{"id":186932,"date":"2021-06-14T12:01:30","date_gmt":"2021-06-14T11:01:30","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=186932"},"modified":"2021-06-14T06:23:41","modified_gmt":"2021-06-14T05:23:41","slug":"inside-the-pentagons-secret-undercover-army","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2021\/06\/inside-the-pentagons-secret-undercover-army\/","title":{"rendered":"Inside the Pentagon&#8217;s Secret Undercover Army"},"content":{"rendered":"<div id=\"attachment_186934\" style=\"width: 360px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/06\/spying-secret-undercover-army-signature-reduction.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-186934\" class=\"wp-image-186934\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/06\/spying-secret-undercover-army-signature-reduction.jpg\" alt=\"\" width=\"350\" height=\"240\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/06\/spying-secret-undercover-army-signature-reduction.jpg 790w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/06\/spying-secret-undercover-army-signature-reduction-300x205.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/06\/spying-secret-undercover-army-signature-reduction-768x526.jpg 768w\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" \/><\/a><p id=\"caption-attachment-186934\" class=\"wp-caption-text\">Inside the largest undercover force the world has ever known: the one created by the Pentagon, with tens of thousands of soldiers, civilians and contractors operating under false names, on the ground and in cyberspace.<br \/>Timothy A. Clary, AFP via Getty Images<\/p><\/div>\n<p><em>17 May 2021 &#8211; <\/em>The largest undercover force the world has ever known is the one created by the <a target=\"_blank\" href=\"https:\/\/www.newsweek.com\/topic\/pentagon\"  data-sys=\"1\">Pentagon<\/a> over the past decade. Some 60,000 people now belong to this secret army, many working under masked identities and in low profile, all part of a broad program called &#8220;signature reduction.&#8221; The force, more than ten times the size of the clandestine elements of the <a target=\"_blank\" href=\"https:\/\/www.newsweek.com\/topic\/cia\"  data-sys=\"1\">CIA<\/a>, carries out domestic and foreign assignments, both in military uniforms and under civilian cover, in real life and online, sometimes hiding in private businesses and consultancies, some of them household name companies.<\/p>\n<p>The unprecedented shift has placed an ever greater number of soldiers, civilians, and contractors working under false identities, partly as a natural result in the growth of secret special forces but also as an intentional response to the challenges of traveling and operating in an increasingly transparent world. The explosion of Pentagon cyber warfare, moreover, has led to thousands of spies who carry out their day-to-day work in various made-up personas, the very type of nefarious operations the United States decries when Russian and Chinese spies do the same.<\/p>\n<p><em>Newsweek&#8217;s<\/em> exclusive report on this secret world is the result of a two-year investigation involving the examination of over 600 resumes and 1,000 job postings, dozens of Freedom of Information Act requests, and scores of interviews with participants and defense decision-makers. What emerges is a window into not just a little-known sector of the American military, but also a completely unregulated practice. No one knows the program&#8217;s total size, and the explosion of signature reduction has never been examined for its impact on military policies and culture. <a target=\"_blank\" href=\"https:\/\/www.newsweek.com\/topic\/congress\"  data-sys=\"1\">Congress<\/a> has never held a hearing on the subject. And yet the military developing this gigantic clandestine force challenges U.S. laws, the Geneva Conventions, the code of military conduct and basic accountability.<\/p>\n<p>The signature reduction effort engages some 130 private companies to administer the new clandestine world. Dozens of little known and secret government organizations support the program, doling out classified contracts and overseeing publicly unacknowledged operations. Altogether the companies pull in over $900 million annually to service the clandestine force\u2014doing everything from creating false documentation and paying the bills (and taxes) of individuals operating under assumed names, to manufacturing disguises and other devices to thwart detection and identification, to building invisible devices to photograph and listen in on activity in the most remote corners of the Middle East and Africa.<\/p>\n<p>Special operations forces constitute over half the entire signature reduction force, the shadow warriors who pursue terrorists in war zones from Pakistan to West Africa but also increasingly work in unacknowledged hot spots, including behind enemy lines in places like North Korea and Iran. Military intelligence specialists\u2014collectors, counter-intelligence agents, even linguists\u2014make up the second largest element: thousands deployed at any one time with some degree of &#8220;cover&#8221; to protect their true identities.<\/p>\n<p>The newest and fastest growing group is the clandestine army that never leaves their keyboards. These are the cutting-edge cyber fighters and intelligence collectors who assume false personas online, employing &#8220;nonattribution&#8221; and &#8220;misattribution&#8221; techniques to hide the who and the where of their online presence while they search for high-value targets and collect what is called &#8220;publicly accessible information&#8221;\u2014or even engage in campaigns to influence and manipulate social media. Hundreds work in and for the <a target=\"_blank\" href=\"https:\/\/www.newsweek.com\/topic\/nsa\"  data-sys=\"1\">NSA<\/a>, but over the past five years, every military intelligence and special operations unit has developed some kind of &#8220;web&#8221; operations cell that both collects intelligence and tends to the operational security of its very activities.<\/p>\n<p>In the electronic era, a major task of signature reduction is keeping all of the organizations and people, even the automobiles and aircraft involved in the clandestine operations, masked. This protective effort entails everything from scrubbing the Internet of telltale signs of true identities to planting false information to protect missions and people. As standard unforgettable identification and biometrics have become worldwide norms, the signature reduction industry also works to figure out ways of spoofing and defeating everything from fingerprinting and facial recognition at border crossings, to ensuring that undercover operatives can enter and operate in the United States, manipulating official records to ensure that false identities match up.