• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
Hidden Harmonies China Blog

Hidden Harmonies China Blog

As China Re-Awakens, Finding New Harmonies in a Brave New World...

  • About Us
  • China Charities
  • FAQ
    • Terms of Service
  • Recommended Readings

Reflections (4)

November 25, 2018 by N.M.Cheung 2 Comments

One thing you need when entering China is you need to immediately get to a major China Mobile Office to obtain a temporary SIM card for your smart phone. There is no such thing as disposable phones you can purchase. You need identification to purchase SIM card and start communicating with others in China or internet. The temporary SIM card cost less then $5 for 2 months normal usage, but it is a must. I noticed that even with the temporary SIM card there is limitations. I attempted to use WiFi in a Starbuck coffee shop with my I-Pad and unable to sign on because Starbuck sent you a code to verify your identity, and the temporary number will not do. Once I used my relative’s phone number I immediately received the code and able to surf the net. Of course you can use WiFi in any hotel with their code. The implication on reflection was obvious. You are responsible for your communications on phone and internet. It would be impossible to spread rumors on line or influence elections like Russia did in U.S. without alerting security apparatus. There are constant reports of punishments of 5-15 days detentions for spreading unfounded rumors or disturbing social harmony.
I remember reading from news that CIA searches for a mole that resulting dozens of agents disappearing in China a few years ago. They surveilled a suspected former agent for years without getting any evidence, and finally decide to arrest him for keeping secret from previous employment as a scapegoat. I suspect they could charge any former agent with that but he satisfy the criteria of being a Chinese-American, as were many false arrests by FBI of Chines-American scientists doing normal scientific exchanges. I suddenly have an epiphany that instead of spending millions of dollars searching for a mole, I could have give them a plausible answer. Remember China started to build supercomputers a few years ago as did U.S. IBM used it to demolish chess grandmasters and Google used it to defeat world champions in Go. Meanwhile China was probably perfecting the AI for large data and cloud computing to search abnormalities any spy will generate no matter how careful they pretended. China built the “Great Firewall” that allow some hackers to claim success in penetrating with VPNs, not realizing it was intentional and they can crack down any time they wish. I guess the joke is on us.

Filed Under: Uncategorized

Reader Interactions

Comments

  1. da5id403 says

    December 23, 2018 at 11:17 am

    “The implication on reflection was obvious. You are responsible for your communications on phone and internet. It would be impossible to spread rumors on line or influence elections like Russia did in U.S. without alerting security apparatus. There are constant reports of punishments of 5-15 days detentions for spreading unfounded rumors or disturbing social harmony.”

    Could this work in the US?

    Open minds want to know.

  2. N.M.Cheung says

    December 23, 2018 at 2:31 pm

    @da5id403
    It’s not possible in U.S. as anybody can buy a disposable phone and post on internet, even those faked fire alarms or threats are impossible to trace unless someone is dumb enough to use his own phone.

Leave a Reply

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload the CAPTCHA.

Primary Sidebar

Recent Posts

  • The TikTok Ban That Failed. This Ban Is Not Really About ‘National Security’ Rather It Is About Greed And Control.
  • 大山的女兒–Daughter of the Mountain
  • No, the Chinese does not express glee over Shinzo Abe’s assassination and how western propaganda got it wrong about what Chinese thinks of Abe
  • The Overt Politicization of the Origins of Covid-19
  • The U.S. Loves Wars…

Recent Comments

  • Hengxin on 大山的女兒–Daughter of the Mountain
  • Hompuso on Short Note on Media Disinformation: No, No, No… CIA is not Impersonating Others in Hacking Others … There is just not Proof!
  • Abraham on The Overt Politicization of the Origins of Covid-19
  • purislot on (Letter) Web search for Tiananmen not censored, but do people care?
  • hanhan on 且谈1989年的天安门事件

Tag Cloud

america Beijing censorship China china-u.s. relations coronavirus corruption culture dalai lama defamation againt Chinese democracy earthquake economy education Environment featured freedom freedom of speech Google government history hong kong human rights humor india internet japan media media bias nationalism olympics politics propaganda racism reform riot rule of law sino-u.s. relations sixfour South China Seas taiwan tiananmen tibet U.S. China Relations xinjiang

Archives

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Blogroll

  • China Dialogue
  • China in Africa: The Real Story by Deborah Brautigam
  • Chinese Portal
  • ESWN (東南西北)
  • Fairness & Accuracy In Reporting (FAIR)
  • Fool's Mountain (sibling blog)
  • iLook China
  • Moon of Shanghai
  • Outcast Journalism
  • Professor Ann Lee
  • Sino Platonic
  • The Anti-Empire Report

Copyright © 2025 · Magazine Pro on Genesis Framework · WordPress · Log in