Chinese Propaganda

China’s propaganda is weak but its promise-keeping is strong. America is the reverse.
Fallujah, Iraq, Mosul, Libya, Syria, Kosovo, Indonesia, Nam ., Cambodia, Loas, Afpak, Yemen, Somalia, Sudan, Diego Garcia, Okinawa, Jeju, Korea, …
Arunachal Pradesh. Assam. Manipur. Meghalaya. Mizoram. Nagaland. Sikkim. Tripura,Kashmir….
Gujarat, dalits…..
East Timor, Aceh, West Papua New GUinea….Rwanda wasn’t what we were told it was, Yugoslavia wasn’t what we were told it was, Iraq wasn’t what we were told it was, and surprise, surprise Tiananmen wasn’t what we were told it was! What next, are you going to tell me the Gulf of Tonkin was made up, and there were no “Kuwaiti incubator babies,” and that Gaddafi didn’t have “viagra fueled rape camps?” Oh, yeah, right, none of those things were true either.
Geeze, what a freaking coincidence? It appears you just can’t trust Western MSM CIA war propaganda. Who knew?
One thing that is clear is that the West’s leadership, as has been the case for the last 500+ years of our planetary pillage project, is completely amoral, unimaginably violent & psychopathic and can never EVER be trusted to tell the truth to us its own citizens. Of course, if it did tell us the truth – we’d have to hang them all – each and everyone – for treason and crimes against humanity.
So instead we ourselves live in our own little navel-gazing bubble waiting for the next new iPhone to come out, or for the release of “Ironman 15,” or some other such ultra-violent superhero nonsense. Anything, anything but deal with the real world. All while we hopelessly wallow in our own narcissism to the point that we can’t help but imagine that everyone on the planet wants to be “just – like – us.”
Tip of an iceberg.
Suffice to say that all the confirmed, indisputable genocides since ww2 were perpetrated by none other than China’s accusers themselves, fukusI.
But it might as well never happened,
Harold Pinter [RIP] “It never happened. Nothing ever happened. Even while it was happening it wasn’t happening. It didn’t matter. It was of no interest. The crimes of the United States have been systematic, constant, vicious, remorseless, but very few people have actually talked about them. You have to hand it to America. It has exercised a quite clinical manipulation of power worldwide while masquerading as a force for universal good”.
Language Manipulation in Western Propaganda:
China doesn’t fire officials, it “purges” them
Corrupt Chinese officials don’t get convicted for corruption, they “lose power struggles”
China doesn’t punish corrupt officials, it “nets” them
Chinese leaders don’t strengthen laws, they “concentrate power”
China doesn’t give out loans, they “trap” countries in debt
Chinese leaders don’t want their country to prosper peacefully, they are “obsessed with stability”
Countries and international organizations don’t praise China, they pander to its “increasing global influence”
Chinese people don’t attend rallies, they “descend” upon them
Chinese media doesn’t report news, it reports “propaganda”
China doesn’t revise counting methodologies, it “under-reports” cases
China doesn’t treat patients, it “rounds them up
China doesn’t enforce quarantines, “it enforces “lockdowns”
China doesn’t requisition private hospitals during a health emergency by passing laws, it “seizes” them
Chinese companies don’t innovate, they “steal IP”
Chinese people are not patriotic, they’re “brainwashed”
China’s government doesn’t face governance challenges, they face “threats” to their rule
Chinese provinces don’t win PISA tests, they “selectively nominate the best schools”
China is not good at AI, it simply has “loose privacy controls” and the “largest datasets”
Chinese athletes don’t win medals, they are “picked from school, often against their parents’ wishes” and train in “secretive” training camps
CCTV is not more popular than BBC on Facebook, it “fools algorithms” and creates “bogus followers”
China doesn’t ban the import of addictive drugs like Opium – it “renounces free trade”
Chinese celebrities don’t love their country and post patriotic messages on social media – they “pander” to the CCP and “nationalistic” fans
HK rioters don’t storm and destroy LegCo – the HK police “stand back” and let them do it
HK rioters don’t beat and burn and kill civilians, commit arson, build bombs, destroy subway stations, set fire to buildings, block traffic – they “retaliate” against police brutality
Western countries don’t have nuclear weapons, they have “nuclear deterrents”
US corporations don’t bribe politicians, they “lobby” them
White people in non-white countries are “expats”
Non-white people in white countries are “immigrants” or “refugees”
Unfriendly countries don’t have governments, they have “regimes”
Citizens of unfriendly countries don’t display “patriotism”, they display “nationalism”
The US has Bushes, a Clintons, and Trumps, other countries have “powerful families”, “clans”, and “princelings”
Botched CIA Communications System Helped Blow Cover of Chinese Agents
The number of informants executed in the debacle is higher than initially thought.