<\/p>\n<p>Just as biometrics and &#8220;Real ID&#8221; are the enemies of clandestine work, so too is the &#8220;digital exhaust&#8221; of online life. One major concern of counter-terrorism work in the <a target=\"_blank\" href=\"https:\/\/www.newsweek.com\/topic\/isis\"  data-sys=\"1\">ISIS<\/a> age is that military families are also vulnerable\u2014another reason, participants say, to operate under false identities. The abundance of online information about individuals (together with some spectacular foreign hacks) has enabled foreign intelligence services to better unmask fake identities of American spies. Signature reduction is thus at the center of not only counter-terrorism but is part of the Pentagon&#8217;s shift towards great power competition with Russia and China\u2014competition, influence, and disruption &#8220;below the level of armed conflict,&#8221; or what the military calls warfare in the &#8220;Gray Zone,&#8221; a space &#8220;in the peace-conflict continuum.&#8221;<\/p>\n<p>One recently retired senior officer responsible for overseeing signature reduction and super-secret &#8220;special access programs&#8221; that shield them from scrutiny and compromise says that no one is fully aware of the extent of the program, nor has much consideration been given to the implications for the military institution. &#8220;Everything from the status of the Geneva Conventions\u2014were a soldier operating under false identity to be captured by an enemy\u2014to Congressional oversight is problematic,&#8221; he says. He worries that the desire to become more invisible to the enemy not just obscures what the United States is doing around the world but also makes it more difficult to bring conflicts to a close. &#8220;Most people haven&#8217;t even heard of the term signature reduction let alone what it creates,&#8221; he says. The officer spoke on condition of anonymity because he is discussing highly classified matters.<\/p>\n<figure class=\"imageBox\">\n<div class=\"innerBox\"><picture class=\"mapping-embed\"><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798051\/military-operators-hollowing-out-vehicle-rear.webp?w=790&amp;f=a2f6a8e1d4c34cb26a4ea2e2d20308f8 1x\" type=\"image\/webp\" media=\"(min-width: 992px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798051\/military-operators-hollowing-out-vehicle-rear.jpg?w=790&amp;f=a2f6a8e1d4c34cb26a4ea2e2d20308f8 1x\" type=\"image\/jpeg\" media=\"(min-width: 992px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798051\/military-operators-hollowing-out-vehicle-rear.webp?w=900&amp;f=b9a6aefeafea8bfa70574967dc255db4 1x\" type=\"image\/webp\" media=\"(min-width: 768px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798051\/military-operators-hollowing-out-vehicle-rear.jpg?w=900&amp;f=b9a6aefeafea8bfa70574967dc255db4 1x\" type=\"image\/jpeg\" media=\"(min-width: 768px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798051\/military-operators-hollowing-out-vehicle-rear.webp?w=790&amp;f=a2f6a8e1d4c34cb26a4ea2e2d20308f8 1x\" type=\"image\/webp\" media=\"(min-width: 481px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798051\/military-operators-hollowing-out-vehicle-rear.jpg?w=790&amp;f=a2f6a8e1d4c34cb26a4ea2e2d20308f8 1x\" type=\"image\/jpeg\" media=\"(min-width: 481px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798051\/military-operators-hollowing-out-vehicle-rear.webp?w=450&amp;f=d498be876895f16516102b02f0a2bf6f 1x\" type=\"image\/webp\" media=\"(min-width: 0px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798051\/military-operators-hollowing-out-vehicle-rear.jpg?w=450&amp;f=d498be876895f16516102b02f0a2bf6f 1x\" type=\"image\/jpeg\" media=\"(min-width: 0px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798051\/military-operators-hollowing-out-vehicle-rear.webp?w=790&amp;f=a2f6a8e1d4c34cb26a4ea2e2d20308f8\" type=\"image\/webp\" \/><img loading=\"lazy\" decoding=\"async\" id=\"i1798051\" class=\"mapping-embed imgPhoto aligncenter\" src=\"https:\/\/d.newsweek.com\/en\/full\/1798051\/military-operators-hollowing-out-vehicle-rear.jpg?w=790&amp;f=a2f6a8e1d4c34cb26a4ea2e2d20308f8\" alt=\"Military operators hollowing out vehicle rear\" width=\"790\" height=\"593\" \/><\/picture><\/div><figcaption class=\"caption\"><span class=\"cap\">Military operators hollowing out the rear of an SUV from Syria to install the power and cabling to turn the seemingly normal vehicle into a close-in intercept platform, able to eavesdrop on cell phone and walkie-talkie signals. (Photo provided to William M. Arkin)<\/span> <span class=\"credit\">W. M. Arkin<\/span><\/figcaption><\/figure>\n<p><strong>The secret life of Jonathan Darby<\/strong><\/p>\n<p>Every morning at 10:00 a.m., Jonathan Darby embarks on his weekly rounds of mail call. Darby is not his real name, but it is also not the fake name on his Missouri driver&#8217;s license that he uses to conduct his work. And the government car he drives, one of a fleet of over 200,000 federal vehicles owned by the General Services Administration, is also not registered in his real or his fake name, and nor are his magnetically attached Maryland state license plates really for his car, nor are they traceable back to him or his organization. Where Darby works and the locations he visits are also classified.<\/p>\n<p>Darby&#8217;s retired from the Army, and he asks that neither his real nor his cover name be used. He served for 20 years in counterintelligence, including two African assignments where he operated in low profile in Ethiopia and Sudan, masquerading as an expat businessman. Now he works for a Maryland-based signature reduction contractor that he asked <em>Newsweek<\/em> not to identify.<\/p>\n<p>As Darby makes his rounds to some 40 or so post offices and storefront mailbox stores in the DC Metropolitan area, he picks up a trunk full of letters and packages, mailing a similar number from rural addresses. Back at the office, he sorts through the take, delivering bills to the finance people and processing dozens of personal and business letters mailed from scores of overseas locations. But his main task is logging and forwarding the signature reduction &#8220;mechanisms&#8221; as they are called, passports and State driver&#8217;s licenses for people who don&#8217;t exist, and other papers\u2014bills, tax documents, organization membership cards\u2014that form the foundation of fake identities.