99 out of 100 cases, the answer is: there is no need to. Most signature reduction soldiers travel under real names, exchanging operational identities only once on the ground where they operate. Or they infiltrate across borders in places like Pakistan and Yemen, conducting the most dangerous missions. These signature reduction missions are the most highly sensitive and involve “close in” intelligence collection or the use of miniaturized enemy tracking devices, each existing in their own special access programs—missions that are so sensitive they have to be personally approved by the Secretary of Defense.
For the one percent, though, for those who have to make it through passport control under false identities, there are various biometrics defeat systems, some physical and some electronic. One such program was alluded to in a little noticed document dump published by Wikileaks in early 2017 and called “Vault 7”: over 8,000 classified CIA tools used in the covert world of electronic spying and hacking. It is called ExpressLane, where U.S. intelligence has embedded malware into foreign biometrics and watchlist systems, allowing American cyber spies to steal foreign data.
An IT wizard working for Wikileaks in Berlin says the code with ExpressLane suggests that the United States can manipulate these databases. “Imagine for a moment that someone is going through passport control,” he says, hesitant to use his real name because of fear of indictment in the United States. “NSA or the CIA is tasked to corrupt—change—the data on the day the covert asset goes through. And then switch it back. It’s not impossible.”
Another source pointed to a small rural North Carolina company in the signature reduction industry, mostly in the clandestine collection and communications field. In the workshop and training facility where they teach operators how to fabricate secret listening devices into everyday objects, they are at the cutting edge, or so their promotional materials say, a repository for molding and casting, special painting, and sophisticated aging techniques.
This quiet company can transform any object, including a person, as they do in Hollywood, a “silicon face appliance” sculpted to perfectly alter someone’s looks. They can age, change gender, and “increase body mass,” as one classified contract says. And they can change fingerprints using a silicon sleeve that so snugly fits over a real hand it can’t be detected, embedding altered fingerprints and even impregnated with the oils found in real skin. Asked whether the appliance is effective, one source, who has gone through the training, laughs. “If I tell you, I’ll have to kill you.”
In real life, identity theft (mostly by criminals’ intent on profit) remains an epidemic that affects everyone, but for those in the intelligence and counter-terrorism worlds, the enemy is also actively engaged in efforts to compromise personal information. In 2015, the Islamic State posted the names, photos and addresses of over 1,300 U.S. military personnel, instructing supporters to target and kill the identified individuals. The FBI said that the release was followed by suspected Russian hackers who masqueraded as members of ISIS and threatened military families through Facebook. “We know everything about you, your husband and your children,” one menacing message said.
Counterintelligence and OPSEC officials began a large-scale effort to inform those affected but also to warn military personnel and their families to better protect their personal information on social media. The next year, ISIS released 8,318 target names: the largest-ever release until it was topped by 8,785 names in 2017.
It was revealed that military personnel sharing location information in their fitness devices were apparently revealing the locations of sensitive operations merely by jogging and sharing their data. “The rapid development of new and innovative information technologies enhances the quality of our lives but also poses potential challenges to operational security and force protection,” U.S. Central Command said in a statement at the time to the Washington Post.
Then came the DNA scare, when Adm. John Richardson, then chief of naval operations, warned military personnel and their families to stop using at-home ancestry DNA test kits. “Be careful who you send your DNA to,” Richardson said, warning that scientific advancements would be able to exploit the information, creating more and more targeted biological weapons in the future. And indeed in 2019, the Pentagon officially advised military personnel to steer clear of popular DNA services. “Exposing sensitive genetic information to outside parties poses personal and operational risks to Service members,” said the memo, first reported by Yahoo news.
“We’re still in the infancy of our transparent world,” says the retired senior officer, cautioning against imagining that there is some “identity gap” similar to the “bomber gap” of the Cold War. “We’re winning this war, including on the cyber side, even if secrecy about what we are doing makes the media portrayal of the Russians again look like they are ten feet tall.”
He admits that processing big data in the future will likely further impinge on everyone’s clandestine operations, but he says the benefits to society, even narrowly in just making terrorist activity and travel that much more difficult, outweigh the difficulties created for military operational security. The officer calls the secrecy legitimate but says that the Defense Department leadership has dropped the ball in recognizing the big picture. The military services should be asking more questions about the ethics, propriety and even legality of soldiers being turned into spies and assassins, and what this means for the future.
Still, the world of signature reduction keeps growing: evidence, says the retired officer, that modern life is not as transparent as most of us think.