Zach DorfmanAugust 15, 2018, 5:13 PM
 Illustration by Kotryna Zukauskaite for Foreign Policy
Illustration by Kotryna Zukauskaite for Foreign Policy
It was considered one of the CIA’s worst failures in decades: Over a two-year period starting in late 2010, Chinese authorities systematically dismantled the agency’s network of agents across the country, executing dozens of suspected U.S. spies. But since then, a question has loomed over the entire debacle.
How were the Chinese able to roll up the network?
Trending Articles
Economists on the Run
Paul Krugman and other mainstream trade experts are now admitting that they were wrong about globalization: It hurt…
Now, nearly eight years later, it appears that the agency botched the communication system it used to interact with its sources, according to five current and former intelligence officials. The CIA had imported the system from its Middle East operations, where the online environment was considerably less hazardous, and apparently underestimated China’s ability to penetrate it.
“The attitude was that we’ve got this, we’re untouchable,” said one of the officials who, like the others, declined to be named discussing sensitive information. The former official described the attitude of those in the agency who worked on China at the time as “invincible.”
Other factors played a role as well, including China’s alleged recruitment of former CIA officer Jerry Chun Shing Lee around the same time. Federal prosecutors indicted Lee earlier this year in connection with the affair.
But the penetration of the communication system seems to account for the speed and accuracy with which Chinese authorities moved against the CIA’s China-based assets.
“You could tell the Chinese weren’t guessing. The Ministry of State Security [which handles both foreign intelligence and domestic security] were always pulling in the right people,” one of the officials said.
“When things started going bad, they went bad fast.”
The former officials also said the real number of CIA assets and those in their orbit executed by China during the two-year period was around 30, though some sources spoke of higher figures. The New York Times, which first reported the story last year, put the number at “more than a dozen.” All the CIA assets detained by Chinese intelligence around this time were eventually killed, the former officials said.
The CIA, FBI, and National Security Agency declined to comment for this story. The Chinese Embassy in Washington did not respond to requests for comment.
At first, U.S. intelligence officials were “shellshocked,” said one former official. Eventually, rescue operations were mounted, and several sources managed to make their way out of China.
Read More
 A demonstrator wearing a mask painted with the colours of the flag of East Turkestan and a hand bearing the colours of the Chinese flag attends a protest in front of the Chinese consulate in Istanbul, on July 5, 2018.(OZAN KOSE/AFP/Getty Images)
Islamic Leaders Have Nothing to Say About China’s Internment Camps for Muslims
Hundreds of thousands of Uighur have been detained without trial in China’s western region of Xinjiang.
 (Wang Zhao/AFP/Getty Images/iStockphoto/Foreign Policy illustration)
China’s AI Giants Can’t Say No to the Party
Open debate about the ethics of tech is a strength, not a weakness, of the U.S. system.
 China’s President Xi Jinping delivers a speech at the opening session of the Chinese Communist Party’s Congress at the Great Hall of the People in Beijing on Oct. 18. (Nicolas Asfouri/AFP/Getty Images)
The Resistible Rise of Xi Jinping
China’s president radically changed his country, and the Communist Party, through skill, determination — and a series of lucky breaks.
One of the former officials said the last CIA case officer to have meetings with sources in China distributed large sums of cash to the agents who remained behind, hoping the money would help them flee.
When the intelligence breach became known, the CIA formed a special task force along with the FBI to figure out what went wrong. During the investigation, the task force identified three potential causes of the failure, the former officials said: A possible agent had provided Chinese authorities with information about the CIA asset network, some of the CIA’s spy work had been sloppy and might have been detected by Chinese authorities, and the communications system had been compromised. The investigators concluded that a “confluence and combination of events” had wiped out the spy network, according to one of the former officials.
Eventually, U.S. counterintelligence officials identified Lee, the former CIA officer who had worked extensively in Beijing, as China’s likely informant. Court documents suggest Lee was in contact with his handlers at the Ministry of State Security through at least 2011.
Chinese authorities paid Lee hundreds of thousands of dollars for his efforts, according to the documents. He was indicted in May of this year on a charge of conspiracy to commit espionage.