<\/p>\n<p>To register and double-check the authenticity of his daily take, Darby logs into two databases, one the Travel and Identity Document database, the intelligence community&#8217;s repository of examples of 300,000 genuine, counterfeit and altered foreign passports and visas; and the other the Cover Acquisition Management System, a super-secret register of false identities where the &#8220;mechanisms&#8221; used by clandestine operators are logged. For false identities traveling overseas, Darby and his colleagues also have to alter databases of U.S. immigration and customs to ensure that those performing illicit activities can return to the United States unmolested.<\/p>\n<p>For identity verification, Darby&#8217;s unit works with secret offices at Homeland Security and the State Department as well as almost all 50 states in enrolling authentic &#8220;mechanisms&#8221; under false names. A rare picture into this world came in April 2013 when an enterprising reporter at Northwest Public Broadcasting did a story suggesting the scale of this secret program. His report revealed that the state of Washington alone had provided hundreds of valid state driver licenses in fictitious names to the federal government. The existence of the &#8220;confidential driver license program,&#8221; as it was called, was unknown even to the governor.<\/p>\n<p>Before the Internet, Darby says\u2014before a local cop or a border guard was connected to central databases in real time\u2014all an operative needed to be &#8220;undercover&#8221; was an ID with a genuine photo. These days, however, especially for those operating under deep cover, the so-called &#8220;legend&#8221; behind an identity has to match more than just a made-up name. Darby calls it &#8220;due diligence&#8221;: the creation of this trail of fake existence. Fake birthplaces and home addresses have to be carefully researched, fake email lives and social media accounts have to be created. And those existences need to have corresponding &#8220;friends.&#8221; Almost every individual unit that operates clandestinely\u2014special operations, intelligence collections, or cyber\u2014has a signature reduction section, mostly operated by small contractors, conducting due diligence. There they adhere to what Darby calls the six principles of signature reduction: credibility, compatibility, realism, supportability, verity and compliance.<\/p>\n<p>Compliance is a big one, Darby says, especially because of the world that 9\/11 created, where checkpoints are common and nefarious activity is more closely scrutinized. To keep someone covert for real, and to do so for any period of time, requires a time consuming dance that not only has to tend to someone&#8217;s operational identity but also maintain their real life back home. As Darby explains it, this includes clandestine bill paying but also working with banks and credit card security departments to look the other way as they search for identity fraud or money laundering. And then, signature reduction technicians need to ensure that real credit scores are maintained\u2014and even real taxes and Social Security payments are kept up to date\u2014so that people can go back to their dormant lives when their signature reduction assignments cease.<\/p>\n<p>Darby&#8217;s unit, originally called the Operational Planning and Travel Intelligence Center, is responsible for overseeing much of this (and to do so it operates the Pentagon&#8217;s largest military finance office), but documentation\u2014as important as it is\u2014is only one piece of the puzzle. Other organizations are responsible for designing and manufacturing the custom disguises and &#8220;biometric defeat&#8221; elements to facilitate travel. Darby says this is where all the Special Access Programs are. SAPs, the most secret category of government information, protect the methods used\u2014and the clandestine capabilities that exist\u2014to manipulate foreign systems to get around seemingly foolproof safeguards including fingerprinting and facial recognition.<\/p>\n<figure class=\"imageBox\">\n<div class=\"innerBox\"><picture class=\"mapping-embed\"><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798069\/spycraft-listening-device-embedded-shoe.webp?w=790&amp;f=40091c0292c85c194d75c47572878b04 1x\" type=\"image\/webp\" media=\"(min-width: 992px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798069\/spycraft-listening-device-embedded-shoe.jpg?w=790&amp;f=40091c0292c85c194d75c47572878b04 1x\" type=\"image\/jpeg\" media=\"(min-width: 992px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798069\/spycraft-listening-device-embedded-shoe.webp?w=900&amp;f=4ddefc9c9bf9daba5f0a278d14b6822d 1x\" type=\"image\/webp\" media=\"(min-width: 768px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798069\/spycraft-listening-device-embedded-shoe.jpg?w=900&amp;f=4ddefc9c9bf9daba5f0a278d14b6822d 1x\" type=\"image\/jpeg\" media=\"(min-width: 768px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798069\/spycraft-listening-device-embedded-shoe.webp?w=790&amp;f=40091c0292c85c194d75c47572878b04 1x\" type=\"image\/webp\" media=\"(min-width: 481px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798069\/spycraft-listening-device-embedded-shoe.jpg?w=790&amp;f=40091c0292c85c194d75c47572878b04 1x\" type=\"image\/jpeg\" media=\"(min-width: 481px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798069\/spycraft-listening-device-embedded-shoe.webp?w=450&amp;f=1c835319dc26ecb49cc6f6321639f8d4 1x\" type=\"image\/webp\" media=\"(min-width: 0px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798069\/spycraft-listening-device-embedded-shoe.jpg?w=450&amp;f=1c835319dc26ecb49cc6f6321639f8d4 1x\" type=\"image\/jpeg\" media=\"(min-width: 0px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798069\/spycraft-listening-device-embedded-shoe.webp?w=790&amp;f=40091c0292c85c194d75c47572878b04\" type=\"image\/webp\" \/><img loading=\"lazy\" decoding=\"async\" id=\"i1798069\" class=\"mapping-embed imgPhoto aligncenter\" src=\"https:\/\/d.newsweek.com\/en\/full\/1798069\/spycraft-listening-device-embedded-shoe.jpg?w=790&amp;f=40091c0292c85c194d75c47572878b04\" alt=\"spycraft listening device embedded in shoe\" width=\"790\" height=\"527\" \/><\/picture><\/div><figcaption class=\"caption\"><span class=\"cap\">Tracking device being implanted in the heel of a shoe. In the background is the base of a lamp, also with an implanted listening device. (Photo provided to William M. Arkin)<\/span> <span class=\"credit\">W.M. Arkin<\/span><\/figcaption><\/figure>\n<p><strong>&#8216;Signature reduction&#8217; is a term of art<\/strong><\/p>\n<p>Numerous signature reduction SAPs, programs with names like Hurricane Fan, Island Hopper and Peanut Chocolate, are administered by a shadowy world of secret organizations that service the clandestine army\u2014the Defense Programs Support Activity, Joint Field Support Center, Army Field Support Center, Personnel Resources Development Office, Office of Military Support, Project Cardinals, and the Special Program Office.<\/p>\n<p>Befitting how secret this world is, there is no unclassified definition of signature reduction. The Defense Intelligence Agency\u2014which operates the Defense Clandestine Service and the Defense Cover Office\u2014says that signature reduction is a term of art, one that &#8220;individuals might use to &#8230; describe operational security (OPSEC) measures for a variety of activities and operations.&#8221; In response to <em>Newsweek<\/em> queries that point out that dozens of people have used the term to refer to this world, DIA suggests that perhaps the Pentagon can help. But the responsible person there, identified as a DOD spokesperson, says only that &#8220;as it relates to HUMINT operations&#8221;\u2014meaning human intelligence\u2014 signature reduction &#8220;is not an official term&#8221; and that it is used to describe &#8220;measures taken to protect operations.&#8221;<\/p>\n<p>Another senior former intelligence official, someone who ran an entire agency and asks not to be named because he is not authorized to speak about clandestine operations, says that signature reduction exists in a &#8220;twilight&#8221; between covert and undercover. The former, defined in law, is subject to presidential approval and officially belongs to the CIA&#8217;s National Clandestine Service. The latter connotes strictly law enforcement efforts undertaken by people with a badge. And then there is the Witness Protection Program, administered by the U.S. Marshals Service of the Justice Department, which tends to the fake identities and lives of people who have been resettled in exchange for their cooperation with prosecutors and intelligence agencies.<\/p>\n<p>The military doesn&#8217;t conduct covert operations, the senior former official says, and military personnel don&#8217;t fight undercover. That is, except when they do, either because individuals are assigned\u2014&#8221;sheep dipped&#8221;\u2014to the CIA, or because certain military organizations, particularly those of the Joint Special Operations Command, operate like the CIA, often alongside them in covert status, where people who depend on each other for their lives don&#8217;t know each other&#8217;s real names. Then there are an increasing number of government investigators\u2014military, <a target=\"_blank\" href=\"https:\/\/www.newsweek.com\/topic\/fbi\"  data-sys=\"1\">FBI<\/a>, homeland security and even state officials\u2014who are not undercover per se but who avail themselves of signature reduction status like fake IDs and fake license plates when they work domestically, particularly when they are engaged in extreme vetting of American citizens of Arab, South Asian, and increasingly African background, who have applied for security clearances.<\/p>\n<p><strong>&#8216;Get Smart&#8217;? <\/strong><\/p>\n<p>In May 2013, in an almost comical incident more reminiscent of &#8220;Get Smart&#8221; than skilled spying, Moscow ordered a U.S. embassy &#8220;third secretary&#8221; by the name of Ryan Fogle to leave the country, releasing photos of Fogle wearing an ill-fitting blond wig and carrying an odd collection of seemingly amateurish paraphernalia\u2014four pairs of sunglasses, a street map, a compass, a flashlight, a Swiss Army knife and a cell phone\u2014so old, one article said, it looked like it had &#8220;been on this earth for at least a decade.&#8221;<\/p>\n<figure class=\"imageBox\">\n<div class=\"innerBox\"><picture class=\"mapping-embed\"><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798063\/ryan-fogle-spy-wig.webp?w=790&amp;f=5fa10760af7192147eba5b0856d320ee 1x\" type=\"image\/webp\" media=\"(min-width: 992px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798063\/ryan-fogle-spy-wig.jpg?w=790&amp;f=5fa10760af7192147eba5b0856d320ee 1x\" type=\"image\/jpeg\" media=\"(min-width: 992px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798063\/ryan-fogle-spy-wig.webp?w=900&amp;f=c5fe9acef6b348693df55141d5a584bb 1x\" type=\"image\/webp\" media=\"(min-width: 768px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798063\/ryan-fogle-spy-wig.jpg?w=900&amp;f=c5fe9acef6b348693df55141d5a584bb 1x\" type=\"image\/jpeg\" media=\"(min-width: 768px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798063\/ryan-fogle-spy-wig.webp?w=790&amp;f=5fa10760af7192147eba5b0856d320ee 1x\" type=\"image\/webp\" media=\"(min-width: 481px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798063\/ryan-fogle-spy-wig.jpg?w=790&amp;f=5fa10760af7192147eba5b0856d320ee 1x\" type=\"image\/jpeg\" media=\"(min-width: 481px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798063\/ryan-fogle-spy-wig.webp?w=450&amp;f=312948fd0533734ba5c29b567f834b50 1x\" type=\"image\/webp\" media=\"(min-width: 0px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798063\/ryan-fogle-spy-wig.jpg?w=450&amp;f=312948fd0533734ba5c29b567f834b50 1x\" type=\"image\/jpeg\" media=\"(min-width: 0px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798063\/ryan-fogle-spy-wig.webp?w=790&amp;f=5fa10760af7192147eba5b0856d320ee\" type=\"image\/webp\" \/><img loading=\"lazy\" decoding=\"async\" id=\"i1798063\" class=\"mapping-embed imgPhoto aligncenter\" src=\"https:\/\/d.newsweek.com\/en\/full\/1798063\/ryan-fogle-spy-wig.jpg?w=790&amp;f=5fa10760af7192147eba5b0856d320ee\" alt=\"Ryan Fogle spy wig \" width=\"790\" height=\"449\" \/><\/picture><\/div><figcaption class=\"caption\"><span class=\"cap\">Sophisticated spycraft or &#8220;Get Smart&#8221;? On May 14, 2013, a computer screen in Moscow displays a photo published by the Russian state RT website, which shows some of the confiscated belongings of Ryan C. Fogle, the third secretary of the political section of Washington&#8217;s embassy in Moscow, being displayed at the Federal Security Service after his arrest.<\/span> <span class=\"credit\">AFP\/Getty Images<\/span><\/figcaption><\/figure>\n<p>The international news media had a field day, many retired CIA people decrying the decline of tradecraft, most of the commentary opining how we&#8217;d moved on from the old world of wigs and fake rocks, a reference to Great Britain admitting just a year earlier that indeed it was the owner of a fake rock and its hidden communications device, another discovery of Russian intelligence in Moscow.