But Lee’s alleged betrayal alone could not explain all the damage that occurred in China during 2011 and 2012, the former officials said. Information about sources is so highly compartmentalized that Lee would not have known their identities. That fact and others reinforced the theory that China had managed to eavesdrop on the communications between agents and their CIA handlers.
When CIA officers begin working with a new source, they often use an interim covert communications system—in case the person turns out to be a double agent.
The communications system used in China during this period was internet-based and accessible from laptop or desktop computers, two of the former officials said.
This interim, or “throwaway,” system, an encrypted digital program, allows for remote communication between an intelligence officer and a source, but it is also separated from the main communications system used with vetted sources, reducing the risk if an asset goes bad.
Although they used some of the same coding, the interim system and the main covert communication platform used in China at this time were supposed to be clearly separated. In theory, if the interim system were discovered or turned over to Chinese intelligence, people using the main system would still be protected—and there would be no way to trace the communication back to the CIA. But the CIA’s interim system contained a technical error: It connected back architecturally to the CIA’s main covert communications platform. When the compromise was suspected, the FBI and NSA both ran “penetration tests” to determine the security of the interim system. They found that cyber experts with access to the interim system could also access the broader covert communications system the agency was using to interact with its vetted sources, according to the former officials.
In the words of one of the former officials, the CIA had “fucked up the firewall” between the two systems.
U.S. intelligence officers were also able to identify digital links between the covert communications system and the U.S. government itself, according to one former official—links the Chinese agencies almost certainly found as well. These digital links would have made it relatively easy for China to deduce that the covert communications system was being used by the CIA. In fact, some of these links pointed back to parts of the CIA’s own website, according to the former official.
The covert communications system used in China was first employed by U.S. security forces in war zones in the Middle East, where the security challenges and tactical objectives are different, the sources said. “It migrated to countries with sophisticated counterintelligence operations, like China,” one of the officials said.
The system was not designed to withstand the scrutiny of a place like China, where the CIA faced a highly sophisticated intelligence service and a completely different online environment.
As part of China’s Great Firewall, internet traffic there is watched closely, and unusual patterns are flagged. Even in 2010, online anonymity of any kind was proving increasingly difficult.
Once Chinese intelligence obtained access to the interim communications system,­ penetrating the main system would have been relatively straightforward, according to the former intelligence officials. The window between the two systems may have only been open for a few months before the gap was closed, but the Chinese broke in during this period of vulnerability.
Precisely how the system was breached remains unclear. The Ministry of State Security might have run a double agent who was given the communication platform by his CIA handler. Another possibility is that Chinese authorities identified a U.S. agent—perhaps through information provided by Lee—and seized that person’s computer. Alternatively, authorities might have identified the system through a pattern analysis of suspicious online activities.
China was so determined to crack the system that it had set up a special task force composed of members of the Ministry of State Security and the Chinese military’s signals directorate (roughly equivalent to the NSA), one former official said.
Once one person was identified as a CIA asset, Chinese intelligence could then track the agent’s meetings with handlers and unravel the entire network. (Some CIA assets whose identities became known to the Ministry of State Security were not active users of the communications system, the sources said.)
One of the former officials said the agency had “strong indications” that China shared its findings with Russia, where some CIA assets were using a similar covert communications system. Around the time the CIA’s source network in China was being eviscerated, multiple sources in Russia suddenly severed their relationship with their CIA handlers, according to an NBC News report that aired in January—and confirmed by this former official.
The failure of the communications system has reignited a debate within the intelligence community about the merits of older, lower-tech methods for covert interactions with sources, according to the former officials.
There is an inherent paradox to covert communications systems, one of the former officials said: The easier a system is to use, the less secure it is.