<\/p>\n<p>Six years later, another espionage case hit the news, this time when a jury sent former American military intelligence officer Kevin Patrick Mallory to 20 years in prison for conspiring to sell secrets to China. There was nothing particularly unique about the Mallory case, the prosecution making its own show of presenting the jury with a collection of wigs and fake mustaches looking like Halloween costumes, the whole thing seemingly another funny episode of clumsy disguise.<\/p>\n<p>And yet, says Brenda Connolly (not her real name), one would be na\u00efve to laugh too hard, for both cases provide a peek into the new tricks of the trade and the extreme secrecy that hides them. Connolly started her engineering career at the Directorate of Science and Technology at the CIA and now works for a small defense contractor that produces the gizmos\u2014think &#8220;Q&#8221; in the James Bond movies, she says\u2014for signature reduction operations.<\/p>\n<p>That &#8220;ancient&#8221; Nokia phone carried by Ryan Fogle, she says, was nothing of the sort, the innocuous outsides concealing what she calls a &#8220;covert communications&#8221; device inside. Similarly, entered in evidence in Mallory case was a Samsung phone given to him by Chinese intelligence that was so sophisticated that even when the FBI cloned it electronically, they could not find a hidden partition used to store secrets and one that Mallory ultimately had to reveal to them.<\/p>\n<p>Lost in the spy-vs-spy theater of both cases were other clues of modern signature reduction, Connolly says. Fogle also carried an RFID shield, a radio frequency identification blocking pouch intended to prevent electronic tracking. And Mallory had vials of fake blood provided by China; Connolly would not reveal what it would be used for.<\/p>\n<p>Like many people in this world, Connolly is a connoisseur and curator. She can talk for hours about the broadcasts that used to go out from the Soviet Union\u2014but also were transmitted from Warrenton, Virginia\u2014female voices reciting random numbers and passages from books that agents around the world would pick up on their shortwave radios and match to prearranged codes.<\/p>\n<p>But then Internet cafes and online backdoors became the clandestine channels of choice for covert communications, largely replacing shortwave\u2014until the surveillance technologies (especially in autocratic countries) caught up and intelligence agencies acquired an ability not only to detect and intercept internet activity but also to intercept every keystroke of activity on a remote keyboard. That ushered in today&#8217;s world of covert communications or COVCOMM, as insiders call it. These are very special encryption devices seen in the Fogle and Mallory cases, but also dozens of different &#8220;burst mode&#8221; transmitters and receivers secreted in everyday objects like fake rocks. All an agent or operator needs to activate communications with these COVCOMMs in some cases is to simply walk by a target receiver (a building or fake rock) and the clandestine messages are encrypted and transmitted back to special watch centers.<\/p>\n<figure class=\"imageBox\">\n<div class=\"innerBox\"><picture class=\"mapping-embed\"><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798064\/covert-communications-devices-fake-bricks-afghanistan.webp?w=790&amp;f=10c92da3ecff1f90a2c73e2a8f616804 1x\" type=\"image\/webp\" media=\"(min-width: 992px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798064\/covert-communications-devices-fake-bricks-afghanistan.jpg?w=790&amp;f=10c92da3ecff1f90a2c73e2a8f616804 1x\" type=\"image\/jpeg\" media=\"(min-width: 992px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798064\/covert-communications-devices-fake-bricks-afghanistan.webp?w=900&amp;f=35d8760767d5152679704b9f2d8fb8c3 1x\" type=\"image\/webp\" media=\"(min-width: 768px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798064\/covert-communications-devices-fake-bricks-afghanistan.jpg?w=900&amp;f=35d8760767d5152679704b9f2d8fb8c3 1x\" type=\"image\/jpeg\" media=\"(min-width: 768px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798064\/covert-communications-devices-fake-bricks-afghanistan.webp?w=790&amp;f=10c92da3ecff1f90a2c73e2a8f616804 1x\" type=\"image\/webp\" media=\"(min-width: 481px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798064\/covert-communications-devices-fake-bricks-afghanistan.jpg?w=790&amp;f=10c92da3ecff1f90a2c73e2a8f616804 1x\" type=\"image\/jpeg\" media=\"(min-width: 481px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798064\/covert-communications-devices-fake-bricks-afghanistan.webp?w=450&amp;f=f522369c71cfd84117876801b5435edc 1x\" type=\"image\/webp\" media=\"(min-width: 0px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798064\/covert-communications-devices-fake-bricks-afghanistan.jpg?w=450&amp;f=f522369c71cfd84117876801b5435edc 1x\" type=\"image\/jpeg\" media=\"(min-width: 0px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798064\/covert-communications-devices-fake-bricks-afghanistan.webp?w=790&amp;f=10c92da3ecff1f90a2c73e2a8f616804\" type=\"image\/webp\" \/><img loading=\"lazy\" decoding=\"async\" id=\"i1798064\" class=\"mapping-embed imgPhoto aligncenter\" src=\"https:\/\/d.newsweek.com\/en\/full\/1798064\/covert-communications-devices-fake-bricks-afghanistan.jpg?w=790&amp;f=10c92da3ecff1f90a2c73e2a8f616804\" alt=\"covert communications devices fake bricks afghanistan\" width=\"790\" height=\"527\" \/><\/picture><\/div><figcaption class=\"caption\"><span class=\"cap\">Covert communication (COVCOMM) device. Fake brick implanted with battery-powered listening device, used in &#8220;close in&#8221; reconnaissance work in Afghanistan. Photo provided to William M. Arkin.<\/span> <span class=\"credit\">W.M. Arkin<\/span><\/figcaption><\/figure>\n<p>&#8220;And who do you think implants those devices?&#8221; Connolly asks rhetorically. &#8220;Military guys, special ops guys working to support even more secretive operations.&#8221; Connolly talks about heated fabrics that make soldiers invisible to thermal detection, electric motorcycles that can silently operate in the roughest terrain, even how tens of feet of wires are sown into &#8220;native&#8221; clothing, the South Asian shalwar kameez, the soldiers themselves then becoming walking receivers, able to intercept nearby low-power radios and even cell phone signals.<\/p>\n<p><strong>Fake hands, fake faces<\/strong><\/p>\n<p>Wigs. Covert communications devices. Fake rocks. In our world of electronic everything, where everything becomes a matter of record, where you can&#8217;t enter a parking garage without the license plate being recorded, where you can&#8217;t check in for a flight or a hotel without a government issued ID, where you can&#8217;t use a credit card without the location being captured, how can biometrics can be defeated? How can someone get past fingerprint readers?<\/p>\n<p>In 99 out of 100 cases, the answer is: there is no need to. Most signature reduction soldiers travel under real names, exchanging operational identities only once on the ground where they operate. Or they infiltrate across borders in places like Pakistan and Yemen, conducting the most dangerous missions. These signature reduction missions are the most highly sensitive and involve &#8220;close in&#8221; intelligence collection or the use of miniaturized enemy tracking devices, each existing in their own special access programs\u2014missions that are so sensitive they have to be personally approved by the Secretary of Defense.<\/p>\n<p>For the one percent, though, for those who have to make it through passport control under false identities, there are various biometrics defeat systems, some physical and some electronic. One such program was alluded to in a little noticed document dump published by <a target=\"_blank\" href=\"https:\/\/www.newsweek.com\/topic\/wikileaks\"  data-sys=\"1\">Wikileaks<\/a> in early 2017 and called &#8220;Vault 7&#8221;: over 8,000 classified CIA tools used in the covert world of electronic spying and hacking. It is called ExpressLane, where U.S. intelligence has embedded malware into foreign biometrics and watchlist systems, allowing American cyber spies to steal foreign data.<\/p>\n<p>An IT wizard working for Wikileaks in Berlin says the code with ExpressLane suggests that the United States can manipulate these databases. &#8220;Imagine for a moment that someone is going through passport control,&#8221; he says, hesitant to use his real name because of fear of indictment in the United States. &#8220;NSA or the CIA is tasked to corrupt\u2014change\u2014the data on the day the covert asset goes through. And then switch it back. It&#8217;s not impossible.&#8221;<\/p>\n<figure class=\"imageBox\">\n<div class=\"innerBox\"><picture class=\"mapping-embed\"><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798367\/silicon-hand-fake-fingerprints-spycraft.webp?w=790&amp;f=e4d50ee16e9e67c158f146e7edd3fa41 1x\" type=\"image\/webp\" media=\"(min-width: 992px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798367\/silicon-hand-fake-fingerprints-spycraft.jpg?w=790&amp;f=e4d50ee16e9e67c158f146e7edd3fa41 1x\" type=\"image\/jpeg\" media=\"(min-width: 992px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798367\/silicon-hand-fake-fingerprints-spycraft.webp?w=900&amp;f=1861394f3d656c1e2faf8e788e4d42bc 1x\" type=\"image\/webp\" media=\"(min-width: 768px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798367\/silicon-hand-fake-fingerprints-spycraft.jpg?w=900&amp;f=1861394f3d656c1e2faf8e788e4d42bc 1x\" type=\"image\/jpeg\" media=\"(min-width: 768px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798367\/silicon-hand-fake-fingerprints-spycraft.webp?w=790&amp;f=e4d50ee16e9e67c158f146e7edd3fa41 1x\" type=\"image\/webp\" media=\"(min-width: 481px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798367\/silicon-hand-fake-fingerprints-spycraft.jpg?w=790&amp;f=e4d50ee16e9e67c158f146e7edd3fa41 1x\" type=\"image\/jpeg\" media=\"(min-width: 481px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798367\/silicon-hand-fake-fingerprints-spycraft.webp?w=450&amp;f=75870348337deb4c0c99ea6033145116 1x\" type=\"image\/webp\" media=\"(min-width: 0px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798367\/silicon-hand-fake-fingerprints-spycraft.jpg?w=450&amp;f=75870348337deb4c0c99ea6033145116 1x\" type=\"image\/jpeg\" media=\"(min-width: 0px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798367\/silicon-hand-fake-fingerprints-spycraft.webp?w=790&amp;f=e4d50ee16e9e67c158f146e7edd3fa41\" type=\"image\/webp\" \/><img loading=\"lazy\" decoding=\"async\" id=\"i1798367\" class=\"mapping-embed imgPhoto aligncenter\" src=\"https:\/\/d.newsweek.com\/en\/full\/1798367\/silicon-hand-fake-fingerprints-spycraft.jpg?w=790&amp;f=e4d50ee16e9e67c158f146e7edd3fa41\" alt=\"silicon hand fake fingerprints spycraft\" width=\"790\" height=\"583\" \/><\/picture><\/div><figcaption class=\"caption\"><span class=\"cap\"> A manufactured silicon hand sleeve, used to evade fingerprinting and to create fake identities for clandestine travelers. (Photo provided to William M. Arkin)<\/span> <span class=\"credit\">W. M. Arkin<\/span><\/figcaption><\/figure>\n<p>Another source pointed to a small rural North Carolina company in the signature reduction industry, mostly in the clandestine collection and communications field. In the workshop and training facility where they teach operators how to fabricate secret listening devices into everyday objects, they are at the cutting edge, or so their promotional materials say, a repository for molding and casting, special painting, and sophisticated aging techniques.<\/p>\n<figure class=\"imageBox\">\n<div class=\"innerBox\"><picture class=\"mapping-embed\"><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798371\/mask-undercover-agent-spy-craft.webp?w=790&amp;f=ea2c65ef52d04e4bb1e5efd8062180a4 1x\" type=\"image\/webp\" media=\"(min-width: 992px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798371\/mask-undercover-agent-spy-craft.jpg?w=790&amp;f=ea2c65ef52d04e4bb1e5efd8062180a4 1x\" type=\"image\/jpeg\" media=\"(min-width: 992px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798371\/mask-undercover-agent-spy-craft.webp?w=900&amp;f=5051331c42fda6755b4aeec7e3079aaa 1x\" type=\"image\/webp\" media=\"(min-width: 768px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798371\/mask-undercover-agent-spy-craft.jpg?w=900&amp;f=5051331c42fda6755b4aeec7e3079aaa 1x\" type=\"image\/jpeg\" media=\"(min-width: 768px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798371\/mask-undercover-agent-spy-craft.webp?w=790&amp;f=ea2c65ef52d04e4bb1e5efd8062180a4 1x\" type=\"image\/webp\" media=\"(min-width: 481px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798371\/mask-undercover-agent-spy-craft.jpg?w=790&amp;f=ea2c65ef52d04e4bb1e5efd8062180a4 1x\" type=\"image\/jpeg\" media=\"(min-width: 481px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798371\/mask-undercover-agent-spy-craft.webp?w=450&amp;f=db15b5e208526666bdc8b0251a6e33f0 1x\" type=\"image\/webp\" media=\"(min-width: 0px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798371\/mask-undercover-agent-spy-craft.jpg?w=450&amp;f=db15b5e208526666bdc8b0251a6e33f0 