The former officials said CIA officers operating in China since the debacle had reverted to older methods of communication, including interacting surreptitiously in person with sources. Such methods can be time-consuming and carry their own risks.
The disaster in China has led some officials to conclude that internet-based systems, even ones that employ sophisticated encryption, can never be counted on to shield assets.
“Will a system always stay encrypted, given the advances in technology? You’re supposed to protect people forever,” one of the former officials said.
Zach Dorfman is a senior fellow at the Carnegie Council for Ethics in International Affairs and an investigative journalist. Follow him on Twitter: @zachsdorfman. More from Foreign Policy
Great Firewall of China? – Quora
Firewalls are mandatory in major buildings because, if someone accidentally starts a fire, they contain the damage and provide time for firefighters to suppress them.
Information firewalls, like the Great Firewall of China, serve the same purpose.
We know how much damage false information (propaganda) does when it gets out of control. Remember what happened when false information, an unfounded rumor–about non-existent weapons of mass destruction in Iraq–got out of control? People who believed those rumors killed millions of women and children and bombed Iraq into ruins.
China does not want that to happen so she regulates rumor-mongering at home and slows misinformation–like Iraq’s WMDs–from entering the country from abroad. That’s why no Chinese ever believed the rumor about Iraq having weapons of mass destruction: they had time to consider the evidence from both sides.
Earlier this month we saw an example of the Great Firewall in action when China’s censor tried to block these 315 articles about China published by Cambridge University Press.
Western media and Western academics were outraged and called the censor’s action ‘repression’ but, if you read the 315 articles, you’ll see why the censor objected to them: they conveyed false information about China: rumors that unregulated Western media have been circulating by for decades.
Eighty of the 315 articles, for example, were based on the brutal, blood-soaked massacre of thousands of democracy-loving students in Tiananmen Square in 1989.
But China’s censor had two problems with this:
The first problem is veracity: there was no brutal, blood-soaked massacre of thousands of democracy-loving students in Tiananmen Square in 1989*, or ever. The students demonstrated in Tiananmen because they’d lost their university scholarships thanks to Deng’s Reform and Opening and were angry that black students, who kept their scholarships, were now dating Chinese girls. In the end, the students went home and were all safely in bed by 6:30 am. In other words, the journal articles knowingly spread false, harmful information.
The second problem is authority: Cambridge University Press, one of the world’s best academic publishers, is responsible for wonderful books like Joseph Needham’s Science and Technology in China. Chinese students, who respect authoritative sources, might think the Tiananmen articles are truthful because Cambridge published them. And when they see that the articles were written by famous scholars–world authorities in their fields–the false information becomes even more persuasive.
More recently still, the RussiaGate scandal has caused the American government to acknowledge that voters can be manipulated by social media, as China has observed for years. But, because she is labeled as a ‘non-Western dictatorship,’ Western media claimed that China had invented these threats as a pretext for ‘cracking down on democracy and free speech’. Now we know the truth.
That’s why Chinese should support the Great Firewall for now. In 20 years time, when China has the same control of global media as the West does today, rumors and false information will still be around but the Great Firewall will no longer be needed.
Please use the sharing tools found via the email icon at the top of articles. Copying articles to share with others is a breach of T&Cs and Copyright Policy. Email [email protected] to buy additional rights. Subscribers may share up to 10 or 20 articles per month using the gift article service. More information can be found at
@Anon  China “are only hypersensitive to any issue that could give momentum to an uprising in their nation”.
ALL nations are  hypersensitive to any issue that could give momentum to an uprising in their nation. ALL.
Why do you think America kills 2,000 people a year in the process of ‘arresting’ them, and jails 2,000,000 without trial, and tries to censor, kidnap or kill Julian Assange and Edward Snowden?
China’s non-violent prevention measures are, literally, harmless by comparison.

Have any Question?

1 thought on “Chinese Propaganda”

  1. Pingback: The Law in China The Law in China - Here Comes China!

Leave a Comment

Your email address will not be published. Required fields are marked *


hcc headline2 mobile 1



Most Popular