1x\" type=\"image\/jpeg\" media=\"(min-width: 0px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798371\/mask-undercover-agent-spy-craft.webp?w=790&amp;f=ea2c65ef52d04e4bb1e5efd8062180a4\" type=\"image\/webp\" \/><img loading=\"lazy\" decoding=\"async\" id=\"i1798371\" class=\"mapping-embed imgPhoto aligncenter\" src=\"https:\/\/d.newsweek.com\/en\/full\/1798371\/mask-undercover-agent-spy-craft.jpg?w=790&amp;f=ea2c65ef52d04e4bb1e5efd8062180a4\" alt=\"mask for undercover agent spy craft\" width=\"790\" height=\"730\" \/><\/picture><\/div><figcaption class=\"caption\"><span class=\"cap\">Behind the mask: The signature reduction mold for an aging mask, used to completely alter the appearance of an operative. (Photo provided to William M. Arkin)<\/span> <span class=\"credit\">W. M. Arkin<\/span><\/figcaption><\/figure>\n<p>This quiet company can transform any object, including a person, as they do in Hollywood, a &#8220;silicon face appliance&#8221; sculpted to perfectly alter someone&#8217;s looks. They can age, change gender, and &#8220;increase body mass,&#8221; as one classified contract says. And they can change fingerprints using a silicon sleeve that so snugly fits over a real hand it can&#8217;t be detected, embedding altered fingerprints and even impregnated with the oils found in real skin. Asked whether the appliance is effective, one source, who has gone through the training, laughs. &#8220;If I tell you, I&#8217;ll have to kill you.&#8221;<\/p>\n<div class=\"imageLeft\" style=\"text-align: center;\">\n<div class=\"innerBox\"><picture class=\"mapping-embed\"><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798369\/spy-craft-agent-silicon-mask-military.webp?w=300&amp;f=3e31eb00bcc8b11a4a329822e3faf49b 1x\" type=\"image\/webp\" media=\"(min-width: 992px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798369\/spy-craft-agent-silicon-mask-military.jpg?w=300&amp;f=3e31eb00bcc8b11a4a329822e3faf49b 1x\" type=\"image\/jpeg\" media=\"(min-width: 992px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798369\/spy-craft-agent-silicon-mask-military.webp?w=300&amp;f=3e31eb00bcc8b11a4a329822e3faf49b 1x\" type=\"image\/webp\" media=\"(min-width: 768px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798369\/spy-craft-agent-silicon-mask-military.jpg?w=300&amp;f=3e31eb00bcc8b11a4a329822e3faf49b 1x\" type=\"image\/jpeg\" media=\"(min-width: 768px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798369\/spy-craft-agent-silicon-mask-military.webp?w=300&amp;f=3e31eb00bcc8b11a4a329822e3faf49b 1x\" type=\"image\/webp\" media=\"(min-width: 481px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798369\/spy-craft-agent-silicon-mask-military.jpg?w=300&amp;f=3e31eb00bcc8b11a4a329822e3faf49b 1x\" type=\"image\/jpeg\" media=\"(min-width: 481px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798369\/spy-craft-agent-silicon-mask-military.webp?w=300&amp;f=3e31eb00bcc8b11a4a329822e3faf49b 1x\" type=\"image\/webp\" media=\"(min-width: 0px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798369\/spy-craft-agent-silicon-mask-military.jpg?w=300&amp;f=3e31eb00bcc8b11a4a329822e3faf49b 1x\" type=\"image\/jpeg\" media=\"(min-width: 0px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798369\/spy-craft-agent-silicon-mask-military.webp?w=300&amp;f=3e31eb00bcc8b11a4a329822e3faf49b\" type=\"image\/webp\" \/><img loading=\"lazy\" decoding=\"async\" id=\"i1798369\" class=\"mapping-embed imgPhoto aligncenter\" src=\"https:\/\/d.newsweek.com\/en\/full\/1798369\/spy-craft-agent-silicon-mask-military.jpg?w=300&amp;f=3e31eb00bcc8b11a4a329822e3faf49b\" alt=\"spy craft agent silicon mask military\" width=\"300\" height=\"348\" \/><\/picture><\/div>\n<p><span class=\"cap\">Not his face: Special operations undercover operative wearing signature reduction aging mask to match false identification. (Photo provided to William M. Arkin)<\/span> <span class=\"credit\">W.M. Arkin<\/span><\/p>\n<\/div>\n<p>In real life, identity theft (mostly by criminals&#8217; intent on profit) remains an epidemic that affects everyone, but for those in the intelligence and counter-terrorism worlds, the enemy is also actively engaged in efforts to compromise personal information. In 2015, the Islamic State posted the names, photos and addresses of over 1,300 <a target=\"_blank\" href=\"https:\/\/www.newsweek.com\/topic\/u.s.-military\"  data-sys=\"1\">U.S. military<\/a> personnel, instructing supporters to target and kill the identified individuals. The FBI said that the release was followed by suspected Russian hackers who masqueraded as members of ISIS and threatened military families through <a target=\"_blank\" href=\"https:\/\/www.newsweek.com\/topic\/facebook\"  data-sys=\"1\">Facebook<\/a>. &#8220;We know everything about you, your husband and your children,&#8221; one menacing message said.<\/p>\n<p>Counterintelligence and OPSEC officials began a large-scale effort to inform those affected but also to warn military personnel and their families to better protect their personal information on social media. The next year, ISIS released 8,318 target names: the largest-ever release until it was topped by 8,785 names in 2017.<\/p>\n<p>It was revealed that military personnel sharing location information in their fitness devices were apparently revealing the locations of sensitive operations merely by jogging and sharing their data. &#8220;The rapid development of new and innovative information technologies enhances the quality of our lives but also poses potential challenges to operational security and force protection,&#8221; U.S. Central Command said in a statement at the time to the <em>Washington Post.<\/em><\/p>\n<p>Then came the DNA scare, when Adm. John Richardson, then chief of naval operations, warned military personnel and their families to stop using at-home ancestry DNA test kits. &#8220;Be careful who you send your DNA to,&#8221; Richardson said, warning that scientific advancements would be able to exploit the information, creating more and more targeted biological weapons in the future. And indeed in 2019, the Pentagon officially advised military personnel to steer clear of popular DNA services. &#8220;Exposing sensitive genetic information to outside parties poses personal and operational risks to Service members,&#8221; said the memo, first reported by Yahoo news.<\/p>\n<p>&#8220;We&#8217;re still in the infancy of our transparent world,&#8221; says the retired senior officer, cautioning against imagining that there is some &#8220;identity gap&#8221; similar to the &#8220;bomber gap&#8221; of the Cold War. &#8220;We&#8217;re winning this war, including on the cyber side, even if secrecy about what we are doing makes the media portrayal of the Russians again look like they are ten feet tall.&#8221;<\/p>\n<p>He admits that processing big data in the future will likely further impinge on everyone&#8217;s clandestine operations, but he says the benefits to society, even narrowly in just making terrorist activity and travel that much more difficult, outweigh the difficulties created for military operational security. The officer calls the secrecy legitimate but says that the Defense Department leadership has dropped the ball in recognizing the big picture. The military services should be asking more questions about the ethics, propriety and even legality of soldiers being turned into spies and assassins, and what this means for the future.<\/p>\n<p>Still, the world of signature reduction keeps growing: evidence, says the retired officer, that modern life is not as transparent as most of us think.<\/p>\n<figure class=\"imageBox\">\n<div class=\"innerBox\"><picture class=\"mapping-embed\"><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798050\/defense-programs-support-activity-signature-reduction.webp?w=790&amp;f=fdd09552fa5d9613c6ca8f257b86a394 1x\" type=\"image\/webp\" media=\"(min-width: 992px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798050\/defense-programs-support-activity-signature-reduction.jpg?w=790&amp;f=fdd09552fa5d9613c6ca8f257b86a394 1x\" type=\"image\/jpeg\" media=\"(min-width: 992px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798050\/defense-programs-support-activity-signature-reduction.webp?w=900&amp;f=234fc28f5cc02f706ad8afc2dbc2c342 1x\" type=\"image\/webp\" media=\"(min-width: 768px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798050\/defense-programs-support-activity-signature-reduction.jpg?w=900&amp;f=234fc28f5cc02f706ad8afc2dbc2c342 1x\" type=\"image\/jpeg\" media=\"(min-width: 768px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798050\/defense-programs-support-activity-signature-reduction.webp?w=790&amp;f=fdd09552fa5d9613c6ca8f257b86a394 1x\" type=\"image\/webp\" media=\"(min-width: 481px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798050\/defense-programs-support-activity-signature-reduction.jpg?w=790&amp;f=fdd09552fa5d9613c6ca8f257b86a394 1x\" type=\"image\/jpeg\" media=\"(min-width: 481px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798050\/defense-programs-support-activity-signature-reduction.webp?w=450&amp;f=d93e4a918eb23c8d1360aa70e94bfceb 1x\" type=\"image\/webp\" media=\"(min-width: 0px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798050\/defense-programs-support-activity-signature-reduction.jpg?w=450&amp;f=d93e4a918eb23c8d1360aa70e94bfceb 1x\" type=\"image\/jpeg\" media=\"(min-width: 0px)\" \/><source srcset=\"https:\/\/d.newsweek.com\/en\/full\/1798050\/defense-programs-support-activity-signature-reduction.webp?w=790&amp;f=fdd09552fa5d9613c6ca8f257b86a394\" type=\"image\/webp\" \/><img loading=\"lazy\" decoding=\"async\" id=\"i1798050\" class=\"mapping-embed imgPhoto aligncenter\" src=\"https:\/\/d.newsweek.com\/en\/full\/1798050\/defense-programs-support-activity-signature-reduction.jpg?w=790&amp;f=fdd09552fa5d9613c6ca8f257b86a394\" alt=\"Defense Programs Support Activity: Signature Reduction\" width=\"790\" height=\"593\" \/><\/picture><\/div><figcaption class=\"caption\"><span class=\"cap\">The Defense Programs Support Activity, also known as the Operational Planning and Travel Intelligence Center, one of the epicenters for signature reduction administration. (photo provided to William M. Arkin)<\/span> <span class=\"credit\">W.M. Arkin<\/span><\/figcaption><\/figure>\n<p>________________________________________________<\/p>\n<p style=\"padding-left: 40px;\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/06\/william-m-arkin.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-thumbnail wp-image-186933\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2021\/06\/william-m-arkin-150x150.jpg\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><em>William M. Arkin has been working in\u00a0 the field of national security for almost 50 years, as an Army intelligence analyst, activist, author, journalist, academic and consultant. He has authored or coauthored more than a dozen books, two of them (<\/em>Top Secret America <em>and<\/em> Nuclear Battlefields<em>) national best sellers. He is the recipient of numerous journalism awards and his articles have appeared on the front pages of<\/em> The Washington Post, The New York Times, <em>and<\/em> The Los Angeles Times<em>. He has written numerous cover stories for <\/em>Newsweek <em>magazine. And he <\/em><em>served for decades as an analyst for <\/em>NBC <em>until 2019, when he <a target=\"_blank\" href=\"https:\/\/medium.com\/@ggreenwald\/full-email-from-william-arkin-leaving-nbc-and-msnbc-1fb0d1dc692b\" >quit<\/a> over the network\u2019s increasing militarism under Trump.<\/em><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/www.newsweek.com\/exclusive-inside-militarys-secret-undercover-army-1591881\" >Go to Original &#8211; newsweek.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The largest undercover force the world has ever known is the one created by the Pentagon over the past decade. Some 60,000 people belong to this secret army working under masked identities in a program called &#8220;signature reduction.&#8221; More than ten times the size of the clandestine elements of the CIA, it carries out domestic and foreign assignments in military uniforms or civilian cover, in real life and online, hiding in private businesses and consultancies, some of them household name companies. <\/p>\n","protected":false},"author":4,"featured_media":186933,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[57],"tags":[1126,1050,2462,112,1109,911,95,70],"class_list":["post-186932","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-militarism","tag-hegemony","tag-imperialism","tag-military-industrial-media-complex","tag-pentagon","tag-spying","tag-surveillance","tag-us-military","tag-usa"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/186932","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=186932"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/186932\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media\/186933"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=186932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=186932"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=186932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}